Skip to content
Blog Contact Us
Delta Risk logo
  • SOC-as-a-Service
    • SOC-as-a-Service Overview
    • SaaS Application Security
    • Cloud Infrastructure Security
    • Network Security
    • Endpoint Security
  • ActiveEye Platform
  • Security Services
    • Security Services Overview
    • Cloud Security Professional Services
    • Pen Testing & Assessments
    • Incident Response Services
    • Cyber Threat Hunting
    • Cyber Security Exercises
    • Compliance & Strategy
  • Resources
    • Cyber Security Resources
    • CISO Guidebook
    • Data Sheets
    • Events
    • Videos
    • White Papers
  • About
    • About Delta Risk
    • Board
    • Leadership
    • News
    • Careers
    • Partners
  • Blog
  • Contact

Author: Keith Melancon

cyber attacks on local governments

Lessons from Cyber Attacks on Local Governments—Are You Protected?

July 16, 2020 | by Keith Melancon

City and state governments are increasingly feeling the heat from ransomware attacks. Ransomware attacks in 2019 on federal and state entities, healthcare providers, and educational institutions cost more than $7.5 billion, according to a new study. Additionally, the number of cyber attacks on local governments, especially in the form of ransomware attacks, are starting to… Read More

Categories: Ransomware
Office Cyber Security and COVID-19

Office Cyber Security and COVID-19: Are You Prepared?

May 14, 2020 | by Keith Melancon

There’s no doubt coronavirus (COVID-19) is dramatically affecting the way we work, both now and almost certainly in the long term. Pre-pandemic, most people commuted to a physical office or location. Then, in what seemed like the blink of an eye, state and national guidelines on social distancing left many companies scrambling to put remote… Read More

Categories: Cyber Security Strategy
Ransomware and baltimore cyber attack

Lessons from the Baltimore Cyber Attack—Are You Doing Enough to Protect Your Business?

June 6, 2019 | by Keith Melancon

Baltimore is feeling the heat from a recent cyber attack involving ransomware that’s crippling the city’s computers. News reports say experts are debating if the strain of ransomware involved in the attack, Robbinhood, leveraged NSA hacking tool EternalBlue. While the Baltimore incident is getting the most attention, other local governments are being hit, too. Earlier this year, two… Read More

Categories: Cyber Security Strategy, Ransomware
How to Build a Better Cyber Security Program for Your University

How to Build a Better Cyber Security Program for Your University

April 30, 2019 | by Keith Melancon

Colleges and universities face some unique challenges when it comes to building a cyber security program. From an ideological standpoint, university campuses are founded on the concept of the free and open exchange of ideas and information. However, universities today must balance this with the day-to-day reality of securing a vast range of critical data… Read More

Categories: Cyber Security Awareness, Cyber Security Strategy, Information Security, Network Security, Public Sector | Tagged: cyber security, information security
People pointing at servers.

Tech Refresh as Part of an Effective Vulnerability Management Program: Part Three

February 25, 2019 | by Keith Melancon

Servers and Vulnerability Management In part three of our blog series on the importance of keeping technology and operating systems updated as part of your vulnerability management program, I’ll focus on servers. Servers are a critical component to your security plan, just like mobile devices and unsupported operating systems are. Servers provide key support for… Read More

Categories: Cyber Security Strategy
People typing on phones, tablets

Tech Refresh as Part of an Effective Vulnerability Management Program: Part Two

February 13, 2019 | by Keith Melancon

Mobile Device Vulnerability Management In part two of our blog series on why it’s important to keep technology and operating systems updated as part of your vulnerability management program, I’ll focus on mobile device vulnerability management. This includes mobile computing, with a focus on mobile devices. The popularity of mobile devices, along with how easily they can… Read More

Categories: Cyber Security Strategy
  • 1
  • 2
  • Next »
RSS Feed

Recent Posts

  • New ActiveEye Features Speed Threat Response, Improve Productivity September 10, 2020
  • 5 Tips for Kickstarting Your Cyber Security Program August 28, 2020
  • 4 Cyber Incident Scenarios You Should Exercise and Test August 20, 2020
  • How to Deal with Ransomware in 2020 August 14, 2020
  • Our Best Cyber Security Blogs of 2020: Mid-Year Update July 29, 2020

Categories

  • AWS Security
  • CISO
  • Cloud Security
  • Critical Infrastructure
  • Cyber Insurance
  • Cyber Security Awareness
  • Cyber Security Exercises
  • Cyber Security Hiring
  • Cyber Security Strategy
  • Cyber Security Threats
  • Data Privacy
  • Data Security
  • Employee Training and Awareness
  • Endpoint Security
  • Financial
  • G Suite Security
  • Healthcare
  • Incident Response
  • Information Security
  • Insider Threat
  • IT security
  • Legal
  • Malware
  • Managed Security
  • Managed Services
  • Network Security
  • News and Events
  • Patching
  • Penetration Testing
  • Public Sector
  • Ransomware
  • Risk and Compliance
  • SOC-as-a-Service
  • Social Engineering
  • Threat Hunting
  • Uncategorized
Delta Risk logo
106 S. St. Mary's Street
Suite 601
San Antonio, TX 78205

Other Locations

Managed Security Services

  • SOC-as-a-Service
  • SaaS Application Security
  • Cloud Infrastructure Security
  • Network Security
  • Endpoint Security
  • ActiveEye Platform

Security Services

  • Services Overview
  • Cloud Security Services
  • Pen Testing
  • Incident Response
  • Compliance
  • Assessments

Company and Resources

  • Leadership
  • News
  • Resources
  • Blog

© 2025 Delta Risk | All Rights Reserved

Privacy Policy | Your California Privacy Choices | EO/AAE | Sitemap | Contact