Jan 13, 2021 | Cybersecurity, Information Security
The Ryuk ransomware has been in the news recently with a string of devastating high-profile breaches. Need Help? Contact an Expert! What Is Ryuk? Ryuk is a relatively new strain of ransomware that was first seen in August 2018. It’s mainly used in targeted...
Nov 20, 2020 | Cybersecurity, Information Security
Within the last few years, SIM swapping attacks have increased dramatically as access to cheap phones and SIM cards has grown easier and the use of phone numbers for website authentication has become more widespread. Victims could easily have no idea until it’s too...
Nov 6, 2020 | Cloud, Compliance, Cybersecurity, Information Security
Securing IoT devices is an important but often overlooked aspect of enterprise security. IoT devices can seem innocent, but some have severe security issues that can offer a quick and easy entry point for attackers into a network. If not properly secured, an attacker...
Nov 3, 2020 | Cloud, Compliance, Cybersecurity, Information Security
Colchester, VT – October 29, 2020: Premier cybersecurity services provider NuHarbor Security has strengthened its partner ecosystem with the strategic addition of SafeGuard Cyber – the industry’s first and only comprehensive collaboration, chat, and social media...
Oct 23, 2020 | Compliance, Cybersecurity, HIPAA, Information Security
October is National Cyber Security Awareness Month, and one of the main themes for 2020 is Securing Internet-Connected Devices in Healthcare. Securing IT devices in healthcare is critical, as any system downtime can lead to deaths and degraded response to emergencies....
Oct 14, 2020 | Cybersecurity, Incident Response, Information Security, NIST 800-53, Risk Management
September is National Preparedness Month and October is National Cybersecurity Awareness Month, which makes it a great time to review your organization’s disaster preparedness strategy. Implementing a contingency plan for a natural disaster could be the difference...
Sep 17, 2020 | Cybersecurity, Information Security, REDSEC
What is Threat Hunting? Threat hunting is the process of proactively searching through environments and networks to detect and isolate advanced threats that were not discovered by traditional security solutions. Threat hunting assumes that the environment is already...
Sep 11, 2020 | Cybersecurity, Information Security, REDSEC
What is Cyber Threat Intelligence? Cyber Threat intelligence is information that is used to identify and understand cyber threats to an organization. This intelligence is used to identify threats that could be a risk to an organization and make informed decisions to...
Jun 4, 2020 | Information Security
If you’re like me, finding good podcast content is hard. I really struggle as I either like podcasts that bend my brain a bit or tells a good story where I can be entertained. Too often I come across podcasts that drone on forever about meaningless topics or...
May 14, 2020 | Information Security
The cybersecurity talent thing is getting old. Everyone talks about it, but nothing really changes across the industry. We don’t have the cybersecurity talent, we don’t have the skillset, we can’t keep our cybersecurity talent. But honestly,...