Insider Threats – Your Employee May Be Your Greatest Risk
by Jake Dwares on June 12, 2023 at 10:30 AM
In February of 2018, Ashley Liles was working as an IT Security Analyst at an Oxford based company that suffered a ransomware attack. Ashley jumped at the opportunity, not to help the company, but to enrich himself by piggybacking on the initial ransomware attack and attempting to tri …
MSP Breaches Opening the Door to Further Attacks on Clients
by Jake Dwares on August 10, 2022 at 1:00 PM
Is your Managed Service Provider (MSP) protecting yours and your client’s data? Are you regularly assessing your MSP and the rest of your vendors? It is no secret that hackers have gained access to more and larger companies over the past few years, but a new malicious tactic is coming …
Access Control to Combat Domestic and Global Threats
by Bryan Borrayo on August 4, 2022 at 1:00 PM
By now, most cybersecurity professionals have heard of the term access control. Access control is a method of guaranteeing that users are who they say they are and that they have the appropriate access to company data. Access control is comprised of two main components: authentication …
Karakurt Data Extortion Group – A New Approach to Ransomware
by William DePalma on July 7, 2022 at 2:45 PM
You may be growing tired of hearing the word “ransomware” by now, but this critical threat is unfortunately only continuing to grow at an exponential speed. The Verizon Business 2022 Data Breach Investigations Report (2022 DBIR) notes that ransomware breaches increased by thirteen per …
Revisiting the Apache Log4j Vulnerability
by Danielle Corsa on March 3, 2022 at 1:00 PM
By now, most are aware of the Apache Log4j vulnerability that was announced in December of 2021. The exposure is widespread in Java applications, and I have been discovering that many companies are affected by it. Remediation is imperative to ensure that attackers do not exploit affec …
Ransomware Disrupting Your Beer Supply
by Peter Fellini on July 16, 2021 at 1:00 PM
When brainstorming blog topics, it often helps to find intersections between your profession and your personal interests. In this case, that intersection is cybersecurity and brewing beer, respectively. But what could beer possibly have to do with cybersecurity?