A How-to-Guide to Defend Against Phishing Attempts

Phishing attacks use email or malicious websites to infect your machine with malware and viruses in order to collect personal and financial information. Cybercriminals attempt to lure users to click on a link or open an attachment that infects

14 Oct 2020
Read More

A How-to-Guide for Multi-Factor Authentication

Have you noticed how often security breaches, stolen data, and identity theft are consistently front-page news these days? Perhaps you, or someone you know, are a victim of cyber criminals who stole personal information, banking credentials, or

08 Oct 2020
Read More

Attackers Don't Break-in. They Log in.

Cybersecurity used to involve a fairly straightforward set of technical controls that kept networks secure and data backed up in the event of a system failure. To do this 10 years ago, IT needed to implement firewalls and antivirus and perform

25 Sep 2020
Read More

Elections Season and Elections Security - Are We Ready?

Election season is firmly upon us.  We are facing increasing cybersecurity threats with government agencies all across the country falling prey to cyberattacks.  These attacks have resulted in financial loss and system wide shutdowns. The

10 Sep 2020
Read More

For Hurricanes and Cybersecurity Attacks, Awareness is Key

As a Louisiana company, we understand all too well the impact of Hurricanes; our thoughts are with friends and neighbors who are suffering the after-effects of Hurricane Laura.  We thank our emergency responders and front line personnel who are

28 Aug 2020
Read More

Antivirus is Dead...Long Live Antivirus

Ingalls has worked Incident Response for over 10 years; in that time we have seen some of the nastiest data breaches and a lot of victims who thought they were safe because they were using popular antivirus software. We’ve seen what works and

12 Aug 2020
Read More
Previous 1 2 3 4 5 ... 9 Next