PROCIRCULAR BLOG

Educating your business on the importance of cybersecurity

LLMNR & NBT-NS Spoofing

Posted by ProCircular Team on Apr 30, 2019 2:09:00 PM

During a penetration test, we’ve found that a common (and easy) way to gather credentials and gain an initial foothold on the client’s network is to perform a Man-in-the-Middle poisoning attack abusing LLMNR & NBT-NS. Depending on how active users are on the network, this attack can give an adversary valuable information almost immediately. Fortunately, with a little knowledge, this attack can be easily remediated.

What is LLMNR & NBT-NS? 

Read More

Topics: Cybersecurity, Network Security, Information Security, hacking

Cybersecurity: Real vs. Checking the Box

Posted by Brandon Blankenship on Feb 28, 2019 3:38:00 PM

The reason we wear our seat belts is not to avoid getting a ticket from the police, but rather to avoid a potential injury in a car accident. This analogy is an easy way to describe the difference between box-checking security and real security, and it's instantly understood regardless of technical knowledge. This message resonates with executives, because they typically prefer to “get to the point” and correctly protecting their data is “the point” of cybersecurity.

Read More

Topics: HIPAA, Information Security, consumer security, Data Security, Data Protection, Vulnerability Assessment, it risk assessment, DFARS, cybersecurity plan, NIST

From the Front Lines of Malware Detection

Posted by ProCircular Team on Jan 24, 2019 3:24:18 PM

Everyone has (or should have) an anti-virus solution. It's probably barked at you once or twice for downloading a file from a sketchy website or opening a link from an email you didn't quite recognize. But how does your anti-virus know what programs are bad, and what programs are good?

Read More

Topics: Cybersecurity, Information Security, Incident Rsponse, security incident handling, security incident response, cybersecurity plan, SIEM

Diagnosing the Cybersecurity Bug

Posted by ProCircular Team on Apr 24, 2017 3:06:59 PM

Industry Trends

Cybersecurity in the healthcare field has gone through a lot changes the past few years. In 2016 there was a significant jump in the total number of healthcare specific cybercrimes.  According to SecurityIntelligence there was a 71% increase of confirmed data breaches in the healthcare sector from 2015 to 2016.  Drilling down on that increase revealed that most of the jump was from external (aka "hacking" or ransomware or malware") followed by internal non-malicious (aka accidents from insiders).  Trends are showing that cybercriminals have found more value in healthcare data and the potential for long term use is much higher because it is more difficult to change an individual’s "health data".  Another eye-opener is that the type of healthcare entities affected is not limited to hospitals.  Business associates, specialized care providers and healthcare plan have all been targets for cyber crime.  Oncology, anesthesiology, orthopedic, and radiology are a few of the specific entities that were in the top 10 largest healthcare breaches of 2016.  This data tells us that cybercriminals will target or find data outside of the large medical providers and may even be targeting the organizations that have lagged behind in implementing security controls.  

Read More

Topics: Cybersecurity, Network Security, HIPAA, Information Security, Data Security, healthcare

The Significance of Data Ownership and Classification

Posted by ProCircular Team on Dec 20, 2016 7:32:00 AM

 

Data ownership and classification are usually initiatives companies think about much after implementing many other layers of controls like firewalls, patching, or antivirus.  But because of legislation like Health Insurance Portability and Accountability Act (HIPAA) and the US Family Education Rights and Privacy Act (FERPA) companies are required to know what data they possess and assure they are securing it.  Most organizations retain large quantities of data and some even call it “big data” but many do not have the certainty of what type of data it is, what are the data elements, where it is stored, when it should be destroyed, and how to protect it.  This article will explore those elements and highlight the importance of data ownership and classification.

Read More

Topics: Cybersecurity, Data Classification, Information Security, Data Retention, Data Security, Data Protection, Data Ownership

  • There are no suggestions because the search field is empty.

ProCircular is a Full-Service Information Security Firm

We are passionate about helping businesses navigate the complex world of information security, and our blog is another great source of inforamtion. We can assist you no matter where you are in your security maturity journey:

  • Breached or hit with ransomware?
  • Don't know where to start? 
  • Looking to confirm your security with a third party?

Secure your future with ProCircular.

Recent Posts

Subscribe to Email Updates