Prepare Now For The Next Cyber Attack

If you thought you were at the mercy of cyber criminals before the latest Russian aggression, be prepared. Things are bound to get much, much worse. Russia is now overtly exercising its cyber warfare aggression as part of its kinetic warfare that started with the invasion of Ukraine in their annexation of the Crimean peninsula in 2014 and its recent invasion of Ukraine this week.

Continue reading

Ransomware Attacks: How To Protect Your Enterprise

Ransomware attacks have increased, not only in frequency but in Dollar amounts being demanded as ransom to free data. This means that things are getting worse, not better out there. Attackers are not necessarily targeting you, but you need to be prepared nevertheless. So, what do we do?

BlueKatana recommends that you should never pay ransom to ransomware. Paying the ransom brings more money to the business of ransomware and encourages shady operators to jump into the action. In our opinion, your best bet is to be prepared for whatever could happen; this minimizes your exposure. You should also be able to react fast, reducing your downtime and increasing your success in business continuity. All combined, you can minimize your impact from these types of otherwise catastrophic events.

BlueKatana is a big proponent of prevention, detection, and response. Attackers will not only encrypt your data to extort your enterprise’s money, but they will also steal your data to sell on the Dark Web to maximize profits. So your plan should include a way to recover and actions to prevent these scenarios from happening in the first place.

Continue reading

InfoSec Rush to Safety Series

In light of the pandemic coming to a close sometime in 2021, we expect that some people will start coming back to work to their office locations. This not only imposes a new reality on the overall social aspects, architecture, and office layout but also poses some challenges on the InfoSec front. Over the next few articles, we will be focusing on the upcoming rush to achieve a secure level of compliance.

Continue reading

Zero Trust Security Model – Explained

In the 1990s

There was no concept of Zero Trust Security Model because it was not needed, the only attack vector was physical access. The majority of computing devices were connected to local networks. LANs were considered secure for several reasons, especially for sitting behind a layer of physical security. Most of the connected devices were desktops and had a network wire sticking out their back panel.

Continue reading

Let’s Talk About Cybersecurity

Cybersecurity is the general concept that groups different types of electronic security awareness, methodologies, preventive, and reactive actions to protect data you hold, send, and receive. Implemented cybersecurity preventive measures allow you to counter unauthorized access to your data and your Customer’s information. Those attempts can come both from inside and outside of your team and can be intended or unintended.

Continue reading