More about Kadian Douglas
Blog Posts by Kadian Douglas:
-
Hacking to Get Paid
Authored by Jake Moraites; Cybersecurity Consultant and Lindsay Timcke; Cybersecurity Director
In the current digital landscape, hacking has become a lucrative business opportunity for cybercriminals across the globe. Gone are the days where hacking was limited to isolated incidents of curiosity or mischief. Hacking is a business now and one way or another, hackers will ensure they get paid.
-
Are YOU Protected? Recent MOVEit Application Hack.
The MOVEit application, a popular managed file transfer (MFT) solution developed by Ipswitch showed some recent vulnerabilities that threatens the security and confidentiality of the transferred data. The impact of this vulnerability can be severe, compromising the privacy and integrity of sensitive data. Organizations should take proactive measures to mitigate the risks and secure their file transfer operations.
-
New Threat Targeting Fortinet FortiGuard Devices
A state-sponsored actor based in China, “Volt Typhoon,” has recently created waves of concern within the cybersecurity industry. The threat actor, who has been known for carrying out cyber espionage, has managed to establish persistent access within telecom networks and other critical infrastructure.
-
Cyber Security/Response Plan Preparedness in Trucking
Cyber Security/Response Plan Preparedness in Trucking Authored by Lindsay Timcke ; Director, IT & Cyber Going back 10-20 years ago the biggest threats to your trucking business were fuel costs, the weather and staffing. Then, almost appearing overnight the internet came into the picture and soon dominated the conversations surrounding Incident Response (IR), Disaster Recovery (DR) and […]
-
Shadow IT and Rogue Applications
Authored by Lindsay Timcke
The last ten years have shown an unprecedented growth in application development and deployment. Presently there is pretty much an application for anything and everything you can imagine. From a corporate standpoint what this has led to is a dramatic increase in groups or even individuals within companies purchasing software that meets their department needs. Over time this application will grow in size and complexity while the user community and importance to the group for completing their daily tasks will also increase. From a compliance and audit standpoint the above introduces many points of concern.
-
Vendor Management – Outsourcing the Task, Not the Risk
Authored by Lindsay Timcke
One of the most overlooked areas of Cybersecurity and creating a solid defensible cybersecurity posture for your firm is vendor management. With most firms in the 21st century being heavily invested in relationships with outside vendors who monitor, develop, deploy, extract, and oversee many aspects of our network infrastructure, it is imperative that each firm approach these outside resources as just an extension of their own organization. This means the controls you have in place at your organization should also be in place at each of your vendors.
-
Microsoft 365 Security: Is Your Organization’s Data Safe?
Authored by David Sun
Microsoft 365 came of age just as organizations quickly adopted remote work during the pandemic. In their urgency to migrate, many IT departments did not have the time to fully research the new platform and all its security features, opting to use the default settings. Once migration was complete and systems running reliably, organizations — fearing disruption — may not have gone back to change the settings.
-
Ransomware that Your Cybersecurity Insurance Can’t Cover
The latest alert from various US government agencies through the Cybersecurity & Infrastructure Security Agency (CISA) warns that actors affiliated with Iran’s Islamic Revolutionary Guard Corps are targeting vulnerabilities in Fortinet networking equipment and Microsoft Exchange email software. Like other threat actors, they leverage vulnerabilities to deploy tools and encrypt systems and exfiltrate data, creating significant business interruption and consumer risk, while demanding a large ransom payment.
-
Education Sector Being Targeted for Cyber Attacks
Back to school apparently also applies to hackers. Educational institutions are currently being targeted for ransomware attacks. The FBI, Cybersecurity & Infrastructure Security Agency (CISA) issued a warning on September 6, 2022 about the increase in ransomware attacks by hacking group Vice Society. This group has been using compromised credentials to exploit internet-facing applications to gain access, explore the network, exfiltrate sensitive student data and deploy ransomware. In the past, we have seen this disruptive activity lead to classes being cancelled, exams being delayed, to schools being shut down permanently.
-
Cybersecurity Education Series for Nonprofits – Security Basics
Please check out the post below written by Javier Young where he highlights how to protect your hard drives, hardware and software decommissioning, and device configuration. Cybersecurity Education Series for Nonprofits – Security Basics