Handling Ransomware Attacks to Minimize Disaster

Ransomware attacks take place in two phases: access development, then monetization. Stopping cyber attacks while they are still intrusions, and not ransomed data, can prevent data privacy disasters.  Cyber Crime Requires a Division of Labour Cyber attackers take a specialized approach to ransomware development. First, the attacker develops access to a target. Second, the attacker [...]

By |2021-08-19T11:59:06-04:00August 16, 2021|Blog, Technical|

Cybersecurity: The Need To Find Common Ground

According to Colonial Pipeline CEO Tim Felt, paying ransom for the return of his company’s data was the hardest thing he had to do. However, the ransom represented less than two days of revenue, based on $1.3B generated by Colonial Pipeline in 2020.   Unmanaged System Leaves Colonial Exposed  The source of the breach was a virtual private network (VPN) account for a system that was supposedly no longer in [...]

By |2021-08-19T12:00:05-04:00July 27, 2021|Blog, Business|

5 Reasons Technological Debt Increases the Risk of Cyber Attack (2021)

Failing to keep software and hardware up-to-date can put your business at risk for cyber attacks. The following issues frequently leave businesses exposed to cyber threats and vulnerabilities. The Culprits Behind Technological Debt Most technological debt is unintentional, the by-product of efforts to save money and resources. This focus inadvertently derails cybersecurity by shifting resources [...]

By |2021-08-19T12:00:11-04:00July 21, 2021|Blog, Business|

Moral Hazard of Cyber Insurance 

Cyber insurance is not a replacement for harm prevention measures. The prices are high and will continue to go up. Here’s why.  While doing research for a customer about trends you can expect for 2021, I found  a number of outlets warning that the cyber insurance market was hardening with rises in premiums. Should we expect this trend to continue [...]

By |2021-08-19T12:02:12-04:00April 28, 2021|Blog, Technical|

macOS Coverage: Is It Worth It?

With CYDEF’s recent coverage expansion to the macOS platform, we need to address the value of cyber security protection for Macs. After all, aren’t Macs completely impervious to security threats? The answer is no of course. So why is the question "Do I need Malware Protection for Mac?" so popular? This post will start by [...]

By |2021-08-19T12:03:25-04:00April 12, 2021|Blog, Technical|

Monitoring for Insider Threat  

Insider threat incidents account for 34% of data breaches. CYDEF’s detection capabilities are not limited to external cyber attacks. They are also valuable detection controls that detect unusual activity on the inside of an organization.  What is Insider Threat?   Cybersecurity is focused on keeping malicious attackers out of business systems.  But what if the malicious attacker is [...]

By |2021-08-19T12:04:12-04:00March 30, 2021|Blog, Business|

Phishing Campaigns Bypass Reputation Engine

The team at CYDEF observed an increasing proportion of phishing attempts that leverage trusted sites to bypass filtering resources. The following post addresses some of the detected campaigns and addresses security awareness programs.  Phishing Off the River  In recent posts we took an in-depth look at anti-virus bypass, especially living-off-the-land techniques.   The general concept of these techniques is that, by abusing trusted resources, an attacker can capitalize on [...]

By |2021-08-19T12:04:26-04:00March 16, 2021|Blog, Technical|

Medical Practices: A Steady Target for Cyber Attack

Medical practices are falling prey to cyberattacks at an exponential rate. Some outlets report that medical data is 10 times more likely to be targeted than banking information. Medical Practices: A Steady Target for Cyber Attack The more than 85% of physicians relying on electronic medical records, and approximately 1 million active physicians in the [...]

By |2021-08-19T12:04:32-04:00March 15, 2021|Blog|
Go to Top