Texas municipalities struggle to recover from ransomware attacks

The N-Sentinel Cybersecurity Monioring service will increase your odds in preventing attacks like this from happening. You need more than a strong firewall and malware protection guarding your networks and data. by: Teri Robinson Borger and Keene confirmed they are among the 22 municipalities in Texas that were hit with…

Lack of cyber investment could spell trouble for smart cities: (report)

by Bradley Barth A lack of investment in cybersecurity protections could imperil the future of smart cities and the Internet of Things devices on which they run, a new report from ABI Research warns. ABI anticipates there will be 1.3 billion wide-area network smart city connections by the year…

Cybersecurity Funds Available Now for Public Power Utilities

Don’t miss this opportunity to improve cybersecurity defenses at your utility – at no cost! Cybersecurity is an ongoing threat to public power utilities and communities. In recognition of this critical issue, the American Public Power Association secured a Department of Energy (DOE) grant with a focus on helping its…

Research Shows Cybersecurity Monitoring is Needed Behind Network Firewalls

A recent white paper released by a leading firewall company discussed Three (3) Dirty Little Secrets that were discovered about Network Firewalls. It shows the existing weaknesses in firewalls, how companies have become used to network and system infections, and to pushes the need for the newest higher-end firewalls which…

Ten Types of Cyber Attacks Electric Utilities Suffered in 2018

The following synopsis are paraphrased and anonymized for the protection of the utilities and their customers. These are real attacks that have happened since 2016 that were either reported or known to companies like us. The list has been kept to just 10. With these real-life examples, we have tried…

What are the differences between the types of hackers?

According to various definitions you read on-line and in print, there are roughly ten (10) different classifications of Hackers. These can all be found on-line as well as the varying definitions as to what each is. When hiring someone to do Penetration Testing or Vulnerability Testing, most organizations use White…