Increase Security Awareness to Prevent Ransomware Attacks

Despite automation, machine learning, and all the rest of the state-of-the-art detection technology at our fingertips, attackers still slip through the cracks. You can utilize tools such as website application firewalls and endpoint discovery and response solutions, but one of the most important ways to reduce your risk of being the victim of a ransomware…

Read More

Member Spotlight: Diane Brown

This month’s Member Spotlight is someone who is no stranger to our RH-ISAC community. She is a member of the RH-ISAC Board of Directors and a frequent contributor to CISO discussions and events. Today we’re highlighting Diane Brown, vice president of IT risk management and CISO at Ulta Beauty. Diane started her cybersecurity career in…

Read More

How Ransomware-as-a-Service is Used in Ransomware Attacks

With average ransom demands now in the millions, ransomware attacks are a lucrative business. It’s no wonder then that more people are trying to get a piece of the profit, and it’s becoming easier than ever to do it with the rise of ransomware-as-a-service. Just like software-as-a-service businesses provide easy access to software, ransomware-as-a-service businesses…

Read More

Top Cyberthreats for Hotels

As travel restrictions ease in 2022, hotel InfoSec departments are preparing for an influx of customers as well as an increase in cyber attacks. Hotels secure a large amount of sensitive customer data and have a broad attack surface, so they are common targets for threat actors. Here are five of the top cyber threats…

Read More

Remote Desktop Protocol Use in Ransomware Attacks

According to the 2020 Unit 42 Incident Response and Data Breach Report, remote desktop protocol (RDP) services were the initial attack vector in 50% of ransomware deployment cases. RDP services have been a popular attack vector for years, particularly for use on small enterprises where phishing emails may not be as successful. However, the COVID-19…

Read More