Municipal Ransomware Attacks 2019

Municipal Ransomware Attacks
Municipal ransomware attacks took the stage in an unprecedented way in 2019. Not only was the use of ransomware by cybercriminals more prevalent, but it was more sophisticated.  New iterations of Ryuk, Purga, and Stop ransomwares were leveraged against everyone from the small business owner to government entities. What got the attention of the federal government in 2019 was the predominant focus on...

The Rise Of Iranian Hacker Groups and What It Means For Organizations

Iranian Hacker Groups
While the intensity of the current geopolitical situation seems to have faded from the headlines as news organizations are mesmerized by impeachment proceedings, don’t be fooled into believing that the threat landscape has not dramatically changed. Worsening U.S-Iranian relations coupled with the rise of Iranian cyber attacks, Iranian sponsored cyber attacks, has proved that it's high time organizations started looking at information security as a business risk and...

Cloud Security Management: How Automated IT Security Policy Monitoring Can Help Organizations In Their Cloud Adoption Journey

Cloud Security Management How Automated IT Security Policy Monitoring Can Help Organizations In Their Cloud Adoption Journey
It becomes necessary for businesses to employ robust Cloud security management policies to prevent malicious attacks by these cybercriminals. Let’s see how automated IT Security policy monitoring can help enterprises in migrating to and adopting Cloud successfully.  Cloud Security Management There are a growing number of ‘born-in-cloud’ companies, and there are the ones that are still reluctant to migrate to...

Iran’s Cyber Warfare Capacity – A Threat Without Boundaries

Iran’s Cyber Warfare Capacity
The United States has had a protracted adversarial relationship with Iran dating back to the end of the Islamic Revolution in 1979.  In 2010, the U.S. and Israel infected computers running Iran’s nuclear program with the Stuxnet virus in an attempt to slow Iran’s progress toward nuclear capability. Since that time, the adversarial relationship has increasingly played out in cyberspace.  Iran has invested heavily in...

Cyberattacks On Municipalities & Government Machinery Surge

Municipalities and other forms of government are under constant threat from cybercriminals. Learn how to prevent cyberattacks, and safeguard digital assets for enhanced cybersecurity and risk management
How To Prevent An Attack & Protect Information Resources As a precautionary measure following a possible Ryuk ransomware attack on government information infrastructure, the mayor of New Orleans declared a state of emergency. This is one example of many attacks that have taken place over the last year. Municipalities and other forms of government are under constant threat from cybercriminals.Learn how topreventcyberattacks, andsafeguard digital assets for enhanced cybersecurity and risk management.  At 5:00 am,...

Cost of Cybersecurity

What is the Cost of Effective Cybersecurity? Organizations across the globe are getting more familiar with the need for a robust cybersecurity strategy, protecting their processes, proprietary information, and confidential client data. The problem that arises is not in their awareness of their IT security needs, but in the implementation of a comprehensive plan to fend...

The Sudden Surge in DDoS Attacks

DDos attacks
Learn how to protect your company’s cloud resources with configuration management, port monitoring, and security auditing tools.  When Criminals Want to Shut Down Your Company’s Access to Cloud-Based Data and Workflow, They Often Implement a DDoS Attack.   A DDoS (Distributed Denial of Service) attack happens when criminals flood your cloud servers and bandwidth with so much traffic that your employees...

Getting Started: Building the Foundations of Cybersecurity for Small to Medium-Sized Businesses

Cybersecurity
Cybersecurity has become a significant concern for all businesses. Most businesses have, at least, attempted to put in measures to secure their systems. While at it, small to medium-sized businesses or enterprises (SMEs) have shown lesser concern for the need for cybersecurity compared to larger firms. Often belittling the probability of attacks, SMEs risk their cyber infrastructure even more....

People, Process, and Technology: The Trifecta of Cybersecurity Programs

Cybersecurity program
Introduction Ensuring that your company’s systems are protected against cyberattacks depends on the proper functioning of each element of your cybersecurity program.  Those core elements are people, process, and technology.  It starts with your team or your “human firewall”, since this can be your weakest link if you neglect it.  Both your people and your...