Cyber Security

The Human Factor in the Digital Landscape

The Human Factor in the Digital Landscape

Computers are predictable. Human behavior is not.

Who Will Be the Next Threat Intel Hero? Challenge Your Friends!

Who Will Be the Next Threat Intel Hero? Challenge Your Friends!

October is National Cybersecurity Awareness Month. Celebrate, learn, and enjoy with an original video game provided to you by NC4! Get on the leaderboard, and the top 10 scores at the end of the month will win a prize!

The Future Belongs to Those Who Can Share it

The Future Belongs to Those Who Can Share it

In order to achieve the promise of real cybersecurity, organizations must confront and overcome their hesitancy to share information by embracing the concept of trust circles.

The Cybersecurity Heroes of America

A free and fair election is the foundation of democracy, and unfortunately ours is at stake once again because of the threat of being hacked. American cybersecurity heroes want to restore digital faith in our institutions.

Cybercriminals’ World Cup Runneth Over

Cybercriminals’ World Cup Runneth Over

The 2018 World Cup is here, and cybercriminals are capitalizing on opportunities for malicious attacks

Don't Take the Bait: Tips for Identifying Phishing Attempts

Don't Take the Bait: Tips for Identifying Phishing Attempts

Maintaining a culture of cybersecurity in your organization means that your employees are representing and safeguarding the business at the highest standards of online behavior.

We Need to Talk About the Cyber Attack on Atlanta

We Need to Talk About the Cyber Attack on Atlanta

Without the correct security solution in place, a disastrous cyber attack like Atlanta’s ransomware nightmare could happen to any organization, any city.

​The DOE's New Office of Cybersecurity, Energy Security, & Emergency Response

​The DOE's New Office of Cybersecurity, Energy Security, & Emergency Response

Beyond what the DOE can do to safeguard and improve the protections to our energy supply, corporations must become more proactive by securing their systems with thorough and coordinated cyber threat intelligence.

Preparing for Ransomware Before it Strikes

Preparing for Ransomware Before it Strikes

The growth of ransomware has caused industry leaders to take a deeper look into how their organization is preparing and actively preventing these damaging attacks. To learn more about the costs of a ransomware attack and the importance of cyber awareness training, check out our infographic.

What A "Culture of Cybersecurity" Could Mean For Your Organization

What A

When it comes to your organization, few words or concepts are more important than culture. By instilling cyber awareness values within your organization, which include an emphasis on understanding risk and knowing proper protocols, you can have more confidence in your capabilities when facing threats.

The Cyber Criminals Behind the Breaches

The Cyber Criminals Behind the Breaches

Because of increased cybersecurity awareness, we understand that cyber attacks are on the rise, but do we truly understand who is behind them? This infographic explores who is behind the attacks and which industries are taking the brunt of it.

What Approach To Cybersecurity Should Your Company Take?

What Approach To Cybersecurity Should Your Company Take?

Every organization has different cybersecurity needs and vulnerabilities. Threats have evolved to the point where even niche industries and companies can be targeted, and online criminals have an ever expanding target to take aim at. Every organization has the responsibility to be cybersecurity aware, which includes finding the right protections for your business systems and understanding how to implement these protections.

Sydney hostage situation takes city by surprise

A hostage situation in Australia's most populous city went on for the better part of a day during the middle of December, as an armed aggressor held a small group of patrons captive for more than 16 hours in a downtown Sydney cafe. The incident is one of the more serious occurrences that has happened in the country as Australia faces a growing violent sentiment from fundamentalist fringe groups.

The Role of Education in the Cybersecurity Workforce

The Role of Education in the Cybersecurity Workforce

Education is one of the key hallmarks to an IT workforce that successfully practices cybersecurity awareness. The deeper the knowledge base within an organization, the more secure it is apt to be. Some recent reports are suggesting that there are ways to improve the way we educate those joining the cybersecurity workforce.

The NTIA Cybersecurity Report Insights

The NTIA Cybersecurity Report Insights

The National Telecommunications & Information Administration (NTIA) is considered to be one of our government's finest resources for technical and administrative guidance on all things online. A wide-ranging cybersecurity awareness draft was released this past September which focused on DDoS attacks, botnets, and general cyber threats.

10 Ways to Stay Cybersecure This Cyber Monday

10 Ways to Stay Cybersecure This Cyber Monday

While Cyber Monday jumpstarts the economy, it also kicks cybercrime into high gear. Hackers are more than aware of consumers' vulnerabilities to coupons, sales, and holiday e-cards, and such vulnerabilities are easily exploited if safety precautions are not taken. Cybersecurity is more important on Cyber Monday than any other time of the year— stay cyber aware with these tips!

How Cyber Hacks Are Affecting Global Industries

How Cyber Hacks Are Affecting Global Industries

Over the past decade plus, global corporations have come to fully recognize the threat of cyber-attacks. This recognition has affected not only how businesses operate, but where they target resources and spend capital. To put it simply, it's now past the point of simple e-mail monitors and anti-virus software.

Cyber Threat Intelligence Experts Discuss Impactful Breaches

Cyber Threat Intelligence Experts Discuss Impactful Breaches

According to a cyber threat intelligence report, there were 791 documented security breaches in the first half of 2017. There's no surprise that with advanced technology and highly skilled hackers, the need for cybersecurity defense and protection is at an all-time high. Let's take a look at the five biggest security breaches in history to get a better idea of what could be on the horizon for future breaches.

Capabilities vs Coordination in Cyber Attack Defense

Capabilities vs Coordination in Cyber Attack Defense

Cybersecurity awareness, threat intelligence, and technological capabilities are all key aspects of secure network defense. This extends from multi-national companies to government-level defense. To some, those are the three core ingredients. Although there is another aspect, and without it, most cybersecurity is rendered pointless: communication and coordination.

Cybersecurity and the Financial Industry

Cybersecurity and the Financial Industry

It doesn't take much imagination to get a good idea of why the financial industry is frequently targeted by cyber-attacks. With so much currency in the system, and with so much personal information at play, it makes for an inviting target. For the financial industry to stay current with evolving dangers, it's critical that corporations partake in the sharing and use of cyber threat intelligence. This can mean everything from communications to cyber defense.

Protecting the Next Election The Role of the Private Sector

Protecting the Next Election The Role of the Private Sector

In late July 2017, cybersecurity experts met in Las Vegas at the annual DEF CON computer security conference. Computer hackers demonstrated the ability to hack into U.S. voting systems - and it took less than two hours. This disturbing development comes as the U.S. authorities are investigating efforts by the Russian Government to interfere in the 2016 Presidential election. The Russians conducted a multi-faceted intelligence operation that used a combination of traditional propaganda and influence tactics as well as a series of cyber-attacks, seeking to obtain and exploit sensitive data.

Timeless Cybersecurity Principles for Every Business

Timeless Cybersecurity Principles for Every Business

To put it simply, cybersecurity can be a difficult task. From keeping up with the latest developments in the constantly evolving world of cyber-threats, to the day-to-day chore of general defense, it proves to be an all-consuming project. This proves to be particularly true for smaller businesses. Beyond complexity and time constraints, world-class cybersecurity also costs money.

Cyber Attack Aftermath Business and Reputation Effects

Cyber Attack Aftermath Business and Reputation Effects

In the public arena, breaking news of a cyber-attack to a corporation is usually limited to headlines. But the true aftermath of a wide-ranging cyber intrusion can be deep and severe. Data breaches carry their own set of obvious problems (lost customer information, lower consumer confidence, etc.), but they also leave long-term damage that is often not understood until much later.

Federal and Private Entities Face These Similar Challenges

Federal and Private Entities Face These Similar Challenges

It can be easy to lose sight of the fact that challenges in cybersecurity faced by the private business community almost mirror those faced at the federal government level. There are different circumstances, of course, but the degree to which these two entities can assist each other in raising cybersecurity awareness is clear.

The Implications of WannaCry Ransomware

The Implications of WannaCry Ransomware

This summer saw a new strain of ransomware that raced through computer networks with alarming speed and ability. It stunned users around the world, and the numbers that have come from this single attack are indeed eye-popping; in one weekend, 200,000 computers were affected across 150 countries with estimates of damages nearing the four billion dollar mark.

The Cost of a Data Breach

The Cost of a Data Breach

Did you know that on average, each individual record impacted in a breach costs an organization $158? The cost of a data breach continues to steadily increase making cyber threat intelligence even more important. Each industry is impacted in different ways.

The Critical Infrastructure Cybersecurity Debate Continues Unabated

The Critical Infrastructure Cybersecurity Debate Continues Unabated

Doomsday scenarios regarding the nation's key pieces of infrastructure have been around since the beginning of the communication age. But what makes those theories and concepts more relevant now, as opposed to the past? Our society has become more technologically integrated and reliant. Entire industries have evolved to the point where a lack of Internet services could cripple the country and cost billions of dollars.

Cyber Threat Sharing Assists Aviation Industry in Combating Cyber Attacks

Cyber Threat Sharing Assists Aviation Industry in Combating Cyber Attacks

Cyber threats in the 21st century are not confined to any one type of business or organization. They are becoming risk mainstays that everyone must account for when determining a business plan or setting guidelines for communication. Modern cyber-attacks can hit big data services or nationwide energy conglomerates, but an industry that has recently become more and more aware of the developing threats is aviation

6 Mobile Cyber Threats That Could Impact Your Organization

6 Mobile Cyber Threats That Could Impact Your Organization

When we think of cyber threats, we often think of large offices filled with computers, or hackers gaining access to massive online systems and websites. But, as threats evolve, it becomes more clear that almost any device connected to the Internet is at risk for some level of attack.

3 Industries With the Most Costly Data Breaches

3 Industries With the Most Costly Data Breaches

Data breaches are going to be costly for any organization hit by one. Sometimes, that cost can be calculated in work hours put toward repairing or retrieving the data, but whatever the method, dollar signs can be attached to any large breach. With cybersecurity awareness growing, and years of cyber-attack data to evaluate, it is becoming more clear which industries stand to lose the most in an attack.

Maintain Awareness of Non Malware Threats

Maintain Awareness of Non Malware Threats

The evolution of cybersecurity threats is ongoing and complex. Maintaining cybersecurity awareness requires constant vigilance, as well as interagency communication at the highest levels.

Top Points from the RSA Conference 2017

Top Points from the RSA Conference 2017

The annual RSA Conference on cybersecurity regularly brings together the best minds in cyber security awareness, and this past February in San Francisco was no different. NC4 was proud to participate. Over the course of the event, some clear themes began to emerge. RSA conferences around the world bring in new ideas and diverse subjects from the 45,000 IT professionals that attend every year. The priorities and concerns of the collective group tend to show through over the course of five days, and many conference sessions.

Make Your Community More Resilient with CTX Soltra Edge

Make Your Community More Resilient with CTX Soltra Edge

Soltra, an industry leader in cyber threat intelligence sharing, with capabilities that range from protecting financial services to transportation and healthcare, has joined the formidable team at NC4 and the Soltra Edge product has been rebranded as CTX/Soltra Edge.

Cyber Threat Intelligence Collaborating with the DHS

Cyber Threat Intelligence Collaborating with the DHS

Through two-way cyber threat intelligence sharing, organizations can collaborate with more than just others in their industry. NC4 CTX/Soltra Edge Solutions allows companies to collaborate with the Department of Homeland Security, other participants of the program, and the system itself.

US Electricity Grid Could Be Facing Imminent Threats

US Electricity Grid Could Be Facing Imminent Threats

Cyber threats to targets that are traditionally exotic, like car interfaces or large electric grids, are becoming a source of concern for those with industry knowledge. As more and more industrial components become network-accessible, and software systems that run many of the nation's larger infrastructure become older and more vulnerable, cyber threat intelligence and reaction capabilities will become more in demand.

Building Cybersecurity Confidence Throughout 2017

Building Cybersecurity Confidence Throughout 2017

Cybersecurity issues grow, not just yearly but daily, as we move into the middle of the twentyfirst century. The Internet of Things (IoT) is growing with more devices connected than ever before. Naturally, the vulnerabilities have increased. Not only are we more connected overall, but the information we have within those connected devices could not be of more importance.

New Cyber Threats Identified in 2017

New Cyber Threats Identified in 2017

A new 2017 Global Cybersecurity Assurance Report Card identifies new threats and changes within the cybersecurity landscape. This infographic from NC4, leaders in cybersecurity awareness, highlights changes to expect in the coming years including various threats and increased spending.

Essential Cybersecurity Considerations for your Business

Essential Cybersecurity Considerations for your Business

Cyber threat intelligence is a broad concept that covers many different disciplines and can be applied to your business in a variety of ways. It goes without saying that each individual organization is going to have a different set of vulnerabilities in their cybersecurity operations. Yet, there are basic fundamental concepts that can be applied to every and any corporation.

Oil and Gas Sector Cybersecurity Areas of Vulnerability

Oil and Gas Sector Cybersecurity Areas of Vulnerability

As we enter 2017, cybersecurity awareness is on the mind of every organization within a myriad of industries and for good reason. With expanding threats and evolving technologies, staying ahead (and aware) of developing situations in the online world is vital for the security and stability of a modern corporation.

Energy Sector Increasingly Vulnerable to Cyber Threats

Energy Sector Increasingly Vulnerable to Cyber Threats

The aspects of our society that are not under the potential for cyber threat are pretty slim. From entertainment to politics to even private accounts, we all have begun to understand the far-reaching impacts of a connected global society where information vulnerability must always be taken seriously. Cybersecurity awareness is no longer a theory to be studied, but a process to be implemented among businesses small and large. But one industry has shown itself to be particularly vulnerable as this new world unfolds: the energy sector. With trillions of dollars relying on it, and our entire way of life revolving around the concept of its consistency, energy is a tempting target for those looking to inspire chaos.

Is your Security Team Overloaded by Cyber Threat Information

Is your Security Team Overloaded by Cyber Threat Information

Security professionals are working hard to manage cyber threat intelligence and mitigate any potential risks, but threat information overload is making their job very difficult.

Conveying the Importance of Cybersecurity to the C Suite

Conveying the Importance of Cybersecurity to the C Suite

Cybersecurity is no longer a matter for niche professionals and a small, specialized portion of your organization; it's a company-wide mandate that extends from the lowest level employee to the C-Suite. Having cybersecurity awareness, and making it a priority within your organization, will only become more critical as the years go by.

Cybersecurity Sharing is Working Says Homeland Security

Cybersecurity Sharing is Working Says Homeland Security

On September 7th, 2016, a panel discussion was held at the Intelligence and National Security Summit highlighting the critical need for cybersecurity awareness. Robert Silvers, assistant secretary for cyber policy at the Department of Homeland Security, revealed some sobering statistics, but also had some positive words for the current state of cybersecurity sharing.

Multi Country Security Collaboration Effort Needed

Multi Country Security Collaboration Effort Needed

As terrorism continues to be an evolving, international issue, collaboration between countries needs to become more streamlined and versatile. Safety and security solutions need to be put in place worldwide. This is a common talking point, but one that was expressed with urgency in a late August panel involving H.W.M. Schoof, National Coordinator for Security and Counterterrorism of the Netherlands.

Ensuring Cybersecurity is Working For Your Staff Not Against it

Ensuring Cybersecurity is Working For Your Staff Not Against it

Cybersecurity awareness can be an intimidating mindset for your staff. The stress of everyday alertness and communication can often turn inward on an organization, creating an atmosphere where the very tenets of cybersecurity backfire. Your IT department is going to be under the most pressure, but internal teams across all departments need to be working in unison in order to create the most secure environment possible.

New Survey Highlights the Effectiveness of Intelligence Sharing in Cybersecurity

New Survey Highlights the Effectiveness of Intelligence Sharing in Cybersecurity

As cybersecurity awareness spreads within the business community, the benefits of sharing information, as well as threat assessments, continue to be established. A new study out of the SANS Institute found some startling statistics that should be a wakeup call for any organization concerned about cybersecurity

Cybersecurity Regulations Issued for Banks in New York State

Cybersecurity Regulations Issued for Banks in New York State

As cyber threats become more common for a variety of industries, it makes sense that regulations and laws may become standard in an effort to safeguard against possible attacks. Industries from power to transportation to communications and beyond are all potential targets whose vulnerabilities would clearly cause issues for the public at large. Banks are another component of our nation's critical infrastructure, that must be safeguarded against cyber threats.

Closing the Cyber Security Perception Gap

Closing the Cyber Security Perception Gap

When it comes to security in a digital world, organizations know a strong defense is vital. However, some companies are not taking full advantage

DDoS Attacks on the Rise in 2016

DDoS Attacks on the Rise in 2016

Distributed denial-of-service, or DDoS, attacks are an insidious form of cyber threat that employ users' own computers against both themselves and others, often without knowledge that an attack is even under way. By using what are essentially bot armies, and with the sophistication of this type of technology being deployed on the rise, DDoS attacks are becoming more difficult to identify and respond to.

Be Fully Prepared for Incident Responses

Be Fully Prepared for Incident Responses

Being fully prepared for an intense cybersecurity situation goes beyond simply having procedures in place. Organizations need a fully aware incident response team that is highly educated, integrated, and light on its feet. A multi-faceted enemy presents itself in the world of cyber threats, one which plays by an ever-changing set of rules.

The Physical Ramifications of Cyber Attacks

The Physical Ramifications of Cyber Attacks

It seems conceptual on the surface, but that perception is quickly losing its usefulness: kinetic cyber-attacks are working their way toward the mainstream and becoming more commonplace.

A Collaborative Strategy Strengthens an Organizations Defenses

A Collaborative Strategy Strengthens an Organizations Defenses

Cyber-attacks can strike any organization which stores valuable information. It is important to maintain vigilance within an organization and to strategize the most effective procedures to protect individual computers, networks, software, and customer and company data from cyber threats.

What to Know About the Cybersecurity Information Sharing Act

What to Know About the Cybersecurity Information Sharing Act

In late 2015, President Obama signed the Cybersecurity Information Sharing Act (CISA) into law. This law is designed to improve cybersecurity within the United States by the sharing of information among agencies as it pertains to cybersecurity threats.

Physical Impact of Cyber Attacks

Physical Impact of Cyber Attacks

NC4, a leader in cyber threat intelligence and solutions, explains the monetary implications of cyber-attacks and the improvements in incident response for those who participate in the sharing of cyber threat intelligence.

Power Grid Simulation by NERC Exposes Cyber Threat Sharing Issues

Power Grid Simulation by NERC Exposes Cyber Threat Sharing Issues

How vulnerable are utility companies to terrorism and cyber-attacks? How would these organizations react to such attacks? How soon would they be able to recover and restore power? And just what exactly is the cybersecurity awareness level in the utilities and energy sector?

Recent Cyber Attacks Refocus Healthcare Organizations on Cybersecurity

Recent Cyber Attacks Refocus Healthcare Organizations on Cybersecurity

A spate of cybersecurity attacks on healthcare organizations have that industry becoming even more vigilant and increasing their cybersecurity awareness against hackers and cyber-attacks. In fact, according to the IBM X-Force Cyber Security Intelligence Index report, the healthcare industry has experienced more cyber-attacks than any other single industry, and more than one million records were compromised in the first half of 2015 alone.

Best Practices for Dealing with Ransomware

Best Practices for Dealing with Ransomware

Ransomware is today's malware-du-jour, and it's as bad as it sounds. With ransomware, your system is incapacitated, typically through a Trojan that encrypts your files or otherwise locks you out until you pay the extortionist's fee. Here, we examine a few cybersecurity awareness best practices to avoid the trap of these cybercriminals.

Left of Boom: Build Defenses Before the Attack

Left of Boom: Build Defenses Before the Attack

Cyber attacks are getting more and more prevalent, and damaging to organizations, as many of them have physical consequences. What is an organization to do? Well, like the old basketball adage says, the best offense is a strong defense. To stay at the forefront of cyber security, here are the top ways to prevent a data compromise:

Cyber Threat Intelligence 5 Things to Know About the New Cybersecurity Act

Cyber Threat Intelligence 5 Things to Know About the New Cybersecurity Act

The Cybersecurity Information Sharing Act (CISA) of 2015, signed into law this past December, has far-reaching implications for cyber threat intelligence sharing, real-time reporting, privacy, liability, and other areas of importance to your business. Here, we lay out five key things to know about the new cybersecurity act.

Are the right cybersecurity resources in place on the federal level

Are the right cybersecurity resources in place on the federal level

Effective cybersecurity efforts rely on a wide range of moving parts coming together and working in concert. Businesses and government agencies must take the initiative and implement security systems and protocols that protect their digital assets and defend against unwanted intrusions.

Is cybersecurity s most glaring issue a lack of talent

In a field dedicated to preventing hackers from breaching defenses and keeping digital assets safe, it's not surprising there are a lot of risks that need to be managed. However, the biggest challenge facing the cybersecurity industry as a whole isn't a specific virus, black hat hacker group or new form of DDoS attack, but a lack of qualified professionals in the field.

IBM Chief Calls Cybercrime the Most Important Worldwide Business Concern

While there's no denying the importance of cybersecurity in the business world, certain words and actions can strongly reinforce the need for organizations of all types to take their digital assets seriously. One such statement was recently made by Ginni Rometty, CEO, chairman and president of IBM.

How effective will a cybersecurity peace treaty be

In theory, a cybersecurity treaty sounds like a major benefit for businesses in all of the signatory countries. While such a pact won't prevent attacks from criminal elements or non-participants, it would significantly reduce the amount of corporate and government espionage currently encountered.

Lack of young people to fill cybersecurity positions could create bottleneck

Cybersecurity is a major consideration for a wide variety of businesses and government agencies and departments. Organizations should focus on many aspects of protecting their digital assets and networks to truly address the issue in a comprehensive fashion.

National Cybersecurity Awareness Month a time for review future planning

National Cybersecurity Awareness Month, observed in October, is a straightforward concept: The event encourages businesses, government agencies and other organizations to pay more attention to cyberdefense and intelligence-gathering efforts.

Why employees at all levels of a business must care about cybersecurity

The expansion of cybersecurity awareness - from its initial, limited perception as a technology issue in the realm of IT to the current understanding of its importance across all areas of a company, - is impressive. This increase in knowledge among many organizations has led to more effective systems to protect valuable assets and a better understanding of how threats develop and evolve.

Setting up Defense Against Inevitable Cyberattacks

The world of hackers and cybercrime is growing by the day. This news shouldn't be a source of panic for businesses - but it should drive company leaders to consider their current cybersecurity strategies and improve and expand them as necessary. Efforts to protect a company's data stores must recognize this security concern and take an appropriate approach in response.

Cybersecurity Literacy a Growing Desire for Businesses

Cybersecurity is a major concern for private companies and public organizations, from small businesses and city halls to international enterprises and agencies of the federal government. One method of improving cybersecurity that's gaining popularity among some businesses aims to increase awareness of such attacks at the highest levels of an organization.

Senate Tries to Act on Cybersecurity Bill Before Summer Recess

Despite a growing level of recognition from the White House, the business world and the general public, cybersecurity efforts on the part of the federal legislative branch have been inconsistent. While many individual senators have expressed support for efforts to better protect businesses, government agencies and the individuals who interact with them from the harm of data theft and related attacks, action on such issues is lacking.

Congress Offers Mixed Message on Cybersecurity Bill

There's no doubt cybersecurity is a hot topic in both the public and private sectors. Beyond its presence as a trending point of conversation, effective cybersecurity measures are also critical to the successful continued operation of many businesses and government agencies and organizations.

Cyberattacks Targeting Middle Eastern Countries Attributed to Iran

In mid-June, it was reported that Iran had been responsible for a series of cyber attacks that targeted Israel, Saudi Arabia and Yemen.

New Findings Reveal Almost 600 iCloud Accounts Hacked in Celebgate

During the summer of 2014, the Internet and social media were abuzz when personal photos of some of the Hollywood's most well-known stars were stolen through a cyberattack. After reviewing a search warrant affidavit that was recently unsealed in the U.S. District Court in Chicago, it was found that 572 Apple iCloud accounts were accessed 3,263 times from the IP address of Emilio Herrera, a resident of Chicago.

Spyware Found at Iran Nuclear Talks Locations

A Russian cybersecurity firm told The Washington Post that sophisticated spyware had infected computers at luxury hotels used for Israel's nuclear negotiations with Iran, according to The Washington Post.

Has the White House's cybersecurity Plan Been Effective

Following a series of high-profile cyberattacks on large U.S. businesses in 2013, President Barack Obama released an official plan for addressing and improving digital security in the country. The New York Times noted that it had raised public and private interest in the vulnerabilities of servers when it was hacked in 2013.

What Issues are Rising in the Cybersecurity Space

From an outside perspective, cybersecurity is an especially interesting field because of how fluid the concept has been in recent years. New ground is broken on a regular basis as recently developed technologies are introduced and used. The results can appear as a race between cybercriminals and the IT and security professionals to find the latest edge.

House Passes Cybersecurity Bill but Will it be Effective

A major step in the life of the proposed cybersecurity bill came during the end of April, as the U.S. House of Representatives passed the Protecting Cyber Networks Act and the National Cybersecurity Protection Advancement Act. The vote isn't the final step in the bills becoming law, but it represents a halfway point of sorts.

Businesses Expect Cybersecurity Risks to Grow in 2015

A recent survey of companies with cybersecurity needs found a high level of consensus among decision-makers that more cyberattacks are expected in 2015 as compared to the past year. The poll involved 649 IT and cybersecurity professionals and is called "The State of Cybersecurity: Implications for 2015."

Cybersecurity Still a Work in Progress for Many Organizations

The topic of cybersecurity has seen renewed attention in recent months. The private sector has seen breaches in the health care space and there has been plenty of focus on the issue by the U.S. government. The cybersecurity bill has been fast-tracked to an extent through Congress, with a vote expected sooner than later in the current legislative session.

A Better Way of Safety and Security

A Better Way of Safety and Security

​George Johnson, NC4 Chief Security Officer, was recently interviewed by Federal News Radio on the subject of sharing information in a secure environment.

White House Cyberattacks Officially a National Emergency

It's not news to the majority of companies storing and transmitting sensitive information online that cyber defense is a major concern both on the level of individual operations and for the economy as a whole. Recent attention paid by both business leaders and the federal government to malicious hackers has raised the issue's profile in the public sphere, as have the many attacks on consumer-facing businesses.

What Kinds of Cyberattacks are the Most Common

Due to the varied nature of computing and Internet uses, hacking, cyberthreats and other malicious attacks cover a wide swath of virtual territory. There are differences in the code used to gain entry, the programming tactics used to access valuable information, the intent of the hackers and the data they're targeting.

Lack of Perspective Leaving Some Companies Vulnerable to Cyber Threats

A recent spate of high-profile attacks on some of the largest national and international businesses have damaged brand value, hurt revenue and somewhat sullied the names of those companies. With cybersecurity threats on the rise and becoming more advanced every day, why does it seem that some organizations are ignoring the potential threats?

Massive winter storm may disrupt travel across US during Christmas week

A major winter storm will likely impact an especially busy travel season across the U.S. as weather predictions for the week of Christmas indicate a severe storm that will traverse much of the country. The two-week period at the end of each year is important for both personal and corporate travel, so the disturbances caused by delays, cancelations and other travel issues are exacerbated due to the sheer amount of people traveling.

Massive storm on course for northern California

After dealing with a severe, extended drought across much of the state that had economic and societal impacts, California is starting to see precipitation in its forecasts again. The issue now facing residents in parts of the state, such as the San Francisco Bay Area, is the potential for major storms that could disrupt business operations and hobble infrastructure in the region during the week of December 8.

Latest Blog Posts


Blog Categories

Contact Us

Which of our solutions are you interested in?*