Articles of interest from the week of March 29, 2021
Developing a Risk Management Approach to Cybersecurity By now most CISOs understand that focusing your cybersecurity program on regulatory...
24/7/365 Monitoring & Alerting
Compromise Assessments
Threat Hunting
Vulnerability Management
CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR®/RMF Pro)
ATO/RMF Support
If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.
Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.
At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.
2 min read
John Frasier : Dec 2, 2019 12:00:00 AM
Ransomware attacks increased by 37% during the third quarter of 2019, compared to Q2, as cyber criminals target both IT vendors and their clients, according to data compiled by insurer Beazley. (By Beazley plc, Insurance Journal) Ingalls: Ransomware has become a serious threat to businesses of all sizes and industries, and traditional security practices are no longer strong enough to protect your business: early detection and response is key. Are you prepared to defend against ransomware?
The holidays are a prime time for hackers, scammers, and online thieves looking to take advantage of unsuspecting online shoppers. Before starting your online shopping this holiday season, follow these simple steps to stay safe online. (Department of Homeland Security) Ingalls: Social Engineering continues to be one of the strongest methods of attack hackers use to gain your personal information, and this seasonal increase in online shopping create even more opportunities for exploit. Increasing your level of security awareness is often the best way to strengthen your security chain.
The majority give outside partners, contractors and suppliers administrative access — without strong security policies in place. (By Tara Seals, Threatpost) Ingalls: Limiting admin rights by individual need is an example of an important security measure that can be executed with high quality policies. We can help with both building security policies reflective of your industry's standard and ensuring they're being adhered to within your organization. Go here for more information.
Serial cybersecurity entrepreneur Shlomo Kramer said in a 2005 interview that cybersecurity is “a bit like Alice in Wonderland” where you run as fast as you can only to stay in place. In 2020, to paraphrase the second part of the Red Queen’s observation (actually from Through the Looking Glass), if you wish to stay ahead of cyber criminals, you must run twice—or ten times—as fast as that. (By Gil Press, Forbes) Ingalls: This comprehensive list shows just how overwhelming cybersecurity can be. Contact us today to talk to one of our cybersecurity experts for more information on how we can help secure your information in a way that's easy and efficient for you.
Even your most security-savvy users may have difficulty identifying honed spear phishing campaigns. Unlike traditional phishing campaigns that are blasted to a large email list in hopes that just one person will bite, advanced spear phishing campaigns are highly targeted and personal. They are so targeted, in fact, that we sometimes refer to them as “laser” phishing. And because these attacks are so focused, even tech-savvy executives and other senior managers have been duped into handing over money and sensitive files by a well-targeted email. That’s how good they are. (By Diana Kelly and Seema Kathuria, Microsoft) Ingalls: Your organization's security is only as strong as your employees' awareness. Strengthen your defenses against social engineering attacks with our specialized training and testing programs.
Developing a Risk Management Approach to Cybersecurity By now most CISOs understand that focusing your cybersecurity program on regulatory...
Why Cybersecurity Has Become a “Team Sport” At a recent online round-table event, hosted by the New Statesman and sponsored by technology company...
1 min read
Only 8% of Businesses That Paid a Ransom Got All of Their Data Back The average total cost of recovery from a ransomware attack has more than doubled...