If a ransomware attacker knocked on your virtual door, would they find it locked, or could they easily gain entrance into your organization? This is a critical question to consider, given that ransomware attacks have increased up to 500% since the initial onset of...
Cloud storage has transformed the way individuals and businesses manage and store their data, but is it right for you? From a cybersecurity perspective there are some things to consider as you are evaluating whether or not to use the cloud. Both cloud and external...
The National Institute of Science and Technology published its latest revision to Special Publication 800-53, Security and Privacy Controls for Information Systems and Organizations, in September 2020 and both private and federal organizations will move toward using...
Social engineering is a practice that has become very prevalent in recent years, and it takes diligence to know what attackers are up to and how to avoid them. In social engineering, perpetrators are relying on human error. They use psychological manipulation to gain...
On 6 May, 2021, attackers accessed the Colonial Pipeline networks and installed ransomware, quickly bringing fuel distribution to a halt up and down the east coast. The Colonial Pipeline runs from Texas to New Jersey and transports 100 million gallons of fuel daily....