MCP Insights

Cybersecurity Threat Advisory: Ryuk Ransomware Activity Targeting the Healthcare and Public Health Sector

Posted on November 2, 2020 by Mike Beagles

As part of our effort to inform our clients about potentially serious cybersecurity issues, MCP provides advisories about vulnerabilities and exploits that could threaten the operations of their critical communications networks. Sign up to receive these advisories in your inbox as soon as they are released.

Read More

Cybersecurity Threat Advisory: Heightened Attack Activity Involving Trickbot Variant 'Bazar Backdoor'

Posted on October 2, 2020 by Mike Beagles

As part of our effort to inform our clients about potential and serious cybersecurity issues, MCP provides advisories about vulnerabilities and exploits that could threaten the operations of their mission-critical communications networks. Sign up to receive these advisories in your inbox as soon as they are released.

Read More

How Mission-Critical Organizations Can Leverage Penetration Testing to Protect Against Cyberattacks

Posted on August 13, 2020 by Matt Schreiner

Amid efforts to expose cybersecurity vulnerabilities in a network before an attacker does, penetration testing, also referred to as a pen test or a white-hat attack, continues to gain momentum as a viable means to detect weaknesses in an organization’s network infrastructure.

If the term penetration testing is foreign to you, it is not as intrusive as it sounds. The objective of a penetration test is to provide information technology (IT) and system managers with critically needed intelligence regarding their organization’s security vulnerabilities. Whether the testing is performed manually or via sophisticated automation tools, it is best conducted by a third party that can use the same tools many hackers rely on. Many of these tools are widely available, arming testers with a better understanding of how they can be used to attack an organization.

Read More

Why Critical Infrastructure Agencies Should Monitor for Exposed Credentials

Posted on July 27, 2020 by Frank Arico

The average number of breached data records, including credentials, per U.S.-based company, is an astounding number—28,500.

Read More

What’s Next? Conducting an Incident Response Review

Posted on May 29, 2020 by Chris Kelly

As states begin to reopen and communities slowly return to normalcy, organizations, including mission-critical agencies, must evaluate their responses to the COVID-19 public-health crisis and leverage their experiences to prepare for future crises. Conducting an incident-response review, also called a hot wash, enables agencies to identify areas in which they performed well, as well as where their responses could use improvement. When conducted as part of an agency’s after-action reporting activities, this review can help build a better incident-response plan moving forward.

Read More

Subscribe to Newsletter

Popular Posts