• Common Entry Points #6 – Open Ports and Services

    Common Entry Points #6 – Open Ports and Services

    Every internet-facing system in your network must undergo a risk assessment and, if necessary, be secured by avoiding default ports and applying stringent restrictions.

  • Avoiding APT Attacks: The MDR Advantage

    Avoiding APT Attacks: The MDR Advantage

    In the digital world, it’s rare to see a crime of passion. Most cyberattacks fall into the crimes of opportunity category, taking advantage of a situation that presents itself unexpectedly. They are usually launched by individuals or groups using readily available automated tools to target and exploit known vulnerabilities. Often referred to as “script kiddies,”…

  • The Legal and Financial Importance of Digital ForensicsĀ 

    The Legal and Financial Importance of Digital ForensicsĀ 

    Fans of classic police investigator shows on television understand the importance of the iconic yellow crime tape. It marks the boundary of a crime scene that restricts access to prevent contamination of the crime scene. Similarly, in the aftermath of a significant ransomware attack or data breach, it’s time for digital and forensic experts to…

  • Ransomware Payment – Can You Avoid a Lose-Lose Situation?

    Ransomware Payment – Can You Avoid a Lose-Lose Situation?

    Facing a ransomware attack is every company’s worst nightmare. The dilemma following data encryption and ransom demand is agonizing: Do you give in to the attackers’ demands and pay, hoping to regain access to your critical data? Or do you refuse, potentially facing permanent data loss, operational downtime, and potentially crippling financial losses? Both options…

  • Understanding and Leveraging the MITRE ATT&CK Advantage

    Understanding and Leveraging the MITRE ATT&CK Advantage

    Whether you are playing a friendly game of chess, planning a flanking attack for a modernized military force, or protecting your business against malicious threat actors, one thing is for certain: it is advantageous to be able to anticipate your adversary’s next move. A chess master, for example, memorizes famous moves to improve strategy and…

  • Decrypting Dollars – Understanding the $10.5T Threat

    Decrypting Dollars – Understanding the $10.5T Threat

    In 2020, Cybersecurity Ventures published a significant statistic: cybercrime was forecasted to cost the world $10.5 trillion annually by 2025. This figure represented the predicted market value of cybercrime and served as an alarming indication of the escalating growth and scale of attacks to come. It sent a wave of panic through the business world and set…

Loading

Sign Up for Updates