LBMC, a GIAC certified incident handler, offers computer security incident response services, including IR plans, training, forensic analysis & more.
A more strategic approach to your security program requires one of the most valuable scenario-based approaches, incident response tabletop exercises.
It is important to remember that cybersecurity is not just the responsibility of the IT department within an organization. Everyone in the company can (and should) play a part in protecting against threats and helping to avoid malware infections and cyber breaches.
The notoriety of ransomware is so great that the United States Department of Health and Human Services has issued guidance specific to this threat.
Our Ransomware Protection Checklist has detailed steps to defend against ransomware and other malware. Firewall, router, IDS, SIEM, applications & more.
In this article, we explore some countermeasures your company should take to fend off phishing. Here are some best practices an organization can implement to stop phishing or limit the impact of a successful phishing attempt.
Preparation for a security breach is a vital component to mitigating cyber threats.