Network Security News | Ingalls Information Security

Articles of interest from the week of February 17, 2020

Written by John Frasier | Feb 17, 2020 5:00:00 AM

RMM Vulnerabilities Potentially Devastating for MSPs: The 4 Security Pillars No Longer Enough

There Are Major Gaps In Security For MSPs Using RMM Tools And A Concerning Lack Of Urgency To Remedy The Issue. (By Allison Francis, Channel Futures) Ingalls: Even MSPs are at risk of exposing themselves and their clients to a disastrous data breach. Having proper security controls is vital to keeping data safe, such as enabling MFA, properly managing and preventing Powershell executions, and deploying next-generation anti-virus. Read more about how to properly secure your RMM usage here.

 

U.S. CISA, DHS and FBI Discover North Korean Malware

The Department of Homeland Security (DHS), the Federal Bureau of Investigation (FBI), and the Department of Defense (DoD) identified Trojan malware variants used by the North Korean government. (Security Magazine) Ingalls: Our MDR (Managed Detection and Response) services offer layered cybersecurity controls for effective risk management and rapid response. It was designed to be a method of proactive prevention against security threats to your environment, especially zero-day threats, making it one of the industry's leading cybersecurity tools. MDR is critical when it comes to staying ahead of all kinds of threats, detecting and stopping them before they become breaches.

 

Small Business Security: 5 Tips on How and Where to Start

There is no one-size-fits-all strategy for security, but a robust plan and the implementation of new technologies will help you and your IT team sleep better. (By Mike Pugila, Dark Reading) Ingalls: 60% of SMBs who get hacked go out of business within 6 months. Our downloadable guide "8 Effective Cybersecurity Controls for SMBs" explores ways to prevent and properly respond to a data breach that have been specifically designed for your small business.

 

Is Your Cybersecurity Workforce Ready To Win Against Cybercriminals?

As any cybersecurity expert will tell you, total threat elimination is an impossible goal. No matter which defense strategies businesses come up with or sophisticated tactics they implement, attack approaches evolve, malicious actors adapt and risks persist. Adding to the complexity of the problem is the fact that business value and data continue to migrate online. Protecting business processes and information has become a critical concern across the globe. (By Ed Sattar, Forbes) Ingalls: Since 2010, Ingalls Information Security has been in the war rooms and board rooms of Global 2000 companies, investigating computer networks targeted and attacked by criminals and nation-state sponsored hackers. This experience gives us an edge in preventing and responding to cyberattacks, as well as developing risk management strategies for our clients for all new cybersecurity treats in 2020 and beyond. 

 

Would You Get Hooked by a Phishing Scam? Test Yourself

As the tide of phishing attacks rises, improving your scam-spotting skills is never a bad idea (By Amer Owaida, We Live Security) Ingalls: Your organization's security is only as strong as your employees' awareness. Strengthen your defenses against social engineering attacks with our specialized training and testing programs to provides effective awareness and prevention to your company.