CISA’s Pilot Program Helps Protect Critical Infrastructure from Ransomware

Earlier this year, CISA (Cybersecurity and Infrastructure Security Agency) launched a new program to help protect critical infrastructure institutions by safeguarding their information systems from ransomware cybercriminals. The two main purposes of this new program, called Ransomware Vulnerability Warning Pilot [...]

2023-08-10T22:30:37-07:00April 1st, 2023|

Microsoft Monitoring Over 100 Ransomware Threat Actors

Microsoft recently disclosed that they are monitoring over 100 different threat actors utilizing 50 unique ransomware families to attack businesses and organizations across the world. These attacks have been increasing in frequency, severity, and sophistication. The threat actors behind [...]

2023-08-10T22:32:36-07:00February 21st, 2023|

Why Your Cybersecurity Strategy Must Include Multi-Factor Authentication

The cybersecurity industry is buried in unexplained and confusing terms and acronyms. Two important terms that everyone should know and understand are multi-factor authentication (MFA) and two-factor authentication (2FA). They are both security mechanisms designed to accurately identify a [...]

2023-02-16T13:33:27-08:00February 16th, 2023|

The Social & Psychological Impacts of Ransomware

When a ransomware gang attacks, it’s not just a problem for IT professionals, it impacts everyone. A ransomware attack triggers a chain reaction. Not only is it damaging to the entity, but it can also impact its employees, third-party [...]

2023-02-20T20:29:10-08:00February 2nd, 2023|

Why Healthcare Entities Should Invest in Robust Cybersecurity

Healthcare organizations are under attack from all sides of their businesses. We are seeing a major increase in directed ransomware and other cyber-attacks on a variety of healthcare organizations and their partners. These attacks are crippling operations, while also [...]

2023-01-12T20:03:08-08:00January 10th, 2023|

Why Ransomware Targets Education and Healthcare Sectors

Nowadays, tech and ransomware go hand in hand. Hackers look for two characteristics when they scope out their next target: first, an organization or individual with valuable information and assets; and second, someone who is fairly easy to attack. [...]

2022-12-16T17:41:34-08:00November 21st, 2022|

U.S. Department of State’s $10M Bounty on Conti Ransomware

The U.S. Department of State announced last week that it is offering a $10,000,000 bounty for information on the identification or location of five highly ranked members of Wizard Spider, the Conti ransomware syndicate. Since the emergence of Conti in [...]

2022-12-15T00:57:47-08:00August 24th, 2022|

OFAC Sanctions Cryptocurrency Mixer Tornado Cash

What is Tornado Cash? A virtual cryptocurrency mixer on the Ethereum blockchain, Tornado Cash was officially sanctioned by the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) on August 8th, 2022. The platform works to facilitate [...]

2022-09-09T18:43:16-07:00August 19th, 2022|

The EPA Adds Cybersecurity Rules for Water Sector

As cyber attacks continue suppressing critical infrastructure sectors like water and wastewater systems, implementing proper cybersecurity practices is becoming more vital in protecting against highly disruptive cybersecurity incidents. According to the Environmental Protection Agency (EPA), these threats on process control [...]

2022-12-15T00:58:31-08:00August 17th, 2022|