How Do You Secure New Technology?
Hackers are relentless adversaries who incessantly create new tools and methodologies to take advantage of known exploitable vulnerabilities within networks.
Hackers are relentless adversaries who incessantly create new tools and methodologies to take advantage of known exploitable vulnerabilities within networks.
HALOCK contained and eradicated a ransomware attack on a manufacturing company’s internal assets and set a wholistic plan to mitigate future risk through enhanced MFA, policies, and training.
During the pandemic HALOCK and the information security community have been responding to a significant spike in cyber security incidents.
Organizations are facing a lot of change with remote work set ups – in both physical location and operational shifts. Especially challenged are businesses that manage credit card information electronically and over the phone. These new working conditions unearth new risks for sensitive data. Social distancing can also bring about more social engineering attempts. According […]
As news of Covid-19 grows in the news, so do cyber attacks, taking advantage of newly-remote workers and the population wanting to learn more of our evolving landscape. Be alert and cautious of unfamiliar emails or calls that disguise themselves as official health organizations you receive or promises of the stimulus package payout. Here are […]
From the Cyber Security Awareness Poster Best of Breed series, meet the inspirations behind the Cyber Tips.
With Privacy Laws such as CCPA, 2020 focuses on the Importance of Respecting Privacy, Safeguarding Data and Enabling Trust – Data Privacy Day is a day to remember.
Since 2017, the Verizon Database Investigations Report repeatedly shows that more than 80 percent of hacking related breaches each year are tied to passwords.
As the cybersecurity industry grows, so do the concepts and terms to help us manage security policies and business objectives. This edition of ‘What is the Meaning of This?’ focuses on duty of care, reasonableness, and CIS RAM.
Passwords continue to be the primary means that enterprises use to protect user identities. But what is protecting the passwords?