If you've turned on the news at all lately you’ve most likely heard Bitcoin, FTX, and other cryptocurrencies being talked about. What you’ve probably heard less about is the technology powering it, called blockchain.
Read moreRansomware attacks have dramatically increased over the last several years and the attackers are recruiting new members. Renting the ransomware infrastructure for a cut of the ransom money is now very common, allowing many low-tech criminal organizations to join in performing the ransomware attacks.
Read moreRansomware attacks have dramatically increased over the last several years and the threat is continuing to evolve. Researchers now refer to ransomware by the actions it takes: Lock, Encrypt, Delete, Steal, or LEDS.
Read moreRansomware attacks have dramatically increased over the last several years and are aggressively targeting all industries. Based on recent study performed by an international government security agency, the United States and Europe have the most targeted attacks, but attacks are occurring all around the world.
Learn moreRansomware attacks have dramatically increased over the last several years. Unfortunately, they are evolving from a simple ransom, to ransom plus threat of disclosure, and using captured information to commit additional fraud.
Learn moreThe modern corporate landscape is a digital one; business floats on a sea of electronic information that allows for rapid communication and the storage of information on a scale that was incomprehensible just a few years ago.
Learn moreCredit card compliance is required for any organization accepting credit card payments. As the Payment Card Industry (PCI) Security Standards Council (SSC) rolls out PCI Data Security Standard (PCI DSS) v4.0, it is a good time for organizations to review their credit card processes and ensure they will continue to meet the requirements.
Learn moreUnderlying the current world events is an ongoing campaign of cyber attacks. The mix of nation state or criminal activity is debatable, but the attacks are ongoing and increasing in intensity.
Learn moreThe recent announcement of multiple threats to on premise Microsoft Exchange 2013-2019 Servers highlights the need for constant vigilance for internet accessible systems and applications.
Learn moreThe recent intrusion of high profile government systems via the SolarWinds Orion vulnerability has gained quite a bit of media attention and is likely to dominate the cyber security news cycle for the foreseeable future.
Learn moreOn July 21, 2020, the FBI issued a Private Industry Notification (PIN 20200721-001) describing an industry and academic study performed on a set of self-certified ELDs identifying a number of security vulnerabilities.
Learn moreOwn IT. Secure IT. Protect IT. October is the 16th Annual National Cyber Security Awareness Month and a great time to update your security awareness training program – or start one.
Learn moreEmail phishing attacks are sent to us at work, home and anywhere else we have email. Most of us use email filters to check these emails and cut down the number of bad messages we receive, but sometimes these filters can be bypassed. Avanan’s Global Phish Report analyzed more than 55 million emails and found that 1 out of every 100 contained a phishing attack.
Learn moreIn response to the increasing number of massive data breaches over the last several years, the Colorado legislature passed new requirements for protecting the personal information of Colorado residents. The Colorado Protections for Consumer Data Privacy (HB18-1128) applies to public and private organizations that handle, process, store or otherwise have access to electronic or printed personally identifiable information (PII) of Colorado residents.
Learn moreWith the rapid pace that technology evolves, understanding how those changes can impact business is important.
Learn moreThis year marked the 26th annual DefCon, the annual hacker conference attended by thousands of people ranging from high school students to well-known security researchers and infamous personalities in the industry.
Learn moreThe General Data Protection Regulation (GDPR) went into effect on May 25, 2018. With fines as high as €20 million or 4% of global revenues, the GDPR cannot be ignored. How do you know if the regulation applies to your organization and how can you comply?
Learn moreWeb application vulnerabilities are a top target for cyber criminals. Websites, applications, servers and supporting infrastructure are exposed to the internet via web applications and thus are under constant attack. Many organizations perform network vulnerability scans on internet facing networks and systems, but often ignore web applications. The tests included in the network vulnerability scans generally do not test web applications and certainly do not perform deep vulnerability testing inside the application.
Learn moreRubinBrown Cyber Security Center of Excellence – Security You Need to Know. Testing your cyber security on a regular basis is part of sound strategy to identify and eliminate risks in the environment. Penetration testing, or "white hat" hacking, tests the external and internal network to assess the effectiveness of controls. Whether you are demonstrating due care in addressing cyber security threats or addressing compliance requirements, penetration testing is a core component of regular security assessment efforts.
Learn more