Report on Ransomware Q4 2019

Report on Ransomware Q4 2019

A look at the recently released cybercrime report by Malwarebytes that focuses on ransomware has some interesting takeaways: First the United States is the target 53% of the time. Canada came in second at a distant 10%.The top 5 states targeted were in order: Texas,...
Ransomware Risk Assessment

Ransomware Risk Assessment

Ransomware attacks are spreading and ransom demands are growing.  22 cities across Texas were recently held hostage for millions after their networks were infiltrated and data was encrypted, and that’s just the latest in a string of cities and businesses being...
What is Credential Stuffing?

What is Credential Stuffing?

Credential stuffing has been in the news because it is a method of attempting to take over accounts of a company by using the databases of known breaches to ‘stuff’ thousands or millions of known credentials into an automated bot and attempting to see if they can get...
NIST CSF – Part 3 – Detect

NIST CSF – Part 3 – Detect

The NIST Cyber Security Framework (NIST CSF) is the result of a February 2013 Executive Order titled “Improving Critical Infrastructure Cybersecurity” and 10 months of collaborative discussions with more than 3,000 security professionals. It comprises a risk-based...
Modern Cyber Security – The Cart before the Horse Syndrome

Modern Cyber Security – The Cart before the Horse Syndrome

Ah the rise of the cybersecurity industry. So many tools, so many ‘silver bullets’. Don’t get me wrong this is not necessarily a bad thing. There are gaps and problems and tools are built to solve these problems and address these gaps. The issue is when a security...