Cyber-Killchain

Cyber-Killchain The process of a cyber-killchain is much like the process of an everyday burglar. These burglars take multiple steps before they actually rob your home, car, or business. The killchain is the common steps that are used by these cyber-burglars. This being the case, it’s important for defenders to pay attention and use the…

The Critical Security Controls – Control 3

Control 3: A Framework for an Offense-informed Defense As we discussed in our earlier blog posts on the 20 Critical Security Controls, they provide an offense-informs-defense framework through which an organization can effectively defend against cyberattacks.  In this installment, we’re examining Control Three. This control is a ‘Basic control’ and represents one which every organization,…

“Can I Buy A Bitcoin From You?”

“Can I buy a bitcoin from you?”  This is often how the conversation begins when we’re contacted by business owners that have been hit with a ransomware attack. As one of the leading Crypto-ransomware incident response organizations in the southeast, we unfortunately get asked this question on a regular basis. Every time we’re asked this,…

Humans, They’re so much trouble!

Modern cybercriminals – Hackers – use numerous clever ways to attack businesses – from technical attacks to social engineering. In our capacity as a Cyber Incident Response organization, we are witnesses to the ingenuity and thought used by attackers in their criminal pursuits. Often, the weakest point in an organization’s armor are the humans who…