TAP Into Technology Blog: Hacks and Breaches (6)
Garland TAPs at Work for the SECCDC
"You have just been hired as the network and security administrators at a small company and will be taking administrative control of all information systems. You know very little about the network, what security level has been maintained,...
What Happens When a Healthcare Computer Network Goes Down?
I hear it in the news every couple days or so, another major organization was hacked and one of two things likely happened; their network went down, or customer information was stolen. At this point we’ve all become so used to hearing...
How to Identify and Prevent Phishing Attacks
“Garland Technology triumphs in highly-volatile and critical environments, allowing us to provide visibility into our customers information, and help enterprises take proactive action against cyber-attacks.”
How to Defend Against TRITON Industrial Malware?
For all the concerns over Industrial Ethernet and IIoT security in recent years, there aren’t many identified malware families poised to take down critical infrastructure. In fact, since the 2010 Stuxnet attack in Iran, there have only...
Halloween Hack: Should SCADA/ICS be Scared?
I’ve been saying for years that supervisory control and data acquisition (SCADA) systems and industrial control systems (ICS) have a greater risk of being hacked. Unless changes and upgrades are made to these mission critical systems, a...
Hijacking Healthcare: Training the Treaters in Cyber Hacks
There’s no denying the dire security situation healthcare organizations are currently facing. However, so much of what you read online or see in the news revolves around specific malware threats or ransomware attacks. What is often missed...