d="M-1758.665,2068.243a1.354,1.354,0,0,1-.418.382,1.412,1.412,0,0,1-.51.179,1.482,1.482,0,0,1-.548-.028,1.475,1.475,0,0,1-.533-.253,1.459,1.459,0,0,1-.394-.427,1.483,1.483,0,0,1-.2-.517,1.378,1.378,0,0,1,.014-.543,1.375,1.375,0,0,1,.237-.512,1.4,1.4,0,0,1,.421-.384,1.342,1.342,0,0,1,.516-.18,1.465,1.465,0,0,1,.549.034,1.488,1.488,0,0,1,.524.251,1.514,1.514,0,0,1,.4.428,1.4,1.4,0,0,1,.194.512,1.394,1.394,0,0,1-.02.544A1.416,1.416,0,0,1-1758.665,2068.243Z" transform="translate(1808.553 -1857.125)"/>
  • Solutions
  • Services
    • cybersecurity iconCybersecurity
    • Icons representing Compliance by a document with a checkmark.Compliance
    • Icon representing Managed Services by displaying a gearManaged Services
  • Company
    • Icon if the Steel Root logomark for the about us pageAbout Us
    • Icon of three individuals simplified to represent technology partners of Steel RootOur Partners
    • Icon of a suitcase for Steel Root Careers pageCareers + Culture
  • Trust Lab
  • Customer Support
    • Remote help icon of a computer being operated remotelyRemote HelpOn-screen support for existing customers
    • Icon of calendar and clock for schedule a meetingBook an Appointment
Get Started

World-class CyberSecurity

  • You are currently browsing the Steel Root blog archives for October, 2017.

  • Pages

    • Home
    • Terms and Conditions
    • Get Started
    • Penetration Testing
    • Solutions
      • Aerospace & Defense
      • Technology
      • Real Estate
      • Protect Sensitive Data
      • Build a Mature Cybersecurity Practice
      • Assess and Test Your Cybersecurity Posture
      • Secure Your Startup or Small Business
      • Augment Your Cybersecurity Team
      • Regulatory Compliance
      • Audit Preparation
      • Advisory Services
      • Microsoft 365 GCC High
    • Services
      • Cybersecurity
        • Cybersecurity Assessment
        • Cybersecurity Consulting
        • Security Controls Testing
        • SOC & SIEM
        • Vulnerability Management
        • Endpoint Security
        • Network Security
        • Email Security
        • Data Security & Insider Threat
        • Incident Response
        • Threat Intelligence
      • Compliance
        • CMMC Certification Prep
        • Secure Enclave
        • Industry Standards (NIST CSF, SOC2, CIS)
        • Regulatory Compliance
        • Government Contracting (FAR, DFARS)
        • Security Controls Testing
        • Policy Development
      • Managed Services
        • Managed IT Services
        • Managed Cybersecurity Services
        • Managed Compliance Services
    • Company
      • About Us
      • Our Partners
      • Careers + Culture
    • Trust Lab
      • Blog
    • Privacy Policy
    • Remote Help
    • Book Appointment
  • Archives

    • December 2020
    • November 2020
    • September 2020
    • August 2020
    • July 2020
    • June 2020
    • May 2020
    • October 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • March 2019
    • February 2019
    • January 2019
    • October 2018
    • September 2018
    • July 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • March 2017
  • Categories

    • +Featured (12)
    • Insights (36)
    • Press (14)
    • Services
      • CMMC Consulting
      • Microsoft GCC High
      • SOC & SIEM
      • Insider Threat
      • Threat Intelligence
      • Managed Security
    • Company
      • About Us
      • Partners
      • Careers + Culture
      • Trust Lab
    • Contact Us
      • Get Started
      • Remote Help

    Twitter Feed

    Contact Info

    16 Front St., Ste. 202

    Salem, MA 01970

    info@steelroot.us 1-978-312-7668

    © 2021 Steel Root LLC. All Rights Reserved.

    • Privacy Policy
    • Terms & Conditions
    Privacy is a human right. We respect your privacy and we don't store your personal details, but you should be aware that this website uses cookies for site analytics.I understand and accept the use of cookies.