What's New

Here's what's happening at Rebyc

Information Security Phishing Ransomware

Mecklenburg County Ransomware Attack – 6 Steps to Protect Your Organization

The question is, if your company was compromised via a ransomware attack, would you pay the hackers to get the encryption key that would unlock your data?  The answer may not be that simple, as Mecklenburg County officia...

Information Security Ransomware

6 Steps to Take to Fight Ransomware

Beazley Insurance just released their Beazley Breach Insights report, which found that ransomware attacks more than quadrupled in 2016. What’s even more alarming is that they predict this number, already at an all-time h...

Information Security

Rebyc Security at the Jack Henry & Associates JAC 2017

  REBYC SECURITY EXHIBITS AT THE JACK HENRY AND ASSOCIATES CUSTOMER CONFERENCE!! Did you make it out to the JAC 2017?  If not, you missed a great event put on by the team JHA.  This was our first time attending and ...

Breach Password Cracking Penetration Testing

Yahoo Breach(es) – Lessons Learned for your Company

Do you Yahoo? Remember that slogan back in the 90’s in the Yahoo commercials?  Well, you wouldn’t be alone if you do Yahoo, or did at least. Per SimilarWeb, Yahoo.com is still the most popular news and media website and ...

Phishing Social Engineering

MYTH: Phishing Tests Should Only Be Performed Annually

Here we go again – this is the third in our series of posts for National Cyber Security Awareness Month (NCSAM).  During the month, we are looking to dispel cyber security related myths that we hear all too frequen...

Patch Management Penetration Testing Vulnerability Assessments

MYTH: An Internal Vulnerability Assessment is the Same as an Internal Penetration Test

This is our second National Cyber Security Awareness Month (NCSAM) post where we seek to dispel some myths about cyber security services. Throughout October, we’ll be posting some blogs breaking down some of the of the m...

Penetration Testing Vulnerability Assessments

MYTH: External Pen Test is the Same as an External Vulnerability Assessment

With National Cyber Security Awareness Month (NCSAM) now upon us, we thought it would be good to dispel some cyber security service related myths.  All too often, in conversations with our clients, we are finding they di...

Phishing Social Engineering

Phishing Attacks – Do’s and Don’ts to Protect Your Company

THIS BLOG POST HAS BEEN UPDATED MULTIPLE TIME – PHISHING IS ALWAYS TOP OF MIND AND THIS HAS CONSISTENTLY BEEN OUR BEST POST WE UPDATED JANUARY 2026 – WHY PHISHING REMAINS THE CROWN JEWEL FOR ATTACKERS IN 2026...

Vulnerability Assessments

65% of Breaches Caused by a Third Party – How Well Do You Know Yours?

Hardly a day goes buy without a new headline about a high profile breach.  Pick up a local newspaper, or the NY Times or simply spend a few minutes on your LinkedIn thread and you’ll find news about Target, Home De...

Information Security Malware Penetration Testing Phishing Ransomware

Rebyc Security’s Patrick Barry at North Carolina Technology Association (@NCTA) Tech Talk Live

In case you missed it, @Rebycsecurity recently participated in a panel for the North Carolina Technology Association Tech Talk Live (@NCTA)event in Charlotte, NC.  The panel broke down some of the key differences between...