Articles of interest from the week of March 29, 2021
Developing a Risk Management Approach to Cybersecurity By now most CISOs understand that focusing your cybersecurity program on regulatory...
24/7/365 Monitoring & Alerting
Compromise Assessments
Threat Hunting
Vulnerability Management
CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR®/RMF Pro)
ATO/RMF Support
If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.
Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.
At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.
2 min read
John Frasier : Mar 2, 2020 12:00:00 AM
Malware-free or fileless techniques accounted for 51% of attacks last year, compared to 40% the year before, as hackers turn to stolen credentials to breach corporate networks, reveals CrowdStrike's latest threat report. (By Eileen Yu, ZDNet) Ingalls: Our MDR (Managed Detection and Response) services offer layered cybersecurity controls for effective risk management and rapid response. It was designed to be a method of proactive prevention against security threats to your environment, especially zero-day threats, making it one of the industry's leading cybersecurity tools. MDR is critical when it comes to staying ahead of all kinds of threats, detecting and stopping them before they become breaches.
Microsoft's director of security education and awareness shares his approach to helping train employees in defensive practices. (By Kelly Sheridan, Dark Reading) Ingalls: Your organization's security is only as strong as your employees' awareness. Strengthen your defenses against social engineering attacks with our specialized training and testing programs to provides effective awareness and prevention to your company.
A group of hackers is using the remote desktop ActiveX control in Word documents to automatically execute on Windows 10 a malware downloader called Ostap that was seen recently adopted by TrickBot for delivery. (By Ionut Ilascu, Bleeping Computer) Ingalls: Having spent the last decade in war rooms and boardrooms investigating attacks by criminals and nation-state sponsored hackers, our team understands how to prevent and respond to cyber attacks. Even with the best controls in place, a security incident can still happen. In fact, when we talk in terms of incident response it may not necessarily refer to a breach, but an attempted breach. Regardless, whatever is responsible for triggering a response, our team of experts has the experience to resolve cyber attacks quickly and discreetly in order to get you back to normal as fast as possible.
While device-aware two-factor authentication is no panacea, it is more secure than conventional SMS-based 2FA. Here's why. (By Markus Jakbosson, Dark Reading) Ingalls: In today's office, employees are bringing more and more of their own devices onto your company's network, including potentially infected mobile phones. Endpoint detection and response lets you find and destroy malware before it executes. Our AI driven software platform enables dynamic threat detection and immediate remediation efforts.
Haven't changed those default passwords yet? You really should. (By Steve Ranger, ZDNet) Ingalls: Having strict password requirements is an example of an often overlooked but extremely important security measure that needs to be taken in your organization. Security policies mandate steps employees and managers should take to keep information secure and help guide individuals to make good decisions, so having strong policies is vital. Let us help review and test your policies to ensure adherence and effectiveness.
Developing a Risk Management Approach to Cybersecurity By now most CISOs understand that focusing your cybersecurity program on regulatory...
Next Generation Cyber: Malware-Free Attacks While the majority of the traditional cybersecurity solutions are focused on stopping malware, the threat...
Why Cybercrime Spikes Around Major Events And Unrest Health pandemics, weather catastrophes, civil unrest, war — these are all unfortunate realities...