Advanced Threat Detection Stopping Advanced Attacks in their Tracks ChatFortress Endpoint Cybersecurity
Advanced Threat Detection: Stopping Advanced Attacks in their Tracks Advanced threat detection monitors your infrastructure for advanced protection against attacks that bypass traditional security like firewalls, antivirus, and intrusion prevention. Advanced threat...
What do CMMC and NIST 800-171 regulations mean for you?
What do CMMC and NIST 800-171 regulations mean for you? The Cybersecurity Maturity Model Certification (CMMC) and NIST 800-171 are new regulations affecting businesses soon. What do these two acronyms mean? CMMC is a cybersecurity framework that has been developed by...
ChatFortress Netwalker Ransomware Recovery Payment and Decryption Statistics
Netwalker Ransomware Recovery, Payment, and Decryption Statistics The information below describes relevant statistics of Netwalker ransomware recovery, payment and decryption. The recovery process of Netwalker ransomware includes identifying the strain and the risk...
Work from Home – Free Employee Cybersecurity Awareness Training
Prepare your employees to work from home safely without exposing your entire company to hackers! Free Cybersecurity Awareness Training... Protect Your Friends and Family share this page! All videos will automatically play one after the other. If you want to...
10 Data Stupid US Government Counties are Ransomware Ticking Time Bombs
529 US County Government Websites are less secure than a porn site. It's safer to visit Pornhub.com then it is to visit your local county website. That's right you are less likely to be infected with malware or have your identity or money stolen by visiting a porn...
Potential for Iranian Cyber Response to U.S. Military Strike in Baghdad
Potential for Iranian Cyber Response to U.S. Military Strike in Baghdad This is the Cybersecurity Dominio Effect Factors that influence cybersecurity attacks can be out of your control. All you can handle is how you are Dectecting, Responding and Recoverying from this...
Cybersecurity Crash Course Day 1 Passwords
Day 1/7 Passwords... No Longer Safe Welcome to Day 1 of the ChatFortress Cybersecurity crash course. Today we’re talking about password do’s and don’t. And how your password may already be compromised, and you didn’t even know it! 81% of hacking-related breaches...
CMMC Practices SI1213; Requirements and Documentation | ChatFortress
Back to Full CMMC & NIST800-171 Requirements List CMMC Practice Requirement: System and Information Integrity - SI.1.213 Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or...
Hackers have weaponized COVID-19 Coronavirus!
Hackers have weaponized COVID-19 Coronavirus! Hackers have weaponized COVID-19 That’s right hackers are using the CoronaVirus to steal your data, your identity, and your money! Business owners have seen a rise in the number of email phishing attacks referencing or...
8 types of hacking and social engineering attack campaigns
8 email scams hackers use to steal your identity, data and money There are multiple attack vectors used by hackers or people who want to compromise your data. My goal is to explain the common 8 email related scams used so you can identify them and protect yourself,...