City and state governments are increasingly feeling the heat from ransomware attacks. Ransomware attacks in 2019 on federal and state entities, healthcare providers, and educational institutions cost more than $7.5 billion, according to a new study. Additionally, the number of cyber attacks on local governments, especially in the form of ransomware attacks, are starting to… Read More
Author: Keith Melancon
Office Cyber Security and COVID-19: Are You Prepared?
There’s no doubt coronavirus (COVID-19) is dramatically affecting the way we work, both now and almost certainly in the long term. Pre-pandemic, most people commuted to a physical office or location. Then, in what seemed like the blink of an eye, state and national guidelines on social distancing left many companies scrambling to put remote… Read More
Lessons from the Baltimore Cyber Attack—Are You Doing Enough to Protect Your Business?
Baltimore is feeling the heat from a recent cyber attack involving ransomware that’s crippling the city’s computers. News reports say experts are debating if the strain of ransomware involved in the attack, Robbinhood, leveraged NSA hacking tool EternalBlue. While the Baltimore incident is getting the most attention, other local governments are being hit, too. Earlier this year, two… Read More
How to Build a Better Cyber Security Program for Your University
Colleges and universities face some unique challenges when it comes to building a cyber security program. From an ideological standpoint, university campuses are founded on the concept of the free and open exchange of ideas and information. However, universities today must balance this with the day-to-day reality of securing a vast range of critical data… Read More
Tech Refresh as Part of an Effective Vulnerability Management Program: Part Three
Servers and Vulnerability Management In part three of our blog series on the importance of keeping technology and operating systems updated as part of your vulnerability management program, I’ll focus on servers. Servers are a critical component to your security plan, just like mobile devices and unsupported operating systems are. Servers provide key support for… Read More
Tech Refresh as Part of an Effective Vulnerability Management Program: Part Two
Mobile Device Vulnerability Management In part two of our blog series on why it’s important to keep technology and operating systems updated as part of your vulnerability management program, I’ll focus on mobile device vulnerability management. This includes mobile computing, with a focus on mobile devices. The popularity of mobile devices, along with how easily they can… Read More