Under Attack? Breach Response Hotline: Call 833.997.7327

RESOURCES

With more than 15 years’ experience in cyber counterintelligence, we have learned to approach cybersecurity differently, and more effectively, than other companies. Browse our case studies, expert insights, Ask the Expert series and more to see why so many organizations choose us to protect their systems when the worst happens.

operational technology cloud
Ignoring Operational Technology Security Could Doom Your Business
10 July 2019
Business Journal Ask the Expert Column Operational Technology Could Become Your Achilles Heel As more people focus on their IT security and upgrade their...
healthcare industry
NIST and FBI Issue Cyber Security Warnings for Healthcare Industry
09 July 2019
Government Agencies Alert Healthcare Industry To Eminent Cyber Threats. Since August, both the FBI and the National Institute of Science and Technology...
protect from ransomware
How To Protect Your Business From A Ransomware Attack
09 July 2019
4 Simple Strategies To Consider When Planning A Ransomware Strategy. With the numerous forms of ransomware that are spreading throughout the world, my...
unpatched vulnerability
One-Third Of Breaches Caused By Known Unpatched Vulnerabilities
21 June 2019
Business Journal Ask the Expert Column – June 2019 The inbox has been filled with fantastic questions over the past few weeks. And that means great information...
cybersecurity insurance
Does Your Cybersecurity Insurance Really Protect You?
31 May 2019
Business Journal Ask the Expert Column – May 2019 The headlines have been filled recently with stories about cybersecurity insurance providers refusing...
cybersecurity provider
3 Critical Questions To Ask Your Cybersecurity Provider
03 May 2019
Business Journal Ask the Expert Column – April 2019 I recently received several e-mails from people asking some very pointed questions about cybersecurity...
cybersecurity with legal
7 Ways To Look At Cybersecurity With Legal In Mind
08 March 2019
Business Journal Ask the Expert Column – March 2019 As many of you know, I prefer a diverse mix of questions in each addition of Ask The Expert. But on...
vulnerabilities, plugins, wordpress themes, attackers, access
WordPress Brute Force Attacks: Protecting Your Web Presence
28 February 2019
WordPress has the distinction of being one of the most popular blogging systems on the Internet and is used in an estimated 70 million websites worldwide....
adware, spyware, keyloggers, fake antivirus software
Malware: Open Warfare in Cyberspace and the Increasing Malware Threat
28 February 2019
Over the years, the definition of the term “virus” has become quite broad and tends to create confusion in the marketplace. When people discuss what is...
silent, invisible, infect, malicious files, hijacks hijacks legitimate processes, applications
Poweliks: Active Memory Analysis
28 February 2019
Malware authors are increasingly becoming motivated by financial gain. As such, new generations of malware are being created to remain undetected and carry...
retail, credit card, security, malware,
Point-of-Sale (POS) Malware: The Escalating Threat
28 February 2019
While many large organizations struggle when responding to Point-of-Sale (POS) breaches, smaller companies have become a popular target for these malware...
virus, worm, trojan horse, rootkit, backdoor
Observational Malware Analysis (OMA): A Better Understanding
28 February 2019
Observational Malware Analysis (OMA) provides a better understanding of malware capabilities, the mission of the attacker, and the effects on the company...
financial institutions, banks, investors, accounts
Investment Fraud: The Growing Threat to Your Financial Security
28 February 2019
As legal standards and regulations evolve, institutions must continue to be proactive in the area of data security. Both internal and external threats...
Employee_Misconduct
Digital Forensics: Employee Misconduct
28 February 2019
Employee misconduct is a real danger faced by companies, while the employee works at the company, as well as during the time just prior to the employee’s...
firewalls and antivirus
Are Your Firewalls and Antivirus Keeping You Safe?
20 February 2019
Nearly every day, I’m asked if an impressive firewall configuration is enough to prevent malware from entering a company’s environment. Or I overhear someone’s...
consumer cyber best practices
Consumer Cyber Best Practices
20 February 2019
The end of the year is a valuable time to clean up bad cyber habits. With a new year comes new opportunities for both you, and the bad guys. Bad guys prey...
cybersecurity for accountants
New SEC Cybersecurity directives for accountants
20 February 2019
SpearTip exists to help our clients stop on-going cyber crime and to prevent future cyber crime. our innovative services include incident response, malware...
questions about cybersecurity
Questions directors should be asking about cybersecurity
20 February 2019
Cybercrime has quickly become the single greatest threat to most businesses, with damages projected to top $6 trillion by 2021 , just three short years...
low tech
3 Low Tech, Low Cost Ways To Help Protect Against Cybercrime
10 February 2019
Business Journal Ask the Expert Column – February 2019 Despite the fact that cyber security represents the greatest high-tech threat known to most organizations,...
cyber security defenses
WARNING: Set Your Cyber Security Defenses On High For 2019
18 January 2019
Business Journal Ask the Expert Column – January 2019 Welcome to a new year. I wish I had happy news, but I don’t. Poorly prepared organizations could...
1 18 19 20 21

Total Economic Impact™ Of SpearTip ShadowSpear