Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SecurityScorecard

What To Do If You Think Your Company Has Been Hacked

Nearly every day, it seems like you’re reading about another data breach in the news. Between ransomware attacks and nation-state actors, you can’t rely on the old “trust but verify” adage anymore. Cyber resilience isn’t about preventing all threats, it’s about creating a security program that allows you to identify, investigate, contain, and mitigate threats quickly and effectively.

Cybersecurity Tips for Healthcare Organizations

“Why do ransomware attackers target healthcare companies so often?” Here are 2 reasons why: Goldmine of personal information: If you look on the dark web, the price of a stolen credit card would be $5 for a validated card. But the price of personal information (passport, social security number, etc.) could range from $400 to $6,500 per person because you can create a fake identity and use it to create accounts in various places.

Water Sector Cybersecurity Requirements

Water Sector Cybersecurity Requirements Policymakers and regulators in Washington are bringing their attention now to water utilities’ cybersecurity. Last month, the White House announced it was expanding its public-private cybersecurity partnership to the water sector. Separately, in December of 2021, the Environmental Protection Agency (EPA) announced an evaluation of regulations related to the public water system’s cybersecurity, which will change in April.

5 Cyber Hygiene Best Practices

Here are 5 cyber hygiene best practices to safeguard yourself from hackers: Hackers know your external look and feel better than you do. So you must constantly rediscover how you appear to the adversaries and take actions to safeguard yourself. A lot of hacks happen by exploiting vulnerabilities that have not been patched instead of being zero-day attacks. So you need to patch your software regularly.

Scary kids scaring kids: An update on the arrest of Lapsus$ group members

One would be hard pressed to find anyone working today in the cybersecurity world that has not yet heard of Lapsus$, an emerging cyber-crime group with big claims of breaching the likes of high-profile companies Microsoft, Samsung, NVIDIA, and Okta amongst others.

5 Ways to Illuminate Your Attack Surface Blind Spots

How well do you know your organization’s attack surface? Chances are, you don’t know it as well as you think you do. According to a recent report, 2 out of 3 organizations say their external attack surface has expanded in the past 12 months, but that does not mean they’ve been keeping track of it.

Reducing Cybersecurity Risk for Local Government

The amount of data that municipalities deal with on an everyday basis has grown exponentially. In particular, local governments have focused on upping their cybersecurity efforts due to the sensitive information and data stored and shared with state and federal government programs. It is now more important than ever to ensure effective cybersecurity within local governments. In this blog, we will take a look at how your local government can reduce impending risks and secure innate vulnerabilities.

2 Ways Reduce the Likelihood of Getting Attacked

2 ways to make your security infrastructure better than 99% of companies: Start with a zero-trust architecture: Assume that the attackers are going to inevitably break-in. Design a system with zero-trust architecture. To do that, you must: You need to look at how you appear to hackers from outside. Today, with a click of a mouse, attackers can scan the entire Internet and find open ports from companies that are easy to break into.

Improving accuracy and value: Why Inviting Vendors is important

As most of our customers know, every single company – customer or not – gets free and unlimited access to their own company’s Scorecard. This view allows them to see the complete details of their scorecard and a high-level view of five other scorecards. SecurityScorecard provides this free access because we know that when companies engage with their scorecard, their scores improve, their attribution becomes more accurate, and our customers lower their own cyber risk.

Spring4Shell: 12 year old vulnerability springs back to life

On Thursday, March 31st a patch for a widely used Java framework called the Spring Framework was given the designation CVE-2022-22965 with a CVSS Score of 9.8. That’s bad news for a lot of companies that make use of this framework for delivery of their web applications, services and APIs. This is a remote code execution (RCE) vulnerability and the ease of exploitation is partly why it has earned a 9.8 out of 10 on the CVSS Score.