Despite a company’s belief on how it would respond in the event of a ransomware attack, companies should consider opening a bitcoin account with a nominal amount of bitcoin in it so that it is at least prepared to make the tough decision should the need arise.
The recent pandemic accelerated a trend towards remote work that has been ongoing for years and, as a result, accelerated usage of cloud-based collaboration platforms and their impact on the field of digital forensics. This article will discuss the trends and challenges associated with these platforms as they pertain to cloud-based data collection and its use in forensic investigations.
A recent surge in cyberattacks, including SolarWinds and Colonial Pipeline, has intensified a focus on cybersecurity across industrial sectors and critical infrastructure. As a result, the U.S. government and other organizations within the nation’s defense supply chain have taken action to protect the critical assets and organizations that ensure the security and prosperity of our country.
Two school district technology leaders share their first-hand experiences and insights into the cybersecurity vulnerabilities affecting the K-12 sector, along with how to design a security roadmap and the challenges that come along with implementing one.
School budgets have been set for the 2021/2022 school year, policies and procedures have been updated, staffing levels have been established, and security solutions have been deployed into this dynamic environment. Here, we consider adjustments that can be made to deployed controls so that children and school staff remain safe in both hybrid and remote learning environments.
Throughout the past two years, supply chain professionals have experienced the national and international disruptions that can occur as a result of cyberattacks, with some threats completely halting certain sectors.
The program, which connects security executives to students at Mercyhurst, aims to benefit both young security professionals building their careers and executives looking for new talent.
As the United States continues to face attacks across critical sectors —
energy and infrastructure, healthcare, and operational technology (OT) —
a cultural shift in cybersecurity is taking place.
By understanding each of the bad actors, federal agencies, law enforcement and first responders — often victims of cyberhacktivism —can better prepare for, and prevent, cyberattacks from happening. Here are a few basic steps every public safety agency can take.
With duress technology literally at their fingertips, healthcare staff can request help anytime/anywhere in facilities and rest assured that assistance is on the way.