“Can I Buy A Bitcoin From You?”

“Can I buy a bitcoin from you?”  This is often how the conversation begins when we’re contacted by business owners that have been hit with a ransomware attack. As one of the leading Crypto-ransomware incident response organizations in the southeast, we unfortunately get asked this question on a regular basis. Every time we’re asked this,…

Humans, They’re so much trouble!

Modern cybercriminals – Hackers – use numerous clever ways to attack businesses – from technical attacks to social engineering. In our capacity as a Cyber Incident Response organization, we are witnesses to the ingenuity and thought used by attackers in their criminal pursuits. Often, the weakest point in an organization’s armor are the humans who…

SPECTRE AND MELTDOWN – APPLICATION TO BUSINESS

On Wednesday January 3, 2018 a series of vulnerabilities were disclosed which impacted nearly every Intel, AMD, and ARM-based processor of the previous 20 years. Awareness of these vulnerabilities, Spectre and Meltdown, have been quickly spread by both the technical and popular media. Many of the media reports have been overblown and based on conjecture…

Backstop User Conference - Chicago Skyline

Setting the Standard for the Alternative Investment Industry – Backstop Solutions User Conference

CIT Presents at Backstop Solutions User Conference The concepts of risk, information management, cybersecurity, 3rd party due diligence, and vendor management are nothing new for the Alternative Investment industry. One of the investment industry’s leading software technology companies, Backstop Solutions, brought these topics center stage during their user conference in Chicago, IL. Backstop is the…

KRACK-vulnerability

What You Need to Know about KRACK Attacks

Taking a deeper look at the KRACK Wireless Vulnerability Background In May of 2017, security researcher Mathy Vanhoef published a technical paper outlining a potentially catastrophic vulnerability within an encryption protocol used within Wireless Computer Networks. This vulnerability has taken the “protected” out of Wi-Fi Protected Access II (WPA2) Wireless Networks. Those networks, both corporate…

Cybersecurity and the manhattan project

How the Security at the Manhattan Project and Modern Cybersecurity aren’t so very different

How the Development of the Atomic Bomb relates to Cybersecurity First, I should point out that this blog isn’t trying to make some analogous connection between the dangers, power, or destructive forces involved with nuclear weapons and cybersecurity.  (Although the parallels are there… but we’ll just put that aside for the moment.) What I hope…