Skip to the main content.
Government Programs
Integrated technology, solutions, and services that support rapid innovation within the DoD ecosystem.

CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR/RMF Pro)
ATO/RMF Support

Book GP Demo

Professional Services
Expertise in security strategy, incident response readiness, policy development, and risk assessments.

Risk Assessments
vCISO
Penetration Testing

Book ProServ Demo

Digital Forensics & Incident Response
Are You Under Attack?

If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.

CONTACT US

Subscribe-to-NetSec-News-v4Subscribe to NetSec News

Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.

SIGN UP

Ingalls Information Security

At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.

Meet The Leadership Team

2 min read

Articles of interest from the week of November 25, 2019

Advanced Persistent Threat Activity Exploiting Managed Service Providers

The National Cybersecurity and Communications Integration Center (NCCIC) is aware of ongoing APT actor activity attempting to infiltrate the networks of global managed service providers (MSPs). Since May 2016, APT actors have used various tactics, techniques, and procedures (TTPs) for the purposes of cyber espionage and intellectual property theft. APT actors have targeted victims in several U.S. critical infrastructure sectors, including Information Technology (IT), Energy, Healthcare and Public Health, Communications, and Critical Manufacturing. (Cybersecurity & Infrastructure Security Agency, Department of Homeland Security) Ingalls: Our MDR (Managed Detection and Response) services offer layered cybersecurity controls for effective risk management and rapid response. It was designed to be a method of proactive prevention against security threats to your environment, making it one of the industry's leading cybersecurity tools.

 

Governor Declares State of Emergency after Cyber-attack

Move allows certain fines and fees to be waived while OMV is closed (By Matt Houston, KSLA News) Ingalls: All organizations are at risk for a data breach, no matter the size. The way you respond to the breach can be just as important as your security defenses. A thorough Incident Response Plan, created before a breach ever happens, can significantly reduce the negative impact of the breach. Read more about how to properly respond to a data breach here.

 

New Cyberattack Tactics Against Businesses Require Advanced Network Defenses

Threat diversification and sophistication has pushed the limits of IT security professionals in defending organizations of all sizes, across all verticals. The cybersecurity skills shortage has reached an all-time-high, with 53 percent of organizations agreeing they have suffered from this gap. (By Bogdan Botezatu, Security Magazine) Ingalls: Even with advanced defenses such as encryption already in place, Network monitoring and intrusion detection are still an important part of network security. It's the only way to ensure all hosts within your network remain safe and secure. Read more about our Network Intrusion Detection services here.

 

New RIPlace Bypass Evades Windows 10, AV Ransomware Protection

A new ransomware bypass technique called RIPlace requires only a few lines of code to bypass ransomware protection features built into many security products and Windows 10.​​​ (By Lawrence Abrams, Bleeping Computer) Ingalls: Ransomware has become a serious threat to businesses of all sizes and industries, and traditional security practices are no longer strong enough to protect your business: early detection and response is key. Are you prepared to defend against ransomware?

 

The Holiday Season and Cybercrime: 8 Ways to Protect Yourself

The holiday season has become an unbridled online spending extravaganza, and threat actors have taken notice. For shoppers, what starts out as an attempt to fulfill their holiday shopping checklist for pennies on the dollar can turn into a financial nightmare. For brands, what begins as an event that significantly boosts sales can turn into a security fiasco that erodes the trust between them and their customers and prospects. (By Yonathan Klijnsma, Help Net Security). Ingalls: Social Engineering continues to be one of the strongest methods of attack hackers use to gain your personal information, and this seasonal increase in online shopping create even more opportunities for exploit. Increasing your level of security awareness is often the best way to strengthen your security chain.

Sign Up For Network Security News