Why Disabling User Consent in Microsoft365 Is Critical for Preventing Data Breaches
In the world of cloud security, one small setting can open the door to major breaches. One such setting in Microsoft 365—User Consent for Applications—has become a growing target for cybercriminals looking to exploit businesses through social engineering and OAuth abuse.
What Happens When You Fix All the Pen Test Findings?
At Mile High Cyber, one of the most common questions we hear from clients is: “What happens after we fix everything from our penetration test?” It’s a fair question — after all, if you've remediated every vulnerability identified during a security assessment, shouldn't your systems now be secure?
The short answer: you’re safer, but you're not done.
Why Real Hackers Beat Robots: The Case for Human-Led Penetration Testing
At Mile High Cyber, we believe there’s no shortcut to uncovering the risks that truly matter. That’s why we deliver manual, human-directed network and web application penetration testing that consistently outperforms automated tools—especially for organizations with limited IT security budgets.
DMARC, DKIM, and SPF—What’s That?!
DMARC, DKIM, and SPF are email security tools that work together to protect you from phishing by verifying that emails are legitimate and not from imposters. Here’s how they work in simple terms…
Are Macs More Secure Than Windows PCs? A Fresh Look at the Debate
At Mile High Cyber, we often encounter the question: Are Mac (Apple) computers inherently more secure than Windows PCs? This topic has been debated for years, and recent developments, such as Apple’s emergency patches for two zero-day vulnerabilities exploited in targeted iPhone attacks, add new dimensions to the discussion.
The Rising Need for Penetration Testing: Navigating New Regulatory Requirements
Discover why penetration testing is no longer optional—new regulations are requiring proactive 3rd party security testing.
What is Pen Testing and Why You Need It
Pen tests are structured ethical hacking engagements where experts try to infiltrate your network or application as malicious hackers would. The objective? To uncover weak spots and provide actionable recommendations to fortify your defenses.
Change Healthcare Cyberattack
Previously undetected security vulnerabilities resulted in a major data breach for Change Healthcare.