During this 30 minute, on-demand webinar, “Incident Response Playbook, The Why, Who and What of Developing an IR Playbook,” presenters Kyle Goode and...Read More
Here at The Crypsis Group, it’s been a busy year so far. We’ve worked with a lot of organizations to help them find bad stuff in their networks and...Read More
During this 30 minute, on-demand webinar, Crypsis Group consultants will give a history of the xDedic marketplace, share some information about...Read More
The U.S. Department of Health and Human Services (“HHS”) Office of Civil Rights (“OCR”) recently released guidance on whether or not a ransomware...Read More
With cyber criminals having impacted millions of people and businesses in 2018, we wish we could say that cyber security threats have now passed their peak. But we can’t. As Crypsis experts have responded to threats, closed off pathways to cybercrime, and shored up our clients’ defenses, we have noticed a number of emerging trends in the incidents we respond to.
Office 365 mailbox compromises are occurring at an alarming rate and costing billions of dollars. Several features can be used to address this, including some that are lesser-known but can have an enormous impact on restricting who is allowed to connect to your environment.
When you are hit with a data breach, knowing who does what will help you respond expeditiously, effectively, and in a manner that minimizes risk to the enterprise. For that your company needs to have an incident response strategy in place. The General Counsel is critical to this process.
With an increase in the number of cyber security compromises as a result of phishing attacks, it is prudent for companies using Office 365 products to take appropriate steps to prevent or mitigate the damage from these incidents. Download our InfoSheet to learn which tools Crypsis suggests enabling to make it harder for attackers to…
Over the last five years, cyber criminals have besieged individuals and companies alike with ransomware, which is malicious software that encrypts data and attempts to extort the victim into paying money to decrypt their own data. Even worse, the use of ransomware by malicious actors is increasing: the FBI has reported that in the first…
The success of security teams when combating cyber threats relies on visibility into the environment they must defend. Security teams that do not have visibility into their endpoints may not see a threat actor moving in the environment, stealing credentials, deploying backdoors, or exfiltrating sensitive data. The goal of this white paper is to illustrate…