Cyber Risk

SolarWinds Supply Chain Cyberattack

Cyber Case Study: SolarWinds Supply Chain Cyberattack

In the final month of 2020, it was revealed that foreign hackers had orchestrated a supply chain cyberattack throughout the past year in an effort to compromise several federal agencies and private organizations. The cybercriminals first infiltrated the digital infrastructure of SolarWinds—a Texas-based technology company—before using that infrastructure to gain access to sensitive data from …

Cyber Case Study: SolarWinds Supply Chain Cyberattack Read More »

Cyber Liability Lessons From the Colonial Pipeline Breach

Cyber Liability: Lessons From the Colonial Pipeline Breach

One of the nation’s largest pipelines was forced to shut down in early May 2021 after falling victim to a ransomware attack. The 5,500-mile pipeline is operated by Colonial Pipeline and carries refined gasoline and jet fuel from Texas to New York. This pipeline transports 45% of the east coast’s fuel supplies. The attack—carried out …

Cyber Liability: Lessons From the Colonial Pipeline Breach Read More »

Reducing Supply Chain Cyber Exposure

Reducing Supply Chain Cyber Exposure

Cyberattacks on global supply chains can cause irreparable harm to an organization’s operational, financial and reputational wellness. These incidents can occur even if your organization is practicing proper cybersecurity methods. Instead of attacking your organization directly, these cybercriminals take advantage of vulnerable suppliers or vendors in your organization’s supply chain to wreak havoc on key …

Reducing Supply Chain Cyber Exposure Read More »

Double Extortion Ransomware Attacks

Double Extortion Ransomware Attacks

In recent years, ransomware attacks have steadily been on the rise. These incidents—which entail cybercriminals compromising a device or server and demanding a large payment be made before restoring the technology (as well as any data stored on it) for the victim—are one of the most damaging cyberattack methods, incurring an average of $1 million …

Double Extortion Ransomware Attacks Read More »

How to Prevent a Malware Attack

How to Prevent a Malware Attack

Malware is a form of malicious software that cybercriminals deploy via unsafe links, downloaded attachments or other virus-ridden programs with the intention of disrupting normal computing operations, collecting sensitive information and controlling your organization’s technology system resources. Malware programs are being produced at an alarming rate and are consistently changing in form and purpose, making …

How to Prevent a Malware Attack Read More »

The Importance of Promoting Strong Passwords

The Importance of Promoting Strong Passwords

Cyberattack methods continue to grow and evolve over time. One specific tactic that cybercriminals frequently utilize is hacking victims’ accounts or devices by cracking their passwords. This tactic is often all too easy for cybercriminals when their targets fail to create strong enough passwords to ward off password-cracking technology or—in some cases—simple guesses. Nevertheless, cybersecurity …

The Importance of Promoting Strong Passwords Read More »