The latest national and state requirements including R-SAT, FedLine requirements, and other emerging cybersecurity guidelines.
The recent string of ransomware attacks against supply chain entities has highlighted how susceptible organizations are to these types of attacks.
Although the Solarwinds attack in late 2020 and the Microsoft Exchange breach in early 2021 were not ransomware-related, the over-arching effects of those compromises has shown that despite the best efforts of information security programs, there are some serious gaps in how we have been preparing security incidents.
The headline is startling: Cybercrime costs the world more than $1 trillion, a 50% increase from 2018. From our experience in the trenches, this feels about right. Attackers are using more complex methods for spreading their malware, and the payloads keep getting more sophisticated – better at evading detection and more effective at delivering their malicious payload.
Between July of 2018 and June 2020, the retail, hospitality and travel industries were hit with 63 billion credential-stuffing attacks. Credential stuffing is a cyber attack method in which attackers use lists of compromised user credentials to breach into a system.
There is no threat greater than a nation-state hacking team, as they are highly skilled, fully equipped with the latest attack methodologies, have unlimited resources, can launch attacks in large scale and are almost untouchable by law enforcement. North Korea has been a major player in this space for years, adding billions to their economy through cyber attacks.
There is no threat greater then a nation-state hacking team, as they are highly skilled, fully equipped with the latest attack methodologies, have unlimited resources, can launch attacks in large scale and are almost untouchable by law enforcement.