Skip to the main content.
Government Programs
Integrated technology, solutions, and services that support rapid innovation within the DoD ecosystem.

CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR/RMF Pro)
ATO/RMF Support

Book GP Demo

Professional Services
Expertise in security strategy, incident response readiness, policy development, and risk assessments.

Risk Assessments
vCISO
Penetration Testing

Book ProServ Demo

Digital Forensics & Incident Response
Are You Under Attack?

If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.

CONTACT US

Subscribe-to-NetSec-News-v4Subscribe to NetSec News

Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.

SIGN UP

Ingalls Information Security

At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.

Meet The Leadership Team

3 min read

Articles of interest from the week of June 21, 2021

Why Cybersecurity Has Become a “Team Sport”

At a recent online round-table event, hosted by the New Statesman and sponsored by technology company BlackBerry, industry experts gathered to discuss cybersecurity strategy going forward. A holistic approach, the attendees agreed, was needed – one that blended technical provision, staff training, media handling, and recovery planning. (By New Statesman) Ingalls: Let Ingalls be a part of your cybersecurity team. Since 2010, we’ve been in war rooms and boardrooms investigating targeted attacks by criminals and nation-state-sponsored hackers. In this time of heightened activity, we know that IT teams are struggling to keep pace with the volume of security alerts and responses needed to keep environments protected. Contact us to learn more about our Managed Detection and Response (MDR) and Incident Response (IR) options.


Microsoft Warns: Now Attackers Are Using a Call Center To Trick You Into Downloading Ransomware

Microsoft's cybersecurity researchers are now on the hunt for BazarCall, a criminal group that's using call centers to infect PCs with malware called BazarLoader – a malware loader that's been used to distribute ransomware. (By Liam Tung, ZDNet) Ingalls: Unfortunately, ransomware remains a serious threat to all industries and accounts for nearly a quarter of all malware-based attacks. Ransomware has become so widespread and commonplace that a normal attack garners neither the shock of security professionals nor the attention of the media. Are You Prepared To Defend Against Ransomware?


#HowTo: Protect Medical Institutions from Cyber-Attacks

Despite not being obvious targets for cyber-criminals, healthcare institutions are increasingly falling victim to digital attacks, now more so than ever. While at the start of the pandemic, medical institutions thought that cyber-criminals would not dare disrupt their operations - at least not while they take care of the sick and study the virus - that hope has been all but shattered. If anything, malicious actors are taking advantage of the havoc caused by COVID-19 to infiltrate overstretched hospital systems and steal invaluable patient data and critical research information. In the last quarter of 2020 alone, cyber-criminals exposed nearly 10 million records in 88 breaches. (By Shimrit Tzur-David, Infosecurity Magazine) Ingalls: The most important decision a business can make regarding cybersecurity risk management is to determine their cybersecurity risk management strategy. Our blog covers the pros and cons of both Responsive and Proactive Strategies.


Three Key Elements of a Defense-in-Depth Approach to Phishing

Phishing is probably the oldest and the most potent attack vector threatening today’s organizations. More than 90% of all cyber-attacks begin with phishing emails. Google reportedly blocks 18 million scam emails every day and registered a record two million phishing websites last year. And phishing attacks don’t look like they are going away anytime soon. In fact, they are going to become even more targeted as organized crime syndicates get their hands on dark web data dumps. Fighting and mitigating these attacks can be challenging and requires multiple layers of defense. Let’s explore the top three elements of a multi-layered, defense-in-depth approach.(By Perry Carpenter, Infosecurity Magazine) Ingalls: phishing attacks are a good example of why you need endpoint protection. Our Managed Detection and Response (MDR) service is designed for advanced detection, threat hunting, anomaly detection, and response guidance utilizing a defense-in-depth approach that monitors and correlates network activity with endpoints, logs, and everything in between.


The Widespread Implications of Cyber Attacks

Whenever an organization suffers a cyber attack, there is a significant human impact, which everyday citizens are only now just starting to realize the full impacts and consequences of. Cybersecurity is no longer something boards and businesses can relegate to the IT department. It has far-reaching broader implications on trust, wellbeing, and the community. (By Anna Leibel and Claire Pales, SmartCompany) Ingalls: No one plans to fail; however, failing to plan will often lead to a disaster when it comes to cybersecurity risk management. Depending on your organization’s size and stakeholders (regulators, shareholders, etc.), having a bad plan can cost your organization even more than if it had no plan at all! We've seen many different versions of breach victims with no plan, good plans, bad plans, and half a plan or less. Our experience in preparing the right plan for your organization can mean the difference between resolving a serious problem with little to no impact or having a minor issue balloon into shareholder lawsuits, regulatory fines, and other nightmares. Contact us today to discuss how you can prepare for successfully managing a cybersecurity crisis by having the right Incident Response Plan.

 

Sign Up For Network Security News