by Benjamin Bressington | Mar 8, 2022 | Uncategorized
7 Lessons learned from completing 8,239 Cybersecurity Audits! That’s right, since launching CybersecurityReportCard.org we have completed 8,239 cybersecurity audits in less than 3 months. Not a bad achievement for the team, but here are the lessons we’ve learned from...
by Benjamin Bressington | Mar 8, 2022 | Uncategorized
Advanced Persistent Threat (APT) are compound network attacks that utilize multiple stages and different attack techniques. APTs are not attacks conceived of or implemented on the spur-of-the-moment. Rather, attackers deliberately plan out their attack strategies...
by Benjamin Bressington | Mar 8, 2022 | Uncategorized
Egregor Ransomware Recovery, Payment, and Decryption Statistics The information below describes relevant statistics of Egregor ransomware recovery, payment, and decryption. The recovery process of Egregor ransomware includes identifying the strain and the risk...
by Benjamin Bressington | Mar 8, 2022 | Uncategorized
Back to Full CMMC & NIST800-171 Requirements List CMMC Practice Requirement: System and Information Integrity – SI.3.220 Utilize sandboxing to detect or block potentially malicious email. Check below how we can help you make implementing CMMC &...
by Benjamin Bressington | Mar 8, 2022 | Uncategorized
In mid-April 2019, a new and sophisticated malware threat began to appear on computers of home users and businesses. The powerful threat, named Scranos, boasts an impressive list of capabilities, including the ability to steal login credentials, payment account...