Ransomware Risk Assessment

Ransomware Risk Assessment

Ransomware attacks are spreading and ransom demands are growing.  22 cities across Texas were recently held hostage for millions after their networks were infiltrated and data was encrypted, and that’s just the latest in a string of cities and businesses being...
What is Credential Stuffing?

What is Credential Stuffing?

Credential stuffing has been in the news because it is a method of attempting to take over accounts of a company by using the databases of known breaches to ‘stuff’ thousands or millions of known credentials into an automated bot and attempting to see if they can get...
NIST CSF – Part 3 – Detect

NIST CSF – Part 3 – Detect

The NIST Cyber Security Framework (NIST CSF) is the result of a February 2013 Executive Order titled “Improving Critical Infrastructure Cybersecurity” and 10 months of collaborative discussions with more than 3,000 security professionals. It comprises a risk-based...
Modern Cyber Security – The Cart before the Horse Syndrome

Modern Cyber Security – The Cart before the Horse Syndrome

Ah the rise of the cybersecurity industry. So many tools, so many ‘silver bullets’. Don’t get me wrong this is not necessarily a bad thing. There are gaps and problems and tools are built to solve these problems and address these gaps. The issue is when a security...
Poorly Written Ransomware Still Infects Unpatched Systems

Poorly Written Ransomware Still Infects Unpatched Systems

WannaCry malware hit the news in 2017 when reports of the damaging attack spread through more than 150 countries.  The National Health Service in the UK, and FedEx where two of the worst hit organizations, but countless others, including small business, schools, and...