ProcessBolt

Purple Teaming: A Key Solution in Addressing Evolving Threats

Author(s):

MK Akram, Project Manager, Globex IT Solutions

Purple Teaming - USCYBERCOM

From the SolarWinds attack to the attempt to poison Florida city’s water supply and the Colonial Pipeline shutdown due to ransomware, recent months have demonstrated how aggressive cybercriminals have become—which raises the question: are modern cybersecurity solutions really that ineffective? With one major attack after another, the expectation is that organizations would have already undertaken … Read more

Cybersecurity Market: Trending Upwards

Author(s):

Josh Henry, ,

Cybersecurity Market coins in front of graph

Rising Cybersecurity Market Trends      The cybersecurity market is rapidly expanding in today’s society; and rightfully so. The steady increase in data breaches and threats to our identities show no signs of slowing down. Additionally, the demand for professionals in the cybersecurity market field is rapidly growing According to an article from Cybersecurity Ventures, the estimated … Read more

Hospitality Breaches

Author(s):

Josh Henry, ,

Hospitality Breach picture of Courtyard Marriott

Leaving the Light on for Everyone Hospitality breaches are the newest target for bad actors. Data breaches are making headlines more and more. As a result, large corporations in the hospitality industry are acquiring large targets on their back. Of course, this is no surprise. In fact, this problem has escalated since last year. Needed … Read more

Malicious Apps: For Play or Prey?

Author(s):

Josh Henry, ,

Malicious Apps, hand holding phone with a warning sign on it, red background

Malicious Apps Today’s society is adapting to excessive use of cell phones and personal data stored in them. Federal laws have been changed to protect citizens from police authorities rummaging through our cell phones without the proper documentation. Considering that criminals have much less trouble adapting than lawmakers, they are usually one step ahead and … Read more

Card Skimmers: What are you Sliding Yourself Into?

Author(s):

Josh Henry, ,

Hand typing in ATM passcode on notepad while covering the keys for privacy, abstract for Card Skimmer

What are Card Skimmers? Mechanisms referred to as “card skimmers” have been a major threat to data security in recent years. These devices enable thieves to withdraw information from the magnetic strip of your card when its casually used at an ATM or store. As the trend grows, the devices become more sophisticated.  Banks, law … Read more

Email: The Ultimate Phishing Hole

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Hole in the ice, fishing line in the hole, boots to the side, email phishing abstract

Recently, we talked about the importance of questioning everything when it comes to cybersecurity; telephone calls, websites, text messages, snaps, any of these mediums are a forum for viruses. As the threats continue to change and grow, many people have started to become more aware of how widespread phishing has become. Phishing has grown in popularity, … Read more