Threat actors continue to target the health care industry. IBM’s Threat Intelligence Index for 2022 rates the industry as the sixth most targeted. That puts it close behind the energy…
Browsing CategoryIncident Response (IR)
What’s New in the 2022 Cost of a Data Breach Report
The average cost of a data breach reached an all-time high of $4.35 million this year, according to newly published 2022 Cost of a Data Breach Report, an increase of…
How to Make Business Practices That Support Cybersecurity Response
Scottish author Robert Burns wrote in the poem “To a Mouse,” “The best-laid schemes o’ mice an’ men. Gang aft a-gley.” You may better know the saying in its more…
Putting Your SOC in the Hot Seat
Today’s Security Operations Centers (SOCs) are being stress-tested as never before. As the heart of any organization’s cybersecurity apparatus, SOCs are the first line of defense, running 24/7 operations to…
Solving the Data Problem Within Incident Response
One of the underappreciated aspects of incident response (IR) is that it often starts as a data problem. In many cases, IR teams are presented with an effect such as…
What CISA Incident Response Playbooks Mean for Your Organization
What does the latest U.S. federal ruling on cybersecurity mean for you? The recent executive order and U.S. Cybersecurity & Infrastructure Security Agency (CISA) commentary on it could provide a…
Everything You Need To Know About Ransomware Attacks and Gangs In 2022
Ransomware is a lucrative business for criminals. It is paying off, and it is working. According to a recent Trend Micro report, a staggering 84% of US organizations experienced either…
Cyber Warfare: What To Expect in 2022
Cyberwarfare is not a future threat—it’s a clear and present danger. While the concept of cyber terrorism might sound like something from a fictional movie, our interconnected world is riddled…
Log4Shell Vulnerability Risks for OT Environments — and How You Can Better Protect Against Them
You’d have to look far and wide to find an IT professional who isn’t aware of (and probably responding to) the Log4Shell vulnerability. The Operational Technology (OT) sector is no…
Starting From Scratch: How to Build a Small Business Cybersecurity Program
When you run a small business, outsourcing for services like IT and security makes a lot of sense. While you might not have the budget for a full-time professional on…