How it’s Happening and Five Steps to Take to Protect Your Network When most people think of cutting edge cryptomining, they don’t think of using PLCs (Programmable Logic Controllers). Apparently criminal hackers and c...
The FBI and Cybersecurity & Infrastructure Security Agency just posted an alert pinning the attack on the Colonial Pipeline on the malicious cyber group, Darkside. The outcome of the attack is impacting the entire s...
With the business world in a massive state of upheaval, corporate security professionals need to revamp their strategies and tactics to reduce the risks of cyber attacks. To help them make these changes, I am sharing ...
Let’s get real for a minute – like Chris Roberts real. If you don’t know or know of Chris and you work in cybersecurity or information security, he is a good follow. His posts are always on point, relevant, a...
In the link below, Hiscox Insurance produced a short video detailing the business impact of a cyber breach. It’s well done and in only 3 minutes, gives quite a visual representation of what a behind the scenes hack migh...
The question is, if your company was compromised via a ransomware attack, would you pay the hackers to get the encryption key that would unlock your data? The answer may not be that simple, as Mecklenburg County officia...
Beazley Insurance just released their Beazley Breach Insights report, which found that ransomware attacks more than quadrupled in 2016. What’s even more alarming is that they predict this number, already at an all-time h...
In case you missed it, @Rebycsecurity recently participated in a panel for the North Carolina Technology Association Tech Talk Live (@NCTA)event in Charlotte, NC. The panel broke down some of the key differences between...