Request a cybersecurity demo from DefenseStorm


Covering all things cybersecurity

Quarterly Threat Report Q2 2017


The second quarter of 2017 saw of the most severe cases of ransomware to date – WannaCry and NotPetya – surpassing the gravity of most other security news in that timeframe.  Ransomware continues as a leading cyberattack vector and cybersecurity experts tend to agree that these attacks will continue to evolve, increasing in number of affected hosts and total cost to the global economy.  Both of these attacks were possible due to EternalBlue, an exploit generally believed to be developed by the U.S. National Security Agency (NSA) and leaked by the Shadow Brokers hacker group as part of the global WannaCry ransomware attack in May.  EternalBlue exploits a vulnerability in the Server Message Block (SMB) protocol which is most commonly found in Microsoft Windows.  NotPetya, released in June, also utilizes the same EternalBlue SMB exploit previously used by WannaCry, as well as the leaked EternalRomance SMB exploit from the NSA. 
Read more

staying secure when shopping online


According to the U.S. Census Bureau, the percentage of online shopping has increased from 7.6% in 2016, to 8.5% of all retail sales. Despite the security risks associated with shopping online, the amount of online shoppers continues to steadily increase. Just about everybody has bought something onl...
Read more

My email was hacked, what can I do?


What should you do when you find that your personal email was hacked? With so many services allowing you to reset your password by receiving email, if an attacker gains access to your email account, they may also be able to access every account which uses that email address to log in. If you recei...
Read more

Vulnerability scanning and penetration testing
Senior Management on Cybersecurity


Only 1 of 3 of respondents say their board is involved in the review of security and privacy risks. This is not just a cybersecurity problem, it is a board problem; affecting all aspects of the business, starting at the top. A recent survey of 276 directors and officers at publicly traded companies,...
Read more

common cyber attacks


Cyber attacks come in all shapes and sizes; which is one of the reasons they are difficult to identify. They have different goals which result in various outcomes. Some cyber attacks focus solely on the release of confidential information to the public, financial gains, or espionage. Each of these o...
Read more

Protect you Network


Sometimes keeping up with cybersecurity can feel like trying to herd cats - virtually impossible. It is true that cybersecurity is constantly adapting and becoming smarter, but there are still ways to greatly reduce your risk. While the specifics may change with cybersecurity trends, the topics rema...
Read more

New York Compliance Regulations


Considering last week's cyber breaches around the world, vigilance is of the utmost importance... how smart is the New York Department of Financial Services (NY DFS) to mandate 23 NYCRR-500? Any breach and loss of data/funds in a US bank is not good for the industry and customer confidence.... any c...
Read more

Guardian provides co-manged cybersecurity operations


Using the DefenseStorm platform, Guardian provides 24/7 monitoring of your entire network, triages alerts, resolves incidents and shares recommendations for improving security and policy compliance....
Read more


Request Your Complimentary Assessment
Grab our latest eBook - Security Data Platform Webinar on October 12th - Space is limited!