What Is CMMC?
CMMC, an abbreviation for Cybersecurity Maturity Model Certification, is a new requirement for defense contractors that the United States Department of Defense (DoD) is in the process of rolling out in October of 2020. All companies that serve DoD contracts, either as the prime contractor or as a subcontractor, will be expected to demonstrate a…
Taking a Proactive Stance Against Election Disinformation Campaigns
The CyberDefenses cyber intelligence team is already seeing evidence of misinformation and disinformation campaigns leading into this year’s election. Sadly, 2020 has proven to be a year that is giving threat actors plenty of material to exploit as they seek to spread fear and confusion among voters. Effective citizen communication has never been more important…
Remote Government Assessments Keep Security Goals in Reach
Government offices across the country are operating on a skeleton crew and are awaiting the time when we can relax social distancing rules and it is deemed safe to resume normal daily business operations. In the meantime, the Internet is still open for business (and more active than ever). This unfortunately means your office faces…
Fuel Pump Payment Card Theft Protection
At a staggering estimation of $1.5 trillion per year, criminals can make more through cybercrime, including credential theft, trade secret theft, data trading, crimeware-as-a-service and ransomware, than all other crime methods combined. One considerable area of these disturbing statistics is the theft and sale of payment and bank card data. The outdoor location and unattended…
Election Security Assessments Help Establish a Statewide Security Baseline
Uniform practices and baseline measurements are essential for elections security, and the upcoming Presidential Election will arguably be the most closely watched and highly scrutinized election in our nation’s history. Local elections offices across the country are being told to practice good cyber hygiene and consume endless amounts of best practices and generic guidelines, but…
Cybersecurity in 2020 – A Look at the New Year Ahead
Why re-focusing your cybersecurity efforts for the New Year is particularly important in 2020. All you have to do is Google cybersecurity and you’ll see article after article with predictions for the coming year. While industry predictions are helpful, they can also be overwhelming and leave even board members and CEOs feeling paralyzed at the…
Navigating Black Friday Shopping Online
Tackling your holiday shopping online? Read on for tips to help you stay safe and protect your identity, so you can relax and enjoy this holiday season. While we spend a lot of our time focusing on the security of both public and private sector organizations, we like to remind ourselves that your organizations are…
Developing An Incident Response Plan for Elections
Developing an Incident Response Plan is a critical step in designing a strong cybersecurity program. In the event of an attack, a well-constructed plan can be the crucial difference between operating in reactive mode or taking a more proactive stance that thwarts the attack in its early phases and mitigates the potential damage. While it’s…
What Is SIEM And How To Choose The Right Tool
Understanding, Selecting, and Using SIEM One of the hurdles faced by organizations regarding cybersecurity isn’t just establishing protective measures. It’s also managing the sheer deluge of information regarding security events occurring on any given day. Because of the volume and complexity, businesses often seek out options to simplify the process. One of those options is…
The Human Toll of Cyber Attacks
It’s one in the morning after Memorial Day, and my friend and I are trying to catch a Lyft home from the airport. The designated ride share area is swarming with people, all tired from long hours in the sun, long island iced teas, (hopefully some long bouts of appreciation for our fallen soldiers), and…