PROCIRCULAR BLOG

Educating your business on the importance of cybersecurity

EDRSilencer Disrupting Endpoint Security

Posted by ProCircular Team on Oct 22, 2024 10:26:08 AM

Hackers have used red team tool EDRSilencer to make the Windows Filtering Platform (WFP) block a list of EDR products from communicating with their management consoles. this software can affect any Windows workstation or Windows server that runs an EDR. 

Read More

Topics: Cybersecurity, Network Security, Information Security, Red team

CMMC Final Rule, October 2024

Posted by ProCircular Team on Oct 14, 2024 8:24:30 AM

CMMC Final Rule, 32 CFR Part 170, was released with formal publishing set for October 15, 2024.  

Read More

Topics: Cybersecurity, Information Security, Compliance, CMMC

Now Open: The FCC’s Schools and Libraries Cybersecurity Pilot Program

Posted by ProCircular Team on Sep 17, 2024 3:31:11 PM

The FCC’s Schools and Libraries Cybersecurity Pilot program is now open for FCC Form 484 Part 1and we’d like to take a moment to help qualifying organizationsget the most bang from their submission.  

Read More

Topics: Cybersecurity, Information Security, Data Protection, Penetration Testing, Incident Response, Monitoring, MXDR

Protect Your Organization with Advanced Phishing Simulations

Posted by Jake McGreevy on Aug 19, 2024 11:29:44 AM

In today's evolving digital landscape, ensuring the security of your organization’s sensitive information is more critical than ever. Traditional security measures, including Multi-Factor Authentication (MFA), are essential but not foolproof. 

Read More

Topics: Cybersecurity, Information Security, Data Security, Data Protection, cybersecurity plan, Passwords, social engineering, MFA

Staying Vigilant Against Cyber Threats in Healthcare

Posted by ProCircular Team on Aug 2, 2024 12:12:52 PM

Recently, the American Hospital Association warned that Black Basta, a known ransomware group, would be accelerating attacks within the healthcare sector. The group gained notoriety for their sophisticated attack methods and high-profile targets and typically operates by infiltrating a network, exfiltrating sensitive data, and then encrypting the victim's files.

Healthcare organizations can stay vigilant against threat actors by adopting a comprehensive cybersecurity strategy that incorporates regular testing and 24/7 monitoring. ProCircular also recommends the following:

Read More

Topics: Cybersecurity, Network Security, Data Breach, Information Security, Data Security, Data Protection, Security Awareness Training, healthcare, hacking, Passwords, risk, Ransomware

  • There are no suggestions because the search field is empty.

ProCircular is a Full-Service Information Security Firm

We are passionate about helping businesses navigate the complex world of information security, and our blog is another great source of inforamtion. We can assist you no matter where you are in your security maturity journey:

  • Breached or hit with ransomware?
  • Don't know where to start? 
  • Looking to confirm your security with a third party?

Secure your future with ProCircular.

Recent Posts

Subscribe to Email Updates