Skip to the main content.
Government Programs
Integrated technology, solutions, and services that support rapid innovation within the DoD ecosystem.

CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR®/RMF Pro)
ATO/RMF Support

Book GP Demo

Professional Services
Expertise in security strategy, incident response readiness, policy development, and risk assessments.

Risk Assessments
vCISO
Penetration Testing

Book ProServ Demo

Digital Forensics & Incident Response
Are You Under Attack?

If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.

CONTACT US

Subscribe-to-NetSec-News-v4Subscribe to NetSec News

Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.

SIGN UP

Ingalls Information Security

At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.

Meet The Leadership Team

1 min read

Articles of interest from the week of October 28, 2019

10 Steps for Ransomware Protection

Here are things you can do right now to shore up your defenses and help your recovery when you get hit. (By Derek Manky, ThreatPost) Ingalls: These 10 steps are just the beginning when it comes to protecting yourself against ransomware. You need help. That's where we come in! Contact us today with your cybersecurity concerns!

 

Ransomware with a Difference as Hackers Threaten to Release City Data

Johannesburg spent the weekend struggling to recover from its second cyber-attack this year as it took key services systems offline. (By Danny Bradbury, Naked Security) Ingalls: Another day, another ransomware attack in the news. Are you prepared to defend against ransomware? Don't wait to find out! Start building up your cyber defenses today with our help.

 

Microsoft Office Bug Remains Top Malware Delivery Vector

CVE-2017-11882 has been attackers' favorite malware delivery mechanism throughout the second and third quarters of 2019. (By Kelly Sheridan, Dark Reading) Ingalls: Are you tired of trying to keeping track of every vulnerability discovered in the software you use everyday? Let us take some of that burden off your shoulders with our specialized Network Intrustion Detection as part of MDR services.

 

Types of Phishing: Tips to Prevent, Spot, Report Scam Emails

October is National Cybersecurity Awareness Month, reminding us that it's important to protect our personal information online. One way to do that is to recognize and avoid falling victim to phishing scams. (By Michelle Shreeve, SNHU) Ingalls: Here at Ingalls, we know how common email attacks are and how dangerous they can be. We offer services specialized in Email Defensethat come with employee education programs, access to our Phishing Email Helpdesk, and more to continually protect your business.

 

10 Cybersecurity Terms Every Business Leader Should Know

In cybersecurity, education is your best defense. (By Neill Feather, Inc.) Ingalls: Take a look at our extensive Education and Training programs with options for every member of your organization. We offer learning opportunities on a wide arrangement of topics, from basic, day-to-day security tips to incident response.

Sign Up For Network Security News

Articles of interest from the week of February 24, 2020

Why Ransomware Attacks on Municipalities Spiked in 2019 Ransomware spread to a number of city, state and local governments across the U.S. in 2019....

Read More

Articles of interest from the week of October 21, 2019

Sudo Bug Opens Root Access on Linux Systems The bug allows users to bypass privilege restrictions to execute commands as root. (By Tara Seals, ...

Read More

Articles of interest from the week of July 29, 2019

The Growing Demand for Managed Detection and Response (MDR) Threat detection/response is a high priority, but many organizations don’t have the staff...

Read More