Cybersecurity Regulations: What the NYCRR 500 Deadline of March 1, 2019 Means to You
New York City is often referred to as the financial capital of the world; with the state of cybersecurity today and the increasing barrage of threats that financial related institutions must combat on a daily basis, it is no wonder that New York became the first state (more…)
Popular Cyber Attacks: Why Due Care is so Important for Reasonable Security
Popular Cyber Attacks and Due Care for Reasonable Security. As children, we enjoyed reading the many fairytales that began with, “Once upon a time.” As adults in the workplace, we regrettably read the stories of so many recent cyber attacks that start with, “Someone opened a phishing email.” (more…)
Data Breach Litigation: Prepare for the Worst Case Scenario
Prepare for the worst – These words of wisdom are apropos in most aspects of life, especially when it comes to cyber security matters for your organization. (more…)
4 Important Steps to Take When Creating an Incident Response Plan
By Erik Leach, CISSP, SCF
Imagine coming home and finding your house broken into and some of your belongings missing. As you totter from room to room, you would probably feel anger, frustrated, disturbed and a little overwhelmed. At a vulnerable moment such as that, it probably would not be the best time to engage in critical decision making (more…)
Why the Meltdown/Spectre Vulnerabilities are Important to You
Two distinct vulnerabilities dubbed Meltdown and Spectre potentially affect almost every system1. In a world that is already saturated with cyberattacks and vulnerabilities, it is easy to succumb to cyber threat fatigue when discussing two new outbreaks. Even though there have been no confirmed reports of attacks that have taken advantage of these newly exposed vulnerabilities, they are highly (more…)
Cleverly Disguised Ransomware Infecting Chrome Users
Cleverly Disguised Ransomware Infecting Chrome Users. A new variant of ransomware is spreading via poorly secured websites and the Chrome Web Browser. Users are fooled into downloading what they think is a missing font pack in order to resolve the error. (more…)
RANSOMWARE: CURRENT STRAINS, ATTACK VECTORS AND PROTECTION
Staying ahead of security threats is no easy task. One threat that should definitely be on your radar is ransomware. From hospital heists to attacks on schools and other businesses, ransomware is costly and is projected to be one of the biggest threats in 2016. According (more…)
Proven Ways to Combat Ransomware
Proven Ways to Combat Ransomware. Ransomware stole a lot of headlines in 2016 and rightfully so. Every type of organization was afflicted by its intrusion this past year, even healthcare. With revenues of over $18 million dollars in 2015, it’s a safe bet that Ransomware isn’t going anywhere in 2017. That’s because it is highly profitable and thanks to the new prepackaged multi-level (more…)
How to Quickly Respond to Computer Intrusions – HALOCK
The moment you realize you are experiencing a network-based breach, you may not know what to do. Minute one, hour one, day one, what should a technical team do to respond to a breach while it’s still in play?
While having a full incident response plan (IRP), a trained response team, and well-placed log repositories are optimal, in our (more…)
INCIDENT RESPONSE: KNOWING YOUR OBLIGATIONS IN THE EVENT OF A SECURITY BREACH
Your organization just experienced a data security breach. All of the data that was entrusted to your organization to be kept safe is now “out there” on the Internet. Your organization doesn’t have an incident response plan (IRP). Who do (more…)