RANSOMWARE ON THE RISE (again)
The top 6 things you should do right now to prepare and defend against a ransomware attack.
2021 Cyber Trends
While large-scale transitions to our business environments changed in 2020 due to the COVID outbreak and implementation of remote work strategies, we are still forecasting how to create an adaptable security plan for the near future. Many are probably more than ready to move on to 2021 as quickly as possible, while hoping for a more stable (more…)
Cyber Security Case Study: Ransomware at a Manufacturing Company
HALOCK contained and eradicated a ransomware attack on a manufacturing company’s internal assets and set a wholistic plan to mitigate future risk through enhanced MFA, policies, and training. (more…)
How Prepared Are You for a Cyber Security Incident?
In the past decade we have seen companies defined by how their leadership responded to a cyber security incident. The most prominent incident is a data breach, which is becoming a too common occurrence, involving billions of people. (more…)
The Current State of Financial Services Data Breaches
“Money, Money, Money, Money” is the opening lyrics for the 1973 song, “For the Love of Money.” The soul funk classic goes on to describe all of the dastardly acts that people will do in order to get more money. One of the malevolent acts some are willing to do in the digitally connected world of today is conduct cyber attacks (more…)
RANSOMWARE IS THE NEW MULTI-LEVEL MARKETING BUSINESS
2016 has proven to be a banner year for Ransomware. The year kicked off with a series of ransomware attacks on a trio of hospitals including the well-publicized incident at Hollywood Presbyterian Medical Center which forced its IT staff to shut down the network while coerced administration officials agreed to pay (more…)
EMPLOYEE SOCIAL MEDIA ACCOUNTS MAKING YOUR NETWORK VULNERABLE?
Social media seems harmless enough especially when your employees stick to using it for personal reasons, but it can indirectly be responsible for critical security breaches. With some social engineering and patience, an attacker can use personal social media profile information to gain access to your corporate network. The attack is completely outside of your (more…)
DEMYSTIFYING COMPROMISE ASSESSMENTS
As threat technology rapidly advances, hackers and threat actors leverage all the means at their disposal to deliver malware and compromise your systems and information. To expose these threat actors, a lot of organizations rely heavily on experts in the cyber security field to perform penetration tests and compromise assessments. (more…)