Resilience

Phishing attacks remain a cybersecurity problem, experts say

Have you recently received a communication that initially scared you? Perhaps a notice that your credit card had unauthorized transactions, your bank account needed attention, or your favorite shopping site needed to verify some information to complete your latest purchase, which you knew was an important but last-minute gift? And this notice asked you to …

Phishing attacks remain a cybersecurity problem, experts say Read More »

What is the difference between Compliance and Security in IT?

What is the difference between compliance and security in technology?  Is there a difference? Yes, there is a difference. While cybersecurity and IT compliance have elements in common, they are still different protocols. Consider the definitions: Cybersecurity is implementing and managing security controls to protect an organization and its assets. Compliance is implementing and managing …

What is the difference between Compliance and Security in IT? Read More »

Is your Incident Response Plan up to date?

A security incident is an event that would cause financial and/or reputational harm, disrupt daily operations, or create compliance issues with state or federal regulations. An Incident Response Plan (IRP) tackles those problems ahead of time, allowing planning when cooler heads can think clearly. You should develop an IRP to guide your organization’s responses to …

Is your Incident Response Plan up to date? Read More »

Non-profit client thanks ImageQuest for support

Recently our CEO received an unsolicited letter from a non-profit we support. The New Beginnings Center- Nashville works with women who traditionally struggle to stay fit and provide healthy meals to their families, such as low-income moms living in food “deserts.” New Beginnings provides these women with individualized personal training, nutritional guidance, and mental health …

Non-profit client thanks ImageQuest for support Read More »

NSA, CISA, UK warn of Russian brute force attacks on networks

Do you work for, or have as a customer: Government agencies, the U.S. military, defense contractors, energy companies, higher education, logistics companies, law firms, media companies, political consultants, political parties, or think tanks? Then cybersecurity needs to be your organization’s top priority. Russia’s military intelligence unit (familiarly GRU) is using brute force attacks to break …

NSA, CISA, UK warn of Russian brute force attacks on networks Read More »

Ransomware attacks pummeling cyber insurance industry

Have you experienced sticker shock with your cyber insurance renewal? Been unable to complete an insurer’s security questionnaire? Even been denied renewal of your policy? All this is happening as insurers stagger under the weight of growing ransomware claims. Ransomware attacks are soaring. Last year, reported ransomware attacks increased 400 percent, according to the Associated …

Ransomware attacks pummeling cyber insurance industry Read More »

Don’t plan on paying to recover from ransomware

Q: What’s worse than having your systems encrypted by ransomware? A: Discovering hackers used two different strains of ransomware, meaning your data is double-encrypted. Yes, this nightmare is out there, according to a recent Wired article. The article cites cases where combinations of  REvil and Netwalker malware, as well as MedusaLocker and GlobalImposter ransomware combinations, …

Don’t plan on paying to recover from ransomware Read More »

Ransomware: National security risk needs global approach

The rising scourge of ransomware needs a global approach to halt its devastation, a task force with government and corporate representatives announced last week. Ransomware is “a flourishing criminal industry” which “routinely imperils lives,” the task force organized by the non-profit Institute for Security and Technology wrote. Utilities, hospitals, schools, military posts, and municipalities all …

Ransomware: National security risk needs global approach Read More »

Improve your Tech IQ: What does “Zero-Day” mean?

When you read articles about breaches and security warnings, you may see the term “zero-day,” as in “zero-day attack,” or “zero-day exploit.” Zero-Day refers to a system vulnerability that is unknown to IT security providers. A zero-day attack allows a cybercriminal to exploit the vulnerability to inject malware, steal data assets, or crawl through the …

Improve your Tech IQ: What does “Zero-Day” mean? Read More »

Scroll to Top