Network Security News | Ingalls Information Security

Articles of interest from the week of January 27, 2020

Written by John Frasier | Jan 27, 2020 5:00:00 AM

Cyberattacks against Endpoints Rising, Reaching $9 million per Attack in 2019

Protecting your organization's network from security threats carries with it a variety of challenges. But one of the biggest challenges may be endpoint security, meaning the ability to protect your network from all the computers, mobile phones, tablets, and other devices that remotely connect to it. Since such devices come from outside your organization, they can be an access point for hackers and cybercriminals to launch attacks that could infect your network. (By Lance Whitney, Tech Republic) Ingalls: Our Managed Detection and Response (MDR) service is designed for advanced detection, threat hunting, anomaly detection and response guidance utilizing a defense-in-depth approach which monitors and correlates network activity with endpoints, logs and everything in between. Unlike a traditional Managed Security Service Provider (MSSP), our service is geared toward proactive prevention. We do this by utilizing the very latest in cloud, big data analytics technology, and machine learning along with the cybersecurity industry’s leading incident response team, to identify threats to your environment.

 

Why Prioritizing Cybersecurity Makes Compliance Easier

Every month in 2019, a new high-profile data breach made headlines. More than a billion customers of various companies had their private information stolen by hackers or exposed on unsecured servers. This poor management of private data angered many – including lawmakers. New data privacy laws in California and New York take effect this year– and Microsoft and Apple seek national data privacy regulations. (By Milton Barley, Forbes) Ingalls: Blending your business needs with your industry's data privacy laws can be tricky. Our three step approach, based on expert understanding of the security your business needs, ensures you meet all corporate compliance requirements when it comes to risk management. Read more about our governance risk and compliance services here.

 

ROI in Cybersecurity

Specifying cybersecurity investment is no easy task. CISOs face an escalating threat environment, an increasingly saturated security provider market, and budgets that never stretch far enough. When it comes to pitching for additional budget, the situation is made more difficult due to the inherent challenges in proving ROI of cybersecurity spend. It is rather like selling insurance: CISOs must try to put a value on what hasn’t happened – the breaches and disruptions that their strategy will prevent. (By Ian Schenkel, Tech Radar) Ingalls: We believe it is important that there are affordable and effective cybersecurity solutions for businesses of every size. We offer best-in-class information security solutions suitable for the largest enterprise companies at a price point that is affordable for SMBs. Request a price for your company today.

 

Smaller Companies Need to Step Up Their Cyber Security Efforts

Whenever we hear about major cyber security attacks such as data breaches, it’s typically larger enterprises that are the victims. That makes sense, considering those events can potentially impact a lot of people and therefore are more likely to grab headlines and garner attention. But that doesn’t mean small and mid-sized companies (SMBs) are immune to such attacks. In fact, smaller organizations are frequent targets of cyber incidents, and they generally have far fewer resources with which to defend themselves. (By Bob Biolino, Security Boulevard) Ingalls: 60% of SMBs who get hacked go out of business within 6 months. Our downloadable guide "8 Effective Cybersecurity Controls for SMBs" explores ways to prevent and properly respond to a data breach that have been specifically designed for your small business.

 

Scam, Spam and Phishing Texts: How to Spot SMS Fraud and Stay Safe

Scammy, spammy texts have come to your phone. Here's how to avoid getting ripped off by scam artists who've added social engineering to their toolbox. (By David Gewirtz, ZDnet) Ingalls: Your organization's security is only as strong as your employees' awareness. Strengthen your defenses against social engineering attacks with our specialized training and testing programs to provides effective awareness and prevention to your company.