Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Safeguarding K-12 Education: A Whole-of-State Approach to Cybersecurity for Chromebook-Centric School Districts

In today’s rapidly evolving digital landscape, K-12 school districts are harnessing the power of technology to transform education. The widespread adoption of Chromebooks has revolutionized the learning process, providing students with tools for collaboration, research and creativity. However, along with these advancements come unprecedented cybersecurity challenges that demand a comprehensive strategy.

The Windows Restart Manager: How It Works and How It Can Be Hijacked, Part 2

In the first part of this series, we provided a brief overview of the Windows Restart Manager. In this blog post, we examine how these mechanisms can be exploited by adversaries and review how the CrowdStrike Falcon platform can detect and prevent these attacks.

Medical Food Company Mom's Meals Suffers Serious Data Breach Exposing More than 1M

Mom's Meals is a food service company that helps provide meals to people who are in need of help. This meal service organization works to deliver food to the homes of individuals who need help with food. These individuals could be at risk for identity theft and other serious problems in the future. Learn about the specifics of this breach below and understand the full risk for data loss because of the attack.

Weekly Cybersecurity Recap September 1

Data breaches are becoming more and more of a problem worldwide, and this week, it's especially obvious that they're causing trouble for serious companies. Major medical organizations, schools, and financial companies were all hit by breaches this week. Mom's Meals, Blue Cross Blue Shield of Illinois, and Prospect Medical Holdings are all medical companies impacted by breaches this week. TMX Finance and the University of Minnesota are the other targets we cover in the recap below.

Bridging the Cyber Skills Gap for Small Businesses

Small and Medium Enterprises (SMEs) have encountered increasing burdens over the last few years, from challenging economic conditions to a dramatically evolving cyber threat landscape. Today, 43% of cyber attacks are targeted at SMEs, and only 14% of targeted SMEs were prepared to handle such attacks. An astonishing 75% of those SMEs attacked could result in permanent closure if unable to recover data.

Sharing is Not Caring: Hunting for Network Share Discovery

Organizations rely on interconnected systems to store, share and manage information. These ecosystems often incorporate network file shares, which act as repositories of various types of data within an organization. Unfortunately, it is not uncommon for sensitive files to find their way onto these network shares inadvertently with permissions that are too broad or not properly restricted.

What is Cloud Security? Types, Risks & Benefits Defined

With data breaches making the headlines almost daily, it can feel like you’re stuck in a never-ending discussion about how secure data is in the cloud. On one hand, cloud naysayers may be preaching cloud repatriation in response to the high profile cloud compromises of the last few years. On the other hand, being too sure of your data security is a major recipe for trouble — hubris has no place in cybersecurity.

What Is Zero Trust? Top Benefits & How It Works

Organizations are tasked with the continuous challenge of having to keep up with advancing cyber threats and must change their security strategies for them to remain secure. Zero Trust Security is a response that demands identity validation from all users, devices, and networks, thus eliminating implicit trust altogether.

Business Continuity Plans for Financial Institutions

Disasters rarely strike with advanced notice. That’s especially true in the business world, where there’s no such thing as a business meteorologist to forecast potential threats that may beset a company’s personnel or assets. That’s where a Business Continuity Plan comes into play.

Cyber Criminals Targeting Victims Through Beta-Testing Apps

Cybercriminals use a variety of deceptive methods to defraud their victims. It can be challenging to keep up-to-date with the latest threats to your online security. The Federal Bureau of Investigation (FBI) has warned people about the dangers of a new threat - malicious beta-testing apps. These apps can have severe consequences for our data and finances. In this article, we'll explain how this latest attack works, the signs of a malicious app you need to be aware of, and, most importantly, what cybersecurity tools you need to protect yourself.