Articles of interest from the week of October 28, 2019
10 Steps for Ransomware Protection Here are things you can do right now to shore up your defenses and help your recovery when you get hit. (By Derek...
24/7/365 Monitoring & Alerting
Compromise Assessments
Threat Hunting
Vulnerability Management
CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR®/RMF Pro)
ATO/RMF Support
If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.
Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.
At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.
1 min read
John Frasier : Oct 21, 2019 12:00:00 AM
The bug allows users to bypass privilege restrictions to execute commands as root. (By Tara Seals, Threatpost) Ingalls: Don't let something this complex potentially destroy your company. Take advantage of our extensive knowledge and experience with cybersecurity by considering making Ingalls your own personal information security experts!
Hackers infected servers used by the San Bernardino City Unified School District with ransomware, locking faculty and staff out of their e-mails over the weekend and forcing classes to proceed without Wi-Fi and other tech-based tools beginning Monday, Oct. 21. (By Eric Licas, The Press-Enterprise) Ingalls: Are you prepared to defend against ransomware? Organization of all industries and sizes need to be aware of these threats. Let Ingalls help with our extensive knowledge and experience with ransomware.
Attackers behind a new malicious campaign are using WAV audio files to hide and drop backdoors and Monero cryptominers on their targets' systems as BlackBerry Cylance threat researchers discovered. (By Sergiu Gatlan, Bleeping Computer) Ingalls: Even with a solid defense in place, malware can still penetrate your organization. Up your cybersecurity with 24/7 monitoring, thorough and actionable alerts, and other preventative measures provided by our Managed Detection and Response services.
Simply implementing best practices is not enough to address the risk coming from your own employees. (By Rob Juncker, Threatpost) Ingalls: Strengthening your company's cybersecurity can start with a strong employee policy. We offer a full program to educate employees on common cybersecurity threats and train them to be vigilant against them.
A leak at Autoclerk, a reservations management system recently acquired by the Western Hotel & Resorts Group, exposed personal and travel information on hotel guests, including members of the U.S. government, military and Department of Homeland Security. (By Teri Robinson, SC Magazine) Ingalls: Has your organization experienced a data breach? Contact our experienced Incident Response team to help you come up with a comprehensive, well-coordinated, and reliable response plan that will minimize the amount of damage to your organization.
10 Steps for Ransomware Protection Here are things you can do right now to shore up your defenses and help your recovery when you get hit. (By Derek...
Why Ransomware Attacks on Municipalities Spiked in 2019 Ransomware spread to a number of city, state and local governments across the U.S. in 2019....
1 min read
Microsoft Warns of a Wide-Scale Phishing-as-a-Service Operation Microsoft has opened the lid on a large-scale phishing-as-a-service (PHaaS) operation...