by Gillian Sweny | Jun 21, 2021 | Blog Posts
A top concern for companies of all sizes recently has been data breaches as cyber criminals gain power from high ransom payments. Data breaches occur when a third party gains unauthorized access to sensitive information and either sells it on the dark web or holds it...
by Gillian Sweny | Jun 10, 2021 | Blog Posts
When it comes to logging into any SOC-as-a-Service (SOCaaS) portal most of us try to grab what info we need and spend as little time in the portal as possible. One of the benefits of having an automated threat analytics portal is that you shouldn’t need to invest a...
by Gillian Sweny | Jun 2, 2021 | Blog Posts
JBS S.A, the largest meat producer in several countries including the U.S, faced a widespread cyberattack over the weekend. The ransomware attack affected all of the meatpacking facilities in the U.S with beef plants being forced to temporarily close and other meat...
by Gillian Sweny | May 27, 2021 | Blog Posts
The Federal Bureau of Investigation issued a flash alert on May 20, 2021 detailing the impact of Conti Ransomware Attack on Healthcare networks. The alert stated that at least 16 healthcare and first responder networks had been exploited in the attacks. For additional...
by Tony Pietrocola | May 25, 2021 | Blog Posts
There are two diffs everyone has a credit score and absolutely no one understands what makes up their credit score. A cyber risk score is the exact opposite. Not every company has a cyber score or truly understands their cyber risk, but we can absolutely tell you what...
by Gillian Sweny | May 18, 2021 | Blog Posts
While we observe compounded growth of cyber-attacks, organizations have responded with more layered defense; however, operational technology (OT) is often ignored when it comes to security protection. Operational disruptions or theft of intellectual property must be...