The digital landscape, with its potential for connection and remembrance, has a lurking shadow side. Cybercriminals have been exploiting online memorials by creating false obituary websites. This happens when a legitimate site has a really difficult to detect - counterfeit counterpart.
Topics: IT Industry, Cybercrime, Cybersecurity, Artificial Intelligence (AI)
Topics: Security Breach, Cybercrime, Cybersecurity, cybersecurity compliance
Adhering to stringent cybersecurity standards is not only a good first-line defense against cyber-attacks, but it’s also a requirement for government agencies.
Topics: Security Breach, Public Safety, Cybercrime, Cybersecurity, cybersecurity compliance
Solutions II, an award-winning Solution Provider specializing in Security, IT Managed Services, Hybrid Cloud, Data Management, Infrastructure, and Hybrid Maintenance solutions, is launching ASM (Attack Surface Management) Illuminate as a next-level service to protect your organization from a cyberattack.
Topics: Ransomware, Security Breach, Cybercrime, Cybersecurity
Cyber Threats and Public Safety: Why Ransomware Can Be a Matter of Life or Death
While businesses regularly deal with the operational disruptions and financial ramifications of cyber-attacks, it’s a different situation in the public sector, where state and local agencies hit by ransomware can quickly transform into a matter of public and personal safety.
Topics: Ransomware, Security Breach, Public Safety, Cybercrime, Cybersecurity
After spending last week in Las Vegas at the Gartner Infrastructure Operations and Cloud Strategy Conference – here are our five takeaways for IT Leaders.
In order to understand the magnitude of an organization's attack surface, let's walk through a real-life attack scenario and see how Attack Surface Management (ASM) could have protected the organization from getting hit with ransomware.
Social Media Vulnerability
As businesses embrace the digital information age and the diverse tool sets to engage with the community many have found these very tool sets can be a double edged sword with potentially devastating effects. Remember when HBO had sensitive information regarding one of its hottest shows Game of Thrones find its way onto Twitter?? Today businesses have to ensure that the channels with which they operate are as locked down as their data repositories are.
Topics: Cybercrime, Service+Secure, Cybersecurity, IT Security, Vulnerability
To Click or Not To Click
Cyber Security firms are innovating at a pace never seen before trying to keep with various attack vectors facing organizations and individuals alike. It’s no secret that cyber security is a lucrative area to be in, but what is really driving this huge market and will it ever slow down? The speed and sophistication of attacks that happen to corporate America are on the rise and businesses that once held the stance of “we’re not at risk of being hacked” are now admitting that it’s no longer a question of “if” but “when”. With these escalating concerns, businesses are forced to pay big bucks to security firms to help reduce their risk, or look into IT managed services. They are also spending more on remediation of existing deficiencies as evidenced by this statistic and article from Business Insider: Cybersecurity is a $81.7 billion market - and startups are raking in the dough.
Topics: Business Continuity, Security, Security Breach, Cybercrime
I am often asked (being in the business if IT security and cybercrime intel & defense) what can I do to prevent from being "hacked or breached"? I bet I get this question at least every other day and try to answer it to the best of my ability knowing that none of the questions or my answers are the same; similar? Yes, but identical? No. I also don't claim to be the "EXPERT" because I have met some of the best and brightest in this industry that fight this type of scourge on our behalf every day, from the cybercrime professionals at the FBI to those fighting cyber terrorism across numerous government and private agencies. To my astonishment I am also regularly amazed at the sheer lack of knowledge most people have when it comes to talking/understanding this topic given we have been hearing about it for years now. I do however, find a genuine "thirst" for learning about cybercrime and all of its offshoots. Unfortunately, this topic is complex and always on the morph. It is not easily "5-minute rice" or "Cliff Notes" addressable. So, let me start by discussing the most common, and likely most relevant, areas to begin a learning curve.
Topics: Business Continuity, Data Protection, Security, Security Breach, Cybercrime