Basic Security Lapses Pave the Way for Ransomware Attacks in 2021
On the surface, ransomware attacks seem sophisticated and complex. Seemingly out of nowhere, criminals gain access to a company's or institution's data or systems, locking the rightful owners out unless and until they pay a hefty price. Due to their random and...
Sun Tzu’s ‘The Art of War’ Applied to Cybersecurity
In roughly the 5th century BC, the Chinese strategist Sun Tzu wrote a treatise that has long been one of the most famous military classics in the entire world. Its themes have profoundly affected not only Asian warfare but also have expanded to influence legal...
Shades of SolarWinds Attack Malware Found in New ‘Tomiris’ Backdoor
Just when it seemed like the furor around the supply attack on SolarWinds by a Russian-affiliated threat actor, Dark Halo had died down, sobering new allegations came to the fore. Researchers at Kaspersky revealed that they believe there to be a new backdoor (named...
More than 90% of Q2 Malware Was Hidden in Encrypted Traffic
WatchGuard Technologies' latest quarterly Internet Security Report laid out the most pressing security trends and malware threats impacting the digital universe. The document also specified the cutting-edge endpoint intelligence strategies that have been developed to...
Data Breach Kicks U.S. Dental Patients in the Teeth
North American Dental Management is a company based in Pittsburgh responsible for providing administrative and technical support services to Professional Dental Alliance offices. On March 31st and April 1st of 2021, an unauthorized entity gained access to the...
Banking Industry Hijacked by Ransomware Attacks in 2021
The headlines continue to buzz with news about ransomware attacks launched against educational institutions, hospitals, corporations, and banks. A recent TrendMicro report confirms that these third-party malware attacks remain prevalent. They happen when...
Top Managed Security Services Company 2021
Even after more than a year into the pandemic, the business world is still struggling to address the cybersecurity challenges that it has introduced. As organizations are rapidly bolstering their digital transformation efforts to seamlessly run their...
SOC 2 Principles
During a SOC 2 examination, an auditor will thoroughly evaluate the risks and privacy protocols you have put in place to protect the data that flows through and is stored by your information systems. The assessor uses several measures to benchmark your system’s...
Does SOC 2 require data to be encrypted “at rest” or only “in transit“?
Blog Installing strong firewalls and keeping your antivirus software up to date are excellent protections to promote an effective security posture. However, it would be best if you had other safeguards in addition to these layers of defense. Information is,...
Gaming Industry Under Attack
In December of 2020, after much fanfare, the CD Project Group launched Cyberpunk 2077. However, contrary to the hype, the game was riddled with bugs and soon earned a cascade of blistering customer feedback. Two months later, hackers capitalized on the game's bugs,...