ezprotect Archives - Adaptus

In part 2, I will discuss your organization's supply chain.  Even if your organization's IT network is protected, your supplier may not be!  Why should you encourage the board to take this into consideration?  With today's delicate economy, the stability of the supply chain is also under threat.  An attacked supply chain can potentially be disastrous to profitability, business continuity, and compliance. 

Read More
blacksville shale gas site

Exercises like Liberty Eclipse demonstrate the interdependencies within our nation’s energy infrastructure. They provide critical forums for collaboration and knowledge transfer and allow public and private sector partners to examine their respective roles and responsibilities in a controlled, secured environment.

Read More
Category One

This week, the head of Britain’s National Cyber Security Centre (NCSC), Ciaran Martin, said something rather alarming in a newspaper interview that generated plenty of headline heat – the UK has never suffered the most serious category one (C1) cyberattack but it is only a matter of time before it does.

Read More

Security advocates finally seem to have the public's attention, and the hope is that people -- including lawmakers -- will take their advice more seriously.

Read More
Cybersecurity on a budget

An insider could introduce malware to your network or an opening for theft that would have been otherwise blocked by antivirus or your firewall. The following measures are vetted practices that have worked for private institutions and public sector ones as well. @Salesforce

Read More

It’s time for all of us to play defense, because Equifax clearly did not. In the wake of the epic breach of as many as 143 million of our Social Security numbers, names and addresses from the company’s credit files, the company put up a website that attempted to make sense of things for consumers. #Equifaxbreach #cybersecurity

Read More

Many IT professionals are unaware of major security threats to their networks via Salesforce as they assume standard network/desktop virus scanning software (such as McAfee, Norton, Total AV, among others) will work within the Salesforce environment. Or, they assume Salesforce includes a built-in virus scanning mechanism. Unfortunately, these are serious misconceptions that lead to catastrophic consequences. Why? @salesforce,#antivirus,#virusscanning

Read More

Equifax said data on 143 million U.S. customers was obtained in a breach. The breach was discovered July 29. Personal data including birth dates, credit card numbers and more were obtained in the breach. Three Equifax executives sold shares in the company days after the breach was discovered. #equifaxbreach #cybersecurity

Read More
cyber spying campaign

The campaign appeared to be the work of several groups, but tactics and techniques used suggest that the groups were operating with “similar goals or under the same sponsor”, probably a nation state... @cyber #cybersecurity #information

Read More
cybersecurity training for officials

A number of election security experts have sounded the alarm about the importance of training local election officials on how to avoid cybersecurity risks.

Read More