PROCIRCULAR BLOG

Educating your business on the importance of cybersecurity

How To Prepare A Cyber Security Incident Response Plan & Incident Response Team For A Cyber Attack

Posted by Joey Marinello on Jan 13, 2022 11:22:24 AM

New cyberattacks are discovered every single day. Organizations should not be considering if they will be attacked, but rather when they will be attacked and what proactive measures must be taken to ensure the company will survive.

Read More

Topics: Incident Response

When in doubt, try "Password123" - How I guessed your password

Posted by Mike Hedlund on Dec 10, 2021 2:56:13 PM

During a penetration test, login credentials are a highly sought-after item. While it is common to harvest that information via email scams (phishing attacks), it is not always the most practical or effective tactic to gain unauthorized access. That access, however, still requires a valid set of credentials. This poses a challenge. How does an attacker find valid accounts without social engineering? There are two main options: breached credentials and password spraying.

Read More

Topics: Cybersecurity, Network Security, Data Protection, Personal Data Protection, Security Awareness Training, Passwords, Monitoring

Top 4 Cybersecurity Risks of Mergers and Acquisitions (M&As)

Posted by Brandon Blankenship on Nov 11, 2021 10:58:22 AM

Buying a risky or vulnerable company is avoidable, and what you don't know can hurt you. Even with insurance or financial indemnification, cybersecurity breaches represent significant capital investment and brand risk. Cyber-related compliance requirements are often poorly understood, difficult to detect, introduce reputational risk, and cost time lost with outside auditors.   

Read More

Cybersecurity is a Team Sport: Peter Drucker on Cyber Attacks

Posted by Aaron R. Warner on Oct 11, 2021 10:48:44 AM

When Peter Drucker produced his seminal work, “What Makes an Effective Executive,” in the Harvard Business Review (Drucker, June, 2004), he may not have been writing with cybersecurity in mind. In fact, in 2004, the cybersecurity world had only begun to appear as the many-headed beast it’s become since then. Nonetheless, this text is an excellent guide for executives about incident response and breach management.

Read More

Topics: Cybersecurity, budgeting, security incident handling

Sophisticated Threat Actors are using LinkedIn to Phish Employees

Posted by Aaron Heikkila on Sep 30, 2021 9:03:06 AM

Phishing via employment-focused social media is on the rise. While performing incident response over the last few months, ProCircular encountered multiple incidents where LinkedIn was used in employee phishing attacks. Several news articles raised awareness of this phishing vector over the last year, and the trend continues with a new wave of attacks by sophisticated threat actors.

Read More

Topics: Incident Rsponse, hacking, risk

    ProCircular is a Full-Service Information Security Firm

    We are passionate about helping businesses navigate the complex world of information security, and our blog is another great source of inforamtion. We can assist you no matter where you are in your security maturity journey:

    • Breached or hit with ransomware?
    • Don't know where to start? 
    • Looking to confirm your security with a third party?

    Secure your future with ProCircular.

    Recent Posts

    Subscribe to Email Updates