Skip to the main content.
Government Programs
Integrated technology, solutions, and services that support rapid innovation within the DoD ecosystem.

CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR®/RMF Pro)
ATO/RMF Support

Book GP Demo

Professional Services
Expertise in security strategy, incident response readiness, policy development, and risk assessments.

Risk Assessments
vCISO
Penetration Testing

Book ProServ Demo

Digital Forensics & Incident Response
Are You Under Attack?

If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.

CONTACT US

Subscribe-to-NetSec-News-v4Subscribe to NetSec News

Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.

SIGN UP

Ingalls Information Security

At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.

Meet The Leadership Team

2 min read

Articles of interest from the week of June 17, 2019

Why Cybersecurity Matters To Your Business

You start a business. You grow your company from an idea to a fully functioning and profitable entity. With success comes clients and, as with most companies, you store personal information either to be used in marketing or from a purchase. As a result, you hold the keys to many of the things that your customers value and treasure in their lives and it is now your responsibility to protect their personal information. Additionally, your company has a myriad of confidential and private information internally that needs to be protected. (By Ryan Bradley, Forbes)

Let’s Talk about Social Engineering Small Businesses

Social engineering small businesses is a favorite of attackers and it is often under-reported in the media. Additionally, it may be easy to fall into the trap of believing your organization is too small to be a target when there are much larger companies with bigger bottom-lines. However, the attacker is looking for the lowest hanging fruit, not necessarily the most lucrative. There are still lots of social engineering techniques that work effectively against small and mid-sized businesses. Attacks on this size of organization are on the rise and they can be very devastating. (By Chris Hadnagy, Social-Engineer)


Top 10 Security Awareness Training Topics for Your Employees

In immensely networked systems, organizations cannot protect confidentiality, integrity and availability of data without implementing an effective and reliable security training program. According to a Kaspersky Lab report, more than 46 percent of cybersecurity incidents are due to human error and enterprises suffer multimillion-dollar losses recovering from staff-related disasters. For example, uninformed workers can harm a secure network by responding to phishing emails, visiting web pages infected with a malware program or storing their confidential information in an insecure storage location. (By Fakhar Imam, InfoSec)


The One Cybersecurity Risk You’re Probably Not Even Thinking About

Printers may be the last thing on your mind, but they're a vulnerable point of entry. (By Kevin Pickhardt, Entrepreneur)


Are Mobile Phones Your Biggest Weakness to Cyber Threats?

As offices and businesses around the world transition to mere mobile employee “pit stops,” the need for mobile devices at work is rampant. Checking emails from the local coffee shop, having access to MS-Office products in the palm of our hands―our phones are no longer only for making calls, they’ve evolved into our hand-held personal computers. With this, comes the storing of sensitive data so it’s easily available to us―emails, calendars, contact information, passwords, payment data, etc. While these features are great for the traveling or telecommuting employee, it’s also attractive to hackers. (By Lindsey Donato, Blum Shapiro

Sign Up For Network Security News

Articles of interest from the week of March 29, 2021

Developing a Risk Management Approach to Cybersecurity By now most CISOs understand that focusing your cybersecurity program on regulatory...

Read More

Articles of interest from the week of June 21, 2021

Why Cybersecurity Has Become a “Team Sport” At a recent online round-table event, hosted by the New Statesman and sponsored by technology company...

Read More

1 min read

Articles of interest from the week of December 16, 2019

Top 5 Cybersecurity Predictions for 2020 When it comes to cybersecurity, staying ahead of threats – rather than reacting to them – is critical. In a...

Read More