Best Cyber Security Blogs of 2020

Our Best Cyber Security Blogs of 2020: Mid-Year Update

The team at Delta Risk published many cyber security-related blogs throughout the first half of 2020. We’ve blogged about topics such as patching, pen-testing, endpoint security, cyber security awareness, and much more. In case you missed any of these when they were published, here’s a roundup of our most read cyber security blogs so far in 2020…. Read More

cyber attacks on local governments

Lessons from Cyber Attacks on Local Governments—Are You Protected?

City and state governments are increasingly feeling the heat from ransomware attacks. Ransomware attacks in 2019 on federal and state entities, healthcare providers, and educational institutions cost more than $7.5 billion, according to a new study. Additionally, the number of cyber attacks on local governments, especially in the form of ransomware attacks, are starting to… Read More

why organizations don't patch

We Don’t Need No Stinking Patches: Why Organizations Don’t Patch

As a cyber security vendor, we regularly advise our readers and clients to “patch early and patch often.” There are many reasons why organizations don’t patch systems and devices, though. First off, let’s just say that patching is a bit like working out. We all know we should exercise regularly. The reality though, is that… Read More

phishing email

5 Signs of a Phishing Email During the COVID-19 Pandemic

A phishing email is typically the starting point for many cyber attacks. While spam filters, whitelists, and anti-virus programs do an adequate job of keeping these emails from passing through to end users’ inboxes, there are still plenty of emails that make it through. Now, with the COVID-19 pandemic, many organizations have shifted to a… Read More

network segmentation and security

How Network Segmentation Can Improve Security: Part Two

In part one of our blog on network segmentation and security, we talked about how network segmentation can improve security and help you protect critical assets. We also covered two segments of network segmentation design as part of layered security. In part two, we’ll discuss two additional segments and how to go about protecting them… Read More