847.221.0200  Main Office
800.925.0559  INCIDENT RESPONSE HOTLINE

Halock Blog

SOcial-engineering-thumb

HOW TO PROTECT YOURSELF FROM SOCIAL ENGINEERS IN THE SOCIAL MEDIA »


The use of social media like Twitter, Facebook, Instagram, Tumblr, Google Plus, LinkedIn and others have been steadily growing. It is used not only between individuals connecting with their “tweeps,” but also for businesses connecting with their customers, and even politicians with their constituents. Social media platforms have become a forum for sharing all … Read More »

ssl-thumb

PCI DSS v3.1 Coming – SSL No Longer Considered Strong Cryptography »

In a recent bulletin the Payment Card Industry Security Standards Council (PCI SSC) stated that updates will be forthcoming to the Data Security Standard (DSS) version 3.0 – and very soon.  The change is related to vulnerabilities seen with Secure Socket Layer cryptography.
The National Institute of Standards and Technology (NIST) no longer views … Read More »

endpoint-thumb

Endpoint Detection and Response: Fire for Effect »


The modern digital landscape is a battleground rife with adversaries ready and willing to go to great lengths to steal your data. Clever independent attackers and state-sponsored actors alike are deploying increasingly effective versions of cyber-attacks intended to intrude, infect, steal, evade, disrupt and destroy everything they touch. To defend themselves, many businesses … Read More »

valentines-thumb

DON’T BE A SUCKER ON VALENTINE’S DAY »


Valentine’s Day is February 14. Traditionally it’s the one day of the year when people express their love for each other by sending flowers, candies and love notes. But we’re not here to talk about love and candy and flowers… we’re here to talk about how hackers use holidays like this to compromise your … Read More »

healthbreach-thumb

PREPARING FOR YOUR DATA BREACH »


Most InfoSec professionals don’t want to think about becoming the next victim of a major data breach to make the headlines. And yet when faced with another major data breach it is a time when Executive Management and security teams reflect on their own insecurities. The latest breach is being reported as the largest … Read More »

View Older Posts