A Guide to Successfully Handling a Data Breach
We’ve written several blog posts about incident response and how organizations respond to data breaches. Each was significantly different from the others in terms of how they dealt with the
SANS – The Five Most Dangerous Cyberattacks
According to SANS Institute Analysts, in today's interconnected world, cybersecurity has never been more critical. The sheer scale of cybercrime today, and the boldness of attackers, is hard for many
DDoS Attacks on Critical Infrastructure: A Look at Hydro-Québec’s Website Outage
Recently, the critical infrastructure of Canada has once again become the target of cyberattacks. Pro-Russian hacking groups have launched a series of DDoS or denial of service attacks, causing operational
The Indigo Bookstore Ransom Cyber Attack – Lessons Learned
The recent attack on the Indigo Bookstore left many cyber security analysts scratching their heads. How did attackers seize control of systems through ransomware, and how was a zero-day exploit
Two-Thirds of Organizations Were Hit by a Ransomware Attack Last Year
In SpyCloud’s Ransomware Defense Report, its annual survey of CISOs or Chief Information Security Officers and heads of IT security from Canada, the UK, and US they found that that
Malware: Old Tools; New Tricks
Since the earliest form of a computer virus was created in 1949, malware has certainly come of age. Malware continues to wreak havoc on corporate and government entities and remains
How Does the Cyber Mercenary Business Work?
The Cyber Mercenary Business is Surging, Unfortunately Reuters wrote a report on the booming business of Cyber mercenaries which we found particularly interesting and thought it was well worth sharing. The
Ransomware and Business Email Compromise (BEC) Account for 70% of Breaches
Ransomware and business email compromises (BEC) topped the list of the types of attacks on organizations in the past year, making up 70% of the total number, according to the
What are the Benefits of SOAR Security Technology?
Choosing the Most Effective Security Technology – SIEM versus SOAR In a previous blog post, Why Organizations Are Moving to Managed Firewall and SIEM Solutions, we addressed not only the benefits
How to Implement an Effective Vulnerability Management Program
We’ve written considerably on Vulnerability Management, Vulnerability Assessments and Patching because they are so critical to preventing attacks. I’ve provided links to several of the most read blog posts we