720-891-1663

Business Email Compromise Attacks Are Not Always Sophisticated

  Business email compromise (BEC) attacks are relentlessly attacking businesses with no let-up in sight.  BEC attacks have traditionally used CEOs and CFOs as their foils, pretending to be them and getting people to wire money to the hackers. The oil and gas industry was targeted by a single individual using old generic malware readily […]

Continue reading → [DISPLAY_ACURAX_ICONS]

CIA Spies on FBI, DHS and Other Friends

In the ongoing Wikileaks Vault 7 series of leaks, there is a new leak called ExpressLane. According to the documents released by Wikileaks, the CIA offers a partnership with other law enforcement and government agencies in which those partners can share biometric data such as fingerprints with the CIA. The CIA does this by offering […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Why An Incident Response Program Is Critical

Do you have a written incident response program? Do the people who are part of it – the outside legal team, crisis communications team, forensics team, for example – know they are part of it? Are contracts signed with outside service providers – or at least providers periodically reviewed and selected vendor already approved? Has […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Over Two Thirds of Boards Receive Zero Cyber Security Training

According to a KPMG survey of Financial Times 350 companies, 68% of the Boards have not received any training to deal with a cyber incident. This means that WHEN – and not if – a significant cyber event occurs, the board will have no plan in place to deal with it.  This is distinct from […]

Continue reading → [DISPLAY_ACURAX_ICONS]