How APT Group Mustang Panda is Targeting Higher Education Threat Advisory – Higher Education Sep-Nov 2022 Universities and Colleges are no exception to the increasing attention they are getting from threat groups. In this post we will give an overview of a trending APT group targeting higher education, highlight the CVEs that group is targeting, […]
5 Ways to Protect Your Company Against Ransomware Every day companies are hit with new and mutating ransomware attacks with exponentially increasing financial impacts. According to Forbes, the average cost to recover from a successful ransomware attack doubled from approximately $41,000 per incident to over $84,000. Traditionally, ransomware attacks involved sensitive data encrypted by actors and released […]
About the Author: Anthony Ortega has more than 20 years of experience in cybersecurity, configuration management, systems engineering, and project management. He is currently nearing completion of his doctor of management in information systems technology degree.
Selecting a Third-Party Risk Management System That Fits Your Business Related Posts
3 Ways to Prevent Third-Party Cyber Security Risk While this pandemic has caused a lot of angst and change in business, there are some lessons that can be learned from how we are trying to stop the spread of COVID-19. What we have learned is that the best way to stop the spread of this […]
3 Effective Practices for Remote Work Cybersecurity If your organization was behind the curve in moving to a remote workforce before March of 2020, it likely moved at warp speed to catch up when the coronavirus pandemic essentially shut down traditional offices and moved employees en masse to their home offices. COVID-19 has proven to […]
Not All Third-Party Relationships are Created Equal Third-party risk management programs require you to explore your businesses suppliers cybersecurity posture. It is no longer sufficient for businesses to only secure their internally-controlled infrastructure and services. You must also diligently evaluate the security policies and procedures of their third parties to reduce cyber risk. Organizations interact […]
Why You Should Take the Cyber Risk Scoring Challenge Simple, first generation products from cyber risk score vendors have been around for decades. They rely heavily on passive scanning—pulling data from public internet traffic—and suffer in terms of completeness and accuracy. The data from these products is typically captured solely from traffic analysis from various […]