May 1, 2020 •
We can learn a lot from the same protective measures that are working to defeat this insidious coronavirus enemy. The parallels are striking between the social and professional measures that are swiftly becoming business-as-usual, and the security measures that should have been business-as-usual all along. Now may be the perfect time to remind ourselves of a few.
Coronavirus • Endpoint Security
March 9, 2020 •
A ransomware variant, DoppelPaymer is showing some interesting new features that have morphed it into what we call “extortionware.” It is infecting systems and performing not only data encryption for ransom, but also exfiltrating data back to the attackers to be potentially released to the public if payment for the ransom is not made.
Active Monitoring • Ransomware
March 3, 2020 •
In my daily scan of the security news headlines, I’ve been noticing that more and more frequently, companies hit by ransomware are paying up. A more recent example is the City of Cartersville, Georgia, which paid a whopping $380K to its attackers. But it doesn’t have to be this way! Read on for 3 ways to avoid a ransomware lock down.
MDR • Ransomware
February 17, 2020 •
Lately, there has been a wave of cyberattacks specifically targeting the petroleum industry. This is due to a handful of recent successes by the attackers with some very large and well-known brands. Given the success that the attackers had in those environments, they are moving on to other similar and potential targets within the industry and attempting to find additional value to compromise. In this post, I’ll share specifics about how the petroleum industry is being targeted and ways you can protect your network from a potential compromise.
Active Monitoring • MDR • Network Security • Point of Sale
January 30, 2020 •
It’s 2020, and that means the deadline for the Visa and Mastercard EMV liability shift for the petroleum market is now imminent. But before you say, “Well, I’ve heard that one before,” and go about your business as a fuel retailer, it’s important to understand that this deadline appears to be sticking.
January 20, 2020 •
While many associate Georgia with innovation and expansion in the payments space—more than 70% of America’s payment transactions are processed by companies in Atlanta and around Georgia—the Georgia information security landscape is also a boon for the state’s economy. In its new industry report, “2020 State of Georgia’s Information Security and Cybersecurity Ecosystem,” the Technology Association of Georgia (TAG) lists more than 75 InfoSec products and services companies that call Georgia home. Together, these companies and others like them generate over $1.4 billion in annual revenue and employ more than 6,700 network and computer system engineers alone.
January 2, 2020 •
We’ve all worked with them, and at some point in our career, we may have even been one: A disengaged employee. Most companies and leadership teams concern themselves with unhappy employees for one basic reason, and that’s the costs of lost productivity. But have you ever thought about the cybersecurity threat posed by an actively disengaged employee?
Access Control • Endpoint Security
October 3, 2019 •
October is National Cyber Security Awareness Month (#NCSAM), and one of the topics I like to bring up is security patching. Just about every IT leader will tell you that timely security patching is a priority for their organization. So why did our latest ControlScan research find that 43% of IT teams are taking more than a week to implement even the most critical of security patches?
Active Monitoring • MDR • Network Security
June 28, 2019 •
Late in the day on a recent Friday, a new customer began installation of the ControlScan Managed Detection and Response (MDR) service to their end user systems. This customer is an SMB (small to mid-sized business) that relies on personal computers to keep their business running. Sound familiar?A few hours after the customer’s implementation was complete—at 12:05 a.m. Saturday to be exact—our MDR service blocked an attempted execution of malware that was present on one of their remote office computers.As it turns out, this active malware had been on the remote office machine since October 2018. With each user login, the malware was executing and performing data harvesting, as well as making attempts at lateral movement and propagation.
Active Monitoring • MDR
May 20, 2019 •
Every diligent company or organization understands cybersecurity is needed, but often doesn’t know how to budget for the appropriate protection. It’s not always a clear-cut number, but there is a way to develop a return on investment (ROI) or return on expense (ROE) equation that you can share with your budgeting team and C-level executives who are looking to you for answers.
April 25, 2019 •
When cybersecurity coverage gets slim—whether it’s due to a lack of internal expertise or technology capabilities, or both—key business functions tend to go on what I call “autopilot.” Firewalls run using outdated configurations, legitimate security threats go unnoticed, and everyone is just hoping today isn’t the day an employee clicks a bad link and unleashes a crippling malware attack. Learn about the three business functions that should never be put on cybersecurity autopilot, and how to proactively address your organization’s expertise and manpower challenges.
Endpoint Security • MDR • Network Security