Ben Faircloth

Ben Faircloth is the Graphic Artist for Secure Ideas, as well as a Scout Analyst as needed. Ben Faircloth has a background in physical security from working Law Enforcement for nearly a decade. During this time, he ran control rooms, managed secure facilities, and processed sensitive information. Ben also has a Bachelors of Science degree in Information Technology and Criminal Justice, which he graduated Summa Cum Laude in his class. His passion is to combine his experience, the things that he learns, and his ability to adapt to provide new and imaginative content for Secure Ideas. In his time at Secure Ideas, Ben worked as part of our Scout Testing team, and was a big part of creating our animated User Awareness and testing program. Ben is also responsible for many of the graphics and art that Secure Ideas uses in their logos, website, promotional materials, and social media. As an Analyst, he provides Scout services such as Network, Web, and User testing and reporting for many of Secure Idea’s clients.

Security Misconfigurations

The configuration of web and application servers is a very important aspect of web applications. Often times, failure to manage proper configurations can lead to a wide variety of security vulnerabilities within servers and environments. When these configurations are not properly addressed or ignored, the overall security posture can suffer. Sometimes the biggest problem that …

Security Misconfigurations Read More »

Network Check Ups

Most people know that taking care of your personal health is important. We get regular check ups and try to keep ourselves as healthy and free of potential risks as best we can. During these check ups, a doctor will typically tell us about important health concerns, and recommendations to improve or fix any conditions …

Network Check Ups Read More »

Defending the Wall: Strong Passwords

Strong passwords are an important part of maintaining accounts and of any organization’s security infrastructure.  They are the first line of defense that separates the access of sensitive and confidential information from those who are permitted to view it and those who would do harm with it.  Having good password practices and policies that are …

Defending the Wall: Strong Passwords Read More »

Social Engineering – Why hack it, when people are just giving away their information!

In today’s technologically driven society, more and more criminals have turned to cyber crime as a means to steal information and intrude on other people’s privacy.  These cyber criminals are often thought of as being computer masterminds who know all kinds of backdoors and secret channels to steal information and to get into secure systems. …

Social Engineering – Why hack it, when people are just giving away their information! Read More »

Scroll to Top