Hurricane Florence Ready?

Corporate Information Technologies is ahead and prepared for the potential impact Hurricane Florence may cause it’s clients.  On Monday our preparations started with this email . . . Hurricane Florence is presently moving toward the Southeastern United States.  The storm’s impact is anticipated to be severe in CIT’s service area ranging from upstate South Carolina…

CIT’s Open House — August 23rd

  After 20 years in NoDa, CIT has moved up to One University Place Come see how our changes set the stage for your next 20 years 8801 J M Keynes Dr Suite 250, Charlotte NC 28262 Open House, Thursday August 23rd   4-6pm   Corporate Information Technologies, one of the Southeast’s leading technology and…

Cyber-Killchain

Cyber-Killchain The process of a cyber-killchain is much like the process of an everyday burglar. These burglars take multiple steps before they actually rob your home, car, or business. The killchain is the common steps that are used by these cyber-burglars. This being the case, it’s important for defenders to pay attention and use the…

The Critical Security Controls – Control 3

Control 3: A Framework for an Offense-informed Defense As we discussed in our earlier blog posts on the 20 Critical Security Controls, they provide an offense-informs-defense framework through which an organization can effectively defend against cyberattacks.  In this installment, we’re examining Control Three. This control is a ‘Basic control’ and represents one which every organization,…

“Can I Buy A Bitcoin From You?”

“Can I buy a bitcoin from you?”  This is often how the conversation begins when we’re contacted by business owners that have been hit with a ransomware attack. As one of the leading Crypto-ransomware incident response organizations in the southeast, we unfortunately get asked this question on a regular basis. Every time we’re asked this,…

Humans, They’re so much trouble!

Modern cybercriminals – Hackers – use numerous clever ways to attack businesses – from technical attacks to social engineering. In our capacity as a Cyber Incident Response organization, we are witnesses to the ingenuity and thought used by attackers in their criminal pursuits. Often, the weakest point in an organization’s armor are the humans who…