Chris Akenson is our CISO at large and is responsible for ensuring STN exceeds security best practices as prescribe by the NIST CSF. Here are his notes about Ransomware: With the current ransomware attacks on the nation’s health care providers, now more than...
As if 2020 wasn’t a difficult enough year, more news of recent ransomware attacks has caused greater alarm among our most critical institutions. The attacks are very much targeted at agencies that are perceived as “able to pay.” Additionally,...
In these uncertain times, security and protection are more important than ever. It can often be overwhelming to know where to start. That’s why in this blog, we have gathered some basic countermeasures to protect against common cyber attacks to your organization from...
As cyber attacks targeting organizations continue to rise, financial institutions want to ensure that they are prepared with a level of security that is impenetrable. This is understandable, as not only the number of attacks are increasing but the cost of losses...
22 municipalities across Texas were hacked with attackers demanding $2.5 million in ransom to unlock the files. This coordinated cyber attack has sent state emergency-management officials scrambling and prompted a federal investigation....
Every company is vulnerable to cyberattacks. Whether you own a small local business, a quickly expanding enterprise, or any kind of company in-between, having a proper network security solution in place is vital to your success. In fact, failing to do so could mean...
Cybersecurity needs to be a part of every corporate strategy. Without taking measures to protect your systems, your business will be vulnerable to malware, data breaches, unauthorized access, and other malicious attacks that can cost your company. In fact, 20 percent...
Cryptolocker is the number one malware threat and an especially malicious type of cyberattack. The virus is a form of ransomware, which is a network security threat that penetrates a computer system, encrypts files, and demands money to restore their data. Here’s how...
Where is your data? “It’s in the cloud.” This is becoming a more and more common response to this highly important question. Cloud storage has gone mainstream and is in high demand for storing information across most industries, including the financial sector. The way...
The financial sector saw 148 data breaches in 2017, with 92% of threats coming from external sources. There’s no question that security threats put your organization and your customers’ sensitive information at constant risk, potentially costing you in customer loss,...
Who are the biggest targets for hackers and cybercriminals? You are. Intruders are finding the holes in your network, your devices, your applications—and they are accessing your data. The majority of organizations do not have the security resources or the required...
When faced with an obstacle, how do you take the first step? I have found it helps to follow the steps outlined in Lisa Avellan’s article “Five Simple Steps When You Don’t Know Where to Start”: Breathe and relax Prioritize Make the best decision Act immediately...
The cybersecurity talent crunch is putting the squeeze on enterprises of all sizes. There just doesn’t seem to be enough expertise to solve the cascade of digital security woes enterprises face or manage their high-intensity solutions like SIEM or EDR. It is of no...
Plus a Checklist of 7 Security Must-Haves There is a children’s book, “Inside, Outside, Upside Down” featuring The Berenstain Bears, that teaches young children about spatial concepts. When it comes to securing your organization’s data, it may feel like you need to...
Compliance is a journey, not a destination. While I am not the first to say this, I will reiterate that compliance is an ongoing, multi-step process. It’s not boxes to check off, “check it off and forget it,” but milepost markers along the way to ensure that...
Compliance is a journey, not a destination—an ongoing, multistep process. It is not boxes to check off—check it and forget it—but milepost markers along the way to ensure that compliance is consistent, such as ensuring that device inventories and configuration...
Learn how to merge networks or migrate to a new network design using Cisco’s virtual routing and forwarding tool. Organizations have come to view networking and IT as a service: something they expect will always be available. Accomplishing this goal requires...
By Brian Edwards, News Editor | February 14, 2018 Skip Newberry, president of the Technology Association of Oregon and member of the Oregon Cybersecurity Advisory Council (OCAC), wrote a column for the Portland Business Journal this week which shared his...
Oregon Cybersecurity Advisory Council members and other cybersecurity experts share insights on what’s in store for the coming year. Portland, Ore., January 30, 2018 — With the massive data breaches of 2017 in the rearview mirror, what cybersecurity headlines and...
By: Tyler Hardison , CISSP, PCI Qualified Security Assessor Daily news headlines scream high-profile information security failures and consequences—Hacked! Attacked! Ransomware!—reinforcing that the severity of risk posed to sensitive information is unprecedented....