Blog

Categories

Archives

Taking a Proactive Stance Against Election Disinformation Campaigns

The CyberDefenses cyber intelligence team is already seeing evidence of misinformation and disinformation campaigns leading into this year’s election. Sadly, 2020 has proven to be a year that is giving threat actors plenty of material to exploit as they seek to spread fear and confusion among voters. Effective citizen communication has never been more important…

Read More
Remote Government Assessment Photo by Kevin Ku on Unsplash

Remote Government Assessments Keep Security Goals in Reach

Government offices across the country are operating on a skeleton crew and are awaiting the time when we can relax social distancing rules and it is deemed safe to resume normal daily business operations. In the meantime, the Internet is still open for business (and more active than ever). This unfortunately means your office faces…

Read More
Fighting Fuel Pump Theft

Fuel Pump Payment Card Theft Protection

At a staggering estimation of $1.5 trillion per year, criminals can make more through cybercrime, including credential theft, trade secret theft, data trading, crimeware-as-a-service and ransomware, than all other crime methods combined. One considerable area of these disturbing statistics is the theft and sale of payment and bank card data. The outdoor location and unattended…

Read More

Election Security Assessments Help Establish a Statewide Security Baseline

Uniform practices and baseline measurements are essential for elections security, and the upcoming Presidential Election will arguably be the most closely watched and highly scrutinized election in our nation’s history. Local elections offices across the country are being told to practice good cyber hygiene and consume endless amounts of best practices and generic guidelines, but…

Read More
Cybersecurity in 2020

Cybersecurity in 2020 – A Look at the New Year Ahead

Why re-focusing your cybersecurity efforts for the New Year is particularly important in 2020. All you have to do is Google cybersecurity and you’ll see article after article with predictions for the coming year. While industry predictions are helpful, they can also be overwhelming and leave even board members and CEOs feeling paralyzed at the…

Read More
Photo by freestocks.org on Unsplash

Navigating Black Friday Shopping Online

Tackling your holiday shopping online? Read on for tips to help you stay safe and protect your identity, so you can relax and enjoy this holiday season. While we spend a lot of our time focusing on the security of both public and private sector organizations, we like to remind ourselves that your organizations are…

Read More
Election Incident Response Planning

Developing An Incident Response Plan for Elections

Developing an Incident Response Plan is a critical step in designing a strong cybersecurity program. In the event of an attack, a well-constructed plan can be the crucial difference between operating in reactive mode or taking a more proactive stance that thwarts the attack in its early phases and mitigates the potential damage. While it’s…

Read More
Locks protecting a gate to portray the idea of SIEM

What Is SIEM And How To Choose The Right Tool

Understanding, Selecting, and Using SIEM One of the hurdles faced by organizations regarding cybersecurity isn’t just establishing protective measures. It’s also managing the sheer deluge of information regarding security events occurring on any given day. Because of the volume and complexity, businesses often seek out options to simplify the process. One of those options is…

Read More
Human Toll of Cyber Attacks

The Human Toll of Cyber Attacks

It’s one in the morning after Memorial Day, and my friend and I are trying to catch a Lyft home from the airport. The designated ride share area is swarming with people, all tired from long hours in the sun, long island iced teas, (hopefully some long bouts of appreciation for our fallen soldiers), and…

Read More
Rules to Avoid a Phishing Attack

Hard and Fast Rules of Evading Phishing Attacks

While phishing attacks are nothing new, they continue to be more inventive and of an exponentially greater quantity, causing us to pause and revisit what continues to be a serious issue for government organizations, businesses and individuals. The technique of Phishing has been around for years, and hackers continue to use it for one big…

Read More