• +1 (866) 459-0642
  • Contact
  • Portal Login
STN Inc.
  • Services
    • Data Management
    • Solution Provider
    • Assessment
      • HIPAA Risk Assessment
      • Risk Assessment
      • IT Security Risk Assessment
      • Automated Cybersecurity Evaluation Tool
      • Cybersecurity Assessment Tool
      • Incident Response Planning
      • Penetration Testing
      • Vulnerability Management
      • Social Engineering
      • CIS Top 20 Checklist
    • Compliance
      • Regulatory Compliance
      • FFIEC Risk & Cybersecurity Assessment
      • NIST 800-171 Compliance
      • PCI Compliance
      • Training
    • Managed Services
      • Managed Security Services
      • Managed SIEM
      • Managed Firewall as a Service (FWAAS)
    • Network Engineering
  • Partners
    • HPE
    • Lacework
  • Blog
  • About
  • Schedule a Consultation
Select Page
From the CISO’s Desk – Quick Ransomware Hitpoints

From the CISO’s Desk – Quick Ransomware Hitpoints

Nov 11, 2020 | Blog, Cryptolocker, Cybersecurity, Featured

Chris Akenson is our CISO at large and is responsible for ensuring STN exceeds security best practices as prescribe by the NIST CSF. Here are his notes about Ransomware: With the current ransomware attacks on the nation’s health care providers, now more than...
Ransomware: Using Zero-Trust to improve Cybersecurity

Ransomware: Using Zero-Trust to improve Cybersecurity

Sep 30, 2020 | Blog, Cybersecurity

As if 2020 wasn’t a difficult enough year, more news of recent ransomware attacks has caused greater alarm among our most critical institutions. The attacks are very much targeted at agencies that are perceived as “able to pay.” Additionally,...
Cyber Threat Actors: Basic Counter Measures to Protect Against Common Cyber Attacks to Your Organization

Cyber Threat Actors: Basic Counter Measures to Protect Against Common Cyber Attacks to Your Organization

Jan 14, 2020 | Blog, Cybersecurity

In these uncertain times, security and protection are more important than ever. It can often be overwhelming to know where to start. That’s why in this blog, we have gathered some basic countermeasures to protect against common cyber attacks to your organization from...
FFIEC CAT: What It Is, Why It Matters & 3 Reasons To Steer Clear of Free Tools

FFIEC CAT: What It Is, Why It Matters & 3 Reasons To Steer Clear of Free Tools

Oct 24, 2019 | Blog, Cybersecurity

As cyber attacks targeting organizations continue to rise, financial institutions want to ensure that they are prepared with a level of security that is impenetrable. This is understandable, as not only the number of attacks are increasing but the cost of losses...
Cyber Threat Actors: Basic Counter Measures to Protect Against Common Cyber Attacks to Your Organization

Ransomware Attack in Government Offices in Texas

Aug 23, 2019 | Blog, Cybersecurity

22 municipalities across Texas were hacked with attackers demanding $2.5 million in ransom to unlock the files. This coordinated cyber attack has sent state emergency-management officials scrambling and prompted a federal investigation....
Vulnerability Scans and Penetration Tests — What’s the Difference Anyway?

Vulnerability Scans and Penetration Tests — What’s the Difference Anyway?

Aug 15, 2019 | Blog, Cybersecurity

Every company is vulnerable to cyberattacks. Whether you own a small local business, a quickly expanding enterprise, or any kind of company in-between, having a proper network security solution in place is vital to your success. In fact, failing to do so could mean...
« Older Entries

"*" indicates required fields

  • Twitter

Designed by Elegant Themes | Powered by WordPress