The Ransomware Playbook Mistakes That Can Cost You Millions

If there is one type of cyberattack that can drain the color from any security leader’s face, it’s ransomware. A crippling, disruptive, and expensive attack to recover from, with final costs rarely being easy to foretell. Already a prevalent threat, the number of ransomware attacks rose during the pandemic and nearly doubled in the year […]

The post The Ransomware Playbook Mistakes That Can Cost You Millions appeared first on Security Intelligence.

Continue reading The Ransomware Playbook Mistakes That Can Cost You Millions

Incident Response for Health Care IT: Differences and Drivers

Threat actors continue to target the health care industry. IBM’s Threat Intelligence Index for 2022 rates the industry as the sixth most targeted. That puts it close behind the energy and retail and wholesale sectors. Certain regions seem to be more prone to attack as well. The Asia-Pacific region accounted for 39% of all health […]

The post Incident Response for Health Care IT: Differences and Drivers appeared first on Security Intelligence.

Continue reading Incident Response for Health Care IT: Differences and Drivers

What’s New in the 2022 Cost of a Data Breach Report

The average cost of a data breach reached an all-time high of $4.35 million this year, according to newly published 2022 Cost of a Data Breach Report, an increase of 2.6% from a year ago and 12.7% since 2020.

The post What’s New in the 2022 Cost of a Data Breach Report appeared first on Security Intelligence.

Continue reading What’s New in the 2022 Cost of a Data Breach Report

How to Make Business Practices That Support Cybersecurity Response

Scottish author Robert Burns wrote in the poem “To a Mouse,” “The best-laid schemes o’ mice an’ men. Gang aft a-gley.” You may better know the saying in its more common form, “The best-laid plans of mice and men often go awry.”   This saying may resonate with incident responders, business continuity planners and crisis managers. […]

The post How to Make Business Practices That Support Cybersecurity Response appeared first on Security Intelligence.

Continue reading How to Make Business Practices That Support Cybersecurity Response

Putting Your SOC in the Hot Seat

Today’s Security Operations Centers (SOCs) are being stress-tested as never before. As the heart of any organization’s cybersecurity apparatus, SOCs are the first line of defense, running 24/7 operations to watch for alerts of attacks and appropriately address those alerts before they become all-out crises. Yet with ransomware attacks maintaining first place as the top […]

The post Putting Your SOC in the Hot Seat appeared first on Security Intelligence.

Continue reading Putting Your SOC in the Hot Seat

Solving the Data Problem Within Incident Response

One of the underappreciated aspects of incident response (IR) is that it often starts as a data problem. In many cases, IR teams are presented with an effect such as malware or adversary activity and charged with determining the cause through the identification of evidence that ties the cause and effect together within an environment […]

The post Solving the Data Problem Within Incident Response appeared first on Security Intelligence.

Continue reading Solving the Data Problem Within Incident Response

What CISA Incident Response Playbooks Mean for Your Organization

What does the latest U.S. federal ruling on cybersecurity mean for you? The recent executive order and U.S. Cybersecurity & Infrastructure Security Agency (CISA) commentary on it could provide a good framework for defending against ransomware and other attacks. In its executive order on ‘Improving the Nation’s Cybersecurity,’ the White House directed the Secretary of […]

The post What CISA Incident Response Playbooks Mean for Your Organization appeared first on Security Intelligence.

Continue reading What CISA Incident Response Playbooks Mean for Your Organization

What CISA Incident Response Playbooks Mean for Your Organization

What does the latest U.S. federal ruling on cybersecurity mean for you? The recent executive order and U.S. Cybersecurity & Infrastructure Security Agency (CISA) commentary on it could provide a good framework for defending against ransomware and other attacks. In its executive order on ‘Improving the Nation’s Cybersecurity,’ the White House directed the Secretary of […]

The post What CISA Incident Response Playbooks Mean for Your Organization appeared first on Security Intelligence.

Continue reading What CISA Incident Response Playbooks Mean for Your Organization

Everything You Need To Know About Ransomware Attacks and Gangs In 2022

Ransomware is a lucrative business for criminals. It is paying off, and it is working.  According to a recent Trend Micro report, a staggering 84% of US organizations experienced either a phishing or ransomware attack in the last year. The average ransomware payment was over $500,000. Bad actors want to keep cashing in. So they’re […]

The post Everything You Need To Know About Ransomware Attacks and Gangs In 2022 appeared first on Security Intelligence.

Continue reading Everything You Need To Know About Ransomware Attacks and Gangs In 2022

Cyber Warfare: What To Expect in 2022

Cyberwarfare is not a future threat—it’s a clear and present danger. While the concept of cyber terrorism might sound like something from a fictional movie, our interconnected world is riddled with security flaws that make it an unfortunate reality. Digital transformation has brought great convenience to consumers with mobile apps and e-commerce. And the evolution […]

The post Cyber Warfare: What To Expect in 2022 appeared first on Security Intelligence.

Continue reading Cyber Warfare: What To Expect in 2022