Sage Advice - Cybersecurity Blog

Becky Metivier

Recent Posts

How to Protect Your Organization from a Ransomware Attack

Ransomware attacks can have devastating consequences for organizations. Downtime is often more detrimental than ransom costs. Recovery is expensive, and there is a significant cost in system disruption, emergency response, and reputation damage.

Read More

Topics: Ransomware, Cybersecurity Awareness

Anatomy of a Ransomware Attack and How to Detect the Threat

Ransomware continues to be a significant threat to organizations of all sizes. Victims of an attack are denied access to their data. Many times, files are encrypted, and a ransom is demanded to restore access. If hit, the best-case scenario is that you have clean backups to restore your systems and can avoid paying the ransom.  However, downtime is often more detrimental than ransom costs. Recovery is expensive, and there is a significant cost in system downtime, emergency response, and reputation damage.

Read More

Topics: Ransomware, Threat Hunting

5 Lessons Learned at our Ransomware Cybersecurity Summit

Local governments and school districts are falling victim to ransomware attacks with alarming frequency and devastating consequences. At any organization, having tools in place to improve cyber resilience is a necessity, especially as hackers get more sophisticated every day.

Read More

Topics: Cybersecurity Culture, Ransomware, Cybersecurity Awareness

The Concentration Risk of Cloud Services

The epic Target breach raised our awareness that third-party service providers are a significant cybersecurity risk. It showed us how an employee at an HVAC vendor could click a phishing link and result in 40 million credit / debit card numbers and 70 million customer and employee records being compromised.

Read More

Topics: Vendor Management, Cloud Security

How to Assess the Security of Your Cloud Service Providers

Like everything in technology today, the activities of cybercriminals are constantly evolving. Your organization must keep pace to protect your data and your reputation. The place most clients are with this query is, “What are our peers doing?”

Read More

Topics: Financial Sector, Cloud Security

The Risks and Rewards of Cloud Services

Cloud computing has gained popularity over the past few years, and organizations large and small are utilizing a variety of cloud services to support their business needs.

Read More

Topics: Vendor Management, Cloud Security

The Danger of Stolen Usernames and Passwords: Credential Stuffing

The popular tax preparation software TurboTax recently announced that an unauthorized party had accessed an undisclosed number of its clients’ accounts. But it wasn’t because they had suffered a data breach. Instead they were victims of a credential stuffing attack – a cyberattack that continues to gain popularity. 

Read More

Topics: Cyber Defense, Privacy, Cybersecurity Awareness

Developing a Cyber Threat Intelligence Program

With cyber-attacks increasing, the likelihood that many organizations are experiencing the same attack is also increasing.  When such an incident occurs, the intelligence gathered – including what happened, how it was dealt with, and lessons that were learned – can teach your organization what to do in the same situation.  In today’s dynamic threat environment, it’s impossible to single-handedly keep on top of everything.  Implementing a threat intelligence program can help you better protect your organization.

Read More

Topics: Security Policy, Threat Intelligence, Information Sharing

Why Your Personal Data is Valuable – and How to Protect It

Looking back at recent data breaches, it’s interesting to note that the largest breaches didn’t involve stolen credit card or social security numbers. Instead a myriad of personal information is being stolen in massive quantities. Why this shift? It’s just more valuable!

Read More

Topics: Threat Intelligence, Risk Management, Privacy

Formjacking is on the Rise – A Look at the Top Cyber Threats

Cybercriminals are driven by opportunity and go where the money is. As soon as the good guys figure out how to stop them, they’ve already figured out their next move. So, it’s no wonder that the cyber threat environment is constantly changing, and exploits continue to evolve and shift.

Read More

Topics: Malware, Risk Management