Network Security News | Ingalls Information Security

Articles of interest from the week of November 4, 2019

Written by John Frasier | Nov 4, 2019 5:00:00 AM

Healthcare Data Breaches Will Cost $4 Billion by Year's End

According to new research, 96 percent of IT professionals agreed that data attackers are outpacing their medical enterprises, holding providers at a disadvantage in responding to vulnerabilities. (Security Magazine) Ingalls: Organizations across all industries face risk from ransomware and other cybersecurity threats. Having the right risk management strategy andimplementation is critical. Our experience in breach response allows us to deploy the most effective risk management service in the industry, at an affordable price. Contact us today for a demo or for more information.

 

Google Discloses Chrome Flaw Exploited in the Wild

Google warns exploits in the wild against a Use After Free vulnerability in Chrome’s audio component. (By Lindsey O'Donnell, ThreatPost) Ingalls: Patch management is only a part of a mature Vulnerability Lifecycle Management program. Regularly scanning your network for new vulnerabilities, authenticating your hosts, and logging this data to help you make important security decisions are also essential steps for enhancing your risk management. Read more about these steps here.

 

Transparent Cybersecurity Policies Make Companies More Attractive to Investors

Companies that are transparent about their cybersecurity risk management efforts are more attractive to investors, after or before a data breach happens in their industry. (By Silviu Stahie, Security Boulevard) Ingalls: We tell potential investors who engage us for assessments, "Never buy a breach." Our "8 Effective Cybersecurity Controls For SMBs" guide is a great place to start to make sure you never have one.

 

What Can Happen In 3 Cybersecurity Seconds?

We are all too familiar with the phrase “time is money” – and yet, with today’s technology and advancements, when a multitude of security events can take place within a short amount of time, it is becoming easier to quantify the exact value of time. (By George McGregor, isBuzz News) Ingalls: Our Managed Detection and Response (MDR) service offers layered cybersecurity controls for effective risk management and rapid response. Our MDR service is geared toward proactive prevention. 

 

To Bolster Cybersecurity, Small Businesses Must Account for the “Human Element”

When hackers succeed, it’s often because they target unsuspecting users. They know users are busy, trusting, or distracted, and as a result, let their guard down when a suspicious email lands in their inbox or they chance upon a sketchy-looking website. Most cybersecurity incidents involve some type of user activity, be it clicking an infected attachment, visiting a compromised website, making passwords too easy to crack, misconfiguring a system or even sharing a computing device. (By the Community Editorial Team at Comcast, Silicon Valley Business Journal) Ingalls: You've seen it a million times. Every day, news reports speak of identity theft that has occurred because of account information being stolen through email scams. Our internet security company can mimic these scams to test your organization's level of defense against such threats. Contact us today to learn more about our social engineering training and testing and how we can provide effective awareness and prevention for your workforce.