Are You a Good Ransomware Target?

Reconnaissance Phase of the Cyber Kill Chain “Reconnaissance” is the first phase of the 7-step Cyber Kill Chain (CKC) model, which maps sophisticated targeted attacks used by cybercriminals such as Advanced Persistent Threat (APT) actors. In the Reconnaissance phase, an attacker uses different techniques to gather as much information as possible about a target — […]

Read More… from Are You a Good Ransomware Target?

What’s Fueling the Ransomware Growth Spike?

Banking trojans are alive and well. Ready to attack. Ransomware attacks are expanding in such proportions that they have become emblematic of 2020 in Infosec. They affect every business sector, and their intensity is growing. Moreover, 2020 clearly showed an innovating trend from ransomware gangs, with new forms of pressure to obtain the ransom (read […]

Read More… from What’s Fueling the Ransomware Growth Spike?

How to Deal with the Inherent Shadow IT Risk

Shadow IT overview : opportunities and risks Shadow IT is defined by the use of applications, devices or software without the consent, or even the knowledge, of your corporate IT heads. Most of the time employees use shadow IT in order to be more efficient and bypass the processes linked to the shift to a […]

Read More… from How to Deal with the Inherent Shadow IT Risk

Are domain squatters hijacking your business?

When there are fake search results for your enterprise, what do you do?  What if the fake results link to malware or illicit content?  It hurts when pirates commandeer your brand online. What do you do if hackers misrepresent your company name, products or services online?  When someone registers in bad faith domains that are associated […]

Read More… from Are domain squatters hijacking your business?

Is Microsoft SMBv1 still a threat to your data?

  Yes I know, this looks like another blog about Microsoft SMBv1, WannaCry, ransomware, etc. But with any discussion of vulnerable servers using SMBv1, it’s hard to avoid. Not to mention, our research shows it’s not the only risk. So please bear with me – it’s a blog, it’s short! The Context Over late 2016 […]

Read More… from Is Microsoft SMBv1 still a threat to your data?

Cybersecurity vs. Risk Management

Frank worked in Information Security as a System Administrator.  He had spent most of the day thwarting bad guys and was frustrated.  After five years, he was in the same job as when he started.  Frank felt locked in a cage, working from home day in and day out, fighting off threats to his company’s […]

Read More… from Cybersecurity vs. Risk Management