Under Attack? Breach Response Hotline: Call 833.997.7327

RESOURCES

With more than 15 years’ experience in cyber counterintelligence, we have learned to approach cybersecurity differently, and more effectively, than other companies. Browse our case studies, expert insights, Ask the Expert series and more to see why so many organizations choose us to protect their systems when the worst happens.

courts - cybersecurity
Courts Broaden Cybersecurity Responsibilities for Boards of Directors
27 December 2019
Business Journal Ask the Expert Column – Book of Lists I understand that recent legal decisions have potentially increased Board Member liability as it...
supply chain - cyberattacks
Keep Your Supply Chain from Opening You to Cyberattacks
06 December 2019
Business Journal Ask the Expert Column – December 2019 We’re a mid-sized, fast-growing company with serious concerns about our supply chain security after...
cybersecurity - 4th Quarter
It’s 4th Quarter. Is Your Cybersecurity Plan Ready for 2020?
08 November 2019
Business Journal Ask the Expert Column – November 2019 Our company has decent cybersecurity protocols, but it seems like we’re always playing catch up....
every minute counts
Every Minute Counts: How You Should Respond To Ransomware
25 October 2019
Business Journal Ask the Expert Column – October 2019 One of our suppliers was recently paralyzed by a ransomware attack. No one knew what to do – they...
being monitored
The Dangerous Difference Between Being Protected and Being Monitored
20 September 2019
Business Journal Ask the Expert Column – September 2019 Our cyber security “partner” recently contacted us to say they had “discovered unusual activity...
operational technology cloud
Ignoring Operational Technology Security Could Doom Your Business
10 July 2019
Business Journal Ask the Expert Column Operational Technology Could Become Your Achilles Heel As more people focus on their IT security and upgrade their...
healthcare industry
NIST and FBI Issue Cyber Security Warnings for Healthcare Industry
09 July 2019
Government Agencies Alert Healthcare Industry To Eminent Cyber Threats. Since August, both the FBI and the National Institute of Science and Technology...
protect from ransomware
How To Protect Your Business From A Ransomware Attack
09 July 2019
4 Simple Strategies To Consider When Planning A Ransomware Strategy. With the numerous forms of ransomware that are spreading throughout the world, my...
unpatched vulnerability
One-Third Of Breaches Caused By Known Unpatched Vulnerabilities
21 June 2019
Business Journal Ask the Expert Column – June 2019 The inbox has been filled with fantastic questions over the past few weeks. And that means great information...
cybersecurity insurance
Does Your Cybersecurity Insurance Really Protect You?
31 May 2019
Business Journal Ask the Expert Column – May 2019 The headlines have been filled recently with stories about cybersecurity insurance providers refusing...
cybersecurity provider
3 Critical Questions To Ask Your Cybersecurity Provider
03 May 2019
Business Journal Ask the Expert Column – April 2019 I recently received several e-mails from people asking some very pointed questions about cybersecurity...
cybersecurity with legal
7 Ways To Look At Cybersecurity With Legal In Mind
08 March 2019
Business Journal Ask the Expert Column – March 2019 As many of you know, I prefer a diverse mix of questions in each addition of Ask The Expert. But on...
vulnerabilities, plugins, wordpress themes, attackers, access
WordPress Brute Force Attacks: Protecting Your Web Presence
28 February 2019
WordPress has the distinction of being one of the most popular blogging systems on the Internet and is used in an estimated 70 million websites worldwide....
adware, spyware, keyloggers, fake antivirus software
Malware: Open Warfare in Cyberspace and the Increasing Malware Threat
28 February 2019
Over the years, the definition of the term “virus” has become quite broad and tends to create confusion in the marketplace. When people discuss what is...
silent, invisible, infect, malicious files, hijacks hijacks legitimate processes, applications
Poweliks: Active Memory Analysis
28 February 2019
Malware authors are increasingly becoming motivated by financial gain. As such, new generations of malware are being created to remain undetected and carry...
retail, credit card, security, malware,
Point-of-Sale (POS) Malware: The Escalating Threat
28 February 2019
While many large organizations struggle when responding to Point-of-Sale (POS) breaches, smaller companies have become a popular target for these malware...
virus, worm, trojan horse, rootkit, backdoor
Observational Malware Analysis (OMA): A Better Understanding
28 February 2019
Observational Malware Analysis (OMA) provides a better understanding of malware capabilities, the mission of the attacker, and the effects on the company...
financial institutions, banks, investors, accounts
Investment Fraud: The Growing Threat to Your Financial Security
28 February 2019
As legal standards and regulations evolve, institutions must continue to be proactive in the area of data security. Both internal and external threats...
Employee_Misconduct
Digital Forensics: Employee Misconduct
28 February 2019
Employee misconduct is a real danger faced by companies, while the employee works at the company, as well as during the time just prior to the employee’s...
firewalls and antivirus
Are Your Firewalls and Antivirus Keeping You Safe?
20 February 2019
Nearly every day, I’m asked if an impressive firewall configuration is enough to prevent malware from entering a company’s environment. Or I overhear someone’s...
1 19 20 21 22
Translate »

Total Economic Impact™ Of SpearTip ShadowSpear