Be Structured Blog Images 0003 Layer 6

Incident Response Plan-Part 5

The Components of An Incident Response Plan

It is at this point that crafting the actual Incident Communications plan becomes crucial.  It is important to note that each plan will be very unique to a business or a corporation, therefore the exact requirements that needs to go into such a plan will vary.

Read More ...
Header Authentication

Incident Response Plan – Part 3

The Benefits and the Needs for Fast Time to Detect and Time to Respond Periods

When an organization is hit by a Cyber-attack, the IT Staff obviously needs to respond as quickly possible to the incident. 

Read More ...
Be Structured Los Angeles IT Security

Incident Response Plan – Part 2

The Risks and the Needs Associated of Going Offline

When a business or a corporation is hit by a Cyber-attack, one of the first questions that often gets asked is just how much of the IT Infrastructure has been damaged, or even if the Cyber attacker is still lurking around trying to infect other systems.

Read More ...
Spear Phishing

Spear Phishing – Part 3

Incidents of Spear Phishing

As we have reviewed, Spear Phishing, is quite different than the normal Phishing attack.  In these cases, the Cyber attacker just merely launches an all-out attack, in the hopes of being able to harvest sensitive information and data. 

Read More ...
Computer with Fish Line and Hook

Spear Phishing – Part 2

What the Spear Phisher is After

Our last blog examined what a Spear Phishing attack is.  In today’s blog, we examine what the primary targets are:

1)     Money, Money, Money and lots of it:

While other Phishing based campaigns focus on getting any kind of personal information and data, the Cyber attacker in this case, wants just one thing: Your cash. 

Read More ...

Spear Phishing – Part 1

Introduction to Spear Phishing

As we know it today, Phishing has become one of the most commonly used tactics by the Cyber attacker in order to garner personal information and data. 

Read More ...
SecurityHero Digital lock security icons pointing

A Review of Cryptojacking

A Review of Cryptojacking

To some degree or another, most of us have heard of the term “Virtual Currency”.  This is essentially the cloud-based version of the traditional paper money. 

Read More ...