🖥️ Webinar: Secure Smarter Not HarderEach month you’ll hear from ReliaQuest security experts along with security industry leaders discuss common cybersecurity challenges, solutions to those challenges, use cases, and more.
Let’s review the current state of cybersecurity for small- and medium-sized businesses (SMBs). According to Cybint, the average cost of a data breach for SMBs worldwide now stands at $3.9 million. Such an amount can be devastating to SMBs monetarily. But a data breach can also wreck an SMB’s reputation. That helps to explain why […]
You’ve probably heard about what happened to Kaseya. Just as a refresher, the IT solutions provider announced that it was “experiencing a potential attack” against one of its solutions on July 2. It ordered customers to shut down their product servers while they waited to hear more. A day later, Kaseya urged customers who encountered […]
Organizations are struggling to identify and contain a breach. According to Security Intelligence, the average dwell time or “lifecycle” of an organization’s breach detection efforts was 280 days in 2020. This period played into the $3.86 million that organizations spent on average in their data breach recovery efforts for that year. Several factors can affect […]
Like many of us in security, the last business trip and conference I attended was RSA in San Francisco, March 2020. It was then that we started to hear about how dangerous and fast spreading the “Novel Coronavirus” that causes COVID-19 was and slowly started to realize this was not going to be a normal […]
Colonial Pipeline and DarkSide Ransomware On Friday, May 7, Colonial Pipeline took down parts of their IT infrastructure in the wake of a ransomware attack. The pipeline supplies 45% of the U.S. East Coast’s gas, diesel and jet fuel. The FBI confirmed on Monday that the criminal group responsible is leveraging the DarkSide RaaS (Ransomware-as-a-Service). […]
What is Zero-day Exploit? The term “zero day exploit” is defined as an unknown cyber attack that exposes a window of vulnerability, typically on the same day a weakness is discovered in a computer software. A zero day exploit can be difficult to detect and called “zero day” due to the number of days until […]
The Super Bowl presents a ton of opportunities for cyber criminals to exploit, both through the target–rich environment surrounding the event itself as well as social engineering attacks that take advantage of the hype.