Keeping compliant with the myriad of regulations that currently abound is one of the major challenges facing the enterprise and its leaders today.

Tevora Blog

  • Archives

Tevora has offices at the following locations:

Southern California: (Headquarters)

One Spectrum Pointe Drive, Suite 200
Lake Forest, California 92630.
Tel: 949.250.3290
Fax: 949.250.9993
Driving directions

Tevora One of OC’s Fastest Private Growing Companies by Orange County Business Journal

Wednesday, 24 September 2014 by

Tevora is pleased to announce its designation as one of the fastest growing privately-held companies in Orange County by the Orange County Business Journal.  Tevora showed an impressive growth of more than 213 percent over the past three years and revenue of $11.8 million for the past year, placing Tevora at number 13 on the […]

(continue reading…)

Basic Methods to Secure your Smartphone

Thursday, 4 September 2014 by

By Matt Mosley and Paul Bertolone

(continue reading…)

Tevora Awarded Prestigious HITRUST CSF Assessor Status for Competence and Integrity

Thursday, 28 August 2014 by

Tevora has been awarded HITRUST (Health Information Trust Alliance) CSF Assessor status recognizing the quality and integrity of Tevora and the service it provides.

(continue reading…)

Tevora Earns Distinction as One of Inc. Magazine’s Fastest Growing Companies

Friday, 22 August 2014 by
Inc. 5000

Tevora is pleased to announce its designation as one of the fastest growing private companies in the nation by Inc. Magazine.  Placing in the top quarter of all 5,000 private companies  ranked in the    exclusive Inc. 500/5000 list, Tevora showed an impressive growth of 383% over the past three years ranking it as number […]

(continue reading…)

Protecting Against ‘Zero Day’ Exploits

Monday, 18 August 2014 by

As cyber-criminals grow more sophisticated in skill and resource, the potential impact of exploits on personal, government and business systems has grown.

(continue reading…)

Splunk Setup Guide

Thursday, 10 April 2014 by

Splunk is a powerful tool for collecting and processing log files from a variety of systems and devices.  The true power of Splunk comes from the search and reporting capabilities available.  This guide is centered around providing a simple Splunk server that can receive logs from a Windows system.  This instance can be used to […]

(continue reading…)

Penetration Tests Are Not Vulnerability Assessments

Monday, 30 September 2013 by
penetration-testing- 9302013

I often, as well as many of my peers and colleagues, have to explain to a client the difference between a vulnerability assessment and a penetration test.  There are a lot of security consulting firms out there that show up to a client’s worksite, run a vulnerability scanner, validate some findings, copy and paste the scanner’s […]

(continue reading…)

SIM Card Hack Causes Major Headaches for Business

Friday, 26 July 2013 by
ML 7-26-2013

More than 20 years after its initial inception, the SIM card has been hacked. A German cryptographer named Karsten Nohl will be presenting findings to that effect at the annual Black Hat computer security conference at the end of the month.

(continue reading…)

HP Builds Backdoors into Storage Products… Always a Bad Thing?

Tuesday, 16 July 2013 by
ML 7-16-2013

In what should come as a surprise to just about nobody, Hewlett-Packardrevealed on July 9th that their StoreVirtual Storage products contain hidden administrator accounts with root access that can be used by HP support to access the operating system. The account exists “to help customers resolve complex support issues”. Thankfully, HP claims, the account isn’t able to […]

(continue reading…)

Tag Team Virus Duo Discovered

Tuesday, 2 July 2013 by
ML 7-2-2013

Security researchers from Microsoft have discovered an interesting and unique virus combo – two unique malware programs that work together in an effort to bypass antivirus software by automatically downloading the other virus should it be removed from the host computer.

(continue reading…)