RESOURCES

With more than 15 years’ experience in cyber counterintelligence, we have learned to approach cybersecurity differently, and more effectively, than other companies. Browse our case studies, expert insights, Ask the Expert series and more to see why so many organizations choose us to protect their systems when the worst happens.

adware, spyware, keyloggers, fake antivirus software
Malware: Open Warfare in Cyberspace and the Increasing Malware Threat
28 February 2019
Over the years, the definition of the term “virus” has become quite broad and tends to create confusion in the marketplace. When people discuss what is...
silent, invisible, infect, malicious files, hijacks hijacks legitimate processes, applications
Poweliks: Active Memory Analysis
28 February 2019
Malware authors are increasingly becoming motivated by financial gain. As such, new generations of malware are being created to remain undetected and carry...
retail, credit card, security, malware,
Point-of-Sale (POS) Malware: The Escalating Threat
28 February 2019
While many large organizations struggle when responding to Point-of-Sale (POS) breaches, smaller companies have become a popular target for these malware...
virus, worm, trojan horse, rootkit, backdoor
Observational Malware Analysis (OMA): A Better Understanding
28 February 2019
Observational Malware Analysis (OMA) provides a better understanding of malware capabilities, the mission of the attacker, and the effects on the company...
financial institutions, banks, investors, accounts
Investment Fraud: The Growing Threat to Your Financial Security
28 February 2019
As legal standards and regulations evolve, institutions must continue to be proactive in the area of data security. Both internal and external threats...
Employee_Misconduct
Digital Forensics: Employee Misconduct
28 February 2019
Employee misconduct is a real danger faced by companies, while the employee works at the company, as well as during the time just prior to the employee’s...
firewalls and antivirus
Are Your Firewalls and Antivirus Keeping You Safe?
20 February 2019
Nearly every day, I’m asked if an impressive firewall configuration is enough to prevent malware from entering a company’s environment. Or I overhear someone’s...
consumer cyber best practices
Consumer Cyber Best Practices
20 February 2019
The end of the year is a valuable time to clean up bad cyber habits. With a new year comes new opportunities for both you, and the bad guys. Bad guys prey...
cybersecurity for accountants
New SEC Cybersecurity directives for accountants
20 February 2019
SpearTip exists to help our clients stop on-going cyber crime and to prevent future cyber crime. our innovative services include incident response, malware...
questions about cybersecurity
Questions directors should be asking about cybersecurity
20 February 2019
Cybercrime has quickly become the single greatest threat to most businesses, with damages projected to top $6 trillion by 2021 , just three short years...
low tech
3 Low Tech, Low Cost Ways To Help Protect Against Cybercrime
10 February 2019
Business Journal Ask the Expert Column – February 2019 Despite the fact that cyber security represents the greatest high-tech threat known to most organizations,...
cyber security defenses
WARNING: Set Your Cyber Security Defenses On High For 2019
18 January 2019
Business Journal Ask the Expert Column – January 2019 Welcome to a new year. I wish I had happy news, but I don’t. Poorly prepared organizations could...
improve cyber security
Things You Can Do Today To Improve Cyber Security
10 December 2018
Business Journal Ask the Expert Column – 2018 We’re going to focus today’s Ask The Expert on one, single question I received in my inbox this morning....
Security tactics
Important Strategies And Tactics For Cyber Security In 2019
10 December 2018
Business Journal Ask the Expert Column – December 2018 It’s hard to believe that I’ve served as the St. Louis Business Journal’s Cyber Security Expert...
cyber insurance
Cyber Insurance “Exclusions” Could Cost You Millions
09 December 2018
Business Journal Ask the Expert Column Is There Anything Specifically In Our Cyber Insurance Policy That Could Leave Our Company Exposed Or At Risk? Yes....
response planning
How To Select The Right Pre-Breach Planning And Response Partner
09 December 2018
Business Journal Ask the Expert Column 5 Critical Considerations To Include When Evaluating A Pre-Breach Planning And Response Partner. I usually try to...
surviving cyber attacks
Surviving Cyber Attacks Depends On Perfecting Practices
09 December 2018
Business Journal Ask the Expert Column When it comes to warding off cyber criminals, cyber terrorists and hackers, the old adage that “Practice makes perfect”...
cybersecurity in banking
Using Cybersecurity To Regain The Trust Of Banking Customers
09 December 2018
Business Journal Ask the Expert Column Consumer mistrust in corporate cybersecurity is reaching all-time highs this year. A recent study conducted by the...
SEC cybersecurity directives for accountants
New SEC Cybersecurity Directives For Accountants
09 December 2018
Business Journal Ask the Expert Column The Securities and Exchange Commission recently released its 2018 Guidance on Public Company Cybersecurity Disclosures,...
questions about cybersecurity
Questions Directors Should Be Asking About Cybersecurity
09 December 2018
Business Journal Ask the Expert Column Cybercrime has quickly become the single greatest threat to most businesses, with damages projected to top $6 trillion...
1 23 24 25 26
Translate »

Total Economic Impact™ Of SpearTip ShadowSpear