Contextual Security Solutions Blog
INFORMATION EVOLVES
SECURITY & COMPLIANCE BLOG
12 Security Questions You Should Ask Your Security Team
CEO’s and board members don’t need to be experts on cybersecurity, but they do need to have some knowledge in order to do their jobs effectively. Especially in today’s environment where there is a risk for financial loss from cyber attacks, these top executives should...
Important Cybersecurity Lessons from 2020
The COVID-19 pandemic has impacted the world in more ways than one and cybersecurity is no exception. With thousands of companies switching to a remote workforce, the pandemic has presented an unprecedented opportunity for hackers and online scammers and cyber...
Why are you asking to be Whitelisted?
Recently I have been asked by clients why we request that our scans be whitelisted when we are performing external security assessments. Many people believe that a blocked scan is the same as blocking a vulnerability which is present on a host. This could not be...
The Similarities Between a Pandemic and Cybersecurity
There is no way to guarantee nature and avert any and every crisis from happening. When the World Health Organization announced a novel coronavirus in Wuhan, China on December 31, 2019, the world was not prepared. Little did we know as we went about our daily routines...
Why Social Engineering is a New Trend in Cyberattacks
Since the beginning of time, humans have been wired to help one another. When we see another person in need, most of us are naturally inclined to want to help. We feel obliged to help the elderly woman trying to lift her groceries or the young man whose car is broken...
Catchphrase: Data Breach Edition
Can you tell what the image is? Is it a bear? Or a lion? Maybe a sword wielding ninja? With just roughly 12% of the picture revealed, it’s hard to identify. Now, imagine it’s a breach. With so little information available its no wonder that dwell time prior to discovery after a compromise still hovers around two months and results in an average cost of over 3 million dollars per breach. It’s as important as ever today for organizations to have confidence in their log and monitoring infrastructure. That’s where Contextual Security Solutions comes in. For more information, visit https://contextualsecurity.com.
Why Credit Card Fraud Still Exists
If you have ever been the victim of credit card fraud, you know that sinking feeling in your stomach when you receive a call stating that your credit card has been compromised. Immediately questions begin swirling around in your head. “Where did I last use my credit...
The Average Cost of Data Breach
We have all heard of data breaches at one time or another but if you run a business, are you aware of exactly what this could mean for your company? It’s no secret that there are multiple costs associated with a data compromise, but many people aren’t aware of what...
Facemasks, Hand Sanitizer, Credit Cards: Beware of New E-Commerce Fraud
As the coronavirus continues to ravage the country, more and more Americans have turned to the internet for their shopping needs. In an effort to mitigate their exposure to the virus, they have unknowingly become victims of an entirely different malady: e-commerce...
Ransomware: What tha’, How tha’ & Logical Next Steps
BY Richard G., CO-FOUNDER @ CONTEXTUAL SECURITY SOLUTIONS Perhaps you have received a malicious unsolicited email, or you are experiencing annoying pop-ups on your computer or network. If so, it’s possible that you have become the victim of ransomware. Ransomware is a...