Google Docs Phishing Campaign – How Automation Would Have Helped

Close to .1% of Gmail users have been estimated to have been hit by the Google Docs phishing attack that spread across the globe this Wednesday –even though Google managed to shut down the[…]

Read More

Responding to a Ransomware Attack: What You Need to Know

Between 2005 and 2016, ransomware infections were more common than data breaches, making them the most pervasive cyberthreat of the last 11 years. Ransomware attacks may encrypt folders and files[…]

Read More

Cybersecurity And The IoT: From Incident Response To Continuous Response

There’s no doubt the Internet of Things (IoT) will eventually take over the digital universe. By 2020, IDC predicts there will be more than 210 billion connected devices available, with at least[…]

Read More

The Health Care Industry: Cybercriminals Have a New Favorite Target

Whether you work in cybersecurity at a hospital or a company that provides health insurance, your data has either been targeted by hackers or will be. Cybercriminals have been attacking the health[…]

Read More

Doxware: The Latest in New Ransomware Threat

Cybercriminals have become increasingly sophisticated in their attacks. A few years ago, the crooks’ primary goal was to steal massive amounts of data that they could resell; credit card numbers,[…]

Read More

Top Quotes from "Mr. Robot" that SOC Managers will Understand

Below are some security best practices as told by Mr. Robot – the popular TV series about hacking, currently wrapping up its second season. By taking such simple steps, security professionals can[…]

Read More

5 Tips on Hiring and Retaining the Right Cybersecurity Talent

If you are a cybersecurity professional, you already know that there is a serious shortage of qualified talent. According to the U.S. Bureau of Labor Statistics, there were almost 210,000 unfilled[…]

Read More

Use Email for Messages, Not for Incident Management

As a CISO, you know how difficult it is to recruit the best staff. Once you bring them on board, you must also work to retain them — after all, their skills are in short supply, and your[…]

Read More

Top 10 Best Practices for Cyberbreach Post-Crisis Communication

 

According to an article appearing in AT&T Cybersecurity Insights, 62 percent of all organizations surveyed admitted that they had suffered a breach in 2015. Furthermore, although 42 percent[…]

Read More

6 Questions You Must Ask for a Successful Incident Response

For most organizations, suffering a cyberattack is not a matter of “if” – it is a matter of “when.” Today’s hackers have more technology and are more persistent than ever before. Lately they seem[…]

Read More