Incident response

How to draft an incident response policy

Simultaneously with their growing online presence, companies and individuals become increasingly susceptible to cyber-security attacks. Most organizations pr

Ransomware-based attacks: Should you pay the ransom?

Introduction Ransomware represents one of the most dangerous cyber threats for netizens and private companies across the world. In the criminal underground,

Ransomware Authors Flunk Again and Again

It turns out that some crypto ransomware samples are not as sophisticated as they appear. The black hat hackers are just as error-prone as everyone else. Sec

DDoS Attacks: Targets and ‘Smoke & Mirrors’ Mode

Introduction It is clear that distributed denial-of-service (DDoS) attacks are still in vogue. It is clear that they have become more ubiquitous, more sophis

Reporting of Cybersecurity Incidents

This article is about the reporting of cybersecurity incidents in the USA. While it covers three main types of reporting—corporate, institutional and civil—f

DDoS Attacks: A Perfect Smoke Screen for APTs and Silent Data Breaches

At the beginning of the year, Forbes mentioned a trend of growing DDoS attacks all over the world. During this year, many security companies have announced a

How Harmful Can a Data Breach Be?

There is this belief that businesses that have suffered a data security breach very often do not recover. But is that really so? What does it take to actuall

Incidents Happen; So Should Incident Response Planning

In the IT world, "Target" doesn't bring to mind great deals from the retail giant, and "Ashley Madison" doesn't conjure up the married dating service. Instea

How to Fix the Top Five Cyber Security Vulnerabilities

A few weeks ago, we analyzed the top five cyber security vulnerabilities in terms of potential for catastrophic damage. Data breaches like the one affecting

Cybersecurity Policy and Threat Assessment for the Energy Sector

INTRODUCTION: A wake-up call An HP Enterprise Security's 2014 Global Report on the Cost of Cyber Crime by the Ponemon Institute reveals some astounding aspec