The best approach to security is a proactive one, but nobody is perfect. What happens when a determined attacker finds their way into your network? How do you know where they have been, what they have seen, when they got in, and how they gained access? How do you prioritize remediation and confirm that the bad guys are out of your network? Incident responders, like ProCircular's Aaron Heikkila, are at the ready to swoop down and stop the attackers in their tracks!
Topics: Cybersecurity, Information Security, Data Security, Incident Response, security incident handling, security incident response
How things stand: a cybersecurity recap of 2019
Topics: Cybersecurity, Network Security, Information Security, Vulnerability Assessment, Penetration Testing, Incident Response, it risk assessment
There has been a recent development regarding a potent vulnerability. To help you stay ahead of the situation, please read the following to learn what the exploit is capable of and what can be done to protect against the it.
Topics: Cybersecurity, Incident Response, hacking, security incident response
Cybersecurity breaches are becoming more and more prevalent. In fact, it’s been estimated that there were almost 5 billion records breached in 2018. Many organizations spend thousands of dollars on security breach prevention tools, but won’t take the time to create a formal process of identifying, responding to, and communicating an incident.
Topics: Cybersecurity, Data Breach, Data Security, Incident Response, security incident handling, security incident response
Flash Briefing: Presidents' Day Hackers Abound
Presidents' Day is on Monday of next week and this isn’t lost on fraudsters and wire-transfer hackers. Once a wire has mistakenly been sent to the bad guy, each minute counts - the longer the delay the greater the chance they’ve been able to transfer your funds to an account that can’t be reached by the FBI. The added holiday adds an automatic delay that works to their advantage and even the most prepared organizations can fall victim.
Topics: Cybersecurity, Incident Response, FBI, security incident response