Blog — Rebyc Security

Mecklenburg County Ransomware Attack - 6 Steps to Protect Your Organization

The question is, if your company was compromised via a ransomware attack, would you pay the hackers to get the encryption key that would unlock your data?  The answer may not be that simple, as Mecklenburg County officials found out last week.  The attack on their computer systems served as a wake up call to all companies proving that they need to take a proactive approach to preventing ransomware. If not, the alternative is much worse.

Continue reading

Investment Advisors - It's time to invest in Cybersecurity!

This week, Ryan Neal wrote a piece for WealthManagement.com about how Registered Investment Advisors (RIA) need to step up their game when it comes to taking cybersecurity requirements seriously. Below is a quote, taken directly from the post, The Cybersecurity Problem Requires Human Solutions:

Continue reading

Rebyc Security at the Jack Henry & Associates JAC 2017

REBYC SECURITY EXHIBITS AT THE JACK HENRY AND ASSOCIATES CUSTOMER CONFERENCE!!

Continue reading

6 Steps to Take to Fight Ransomware

Beazley Insurance just released their Beazley Breach Insights report, which found that ransomware attacks more than quadrupled in 2016. What’s even more alarming is that they predict this number, already at an all-time high, will double again in 2017! Helping fuel this growth is the addition of new Ransomware variants. Several security research firms have reported that as many as 10 new ones were introduced every month in 2016! Researchers have also uncovered some variants that offer Ransomware-As-AService, which allows almost anyone to conduct a vicious ransomware campaign against the target of their choosing.

Continue reading

Yahoo Breach(es) - Lessons Learned for your Company

Do you Yahoo? Remember that slogan back in the 90’s in the Yahoo commercials?  Well, you wouldn’t be alone if you do Yahoo, or did at least. Per SimilarWeb, Yahoo.com is still the most popular news and media website and the 5th most popular site overall.  The Yahoo sites get over almost 6 billion visits a day, but unfortunately, those numbers are trending downward due to their security breach disclosure. 

Continue reading

MYTH: Phishing Tests Should Only Be Performed Annually

Here we go again - this is the third in our series of posts for National Cyber Security Awareness Month (NCSAM).  During the month, we are looking to dispel cyber security related myths that we hear all too frequently.   

Continue reading

MYTH: An Internal Vulnerability Assessment is the Same as an Internal Penetration Test

This is our second National Cyber Security Awareness Month (NCSAM) post where we seek to dispel some myths about cyber security services. Throughout October, we’ll be posting some blogs breaking down some of the of the more prevalent versions of these myths we are seeing in the market.  

Continue reading

MYTH: External Pen Test is the Same as an External Vulnerability Assessment

With National Cyber Security Awareness Month (NCSAM) now upon us, we thought it would be good to dispel some cyber security service related myths.  All too often, in conversations with our clients, we are finding they didn’t get what they thought they were getting when they purchased a previous service.  Or worse, they don’t even realize it.  Throughout October, we’ll be posting some blogs breaking down some of the more prevalent versions of these myths.   

Continue reading

Phishing Attacks - Do's and Don'ts to Protect Your Company

In Today's world, a phishing attack is one of the most successful means a hacker uses to gain access to your data.  It's not all that shocking given the improvements in technology, tools and education regarding securing your physical environment.  They have to find a way around - if they can get just one of your employees to give up their credentials, it could be just the keys to the kingdom they need. 

Continue reading

65% of Breaches Caused by a Third Party - How Well Do You Know Yours?

Hardly a day goes buy without a new headline about a high profile breach.  Pick up a local newspaper, or the NY Times or simply spend a few minutes on your LinkedIn thread and you'll find news about Target, Home Depot and Wendys to name a few.  What a headache for these organizations to deal with.  

Continue reading