Skip to the main content.
Government Programs
Integrated technology, solutions, and services that support rapid innovation within the DoD ecosystem.

CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR/RMF Pro)
ATO/RMF Support

Book GP Demo

Professional Services
Expertise in security strategy, incident response readiness, policy development, and risk assessments.

Risk Assessments
vCISO
Penetration Testing

Book ProServ Demo

Digital Forensics & Incident Response
Are You Under Attack?

If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.

CONTACT US

Subscribe-to-NetSec-News-v4Subscribe to NetSec News

Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.

SIGN UP

Ingalls Information Security

At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.

Meet The Leadership Team

2 min read

Top 5 Cybersecurity Blog Posts of 2020

To say 2020 has been an unprecedented year is undoubtedly an understatement,  and when we look at cybersecurity we see the unprecedented theme of the year clearly demonstrated. 

In 2020 Ransomware attacks continued to cause massive disruption to businesses of all sizes. Companies have relied more and more on experienced cybersecurity partners to strengthen their cybersecurity protections and reduce their attack surfaces. Cybersecurity technology enabled services have evolved with legacy antivirus solutions unable to keep pace with the threats. The security of our Elections Infrastructure has been challenged with government agencies all across the country falling prey to cyberattacks. The COVID-19 pandemic spread throughout the world, and an increasing percentage of the workforce have been forced to work remotely in an effort to “flatten the curve”, creating cybersecurity risks that many companies weren’t ready to mitigate.

Ingalls has written about these, and many other cybersecurity topics on our blog this year. As we look forward to a better 2021, take some time to review these key Blog Posts so we can welcome 2021 more cybersecurity aware and more cybersecurity prepared.


How to Respond When You’ve Been Breached

An employee calls the helpdesk saying that they can’t access their files, and there’s a note on the screen saying to email the attacker to send bitcoin to get the files decrypted. The CEO is receiving emails from their contacts asking whether they sent an email with a link to an “encrypted” message (hint: they didn’t) asking recipients to login to access it. Customers are calling saying that they can’t access the company website. A journalist contacts the company’s lawyer asking whether the company is aware that sensitive customer data is publicly exposed in a public file share. Cyberattacks come in many forms, but for the IT professionals responsible for securing an environment, these reports are all alarming. Cybersecurity incidents are an unfortunate reality of operating a business today, and most cybersecurity experts agree that for most organizations it’s not a matter of if but when an organization will face a breach.

https://blog.iinfosec.com/how-to-respond-when-you-have-been-breached


What Should you Be Asking Your IT Company about Cybersecurity

As many businesses around the world continue to fall victim to cyber attacks, it's important now more than ever to reevaluate and potentially add to any protective measures already in place. Current cybersecurity measures are critical, as more than 60% of small businesses go out of business within six months after being hacked. 

https://blog.iinfosec.com/what-you-should-be-asking-your-it-company-about-cybersecurity


Managed Detection And Response (MDR): What’s It All About?

With so many security products and vendors on the market, it can feel like there's no practical way to evaluate them all. Sometimes, we take the approach of selecting the product with the most recognizable brand and then hope it was the right decision. After all, you can always replace it later if it doesn't work the way you want it to, right?  The problem, of course, is that deploying tools is time consuming, costly, and potentially disruptive. There's also the cost associated with removing tools which turn out to be a bad fit.

The challenges associated with selecting the best security solution for your organization become more complicated when dealing with newer technologies. One such offering is Managed Detection and Response (MDR).

https://blog.iinfosec.com/managed-detection-and-response-mdr-whats-it-all-about

Elections Season And Elections Security - Are We Ready?

Election season is firmly upon us. We are facing increasing cybersecurity threats with government agencies all across the country falling prey to cyberattacks. These attacks have resulted in financial loss and system wide shutdowns. The frequency, organization, and impact of these cyberattacks are growing. The question is clear; when it comes to Elections Security, are we ready?

https://blog.iinfosec.com/elections-season-and-elections-security-are-we-ready


Keep Your Network Secure While Working Remotely During COVID-19

As the COVID-19 pandemic continues to spread throughout the world, an increasing percentage of the workforce will be forced to work remotely in an effort to “flatten the curve” of this deadly virus. In preparation for this massive shift, it’s important to take necessary precautions to protect the networks and systems that store businesses’ private, sensitive data. 

Ingalls Information Security team has compiled a guide businesses can follow and share best practice measures to ensure secure remote access and business continuity during the COVID-19 pandemic crisis.

https://blog.iinfosec.com/keep-your-network-secure-while-working-remotely-during-covid-19

Subscribe to Network Security News