by Gate 15 | May 26, 2017 | Uncategorized
About a week ago, as we were coming out of the initial concerns relating to the WannaCry ransomware outbreak, I shared the following thought on LinkedIn: “WannaCry brings up a thought I often have – what is the best way to capture cyber incidents with physical...
by Gate 15 | May 25, 2017 | Uncategorized
This week, terrorists have conducted attacks in the United Kingdom, Indonesia, the Philippines, Somalia (and other parts of Africa), as well as ongoing fighting in Iraq and Syria. On 15 May, the US Department of Homeland Security released an updated National Terrorism...
by Gate 15 | May 23, 2017 | Uncategorized
Business Email Compromise (BEC) is a more specific form of Email Account Compromise (EAC). Email accounts can be compromised by guessing email credentials, obtaining access by the interception of email credentials, encryption keys, or gaining email account information...
by Gate 15 | May 16, 2017 | Uncategorized
The National Terrorism Advisory System is an inadequate tool to communicate threats and risks to homeland security. From Friday, over the weekend, and continuing, organizations around the world, to include numerous entities within the critical infrastructure...
by Gate 15 | May 11, 2017 | Uncategorized
Vocabulary.com defines extortion as “forcing someone into giving you something through threats.” Most commonly the extortioner desires money but it could be anything deemed to be as something of value. The extortioner may desire a decision made in his/her favor or the...
by Gate 15 | May 11, 2017 | Uncategorized
This is the first in a short series we’re writing for our friends at SurfWatch Labs on applying the Preparedness Cycle to Cyber Risk Management. Bad things happen. Whether we’re dealing with our personal or professional business, life seems to always have a...