Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

Alert AA20-302A: Federal agencies warn about ransomware attacks targeting hospitals

A cybersecurity bulletin was released by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Health and Human Services (HHS) on October 28, 2020. The three agencies have issued a high-level warning about an increased, imminent threat of ransomware attacks in the healthcare sector. The cybercriminal group behind the TrickBot, Ryuk, and BazarLoader malware is now targeting U.S. hospitals and healthcare providers.

Calligo acquires third Irish MSP of 2020: Cinnte Technologies

Today Calligo announces it has completed the acquisition of Cinnte Technologies, a Cavan- and Dublin-based MSP, specialising in managed IT, cloud and security services. This marks Calligo’s eighth international acquisition in three years, and the third in Ireland in 2020, reinforcing Calligo’s position as one of Ireland’s largest IT managed services providers in terms of resources, market share and especially breadth of services.

Business Continuity Planning: How to create an effective business continuity plan for 2021

What if all your employees lost access to their data and tools right now? What if every platform you use to communicate with your staff and your customers went down right now? Companies rarely get an advanced warning that a disaster is about to strike. There is no time to prepare, and no time to protect your company from the fallout. That time has passed, and for companies without a business continuity plan, all that is left to do is lament how poorly prepared they were.

Precautions to protect yourself from Identity Theft

This festive season keep your data safe with IDcentral This festive season will be celebrated with even greater joy as we will be putting an end to the year 2020 (year of uncertainty and obscurity is finally over). But while we are prepping up to celebrate the new year, fraudsters are on a constant look out to leverage vulnerability. During the holiday season, people tend to make a greater number of purchases than they do during the rest of the year.

Say What? Natural Language Processing Improves Cloud Security

This is the third entry in a series of articles focused on AI/ML. Natural language processing (NLP) is a form of artificial intelligence (AI) that gives machines the ability to read, understand, and derive meaning from human languages. NLP powers many applications that we use every day, such as virtual assistants, machine translation, chatbots, and email auto-complete. The technology is still evolving very quickly.

3 Steps to Building a Resilient Incident Response Plan

According to the Accenture State of Cybersecurity 2020 report, the average cost of a cyber attack for ‘non-leaders’ stands at $380,000 per incident. The report classifies organizations into ‘leaders’ and ‘non-leaders.’ The ‘leaders’ are those who set the bar for innovation and achieve high-performing cyber resilience. Given the rate of cyber attacks today, a security breach can easily run a non-resilient business into a major loss.

Data Classification in Microsoft 365

More and more organizations are recognizing the power and value of data classification. By accurately classifying and labeling the information you store, you can: If your organization is like most, you now rely on cloud platforms like SharePoint Online, OneDrive and Exchange Online, and you need to know exactly what types of data is being stored there so you can ensure sensitive content is properly protected.

Using Node.js Async Hooks to Monitor API performance.

Async hooks are one of those Node.js features that seem interesting when you first see them, but in practice they end up failing to provide overtly obvious use cases. At their core, async hooks are a way to step into the lifecycle of any asynchronous resource. This may be a promise, a timeout, streams, DNS lookups, and even HTTP requests—like API calls. Most examples are focused on tracking the execution context or enhancing asynchronous stack traces.

Devo Leadership Recognized-What It Means for Customers

The Forrester Wave report for AIOps came out today, and Devo is a Leader! This is great news for Devo, but it’s really great news for our customers. Read more about it in our news release. AIOps is a broad category, so let’s unpack just what this recognition means. Forrester evaluated the Devo Data Analytics Platform against many competitive offerings in several key areas, including: That’s a broad collection of technical capabilities.

The Importance and Difference Between Indicators of Attack and Indicators of Compromise

The recent headlines attest that no organization is immune to targeted attacks launched by skilled, persistent adversaries. These highly sophisticated attackers gain unprecedented success against large and even well-equipped organizations across the world. The detection of these attacks is a daunting task. However, if you are well aware of the Indicator of Attacks (IoA) and Indicators of Compromise (IoC), then you can resolve issues with better outcomes.