Skip to the main content.
Government Programs
Integrated technology, solutions, and services that support rapid innovation within the DoD ecosystem.

CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR/RMF Pro)
ATO/RMF Support

Book GP Demo

Professional Services
Expertise in security strategy, incident response readiness, policy development, and risk assessments.

Risk Assessments
vCISO
Penetration Testing

Book ProServ Demo

Digital Forensics & Incident Response
Are You Under Attack?

If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.

CONTACT US

Subscribe-to-NetSec-News-v4Subscribe to NetSec News

Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.

SIGN UP

Ingalls Information Security

At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.

Meet The Leadership Team

2 min read

Articles of interest from the week of February 10, 2020

Hacks on Louisiana Parishes Hint at Nightmare Election Scenario

Expert believes November ransomware attacks timed to election, ‘A very dangerous model for discrediting election results.’ (By Kartikay Mehrotra, Bloomberg) Ingalls: In our most recent Threat Intelligence Report, we break down how the 2020 presidential election could be hacked. This report was published in partnership with the National Association of Secretaries of State (NASS). Click here learn more.

 

Microsoft Addresses Active Attacks, Air-Gap Danger with 99 Patches

There are 12 critical and five previously disclosed bugs in the February 2020 Patch Tuesday Update. (By Tara Seals, Threatpost) Ingalls: Enhancing your patch management process to include vulnerability scanning, a robust remediation workflow, and metrics-based decision support from data collection can do a lot more for your risk management than simply plugging holes whenever a software vendor produces a patch. In our downloadable “8 Effective Cybersecurity Controls For SMBs” guide we discuss how to do more with patch management, and the benefits of a mature Vulnerability Lifecycle Management program. If your business or a client needs expert cybersecurity risk management that includes Vulnerability Lifecycle Management, please contact us today to schedule an engagement with Ingalls Information Security! 

 

Cybersecurity Tips for Executives

A data breach poses one of the greatest risks to corporations today. Yet, only 45% of executives think cybersecurity represents an important aspect of their company, according to the EY Global Information Security Survey. This statistic is surprising, especially when you consider the Ponemon Institute determines the cost of the average global data breach at $3.92 million. In an effort to promote proactive cybersecurity measures, below we present a collection of cybersecurity tips for executives. (By Ryan Squires, Security Boulevard) Ingalls: Here at Ingalls, we believe it is important that there are affordable and effective cybersecurity solutions for businesses of every size. We offer best-in-class information security solutions suitable for the largest enterprise companies at a price point that is affordable for SMBs. Request a price for your company today.

 

Emotet Malware Now Hacks Nearby Wi-Fi Networks to Infect New Victims

Emotet, the notorious trojan behind a number of botnet-driven spam campaigns and ransomware attacks, has found a new attack vector: using already infected devices to identify new victims that are connected to nearby Wi-Fi networks. (By Ravie Lakshmanan, The Hacker News) Ingalls: Having spent the last decade in war rooms and boardrooms investigating attacks by criminals and nation-state sponsored hackers, our team understands how to prevent and respond to cyber attacks. Even with the best controls in place, a security incident can still happen. In fact, when we talk in terms of incident response, it may not necessarily refer to a breach, but an attempted breach. Regardless, whatever is responsible for triggering a response, our team of experts has the experience to resolve cyber attacks quickly and discreetly in order to get you back to normal as fast as possible.

 

Rotten Apple: Number of Cyber Attacks Targeting Mac Computers has Overtaken Windows PC Threats for the First Time EVER, Study Claims

Mac cyber threats are growing faster than Windows PCs, says Malwarebytes. Nearly twice as many Mac threats were detected than Windows per endpoint. Overall Mac threats increased by more than 400 per cent in 2019 over 2018. (By Jonathan Chadwick, DailyMail) Ingalls: Our Managed Detection and Response (MDR) service is designed for advanced detection, threat hunting, anomaly detection and response guidance utilizing a defense-in-depth approach which monitors and correlates network activity with endpoints, logs and everything in between. Unlike a traditional Managed Security Service Provider (MSSP), our service is geared toward proactive prevention. We do this by utilizing the very latest in cloud, big data analytics technology, and machine learning along with the cybersecurity industry’s leading incident response team, to identify threats to your environment.

Sign Up For Network Security News