by Katherine Parker | Apr 25, 2019 | Data Breach Response, Incident Response Plan, Malware Incident Response, Network Remediation, Network Security, Runbook
FollowFollowFollowFollow Print Article You might have heard about the ransomware attack on Arizona Beverage Company a few weeks ago. Since the attack, the company has needed several weeks of network remediation to recover. They have thrown hundreds of thousands of...
by Katherine Parker | Apr 17, 2019 | Data Breach Response, Data Security, Network Security, Network Visibility, Uncategorized
A few days ago Charlie Osborne for Zero Day wrote about a card skimming malware that had been active and collecting the payment card data of AeroGrow customers for months before it was ever detected. In other words, AeroGrow was in the middle of a malware cyberattack...
by Katherine Parker | Apr 8, 2019 | Data Security, Education Industry IT, Network Security, Uncategorized
FollowFollowFollowFollow Print Article The US Department of Justice is now executing the second round of the School Violence Prevention Program (SVPP) initiatives, continuing an investment in the technology, coordination and training necessary for a safer K-12 school...
by Katherine Parker | Apr 5, 2019 | Data Security, Email Environment Security, Incident Response Plan, Network Security, Network Visibility, Penetration Test, Runbook
This is Part 2 of Network Security Across the Full CyberAttack Continuum: Defenses To Have Before The Attack Happens. Part 1 covers some new Malware Innovations, the importance of Trained Staff to help network users identify and deflect malicious activity, and the...
by Katherine Parker | Apr 5, 2019 | Data Security, Network Security, Network Visibility
Cyber criminals are clever people. Moreover, they are not hoodie-wearing loners in basements. This character sketch is entirely misleading to the real threat that cyber criminals are. They are organized, syndicated, and global. Their motivations are many. They may be...
Recent Comments