How to Leverage Your SIEM to Detect and Respond to Ransomware

Leverage Your SIEM to Detect and Respond to Ransomware

According to the Ponemon Institute, only 20% of organizations are confident of their ability to deal with a ransomware attack. This may seem counter intuitive since the cost of a successful attack to an organization can be significant, but exemplifies the challenges endemic preventing, detecting and responding to the growing sophistication of ransomware threat actors. […]

EDR vs. MDR: Which Threat Detection is Right for You?

EDR vs. MDR Threat Detection

Today’s threat environment for enterprises and small businesses is expanding at a rate that makes keeping pace a challenge. Cybersecurity threats manifest today at higher volume, with greater diversity and more sophistication than ever before. Highlights from the 2020 Cost of a Data Breach Report, conducted by IBM in partnership with the Ponemon Institute, demonstrate […]

Using Application Whitelisting to Stop Malware

Application Whitelisting to Stop Malware

When Avertium’s CyberOps Center of Excellence analysts’ map the attacks we see against the MITRE ATT&CK framework, we find that the most common Initial Access technique used today is Phishing. Through the Phishing tactic, attackers will often attempt to execute malicious code on the victim machine through malicious links or attachments.  Execution of this malicious […]

Least Privilege: Minimizing Permissions to Improve Cybersecurity

Least Privilege: Minimizing Permissions to Improve Cybersecurity

Employing least privilege access by minimizing permissions for end user account access is an important aspect of building a cybersecurity program. Admittedly, assigning appropriate access levels and setting up account separation can present a challenge in workload and can be unpopular with your end users, but this practice is worth the effort. This article explains […]

How to Write a Business Continuity Plan to Fit Your Enterprise

How to Write a Business Continuity Plan

What is a Business Continuity Plan? An effective business continuity plan (BCP) is a proactive practice that aims to avoid and mitigate risks associated with a disruption of operations. A BCP should ensure personnel and assets are protected and able to function in the event of a disaster. What is the Primary Goal of Business […]

Password Spray Attack Q&A with a Penetration Tester

password spray attack

Penetration testers, or ethical hackers, use the same tactics, techniques and practices (TTPs) as cyber attackers, but on behalf of an organization to identify vulnerabilities to be remediated before the bad guy gets to them. A password spray attack is a common way our pen testers infiltrate networks; so much so that we feel it’s […]

10 Ways Using SIEM Technology Can Automate Fulfilling HIPAA Regulations

Using SIEM Technology Can Automate Fulfilling HIPAA Regulations

Any organization that transmits health information electronically, including health plans, healthcare clearing houses, healthcare providers, and a covered entity’s business associates, must comply with the Health Insurance Portability and Accountability Act (HIPAA). Yet one of the top problems these organizations face is failure to properly safeguard electronic protected health information (ePHI). One of the greatest […]

3 Things for HIPAA Compliance When Returning to Normal Operations

HIPAA Compliance When Returning to Normal Operations

As workplaces begin to re-open, organizations are looking to return their employees to their office work environments. The Health Insurance Portability and Accountability Act (HIPAA) stipulates that employees are responsible for protecting the privacy of protected health information (PHI) at all times. This means employers must continually review and modify their security measures to ensure […]

How to Protect Workers from Increased Phishing Attacks During COVID-19

Protect Workers from Increased Phishing Attacks During COVID-19

Cybercriminals are taking advantage of the vulnerabilities introduced by organizations forced to rapidly move employees to a virtual workforce model and the resulting greater reliance on the internet. Google reports the number of active phishing websites has increased from 149,195 in January to 522,495 in March. That’s an increase of 350 percent since the beginning […]

3 Ways to Stay PCI Compliant During the COVID-19 Pandemic

9 Ways to Stay PCI Compliant During the COVID-19 Pandemic

The COVID-19 pandemic has had a significant impact on maintaining PCI compliance in a “business as usual” fashion for many organizations.  As businesses transition to support remote work, take other measures to remain operational, and complete assessments on time in the face of COVID-related restrictions, it is important to ensure these alternative work arrangements do […]