Category Archives: Compromise Assessments
RANSOMWARE ON THE RISE (again)
The top 6 things you should do right now to prepare and defend against a ransomware attack.(more…)
2021 Cyber Trends
While large-scale transitions to our business environments changed in 2020 due to the COVID outbreak and implementation of remote work strategies, we are still forecasting how to create an adaptable security plan for the near future. Many are probably more than ready to move on to 2021 as quickly as possible, while hoping for a more stable and unobtrusive year ahead. In order to ensure that your desired level of “regularity” becomes reality, it is critical to understand what cybersecurity trends will play out in 2021. Our professionals shared some insight on key areas to focus. (more…)
Cyber Security Case Study: Ransomware at a Manufacturing Company
HALOCK contained and eradicated a ransomware attack on a manufacturing company’s internal assets and set a wholistic plan to mitigate future risk through enhanced MFA, policies, and training. (more…)
HALOCK Pandemic Breaches Bulletin
Common Causes for the Recent Major Spike in Security Incidents(more…)
How Prepared Are You for a Cyber Security Incident?
In the past decade we have seen companies defined by how their leadership responded to a cyber security incident. The most prominent incident is a data breach, which is becoming a too common occurrence, involving billions of people. (more…)
RANSOMWARE IS THE NEW MULTI-LEVEL MARKETING BUSINESS
By Erik Leach
2016 has proven to be a banner year for Ransomware. The year kicked off with a series of ransomware attacks on a trio of hospitals including the well-publicized incident at Hollywood Presbyterian Medical Center which forced its IT staff to shut down the network while coerced administration officials agreed to pay a $17,000 bitcoin ransom. The year is culminating in dramatic fashion as well as thousands of San Francisco commuters got to ride for free as a result of a ransomware attack on the San Francisco Municipal Transportation Agency which infected 2,112 computers and took its light rail transit system offline for more than 24 hours. (more…)
EMPLOYEE SOCIAL MEDIA ACCOUNTS MAKING YOUR NETWORK VULNERABLE?
Social media seems harmless enough especially when your employees stick to using it for personal reasons, but it can indirectly be responsible for critical security breaches. With some social engineering and patience, an attacker can use personal social media profile information to gain access to your corporate network. The attack is completely outside of your control and uses a combination of social engineering and phishing attack techniques. (more…)