Stopping Coronavirus Cyber-Scams Before They Start – Part 2
How to Identify Coronavirus Cyber-Attacks – Part 2 In our first post concerning Corona Virus cyber-scams named “How to Identify Corona Virus Cyber-Attacks,” we wanted to warn our customers and readers
4 Key Steps to Stopping Ransomware Attacks
How Significant is the Ransomware Problem? In writing this blog post we reviewed data from a variety of surveys including the Verizon Data Breach Report, the Cybersecurity Insiders Survey, the Ponemon
6 Steps to Processing DSAR’s Under CCPA & GDPR
A Framework to Processing DSAR’s Under CCPA & GDPR We continue to dig into the topic of privacy, GDPR, and CCPA in this blog to clarify the requirements of current compliance
Securing Your Remote Workforce
Protecting Your Remote Employees from Cyber Attacks As we suggested in our last blog post, this blog post was written to help our customers and readers of our blog protect themselves
Stopping Corona Virus Cyber-Scams Before They Start
How to Identify Corona Virus Cyber-Attacks This blog post was written to help our customers and readers of our blog identify scams that were created by cybercriminals to leverage the Corona
Executing DSAR’s Under CCPA & GDPR
Better Solutions to Handling DSAR’s Under CCPA & GDPR We’ve written about privacy, GDPR, and CCPA several times in this blog in order to clarify the requirements of current compliance legislation
Phishing and Wire Transfer Scams are Victimizing Corporate Executives
“CEO Fraud” or “CEO Fraud Phishing” Doubled Over the Past Year CEO Fraud is a scam in which cyber criminals either spoof or literally take over company email accounts to impersonate
Ransomware is Targeting Industrial Control Systems
Industrial Control System (ICS) Ransomware is Evolving…Quickly Several months ago we wrote a blog post called The Evolution of Malware which tracked the development of how cyber-attacks and malicious code have
How to Improve Your SOCs Effectiveness – Part 2
Four Recommendations to Improve the Effectiveness of your SOC The ultimate goal of this blog post is to provide 4 or so understandable, actionable recommendations for improving SOC effectiveness. To get
How to Improve Your SOCs Effectiveness – Part 1
How to Improve Security Operation Center (SOC) Effectiveness – Part 1 So many articles and blog posts have been written on SOCs, how they are structured, what their mission and purpose