Health pandemics, weather catastrophes, civil unrest, war — these are all unfortunate realities our global society faces at various times. During these major events, our collective sense of routine and normalcy is often replaced with fear and uncertainty. For most of us, our best selves can emerge and even shine during these trying times as we look for ways to help others and seek to provide some measure of comfort. (By: Arthur Wong, Forbes) Ingalls: With a major election about a month away, it's important for users to remain vigilant for malicious cyber activity targeting potential donors. Ingalls helps businesses large and small manage security risks and defend against cyberattacks. If you’d like to learn more, contact us here. One of our cybersecurity experts will be more than happy to assist you and answer any questions you may have.
The Cybersecurity and Infrastructure Security Agency (CISA) has released the Telework Essentials Toolkit, a comprehensive resource of telework best practices. The Toolkit provides three personalized modules for executive leaders, IT professionals, and teleworkers. Each module outlines distinctive security considerations appropriate for their role:
CISA encourages users and administrators to review the Telework Essentials Toolkit and the CISA Telework page for more information. (By: CISA) Ingalls: Can We Work From Home (WFH) Securely? Our blog covers some basic ground rules so that we can all help protect our information while working from home.
The death of a woman at least in part because of a ransomware attack has placed security teams on high alert: put in place adequate training for the workforce and ensure network redundancy, or else risk similar tragedy and even potential liability. (By: Bradley Barth, SC Media) Ingalls: If your organization is just beginning to develop a risk management strategy for cybersecurity, the first step is to plan for the worst-case scenario: a Data Security Breach. Ingalls has responded to some of the largest breaches in history, and today we handle multiple breach response engagements on a weekly basis. Our expertise in this area sets us apart from other cybersecurity services companies, and we provide our clients with expert consulting on how to identify and respond to a breach. We can sit down with you during a free consultation and scope out an Incident Response Planning engagement that will include documentation of a plan as well as testing it through tabletop exercises that are based on real-world breach scenarios that we've successfully navigated.