How to Write an Incident Response Plan for Ransomware Recovery

“It does not do to leave a live dragon out of your calculations, if you live near one.” – J.R.R. Tolkien In 2022, ransomware is the live dragon for many companies working to develop incident response plans. According to Fortinet’s Global Threat Landscape Report, the first half of 2021 saw a 10.7x increase in the…

Read More

Different Types of Ransomware Attacks

Crypto Ransomware The first ransomware attack, known as the AIDS Trojan, hit the healthcare industry in 1989, but it’s only been in the last decade that strains such as CryptoLocker, Petya, NotPetya, WannaCry, TeslaCrypt, and Locky have pushed ransomware to the forefront of cybersecurity discussions. These strains have variations in the way they deploy, but…

Read More

Member Spotlight: Mike Fair

This month’s Member Spotlight is Mike Fair, associate vice president of cybersecurity at Victoria’s Secret. Like many others in the cybersecurity field, tech was not his original career path. He briefly considered political science before settling on public relations for his undergraduate degree. Mike first began his career at Target in their IT department. After…

Read More

Hiring in Cybersecurity

According to RH-ISAC’s 2021 CISO Benchmark Report, 67% of retail and hospitality organizations expect their full-time employee count to be higher in 2022 than in 2021. Similarly, 70% expect their budget in 2022 to be higher than the previous year. This is good news for cybersecurity professionals racing to secure the digital-first world, but will…

Read More

How To Recover from a Ransomware Attack

In a perfect world, all of the defenses you’ve put in place will successfully defend against a ransomware attack. Your employees won’t click on any malicious links, none of your credentials will be brute-forced, your RDP ports are secure, and you’ve implemented a zero-trust framework across your network. It is true that taking measures to…

Read More