Skip to the main content.
Government Programs
Integrated technology, solutions, and services that support rapid innovation within the DoD ecosystem.

CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR/RMF Pro)
ATO/RMF Support

Book GP Demo

Professional Services
Expertise in security strategy, incident response readiness, policy development, and risk assessments.

Risk Assessments
vCISO
Penetration Testing

Book ProServ Demo

Digital Forensics & Incident Response
Are You Under Attack?

If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.

CONTACT US

Subscribe-to-NetSec-News-v4Subscribe to NetSec News

Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.

SIGN UP

Ingalls Information Security

At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.

Meet The Leadership Team

2 min read

Articles of interest from the week of December 2, 2019

Ransomware Attacks Rise 37% in Q3, Targeting IT Vendors, Their Clients: Beazley

Ransomware attacks increased by 37% during the third quarter of 2019, compared to Q2, as cyber criminals target both IT vendors and their clients, according to data compiled by insurer Beazley. (By Beazley plc, Insurance Journal) Ingalls: Ransomware has become a serious threat to businesses of all sizes and industries, and traditional security practices are no longer strong enough to protect your business: early detection and response is key. Are you prepared to defend against ransomware?

 

Holiday Online Shopping Safety from CISA

The holidays are a prime time for hackers, scammers, and online thieves looking to take advantage of unsuspecting online shoppers. Before starting your online shopping this holiday season, follow these simple steps to stay safe online. (Department of Homeland Security) IngallsSocial Engineering continues to be one of the strongest methods of attack hackers use to gain your personal information, and this seasonal increase in online shopping create even more opportunities for exploit. Increasing your level of security awareness is often the best way to strengthen your security chain.

 

ThreatList: Admin Rights for Third Parties is the Norm

The majority give outside partners, contractors and suppliers administrative access — without strong security policies in place. (By Tara Seals, Threatpost) Ingalls: Limiting admin rights by individual need is an example of an important security measure that can be executed with high quality policies. We can help with both building security policies reflective of your industry's standard and ensuring they're being adhered to within your organization. Go here for more information.

 

Serial cybersecurity entrepreneur Shlomo Kramer said in a 2005 interview that cybersecurity is “a bit like Alice in Wonderland” where you run as fast as you can only to stay in place. In 2020, to paraphrase the second part of the Red Queen’s observation (actually from Through the Looking Glass), if you wish to stay ahead of cyber criminals, you must run twice—or ten times—as fast as that. (By Gil Press, Forbes) Ingalls: This comprehensive list shows just how overwhelming cybersecurity can be. Contact us today to talk to one of our cybersecurity experts for more information on how we can help secure your information in a way that's easy and efficient for you.

 

Spear Phishing Campaigns—They’re Sharper Than You Think

Even your most security-savvy users may have difficulty identifying honed spear phishing campaigns. Unlike traditional phishing campaigns that are blasted to a large email list in hopes that just one person will bite, advanced spear phishing campaigns are highly targeted and personal. They are so targeted, in fact, that we sometimes refer to them as “laser” phishing. And because these attacks are so focused, even tech-savvy executives and other senior managers have been duped into handing over money and sensitive files by a well-targeted email. That’s how good they are. (By Diana Kelly and Seema Kathuria, Microsoft) Ingalls: Your organization's security is only as strong as your employees' awareness. Strengthen your defenses against social engineering attacks with our specialized training and testing programs.

Sign Up For Network Security News