Skip to the main content.
Government Programs
Integrated technology, solutions, and services that support rapid innovation within the DoD ecosystem.

CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR®/RMF Pro)
ATO/RMF Support

Book GP Demo

Professional Services
Expertise in security strategy, incident response readiness, policy development, and risk assessments.

Risk Assessments
vCISO
Penetration Testing

Book ProServ Demo

Digital Forensics & Incident Response
Are You Under Attack?

If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.

CONTACT US

Subscribe-to-NetSec-News-v4Subscribe to NetSec News

Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.

SIGN UP

Ingalls Information Security

At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.

Meet The Leadership Team

2 min read

Articles of interest from the week of June 7, 2021

Boards Need To Understand The Long Term-Harm From Cyber Breaches

Serious cybersecurity breaches can have an immediate and noticeable impact on a company. But what about the long-term effects that boards and managers need to consider? (By Andrew Birmingham, Which-50 Media) Ingalls: At a time when cybersecurity is more strategic to businesses than ever before, determining one’s cybersecurity risk management strategy is crucial. Our Master Risk Control: Pick A Cybersecurity Risk Management Strategy blog post provides some valuable insight on the pros and cons of both the Responsive Strategy and Proactive Strategy.


Hackers Breached Colonial Pipeline Using Compromised VPN Password

The ransomware cartel that masterminded the Colonial Pipeline attack early last month crippled the pipeline operator's network using a compromised virtual private network (VPN) account password, the latest investigation into the incident has revealed. (By Ravie Lakshmananr, The Hacker News) Ingalls: The most effective way to avoid having your account information can be stolen, which can lead to a breach, is by enabling Multi-Factor Authentication (or MFA) and avoid reusing passwords. Here's some more information on why you need to deploy advanced user account protections like MFA.


Username and Password Breaches Increase by 450 Percent

A new report from an identity specialist reveals a massive 450 percent surge in breaches containing usernames and passwords globally. The report also finds that unauthorized access was the leading cause of breaches for the third consecutive year, increasing year-on-year for the past two years, and accounting for 43 percent of all breaches in 2020. (By Ian Barker, BetaNews) Ingalls: User account security is one of the most important parts of a proactive security strategy. Multi-factor authentication, password managers, complexity, and other risk management controls can all work together to make sure that user accounts stay secure. If you need help with implementing these controls or other cybersecurity risk management techniques, be sure to contact us so that Ingalls Information Security can help!


The Evolution of Phishing: Welcome "Vishing"

Post-mortem analysis of data breaches shows that most of today’s cyber-attacks are front-ended by phishing campaigns. The most recent CryptoForHealth Twitter Hacker is just one of many examples. This is not surprising, since the easiest way for a threat actor to gain access to sensitive data is by compromising an end user’s identity and credentials. Things get even worse if a stolen identity belongs to a privileged user, who has even broader access, and therefore provides the intruder with “the keys to the kingdom”. While paying close attention to established hackers tactics, techniques, and procedures (TTPs) increases an organization’s ability to implement effective cyber defense strategies, businesses need to stay abreast of emerging TTPs. A good example is vishing, which is a new take on an old scam. (By Torsten George, SecurityWeek) Ingalls: Our cybersecurity experts are highly skilled in Security Awareness Training, Risk Management, and Endpoint Protection. Mastery in all of these areas is essential to prevent voice phishing attacks. Contact Ingalls today to find out how we can protect your organization.


The Cost of Ransomware Attacks Worldwide Will Go Beyond $265 Billion in the Next Decade

The cost of ransomware incidents worldwide is expected to spiral out of control, exceeding $265 billion by 2031. Ransomware is now one of the most potentially damaging -- and a very popular -- types of malware. If ransomware lands on a vulnerable system, files are usually encrypted, users are locked out, and payment is demanded, usually in cryptocurrency, in return for a decryption key. (By Charlie Osborne, ZDNet) Ingalls: To help fight Ransomware, Ingalls’ offers Managed Detection and Response (MDR), our MDR offers advanced anomaly detection, threat hunting, and sophisticated response guidance utilizing a defense-in-depth approach. Unlike a traditional Managed Security Service Provider (MSSP), Ingalls’ MDR service is geared toward proactive prevention. We do this by utilizing the very latest in cloud, big data analytics, and machine learning along with the cybersecurity industry’s leading incident response team, to identify threats to your environment and to provide the highest fidelity of monitoring, alerting and response possible.

 

Sign Up For Network Security News

Articles of interest from the week of June 21, 2021

Why Cybersecurity Has Become a “Team Sport” At a recent online round-table event, hosted by the New Statesman and sponsored by technology company...

Read More

Articles of interest from the week of June 17, 2019

Why Cybersecurity Matters To Your Business You start a business. You grow your company from an idea to a fully functioning and profitable entity....

Read More

Articles of interest from the week of June 15, 2020

Defending Your Budget: How to Show ROI of Cybersecurity Investments Until recently, proving the ROI of security investment has not been a significant...

Read More