Contextual Security Solutions Blog
INFORMATION EVOLVES
SECURITY & COMPLIANCE BLOG
Security Threats Increase as Cybercriminals Target Remote Working
With the COVID-19 pandemic continuing to sweep across the nation, thousands of businesses have adopted a remote working landscape. While advancements in technology allowed for remote working before the pandemic, many businesses still operated within the confines of an...
Solarwinds, FireEye, and Breaches.
Over the past few days there have been multiple high-level breaches to platforms like Microsoft Teams, Solarwinds Orion, and companies like FireEye and some government agencies. Going into the holidays, this may be a cause for anxiety for those of you who are charged...
How a Rise in Ransomware Breaches Emphasizes the Need for Better Cybersecurity
Cybercriminals have reared their head in 2020 with an increase in ransomware attacks, putting thousands of businesses and millions of people at risk. What does this mean for cybersecurity teams? As threats continue to increase, security professionals are faced with...
12 Security Questions You Should Ask Your Security Team
CEO’s and board members don’t need to be experts on cybersecurity, but they do need to have some knowledge in order to do their jobs effectively. Especially in today’s environment where there is a risk for financial loss from cyber attacks, these top executives should...
Important Cybersecurity Lessons from 2020
The COVID-19 pandemic has impacted the world in more ways than one and cybersecurity is no exception. With thousands of companies switching to a remote workforce, the pandemic has presented an unprecedented opportunity for hackers and online scammers and cyber...
Why are you asking to be Whitelisted?
Recently I have been asked by clients why we request that our scans be whitelisted when we are performing external security assessments. Many people believe that a blocked scan is the same as blocking a vulnerability which is present on a host. This could not be...
The Similarities Between a Pandemic and Cybersecurity
There is no way to guarantee nature and avert any and every crisis from happening. When the World Health Organization announced a novel coronavirus in Wuhan, China on December 31, 2019, the world was not prepared. Little did we know as we went about our daily routines...
Why Social Engineering is a New Trend in Cyberattacks
Since the beginning of time, humans have been wired to help one another. When we see another person in need, most of us are naturally inclined to want to help. We feel obliged to help the elderly woman trying to lift her groceries or the young man whose car is broken...
Catchphrase: Data Breach Edition
Can you tell what the image is? Is it a bear? Or a lion? Maybe a sword wielding ninja? With just roughly 12% of the picture revealed, it’s hard to identify. Now, imagine it’s a breach. With so little information available its no wonder that dwell time prior to discovery after a compromise still hovers around two months and results in an average cost of over 3 million dollars per breach. It’s as important as ever today for organizations to have confidence in their log and monitoring infrastructure. That’s where Contextual Security Solutions comes in. For more information, visit https://contextualsecurity.com.
Why Credit Card Fraud Still Exists
If you have ever been the victim of credit card fraud, you know that sinking feeling in your stomach when you receive a call stating that your credit card has been compromised. Immediately questions begin swirling around in your head. “Where did I last use my credit...