Cybersecurity Blog https://blog.iinfosec.com Stay updated on all things cybersecurity risk management through insightful, and timely posts on topics like cyber threats, technology, and more. en Tue, 15 Nov 2022 15:38:24 GMT 2022-11-15T15:38:24Z en Cybersecurity Advisory: Patches for 6 Actively Exploited Zero Days https://blog.iinfosec.com/cybersecurity-advisory-for-security-patches-for-6-actively-exploited-zero-days <div class="hs-featured-image-wrapper"> <a href="https://blog.iinfosec.com/cybersecurity-advisory-for-security-patches-for-6-actively-exploited-zero-days" title="" class="hs-featured-image-link"> <img src="https://blog.iinfosec.com/hubfs/Generic%20Security%20Advisory_Blog.jpg" alt="Security Patches for 6 Actively Exploited Zero Days" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div> <div> <div> <div> <div> <div style="line-height: 1.25;"> It's important that organizations deploy last week's "Patch Tuesday" patches as soon as possible. These patches include several critical, high, and important severity vulnerabilities, but more importantly, it addresses 6 vulnerabilities that are known to be under active exploitation by threat actors "in the wild". </div> </div> </div> </div> </div> </div> <div class="hs-featured-image-wrapper"> <a href="https://blog.iinfosec.com/cybersecurity-advisory-for-security-patches-for-6-actively-exploited-zero-days" title="" class="hs-featured-image-link"> <img src="https://blog.iinfosec.com/hubfs/Generic%20Security%20Advisory_Blog.jpg" alt="Security Patches for 6 Actively Exploited Zero Days" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div> <div> <div> <div> <div> <div style="line-height: 1.25;"> It's important that organizations deploy last week's "Patch Tuesday" patches as soon as possible. These patches include several critical, high, and important severity vulnerabilities, but more importantly, it addresses 6 vulnerabilities that are known to be under active exploitation by threat actors "in the wild". </div> </div> </div> </div> </div> </div> <img src="https://track.hubspot.com/__ptq.gif?a=3957749&amp;k=14&amp;r=https%3A%2F%2Fblog.iinfosec.com%2Fcybersecurity-advisory-for-security-patches-for-6-actively-exploited-zero-days&amp;bu=https%253A%252F%252Fblog.iinfosec.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Cybersecurity Controls Cybersecurity Advisory Mon, 14 Nov 2022 20:19:00 GMT https://blog.iinfosec.com/cybersecurity-advisory-for-security-patches-for-6-actively-exploited-zero-days 2022-11-14T20:19:00Z Cyrus Robinson If It Walks Like a Qakbot and Quacks Like a Qakbot… https://blog.iinfosec.com/critical-advisory-notice-for-qakbot <div class="hs-featured-image-wrapper"> <a href="https://blog.iinfosec.com/critical-advisory-notice-for-qakbot" title="" class="hs-featured-image-link"> <img src="https://blog.iinfosec.com/hubfs/Qakbot%20Advisory_Blog.jpg" alt="If It Walks Like a Qakbot and Quacks Like a Qakbot..." class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="text-align: left; font-weight: bold; line-height: 1.15;">Qakbot Conversation Hijacking Phishing Campaigns Targeting Government, Law Enforcement, and Financial Sector Organizations.</p> <p style="text-align: left; line-height: 1.15;">Beginning July 2022, the Ingalls SOC began to observe an increase in malware infection attempts involving Qakbot (aka Qbot aka Pinkslipbot) across our client base but with a particular focus on state and local government and law enforcement organizations (especially government/law enforcement organizations in Louisiana) and, to a lesser extent, financial industry organizations. With ongoing international tensions in several regions and upcoming elections, the Ingalls SOC wants to ensure that our clients are protected from emerging threats within the threat landscape.</p> <div class="hs-featured-image-wrapper"> <a href="https://blog.iinfosec.com/critical-advisory-notice-for-qakbot" title="" class="hs-featured-image-link"> <img src="https://blog.iinfosec.com/hubfs/Qakbot%20Advisory_Blog.jpg" alt="If It Walks Like a Qakbot and Quacks Like a Qakbot..." class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="text-align: left; font-weight: bold; line-height: 1.15;">Qakbot Conversation Hijacking Phishing Campaigns Targeting Government, Law Enforcement, and Financial Sector Organizations.</p> <p style="text-align: left; line-height: 1.15;">Beginning July 2022, the Ingalls SOC began to observe an increase in malware infection attempts involving Qakbot (aka Qbot aka Pinkslipbot) across our client base but with a particular focus on state and local government and law enforcement organizations (especially government/law enforcement organizations in Louisiana) and, to a lesser extent, financial industry organizations. With ongoing international tensions in several regions and upcoming elections, the Ingalls SOC wants to ensure that our clients are protected from emerging threats within the threat landscape.</p> <img src="https://track.hubspot.com/__ptq.gif?a=3957749&amp;k=14&amp;r=https%3A%2F%2Fblog.iinfosec.com%2Fcritical-advisory-notice-for-qakbot&amp;bu=https%253A%252F%252Fblog.iinfosec.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Cybersecurity Controls Cybersecurity Advisory Tue, 01 Nov 2022 19:23:52 GMT https://blog.iinfosec.com/critical-advisory-notice-for-qakbot 2022-11-01T19:23:52Z Cyrus Robinson Are You Prepared to Defend Against Ransomware? https://blog.iinfosec.com/are-you-prepared-to-defend-against-ransomware <div class="hs-featured-image-wrapper"> <a href="https://blog.iinfosec.com/are-you-prepared-to-defend-against-ransomware" title="" class="hs-featured-image-link"> <img src="https://blog.iinfosec.com/hubfs/NCSAM%20Defend%20Against%20Ransomware%20v1_Blog.jpg" alt="Are You Prepared to Defend Against Ransomware?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>One of the most telling statistics from this year’s <a href="https://www.verizon.com/business/resources/reports/dbir/?cmp=knc:bin:ac:wls:dpr:8888855284&amp;utm_term=verizon%20dbir%202022&amp;utm_medium=cpc&amp;utm_source=bing&amp;utm_campaign=BNG_BND_Security_Exact&amp;utm_content=DBIR2022&amp;ds_cid=71700000082347690&amp;&amp;msclkid=43a11a3e1f141ccbcb057964b67eb530&amp;gclid=43a11a3e1f141ccbcb057964b67eb530&amp;gclsrc=3p.ds">Verizon Data Breach Investigations Report (DBIR)</a> is that Ransomware remains a serious threat to all industries, with a one-year rise in occurrence as high as the past five combined. Ransomware has become so widespread and commonplace that a normal attack garners neither the shock of security professionals nor the attention of the media, while attacks on larger and increasingly critical or sensitive institutions make headlines nearly every week.&nbsp;&nbsp;</p> <div class="hs-featured-image-wrapper"> <a href="https://blog.iinfosec.com/are-you-prepared-to-defend-against-ransomware" title="" class="hs-featured-image-link"> <img src="https://blog.iinfosec.com/hubfs/NCSAM%20Defend%20Against%20Ransomware%20v1_Blog.jpg" alt="Are You Prepared to Defend Against Ransomware?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>One of the most telling statistics from this year’s <a href="https://www.verizon.com/business/resources/reports/dbir/?cmp=knc:bin:ac:wls:dpr:8888855284&amp;utm_term=verizon%20dbir%202022&amp;utm_medium=cpc&amp;utm_source=bing&amp;utm_campaign=BNG_BND_Security_Exact&amp;utm_content=DBIR2022&amp;ds_cid=71700000082347690&amp;&amp;msclkid=43a11a3e1f141ccbcb057964b67eb530&amp;gclid=43a11a3e1f141ccbcb057964b67eb530&amp;gclsrc=3p.ds">Verizon Data Breach Investigations Report (DBIR)</a> is that Ransomware remains a serious threat to all industries, with a one-year rise in occurrence as high as the past five combined. Ransomware has become so widespread and commonplace that a normal attack garners neither the shock of security professionals nor the attention of the media, while attacks on larger and increasingly critical or sensitive institutions make headlines nearly every week.&nbsp;&nbsp;</p> <img src="https://track.hubspot.com/__ptq.gif?a=3957749&amp;k=14&amp;r=https%3A%2F%2Fblog.iinfosec.com%2Fare-you-prepared-to-defend-against-ransomware&amp;bu=https%253A%252F%252Fblog.iinfosec.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Cybersecurity Controls Fri, 28 Oct 2022 15:37:02 GMT https://blog.iinfosec.com/are-you-prepared-to-defend-against-ransomware 2022-10-28T15:37:02Z Sarena O'Donnell A How-to-Guide for Multi-Factor Authentication https://blog.iinfosec.com/a-how-to-guide-for-multi-factor-authentication <div class="hs-featured-image-wrapper"> <a href="https://blog.iinfosec.com/a-how-to-guide-for-multi-factor-authentication" title="" class="hs-featured-image-link"> <img src="https://blog.iinfosec.com/hubfs/A%20How-to-Guide%20for%20Multi-Factor%20Authentication%20Social%20NSCAM%202022_Blog.jpg" alt="A How-to-Guide for Multi-Factor Authentication" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><span>Have you noticed how often security breaches, stolen data, and identity theft are consistently front-page news these days? Perhaps you, or someone you know, are a victim of cyber criminals who stole personal information, banking credentials, or more. As these incidents become more prevalent, you should consider using multi-factor authentication, also called strong authentication, or two-factor authentication. This technology may already be familiar to you, as many banking and financial institutions require both a password and one of the following to log in: a call, email, or text containing a code. By applying these principles of verification to more of your personal accounts, such as email, social media, and more, you can better secure your information and identity online!</span></p> <div class="hs-featured-image-wrapper"> <a href="https://blog.iinfosec.com/a-how-to-guide-for-multi-factor-authentication" title="" class="hs-featured-image-link"> <img src="https://blog.iinfosec.com/hubfs/A%20How-to-Guide%20for%20Multi-Factor%20Authentication%20Social%20NSCAM%202022_Blog.jpg" alt="A How-to-Guide for Multi-Factor Authentication" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><span>Have you noticed how often security breaches, stolen data, and identity theft are consistently front-page news these days? Perhaps you, or someone you know, are a victim of cyber criminals who stole personal information, banking credentials, or more. As these incidents become more prevalent, you should consider using multi-factor authentication, also called strong authentication, or two-factor authentication. This technology may already be familiar to you, as many banking and financial institutions require both a password and one of the following to log in: a call, email, or text containing a code. By applying these principles of verification to more of your personal accounts, such as email, social media, and more, you can better secure your information and identity online!</span></p> <img src="https://track.hubspot.com/__ptq.gif?a=3957749&amp;k=14&amp;r=https%3A%2F%2Fblog.iinfosec.com%2Fa-how-to-guide-for-multi-factor-authentication&amp;bu=https%253A%252F%252Fblog.iinfosec.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> User Protection Mon, 24 Oct 2022 13:23:27 GMT https://blog.iinfosec.com/a-how-to-guide-for-multi-factor-authentication 2022-10-24T13:23:27Z Sarena O'Donnell Small Business Cybersecurity Quick Wins https://blog.iinfosec.com/small-business-cybersecurity-quick-wins <div class="hs-featured-image-wrapper"> <a href="https://blog.iinfosec.com/small-business-cybersecurity-quick-wins" title="" class="hs-featured-image-link"> <img src="https://blog.iinfosec.com/hubfs/small-business-quick-wins%20v2b_Blog.jpg" alt="Small Business Cybersecurity Quick Wins" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>Small businesses are quickly deploying various technologies to better serve their customers and manage their business more efficiently. Different kinds of technologies, however, come with a variety of risks and, thus, require specific strategies to protect them. Our “Quick Wins” blog and infographic can be used as a starting point as a content outline for your own security awareness training program.&nbsp;</p> <div class="hs-featured-image-wrapper"> <a href="https://blog.iinfosec.com/small-business-cybersecurity-quick-wins" title="" class="hs-featured-image-link"> <img src="https://blog.iinfosec.com/hubfs/small-business-quick-wins%20v2b_Blog.jpg" alt="Small Business Cybersecurity Quick Wins" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>Small businesses are quickly deploying various technologies to better serve their customers and manage their business more efficiently. Different kinds of technologies, however, come with a variety of risks and, thus, require specific strategies to protect them. Our “Quick Wins” blog and infographic can be used as a starting point as a content outline for your own security awareness training program.&nbsp;</p> <img src="https://track.hubspot.com/__ptq.gif?a=3957749&amp;k=14&amp;r=https%3A%2F%2Fblog.iinfosec.com%2Fsmall-business-cybersecurity-quick-wins&amp;bu=https%253A%252F%252Fblog.iinfosec.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Cybersecurity Controls Mon, 17 Oct 2022 15:17:17 GMT https://blog.iinfosec.com/small-business-cybersecurity-quick-wins 2022-10-17T15:17:17Z National Cyber Security Alliance 4 Tips for Safely Updating Software and Apps https://blog.iinfosec.com/4-tips-for-safely-updating-software-and-apps <div class="hs-featured-image-wrapper"> <a href="https://blog.iinfosec.com/4-tips-for-safely-updating-software-and-apps" title="" class="hs-featured-image-link"> <img src="https://blog.iinfosec.com/hubfs/4%20Tips%20For%20Safely%20Updating%20Software%20And%20Apps%20v1_Blog%20Header.jpg" alt="4 Tips for Safely Updating Software and Apps" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="line-height: 1.25;">It's Cybersecurity Awareness Month and one critical way to keep yourself and your information safe is to regularly update apps and software. Here are some important tips and a cool infographic shared from Cybersecurity Awareness Month that helps illustrate the importance of staying safe online.&nbsp;</p> <div class="hs-featured-image-wrapper"> <a href="https://blog.iinfosec.com/4-tips-for-safely-updating-software-and-apps" title="" class="hs-featured-image-link"> <img src="https://blog.iinfosec.com/hubfs/4%20Tips%20For%20Safely%20Updating%20Software%20And%20Apps%20v1_Blog%20Header.jpg" alt="4 Tips for Safely Updating Software and Apps" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="line-height: 1.25;">It's Cybersecurity Awareness Month and one critical way to keep yourself and your information safe is to regularly update apps and software. Here are some important tips and a cool infographic shared from Cybersecurity Awareness Month that helps illustrate the importance of staying safe online.&nbsp;</p> <img src="https://track.hubspot.com/__ptq.gif?a=3957749&amp;k=14&amp;r=https%3A%2F%2Fblog.iinfosec.com%2F4-tips-for-safely-updating-software-and-apps&amp;bu=https%253A%252F%252Fblog.iinfosec.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Risk Management Security Awareness Thu, 13 Oct 2022 15:30:00 GMT https://blog.iinfosec.com/4-tips-for-safely-updating-software-and-apps 2022-10-13T15:30:00Z Kim Buckley Securer Things: Cybersecurity Awareness for IoT https://blog.iinfosec.com/securer-things <div class="hs-featured-image-wrapper"> <a href="https://blog.iinfosec.com/securer-things" title="" class="hs-featured-image-link"> <img src="https://blog.iinfosec.com/hubfs/Securer%20Things%20v2_Blog.jpeg" alt="Securer Things: Securing your IoT devices" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> In honor of Cybersecurity Awareness Month and Halloween, we thought it was a good chance to put together a friendly reminder of how and why you need to secure (aka "patch") the IoT "pumpkins" in your life. Without further ado, we introduce "Securer Things," which will hopefully give you a clear roadmap to IoT cyber safety. <div class="hs-featured-image-wrapper"> <a href="https://blog.iinfosec.com/securer-things" title="" class="hs-featured-image-link"> <img src="https://blog.iinfosec.com/hubfs/Securer%20Things%20v2_Blog.jpeg" alt="Securer Things: Securing your IoT devices" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> In honor of Cybersecurity Awareness Month and Halloween, we thought it was a good chance to put together a friendly reminder of how and why you need to secure (aka "patch") the IoT "pumpkins" in your life. Without further ado, we introduce "Securer Things," which will hopefully give you a clear roadmap to IoT cyber safety. <img src="https://track.hubspot.com/__ptq.gif?a=3957749&amp;k=14&amp;r=https%3A%2F%2Fblog.iinfosec.com%2Fsecurer-things&amp;bu=https%253A%252F%252Fblog.iinfosec.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Security Awareness Mon, 10 Oct 2022 16:32:15 GMT jessica.willoughby@iinfosec.com (Jessica Willoughby) https://blog.iinfosec.com/securer-things 2022-10-10T16:32:15Z The Phishing Adventures of Huck Phinn, Another School of Phish https://blog.iinfosec.com/the-phishing-adventures-of-huck-phinn-another-school-of-phish <div class="hs-featured-image-wrapper"> <a href="https://blog.iinfosec.com/the-phishing-adventures-of-huck-phinn-another-school-of-phish" title="" class="hs-featured-image-link"> <img src="https://blog.iinfosec.com/hubfs/Huck%20Phinn%20Ch%207%20Social_Blog%20Header.jpg" alt="The Phishing Adventures of Huck Phinn, Another School of Phish" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <h5 style="font-weight: normal;"><span style="color: #009639;">Chapter 7</span></h5> <p>It's Cybersecurity Awareness Month, so we thought it was a good time to bring back our good friend Huck Phinn for another adventure in phishing.&nbsp;</p> <div class="hs-featured-image-wrapper"> <a href="https://blog.iinfosec.com/the-phishing-adventures-of-huck-phinn-another-school-of-phish" title="" class="hs-featured-image-link"> <img src="https://blog.iinfosec.com/hubfs/Huck%20Phinn%20Ch%207%20Social_Blog%20Header.jpg" alt="The Phishing Adventures of Huck Phinn, Another School of Phish" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <h5 style="font-weight: normal;"><span style="color: #009639;">Chapter 7</span></h5> <p>It's Cybersecurity Awareness Month, so we thought it was a good time to bring back our good friend Huck Phinn for another adventure in phishing.&nbsp;</p> <img src="https://track.hubspot.com/__ptq.gif?a=3957749&amp;k=14&amp;r=https%3A%2F%2Fblog.iinfosec.com%2Fthe-phishing-adventures-of-huck-phinn-another-school-of-phish&amp;bu=https%253A%252F%252Fblog.iinfosec.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> phishing Tue, 04 Oct 2022 18:00:59 GMT https://blog.iinfosec.com/the-phishing-adventures-of-huck-phinn-another-school-of-phish 2022-10-04T18:00:59Z Cyrus Robinson What the FTC Revised Safeguards Rule Means for Auto Dealerships https://blog.iinfosec.com/ftc-revised-safeguards-rule-for-auto-dealerships <div class="hs-featured-image-wrapper"> <a href="https://blog.iinfosec.com/ftc-revised-safeguards-rule-for-auto-dealerships" title="" class="hs-featured-image-link"> <img src="https://blog.iinfosec.com/hubfs/Auto%20Dealerships%20Safeguards%20Rule%20v1_Blog.jpg" alt="What The FTC Revised Safeguards Rule Means For Auto Dealerships" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> The FTC has issued guidance on the Revised Safeguards Rule for auto dealerships, which in addition to data privacy requirements, includes regulations that require your business to draft and follow a written Information Security program overseen by a designated Qualified Individual.&nbsp; <div class="hs-featured-image-wrapper"> <a href="https://blog.iinfosec.com/ftc-revised-safeguards-rule-for-auto-dealerships" title="" class="hs-featured-image-link"> <img src="https://blog.iinfosec.com/hubfs/Auto%20Dealerships%20Safeguards%20Rule%20v1_Blog.jpg" alt="What The FTC Revised Safeguards Rule Means For Auto Dealerships" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> The FTC has issued guidance on the Revised Safeguards Rule for auto dealerships, which in addition to data privacy requirements, includes regulations that require your business to draft and follow a written Information Security program overseen by a designated Qualified Individual.&nbsp; <img src="https://track.hubspot.com/__ptq.gif?a=3957749&amp;k=14&amp;r=https%3A%2F%2Fblog.iinfosec.com%2Fftc-revised-safeguards-rule-for-auto-dealerships&amp;bu=https%253A%252F%252Fblog.iinfosec.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> safeguards rule Tue, 27 Sep 2022 13:45:21 GMT https://blog.iinfosec.com/ftc-revised-safeguards-rule-for-auto-dealerships 2022-09-27T13:45:21Z Christopher Magill Ingalls Summer 2022 Intern Midterm Review: Rylan Burlison https://blog.iinfosec.com/ingalls-summer-2022-intern-midterm-review-rylan-burlison <div class="hs-featured-image-wrapper"> <a href="https://blog.iinfosec.com/ingalls-summer-2022-intern-midterm-review-rylan-burlison" title="" class="hs-featured-image-link"> <img src="https://blog.iinfosec.com/hubfs/Intern%20Midterm%20Review%20%28Rylan%20Burlison%29_Blog.jpg" alt="Ingalls Summer 2022 Intern Midterm Review: Rylan Burlison" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="line-height: 1.15;">In this Intern Midterm Review, we hear from Rylan Burlison about what it's like working at Ingalls and what's next in his cybersecurity career journey.&nbsp;</p> <div class="hs-featured-image-wrapper"> <a href="https://blog.iinfosec.com/ingalls-summer-2022-intern-midterm-review-rylan-burlison" title="" class="hs-featured-image-link"> <img src="https://blog.iinfosec.com/hubfs/Intern%20Midterm%20Review%20%28Rylan%20Burlison%29_Blog.jpg" alt="Ingalls Summer 2022 Intern Midterm Review: Rylan Burlison" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="line-height: 1.15;">In this Intern Midterm Review, we hear from Rylan Burlison about what it's like working at Ingalls and what's next in his cybersecurity career journey.&nbsp;</p> <img src="https://track.hubspot.com/__ptq.gif?a=3957749&amp;k=14&amp;r=https%3A%2F%2Fblog.iinfosec.com%2Fingalls-summer-2022-intern-midterm-review-rylan-burlison&amp;bu=https%253A%252F%252Fblog.iinfosec.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Internship Wed, 21 Sep 2022 13:07:53 GMT jessica.willoughby@iinfosec.com (Jessica Willoughby) https://blog.iinfosec.com/ingalls-summer-2022-intern-midterm-review-rylan-burlison 2022-09-21T13:07:53Z