Blog
Insource VS Outsource
As your business takes on bigger and better IT services, you are faced with the question of outsourcing or insourcing your resources and professionals. The more traditional choice of insourcing all IT expertise has become a not-so-obvious choice as other options have...
What Are Managed Services?
As your business grows, so does the need for organized and efficient IT management. Having one IT employee or running it all yourself makes keeping your business stable and working effectively a challenge. Outsourcing to an IT company with managed services can give...
B2B Payment Fraud Continues to Rise
What You Can Do To Prevent Wire Fraud Electronic payment attacks are on the rise, and small-to-mid-sized businesses are the target as more and more look to ACH and electronic payments as means of facilitating business between vendors. While wire transfer fraud...
How Are Attackers Using Phishing to Get Into Victims’ Mailboxes?
NetStandard's Security Minute Series If you want to see how attackers are using phishing to get into victims' mailboxes, Microsoft has a good writeup: Behind the scenes of business email compromise: Using cross-domain threat data to disrupt a large BEC campaign |...
Do You Have MFA Enabled On ALL Remote Access?
NetStandard's Security Minute Series The DoJ announced that it recovered "most" of the $4.4 million ransom that Colonial Pipeline paid, by seizing the BitCoin wallet: US recovers most of Colonial Pipeline's $4.4M ransomware payment (bleepingcomputer.com) This...
Ransomware Attackers Are Mirroring Traditional Sales Techniques
NetStandard's Security Minute Series The big ransomware victim of the week was JBS Meats. It's not known if JBS paid a ransom or not. The US government has pointed the finger at Revil / Sodinokibi: US: Russian threat actors likely behind JBS ransomware attack...
Proactively Detect and Block These Exfiltration Applications
NetStandard's Security Minute Series In 2011, the IT world was shocked to learn that RSA was hacked, and the seed values for SecurID tokens were stolen. This left every SecurID token in the world vulnerable and exposed - if you were in the industry at the time,...
Consider Cyber Insurance
NetStandard's Security Minute Series The big ransomware news from last weekend was Colonial Pipeline, the largest fuel pipeline operator on the East Coast, which was forced to shut down its entire network and all operations after being hit with ransomware from...
Is This the Future of Ransomware?
NetStandard's Security Minute Series Data exfiltration by attackers is on the rise. By some statistics, up to 80% of all ransomware attacks now include the threat of leaking data publicly. It's the future of ransomware: Ransomware: The Data...
Tips on How Public and Private Entities Can Combat the Rising Tide of Ransomware
NetStandard's Security Minute Series This Tuesday, 5/4, I'm doing a webinar with Miller Group. Sign up, tell your friends! The Ransomware Task Force, a group of more than 50 cybersecurity experts, has published a detailed framework for how...
