The Cybersecurity Boom

| July 23, 2015

article image
The Cybersecurity Boom. While the prospects of cybercrime and cyberterrorism are certainly thrilling (and scary), the descriptor of “Sci-fi” for the movie may no longer be necessary. In the last calendar year, there’s been dozens of high-profile cybersecurity incidents that are not a far cry from the geopolitical near-miss in WarGames.The United States government and the country’s largest bank have both had serious security intrusions as of recent. This summer the United States Government revealed it had over 20 million records stolen by hackers allegedly based in China. Just as concerning, it was exactly one year ago that J.P. Morgan was compromised with records stolen from over 76 million households and 7 million small businesses. The company has now vowed to spend $250 million a year in preventing such incidents.

Spotlight

Vision Technologies

Vision Technologies, a national and global systems integrator, provides IT services and solutions for commercial and federal clients. Our seasoned staff has keen insight into trends and emerging technologies that are changing the way we work, communicate, and protect our society. We offer design, installation, support, and project management for Distributed Antenna Systems, Passive Optical Networking, voice/data, wireless systems, security, audio visual, and video teleconferencing delivering powerful IP-centric, integrated solutions that get results.

OTHER ARTICLES

A 4 Step Guide to Stronger OT Cybersecurity

Article | April 14, 2020

Security and risk management leaders at organizations around the world are increasingly concerned about cybersecurity threats to their operational technology (OT) networks. A key driver behind this is that cyberthreats, like disruptionware, are increasing in quantity and sophistication all the time. Industrial control system (ICS) networks are categorized as high risk because they are inherently insecure, increasingly so because of expanding integration with the corporate IT network, as well as the rise of remote access for employees and third parties. An example of an IT network within a control system is a PC that’s running HMI or SCADA applications. Because this particular PC wasn’t set up with the initial intention of connecting to IT systems, it typically isn’t managed so can’t access the latest operating system, patches, or antivirus updates. This makes that PC extremely vulnerable to malware attacks. Besides the increased cyberthreat risk, the complexity resulting from IT–OT integration also increases the likelihood of networking and operational issues.

Read More

DOCUMENT PROOFREADING AND EDITING SERVICES FOR YOUR CYBERSECURITY POLICY

Article | June 14, 2021

Recent data breaches, ransomware, and malware trends have increased the need to protect customer privacy. Regardless of company size or industry, you need a cybersecurity policy to ensure cybersecurity best practices in your organization. A cybersecurity policy contains preventive measures that protect your network from cybercriminals. To ensure that your cybersecurity policy is easy to read, understand, and implement, you need cybersecurity policy document proofreading and editing services. Your cybersecurity policy spells out cybersecurity dos and don’ts drafted from industry and state regulations that your employees should follow. It states the instructions your employees should follow to prevent cyberattacks and how they should react when they notice a network security breach. This protects data, promotes customer privacy, and prevents cyber-attacks. In this article, we spell out why you need cybersecurity proofreading and editing services.

Read More

5 Benefits of Investing in Cyber Security & IT solutions in 2021

Article | June 2, 2021

Cyber Security has quickly evolved from being just an IT problem to a business problem. Recent attacks like those on Travelex and the SolarWinds hack have proved that cyber-attacks can affect the most solid of businesses and create PR nightmares for brands built painstakingly over the years. Investing in cyber security training, cyber security advisory services and the right kind of IT support products, has therefore, become imperative in 2021. Investing in cyber security infrastructure, cyber security certification for employees and IT solutions safeguards businesses from a whole spectrum of security risks, ransomware, spyware, and adware. Ransomware refers to malicious software that bars users from accessing their computer system, whereas adware is a computer virus that is one of the most common methods of infecting a computer system with a virus. Spyware spies on you and your business activities while extracting useful information. Add social engineering, security breaches and compromises to your network security into the mix, and you have a lethal cocktail.

Read More

Ryuk: Defending Against This Increasingly Busy Ransomware Family

Article | February 12, 2020

On December 16, 2019, the U.S. Coast Guard disclosed a security incident at a facility regulated by the Maritime Transportation Security Act (MTSA). Forensic analysis suggests that the incident might have begun when an employee clicked on a link embedded in a phishing email.This action enabled a threat actor to set Ryuk ransomware loose on the facility’s network. Ultimately, the infection spread to all IT network files, leading Ryuk to disrupt the corporate IT network and prevent critical process control monitoring systems from functioning properly. Phishing is one of the primary infection vectors for most ransomware families, but there’s an interesting twist with this particular family. As noted by Malwarebytes, a typical Ryuk attack begins when a user opens a weaponized Microsoft Office document attached to a phishing email. Opening the document causes a malicious macro to execute a PowerShell command that attempts to download the banking trojan Emotet. This has the ability to download additional malware onto an infected machine that retrieves and executes Trickbot.

Read More

Spotlight

Vision Technologies

Vision Technologies, a national and global systems integrator, provides IT services and solutions for commercial and federal clients. Our seasoned staff has keen insight into trends and emerging technologies that are changing the way we work, communicate, and protect our society. We offer design, installation, support, and project management for Distributed Antenna Systems, Passive Optical Networking, voice/data, wireless systems, security, audio visual, and video teleconferencing delivering powerful IP-centric, integrated solutions that get results.

Events