As many people return to their workplaces, cybersecurity attacks continue unabated. Email phishing remains the most common method by which cybercriminals first gain unauthorized access. These phishing attacks can then lead to ransomware incidents, business email compromise scams and other destructive cyber attacks. So, training employees to be able to spot phishing emails is as important as ever, as is…
Ransomware attacks continue to plague businesses across the globe. As companies enhance their defenses, attackers increase the sophistication of their software and its deployment. Ransomware attacks used to be limited to the locking of a company’s computer system by encryption software and a demand to pay in order to obtain the key, but not anymore. In early June 2020, for…
On June 23, 2020, Avi Gesser and HJ Brehmer from Debevoise’s Data Strategy & Security Group, along with our special guest, Dave Wong, VP at FireEye Mandiant, had a discussion on the current threat landscape of Ransomware 2.0 and associated mitigation strategies and considerations, including: Ransomware 2.0 and the current threat landscape, including COVID-19 related phishing e-mails, attacks on industrial…
On June 16, Avi Gesser, Stephanie Cipolla, and special guests Art Ehuan from Crypsis and Ed Cabrera from Trend Micro discussed the hallmarks of a reasonable corporate cybersecurity program for the purposes of defending litigation or responding to regulatory inquiries, including: Technical controls (MFA, access rights, encryption, network segmentation, endpoint detection, etc.) Administrative controls (policies, procedures, training, resources, vendor management, etc.)…
Introduction Much has been written recently on the increased cybersecurity and privacy risks that companies are facing. One of the most effective ways for organizations to mitigate those risks is to significantly reduce the amount of data that they collect and maintain. Having less data means that there is less sensitive information to protect from hacks or leaks which is…