Posts about

Cyber Security

Phishing & Smishing Campaigns: Steps to Protect Your Personal Info

Phishing and Smishing campaigns are becoming more advanced with the introduction of AI language models such as ChatGPT. This allows an attacker to create a more fluid and less suspicious emails that are harder to identify.

Protecting Cyber Security Assets

There are 5 main core functions of the NIST Cybersecurity Framework: Identify, Protect, Detect, Respond and Recover. Let’s focus on the importance of the core function of Protection.

What does the ransomeware attack on Colonial pipeline mean for the future of critical infastructure protection?

On May 7th, Colonial Pipeline was forced to shut down operations as a result of a ransomware attack. The shutdown lasted until May 12th and the effects of the shutdown were felt long after. Colonial Pipeline supplies 2.5 million barrels of fuel daily to the southeastern US....

Cyber Security Bulletin:  Kaseya Attack Recommendations

The Kaseya attack was a zero-day exploit attack that took down the servers that are used to provide VSA SaaS (Virtual System/Server Administrator Software as a Service). The VSA SaaS software then infected and locked down the computers running the software. This attack...