Network Security News | Ingalls Information Security

Articles of interest from the week of October 14, 2019

Written by John Frasier | Oct 14, 2019 4:00:00 AM

Hepatitis Patients' Data Exposed

The Philadelphia Department of Public Health inadvertently exposed on its website the records of thousands of hepatitis patients, according to a local news report. (By Marianne Kolbasuk McGee, Healthcare Info Security) Ingalls: This is an example of what catastrophic consequences can come about when cybersecurity isn’t taken seriously. Don’t let your customers’ sensitive data get leaked, mitigate the risk of cyber-attackers with our extensive knowledge of the threats to your data.

Mississippi Shows Flagrant Disregard for Cybersecurity

An audit of Mississippi government institutions has revealed an alarming lack of compliance with standard cybersecurity practices and with the state's own enterprise security program. (By Sarah Coble, Info-Security Magazine) Ingalls: Is your cybersecurity compliant with industry standards? Let Ingalls help you manage your Governance Risk & Compliance with a risk assessment personalized to your business and industry.


Critical Security Issue Identified in iTerm2 as Part of Mozilla Open Source Audit

A security audit funded by the Mozilla Open Source Support Program (MOSS) has discovered a critical security vulnerability in the widely used macOS terminal emulator iTerm2. After finding the vulnerability, Mozilla, Radically Open Security (ROS, the firm that conducted the audit), and iTerm2’s developer George Nachman worked closely together to develop and release a patch to ensure users were no longer subject to this security threat. All users of iTerm2 should update immediately to the latest version (3.3.6) which has been published concurrent with this blog post. (By Tom Ritter, Mozilla Security Blog) Ingalls: Keeping up with all every patch and update can be difficult and overwhelming on your own, but it’s one of the most important security measures you can take. Let Ingalls help your Vulnerability Management Program by making us your cybersecurity consultants!

 

Ransomware: Prepare for Hackers Launching Even More Destructive Malware Attacks

The 'wiper' ransomware used in state-backed attacks like NotPetya is gaining ground among cyber criminals, warns EU law enforcement annual cybercrime report. (By Danny Palmer, ZDnet) Ingalls: New forms of Malware are being exposed daily, and it takes a continuous, comprehensive method of security to protect yourself from it. Ingalls Endpoint Detection and Response is designed to monitor your network and stop malicious code before it gets the chance to execute, designed for protection against the continuously changing threat of malware.

 

What is Incident Response?

Six steps for effective incident response. (By Nate Lord, Digital Guardian) Ingalls: Do you have an Incident Response Plan? Ingalls can help you design an in-depth, effective Plan to minimize the consequences associated with a data breach. Guided by our expertise in data breaches and enhanced by our MDR services, your data is safe with us.