Posted on Apr 24, 2018
Without the correct security solution in place, a disastrous cyber attack like Atlanta’s ransomware nightmare could happen to any organization, any city.
Posted on Apr 24, 2018
Without the correct security solution in place, a disastrous cyber attack like Atlanta’s ransomware nightmare could happen to any organization, any city.
Posted on Apr 05, 2018
Beyond what the DOE can do to safeguard and improve the protections to our energy supply, corporations must become more proactive by securing their systems with thorough and coordinated cyber threat intelligence.
Posted on Feb 13, 2018
The growth of ransomware has caused industry leaders to take a deeper look into how their organization is preparing and actively preventing these damaging attacks. To learn more about the costs of a ransomware attack and the importance of cyber awareness training, check out our infographic.
Posted on Jan 23, 2018
When it comes to your organization, few words or concepts are more important than culture. By instilling cyber awareness values within your organization, which include an emphasis on understanding risk and knowing proper protocols, you can have more confidence in your capabilities when facing threats.
Posted on Jan 09, 2018
Because of increased cybersecurity awareness, we understand that cyber attacks are on the rise, but do we truly understand who is behind them? This infographic explores who is behind the attacks and which industries are taking the brunt of it.
Posted on Dec 18, 2017
Every organization has different cybersecurity needs and vulnerabilities. Threats have evolved to the point where even niche industries and companies can be targeted, and online criminals have an ever expanding target to take aim at. Every organization has the responsibility to be cybersecurity aware, which includes finding the right protections for your business systems and understanding how to implement these protections.
Posted on Dec 17, 2017
A hostage situation in Australia's most populous city went on for the better part of a day during the middle of December, as an armed aggressor held a small group of patrons captive for more than 16 hours in a downtown Sydney cafe. The incident is one of the more serious occurrences that has happened in the country as Australia faces a growing violent sentiment from fundamentalist fringe groups.
Posted on Dec 11, 2017
Education is one of the key hallmarks to an IT workforce that successfully practices cybersecurity awareness. The deeper the knowledge base within an organization, the more secure it is apt to be. Some recent reports are suggesting that there are ways to improve the way we educate those joining the cybersecurity workforce.
Posted on Dec 05, 2017
The National Telecommunications & Information Administration (NTIA) is considered to be one of our government's finest resources for technical and administrative guidance on all things online. A wide-ranging cybersecurity awareness draft was released this past September which focused on DDoS attacks, botnets, and general cyber threats.
Posted on Nov 27, 2017
While Cyber Monday jumpstarts the economy, it also kicks cybercrime into high gear. Hackers are more than aware of consumers' vulnerabilities to coupons, sales, and holiday e-cards, and such vulnerabilities are easily exploited if safety precautions are not taken. Cybersecurity is more important on Cyber Monday than any other time of the year— stay cyber aware with these tips!
Posted on Nov 13, 2017
Over the past decade plus, global corporations have come to fully recognize the threat of cyber-attacks. This recognition has affected not only how businesses operate, but where they target resources and spend capital. To put it simply, it's now past the point of simple e-mail monitors and anti-virus software.
Posted on Oct 23, 2017
According to a cyber threat intelligence report, there were 791 documented security breaches in the first half of 2017. There's no surprise that with advanced technology and highly skilled hackers, the need for cybersecurity defense and protection is at an all-time high. Let's take a look at the five biggest security breaches in history to get a better idea of what could be on the horizon for future breaches.
Posted on Oct 12, 2017
Cybersecurity awareness, threat intelligence, and technological capabilities are all key aspects of secure network defense. This extends from multi-national companies to government-level defense. To some, those are the three core ingredients. Although there is another aspect, and without it, most cybersecurity is rendered pointless: communication and coordination.
Posted on Oct 02, 2017
It doesn't take much imagination to get a good idea of why the financial industry is frequently targeted by cyber-attacks. With so much currency in the system, and with so much personal information at play, it makes for an inviting target. For the financial industry to stay current with evolving dangers, it's critical that corporations partake in the sharing and use of cyber threat intelligence. This can mean everything from communications to cyber defense.
Posted on Sep 27, 2017
In late July 2017, cybersecurity experts met in Las Vegas at the annual DEF CON computer security conference. Computer hackers demonstrated the ability to hack into U.S. voting systems - and it took less than two hours. This disturbing development comes as the U.S. authorities are investigating efforts by the Russian Government to interfere in the 2016 Presidential election. The Russians conducted a multi-faceted intelligence operation that used a combination of traditional propaganda and influence tactics as well as a series of cyber-attacks, seeking to obtain and exploit sensitive data.
Posted on Sep 22, 2017
To put it simply, cybersecurity can be a difficult task. From keeping up with the latest developments in the constantly evolving world of cyber-threats, to the day-to-day chore of general defense, it proves to be an all-consuming project. This proves to be particularly true for smaller businesses. Beyond complexity and time constraints, world-class cybersecurity also costs money.
Posted on Sep 13, 2017
In the public arena, breaking news of a cyber-attack to a corporation is usually limited to headlines. But the true aftermath of a wide-ranging cyber intrusion can be deep and severe. Data breaches carry their own set of obvious problems (lost customer information, lower consumer confidence, etc.), but they also leave long-term damage that is often not understood until much later.
Posted on Aug 15, 2017
It can be easy to lose sight of the fact that challenges in cybersecurity faced by the private business community almost mirror those faced at the federal government level. There are different circumstances, of course, but the degree to which these two entities can assist each other in raising cybersecurity awareness is clear.
Posted on Jul 18, 2017
This summer saw a new strain of ransomware that raced through computer networks with alarming speed and ability. It stunned users around the world, and the numbers that have come from this single attack are indeed eye-popping; in one weekend, 200,000 computers were affected across 150 countries with estimates of damages nearing the four billion dollar mark.
Posted on Jul 07, 2017
Did you know that on average, each individual record impacted in a breach costs an organization $158? The cost of a data breach continues to steadily increase making cyber threat intelligence even more important. Each industry is impacted in different ways.
Posted on Jun 30, 2017
Doomsday scenarios regarding the nation's key pieces of infrastructure have been around since the beginning of the communication age. But what makes those theories and concepts more relevant now, as opposed to the past? Our society has become more technologically integrated and reliant. Entire industries have evolved to the point where a lack of Internet services could cripple the country and cost billions of dollars.
Posted on Jun 20, 2017
Cyber threats in the 21st century are not confined to any one type of business or organization. They are becoming risk mainstays that everyone must account for when determining a business plan or setting guidelines for communication. Modern cyber-attacks can hit big data services or nationwide energy conglomerates, but an industry that has recently become more and more aware of the developing threats is aviation
Posted on May 31, 2017
When we think of cyber threats, we often think of large offices filled with computers, or hackers gaining access to massive online systems and websites. But, as threats evolve, it becomes more clear that almost any device connected to the Internet is at risk for some level of attack.
Posted on May 16, 2017
Data breaches are going to be costly for any organization hit by one. Sometimes, that cost can be calculated in work hours put toward repairing or retrieving the data, but whatever the method, dollar signs can be attached to any large breach. With cybersecurity awareness growing, and years of cyber-attack data to evaluate, it is becoming more clear which industries stand to lose the most in an attack.
Posted on Apr 25, 2017
The evolution of cybersecurity threats is ongoing and complex. Maintaining cybersecurity awareness requires constant vigilance, as well as interagency communication at the highest levels.
Posted on Apr 21, 2017
The annual RSA Conference on cybersecurity regularly brings together the best minds in cyber security awareness, and this past February in San Francisco was no different. NC4 was proud to participate. Over the course of the event, some clear themes began to emerge. RSA conferences around the world bring in new ideas and diverse subjects from the 45,000 IT professionals that attend every year. The priorities and concerns of the collective group tend to show through over the course of five days, and many conference sessions.
Posted on Apr 10, 2017
Soltra, an industry leader in cyber threat intelligence sharing, with capabilities that range from protecting financial services to transportation and healthcare, has joined the formidable team at NC4 and the Soltra Edge product has been rebranded as CTX/Soltra Edge.
Posted on Mar 30, 2017
Through two-way cyber threat intelligence sharing, organizations can collaborate with more than just others in their industry. NC4 CTX/Soltra Edge Solutions allows companies to collaborate with the Department of Homeland Security, other participants of the program, and the system itself.
Posted on Mar 23, 2017
Cyber threats to targets that are traditionally exotic, like car interfaces or large electric grids, are becoming a source of concern for those with industry knowledge. As more and more industrial components become network-accessible, and software systems that run many of the nation's larger infrastructure become older and more vulnerable, cyber threat intelligence and reaction capabilities will become more in demand.
Posted on Feb 23, 2017
Cybersecurity issues grow, not just yearly but daily, as we move into the middle of the twentyfirst century. The Internet of Things (IoT) is growing with more devices connected than ever before. Naturally, the vulnerabilities have increased. Not only are we more connected overall, but the information we have within those connected devices could not be of more importance.
Posted on Feb 13, 2017
A new 2017 Global Cybersecurity Assurance Report Card identifies new threats and changes within the cybersecurity landscape. This infographic from NC4, leaders in cybersecurity awareness, highlights changes to expect in the coming years including various threats and increased spending.
Posted on Feb 09, 2017
Cyber threat intelligence is a broad concept that covers many different disciplines and can be applied to your business in a variety of ways. It goes without saying that each individual organization is going to have a different set of vulnerabilities in their cybersecurity operations. Yet, there are basic fundamental concepts that can be applied to every and any corporation.
Posted on Jan 24, 2017
As we enter 2017, cybersecurity awareness is on the mind of every organization within a myriad of industries and for good reason. With expanding threats and evolving technologies, staying ahead (and aware) of developing situations in the online world is vital for the security and stability of a modern corporation.
Posted on Jan 17, 2017
The aspects of our society that are not under the potential for cyber threat are pretty slim. From entertainment to politics to even private accounts, we all have begun to understand the far-reaching impacts of a connected global society where information vulnerability must always be taken seriously. Cybersecurity awareness is no longer a theory to be studied, but a process to be implemented among businesses small and large. But one industry has shown itself to be particularly vulnerable as this new world unfolds: the energy sector. With trillions of dollars relying on it, and our entire way of life revolving around the concept of its consistency, energy is a tempting target for those looking to inspire chaos.
Posted on Jan 13, 2017
Security professionals are working hard to manage cyber threat intelligence and mitigate any potential risks, but threat information overload is making their job very difficult.
Posted on Dec 27, 2016
Cybersecurity is no longer a matter for niche professionals and a small, specialized portion of your organization; it's a company-wide mandate that extends from the lowest level employee to the C-Suite. Having cybersecurity awareness, and making it a priority within your organization, will only become more critical as the years go by.
Posted on Nov 21, 2016
On September 7th, 2016, a panel discussion was held at the Intelligence and National Security Summit highlighting the critical need for cybersecurity awareness. Robert Silvers, assistant secretary for cyber policy at the Department of Homeland Security, revealed some sobering statistics, but also had some positive words for the current state of cybersecurity sharing.
Posted on Nov 08, 2016
As terrorism continues to be an evolving, international issue, collaboration between countries needs to become more streamlined and versatile. Safety and security solutions need to be put in place worldwide. This is a common talking point, but one that was expressed with urgency in a late August panel involving H.W.M. Schoof, National Coordinator for Security and Counterterrorism of the Netherlands.
Posted on Oct 25, 2016
Cybersecurity awareness can be an intimidating mindset for your staff. The stress of everyday alertness and communication can often turn inward on an organization, creating an atmosphere where the very tenets of cybersecurity backfire. Your IT department is going to be under the most pressure, but internal teams across all departments need to be working in unison in order to create the most secure environment possible.
Posted on Oct 21, 2016
As cybersecurity awareness spreads within the business community, the benefits of sharing information, as well as threat assessments, continue to be established. A new study out of the SANS Institute found some startling statistics that should be a wakeup call for any organization concerned about cybersecurity
Posted on Oct 04, 2016
As cyber threats become more common for a variety of industries, it makes sense that regulations and laws may become standard in an effort to safeguard against possible attacks. Industries from power to transportation to communications and beyond are all potential targets whose vulnerabilities would clearly cause issues for the public at large. Banks are another component of our nation's critical infrastructure, that must be safeguarded against cyber threats.
Posted on Sep 26, 2016
When it comes to security in a digital world, organizations know a strong defense is vital. However, some companies are not taking full advantage
Posted on Sep 19, 2016
Distributed denial-of-service, or DDoS, attacks are an insidious form of cyber threat that employ users' own computers against both themselves and others, often without knowledge that an attack is even under way. By using what are essentially bot armies, and with the sophistication of this type of technology being deployed on the rise, DDoS attacks are becoming more difficult to identify and respond to.
Posted on Aug 30, 2016
Being fully prepared for an intense cybersecurity situation goes beyond simply having procedures in place. Organizations need a fully aware incident response team that is highly educated, integrated, and light on its feet. A multi-faceted enemy presents itself in the world of cyber threats, one which plays by an ever-changing set of rules.
Posted on Aug 10, 2016
It seems conceptual on the surface, but that perception is quickly losing its usefulness: kinetic cyber-attacks are working their way toward the mainstream and becoming more commonplace.
Posted on Jul 29, 2016
Cyber-attacks can strike any organization which stores valuable information. It is important to maintain vigilance within an organization and to strategize the most effective procedures to protect individual computers, networks, software, and customer and company data from cyber threats.
Posted on Jul 11, 2016
In late 2015, President Obama signed the Cybersecurity Information Sharing Act (CISA) into law. This law is designed to improve cybersecurity within the United States by the sharing of information among agencies as it pertains to cybersecurity threats.
Posted on Jun 13, 2016
NC4, a leader in cyber threat intelligence and solutions, explains the monetary implications of cyber-attacks and the improvements in incident response for those who participate in the sharing of cyber threat intelligence.
Posted on May 23, 2016
How vulnerable are utility companies to terrorism and cyber-attacks? How would these organizations react to such attacks? How soon would they be able to recover and restore power? And just what exactly is the cybersecurity awareness level in the utilities and energy sector?
Posted on May 09, 2016
A spate of cybersecurity attacks on healthcare organizations have that industry becoming even more vigilant and increasing their cybersecurity awareness against hackers and cyber-attacks. In fact, according to the IBM X-Force Cyber Security Intelligence Index report, the healthcare industry has experienced more cyber-attacks than any other single industry, and more than one million records were compromised in the first half of 2015 alone.
Posted on Apr 19, 2016
Ransomware is today's malware-du-jour, and it's as bad as it sounds. With ransomware, your system is incapacitated, typically through a Trojan that encrypts your files or otherwise locks you out until you pay the extortionist's fee. Here, we examine a few cybersecurity awareness best practices to avoid the trap of these cybercriminals.
Posted on Apr 08, 2016
Cyber attacks are getting more and more prevalent, and damaging to organizations, as many of them have physical consequences. What is an organization to do? Well, like the old basketball adage says, the best offense is a strong defense. To stay at the forefront of cyber security, here are the top ways to prevent a data compromise:
Posted on Mar 07, 2016
The Cybersecurity Information Sharing Act (CISA) of 2015, signed into law this past December, has far-reaching implications for cyber threat intelligence sharing, real-time reporting, privacy, liability, and other areas of importance to your business. Here, we lay out five key things to know about the new cybersecurity act.
Posted on Jan 18, 2016
Effective cybersecurity efforts rely on a wide range of moving parts coming together and working in concert. Businesses and government agencies must take the initiative and implement security systems and protocols that protect their digital assets and defend against unwanted intrusions.
Posted on Dec 14, 2015
In a field dedicated to preventing hackers from breaching defenses and keeping digital assets safe, it's not surprising there are a lot of risks that need to be managed. However, the biggest challenge facing the cybersecurity industry as a whole isn't a specific virus, black hat hacker group or new form of DDoS attack, but a lack of qualified professionals in the field.
Posted on Dec 03, 2015
While there's no denying the importance of cybersecurity in the business world, certain words and actions can strongly reinforce the need for organizations of all types to take their digital assets seriously. One such statement was recently made by Ginni Rometty, CEO, chairman and president of IBM.
Posted on Nov 16, 2015
In theory, a cybersecurity treaty sounds like a major benefit for businesses in all of the signatory countries. While such a pact won't prevent attacks from criminal elements or non-participants, it would significantly reduce the amount of corporate and government espionage currently encountered.
Posted on Oct 29, 2015
Cybersecurity is a major consideration for a wide variety of businesses and government agencies and departments. Organizations should focus on many aspects of protecting their digital assets and networks to truly address the issue in a comprehensive fashion.
Posted on Oct 14, 2015
National Cybersecurity Awareness Month, observed in October, is a straightforward concept: The event encourages businesses, government agencies and other organizations to pay more attention to cyberdefense and intelligence-gathering efforts.
Posted on Sep 25, 2015
The expansion of cybersecurity awareness - from its initial, limited perception as a technology issue in the realm of IT to the current understanding of its importance across all areas of a company, - is impressive. This increase in knowledge among many organizations has led to more effective systems to protect valuable assets and a better understanding of how threats develop and evolve.
Posted on Aug 27, 2015
The world of hackers and cybercrime is growing by the day. This news shouldn't be a source of panic for businesses - but it should drive company leaders to consider their current cybersecurity strategies and improve and expand them as necessary. Efforts to protect a company's data stores must recognize this security concern and take an appropriate approach in response.
Posted on Aug 24, 2015
Cybersecurity is a major concern for private companies and public organizations, from small businesses and city halls to international enterprises and agencies of the federal government. One method of improving cybersecurity that's gaining popularity among some businesses aims to increase awareness of such attacks at the highest levels of an organization.
Posted on Aug 07, 2015
Despite a growing level of recognition from the White House, the business world and the general public, cybersecurity efforts on the part of the federal legislative branch have been inconsistent. While many individual senators have expressed support for efforts to better protect businesses, government agencies and the individuals who interact with them from the harm of data theft and related attacks, action on such issues is lacking.
Posted on Jul 10, 2015
There's no doubt cybersecurity is a hot topic in both the public and private sectors. Beyond its presence as a trending point of conversation, effective cybersecurity measures are also critical to the successful continued operation of many businesses and government agencies and organizations.
Posted on Jun 26, 2015
In mid-June, it was reported that Iran had been responsible for a series of cyber attacks that targeted Israel, Saudi Arabia and Yemen.
Posted on Jun 19, 2015
During the summer of 2014, the Internet and social media were abuzz when personal photos of some of the Hollywood's most well-known stars were stolen through a cyberattack. After reviewing a search warrant affidavit that was recently unsealed in the U.S. District Court in Chicago, it was found that 572 Apple iCloud accounts were accessed 3,263 times from the IP address of Emilio Herrera, a resident of Chicago.
Posted on Jun 15, 2015
A Russian cybersecurity firm told The Washington Post that sophisticated spyware had infected computers at luxury hotels used for Israel's nuclear negotiations with Iran, according to The Washington Post.
Posted on May 20, 2015
Following a series of high-profile cyberattacks on large U.S. businesses in 2013, President Barack Obama released an official plan for addressing and improving digital security in the country. The New York Times noted that it had raised public and private interest in the vulnerabilities of servers when it was hacked in 2013.
Posted on May 08, 2015
From an outside perspective, cybersecurity is an especially interesting field because of how fluid the concept has been in recent years. New ground is broken on a regular basis as recently developed technologies are introduced and used. The results can appear as a race between cybercriminals and the IT and security professionals to find the latest edge.
Posted on May 01, 2015
A major step in the life of the proposed cybersecurity bill came during the end of April, as the U.S. House of Representatives passed the Protecting Cyber Networks Act and the National Cybersecurity Protection Advancement Act. The vote isn't the final step in the bills becoming law, but it represents a halfway point of sorts.
Posted on Apr 21, 2015
A recent survey of companies with cybersecurity needs found a high level of consensus among decision-makers that more cyberattacks are expected in 2015 as compared to the past year. The poll involved 649 IT and cybersecurity professionals and is called "The State of Cybersecurity: Implications for 2015."
Posted on Apr 14, 2015
The topic of cybersecurity has seen renewed attention in recent months. The private sector has seen breaches in the health care space and there has been plenty of focus on the issue by the U.S. government. The cybersecurity bill has been fast-tracked to an extent through Congress, with a vote expected sooner than later in the current legislative session.
Posted on Apr 14, 2015
George Johnson, NC4 Chief Security Officer, was recently interviewed by Federal News Radio on the subject of sharing information in a secure environment.
Posted on Apr 03, 2015
It's not news to the majority of companies storing and transmitting sensitive information online that cyber defense is a major concern both on the level of individual operations and for the economy as a whole. Recent attention paid by both business leaders and the federal government to malicious hackers has raised the issue's profile in the public sphere, as have the many attacks on consumer-facing businesses.
Posted on Apr 03, 2015
Due to the varied nature of computing and Internet uses, hacking, cyberthreats and other malicious attacks cover a wide swath of virtual territory. There are differences in the code used to gain entry, the programming tactics used to access valuable information, the intent of the hackers and the data they're targeting.
Posted on Mar 16, 2015
A recent spate of high-profile attacks on some of the largest national and international businesses have damaged brand value, hurt revenue and somewhat sullied the names of those companies. With cybersecurity threats on the rise and becoming more advanced every day, why does it seem that some organizations are ignoring the potential threats?
Posted on Dec 24, 2014
A major winter storm will likely impact an especially busy travel season across the U.S. as weather predictions for the week of Christmas indicate a severe storm that will traverse much of the country. The two-week period at the end of each year is important for both personal and corporate travel, so the disturbances caused by delays, cancelations and other travel issues are exacerbated due to the sheer amount of people traveling.
Posted on Dec 11, 2014
After dealing with a severe, extended drought across much of the state that had economic and societal impacts, California is starting to see precipitation in its forecasts again. The issue now facing residents in parts of the state, such as the San Francisco Bay Area, is the potential for major storms that could disrupt business operations and hobble infrastructure in the region during the week of December 8.
Thanks for contacting NC4! A member of our team will be in touch with you shortly.