For the first time, the operators behind the Sodinokibi Ransomware have released files stolen from one of their victims because a ransom was not paid in time. (By Lawrence Abrams, Bleeping Computer) Ingalls: Do you think your business might have been affect by ransomware? A breach can happen to any organization, regardless of size or industry, and can have unimaginable consequences. Contact us today to talk to one of our cybersecurity experts for more information on how we can help secure your information in a way that's easy and efficient for you.
On Jan. 1, the toughest data privacy law in the U.S. goes into effect: the California Consumer Privacy Act, or CCPA. (By KQED, NPR) Ingalls: Blending your business needs with your industry's data privacy laws can be tricky. Our three step approach, based on expert understanding of the security your business needs, ensures you meet all corporate compliance requirements when it comes to risk management. Read more about our governance risk and compliance services here.
Company tells employees to seek new employment after suspending all operations right before Christmas. (By Catalin Cimpanu, ZDnet) Ingalls: Ransomware has become a serious threat to businesses of all sizes and industries, and traditional security practices are no longer strong enough to protect your business: early detection and response is key. Are you prepared to defend against ransomware?
Users of GnuPG, OpenSSL and Git could be in danger from an attack that’s practical for ordinary attackers to carry out. (By Tara Seals, Threatpost) Ingalls: Encryption is essential when it comes to securing data. We offer a comprehensive, secure service with high standard encryption compliant with NIST-FIPS and AES designed specifically to keep your data at rest safe. Read more about the importance of encryption here.
A Virgin Mobile-branded phone distributed by Assurance Wireless to low-income U.S. citizens has a trojan pre-installed that can download additional malware. (By Tara Seals, Threatpost) Ingalls: In today's office, employees are bringing more and more of their own devices onto your company's network, including potentially infected mobile phones. Endpoint detection and response lets you find and destroy malware before it executes. Our AI driven software platform enables dynamic threat detection and immediate remediation efforts.