The Dove

Municipalities Increasingly Targeted by Ransomware Attacks

CNN: "Crippling ransomware attacks targeting US cities on the rise" -- ...
In: Security

Mitigating One of the Biggest Threats: Web

Web and email have long been the top two threat vectors. Today we will address web ...
In: Security

Cybersecurity Awareness Takes Top Spot in 2019

With the new year underway, this is a great time to review your overall security posture.  
In: Security

Distribute Denial of Service: IoT Increases Attack Strength

Distributed Denial of Service or DDoS, is a fairly easy attack to perpetrate. The basic gist is that a DDoS ...
In: Security

RDDoS: A New Ransom Attack Based in Fear

2016 and 2017 gave us deadly ransomware attacks like WannaCry and NotPetya. These attacks put ransom-type ...
In: Security

WHY TALOS: Threat Intelligence Like No Other

Cyber security that’s reactive isn’t cyber security that works anymore. If you are using a security system that doesn’t have a repository where it can find the ...
In: Security

Your Guide to Multi-Factor Authentication

You know the importance of using good password practices:
In: Security

Cryptojacking Overtakes Ransomware as Most Popular Malware Threat

2017 gave us the year of ransomware and all the fears that came along with it. We saw the devastation ...
In: Security

2018 Annual Cybersecurity Report 

This report by Cisco essentially gives you the playbook for defending your network ...
In: Security

Developing an Information Security Strategy: Putting All the Pieces Together

Previously we discussed our ...
In: Security

Developing an Information Security Strategy: Evaluate Your Current Controls 

Previously we discussed our plans in this security blog series for a simplified approach to cybersecurity.  We discussed the importance of identifying and ...
In: Security

Developing an Information Security Strategy: 8 Steps to Writing a Security Policy

Last week we discussed our plans in this security blog series for a simplified approach to ...
In: Security

Leave a Reply