Erich is a self-proclaimed geek and experienced information security leader who is passionate about cyber security, but is still able to effectively communicate with the highest levels of leadership. His proven track record of advancement in the industry spans a broad spectrum of experience including security roles, large scale technical project management, hands-on technical work and senior leadership roles. This wide range of experience allows him to have a unique, holistic view of information systems which results in the implementation of secure technical and policy-based solutions that work well, and are easily maintained.
The IRS is warning of a phishing scam that promises refund information but looks to capture Social Security numbers and other sensitive data.
The ransomware gang exfiltrated 40 gigabytes of data from the fashion house, including HR and salary details.
Boggi Milano sustains ransomware attack. Arup consultancy affected by third-party payroll provider breach. Update on Ubiquiti's ransomware incident. More universities affected by Accellion compromise. Broward County schools hit by ransomware. Health system data exposure.
With attackers’ average dwell times, the time from when they gain access to a system to the time they are discovered, running in the hundreds of days, any information that can lead to spotting them is incredibly valuable. By sharing security incident information, organizations can develop Indicators of Compromise (IoCs) that can help other organizations defend against current and future attacks.
Even at home, their IP address is likely to change. This makes fraudulent logins difficult to pinpoint.
Causing a Windows computer to reboot in safe mode can disable software, potentially even antivirus or anti-ransomware software, that is working to keep your computer safe. This would then allow the attackers to make changes that may otherwise not be allowed in normal running mode.