Do you want to learn more about security?  IT practitioners can turn to the National Institutes of Standards and Technologies Special Publications on computer security. Sometimes called the 800 series, these documents cover topics such as best practices in doing security assessments, security in virtual environments and suggestions for securing cloud environments.

Learn more about security locally by attending North Texas InfraGard events. Founded as an alliance between the FBI, security community and organizations like the yours, quarterly meetings help attendees understand the rapidly evolving threats using technology.

If you plan on focusing most of your efforts on securing your systems, consider that for every server, there 5-50 end users on PCs, laptops, and tablets that need your help understanding how to help protect the network. Start a security awareness campaign using content from the Department of Homeland Security’s STOP.THINK.CONNECT program. All kinds of resources are here for you – from a comprehensive Tips & Advice area to Twitter Chats, past and present. Get involved!

If you’d like to know where your company stands in its preparedness from a security standpoint, feel free to check out all the technology audit solutions we offer.


Other Helpful Security Resources:Daily Internet Storm Center

SANS Institute Common Security Terms – what’s the difference between Trojans, Worms and Ransomware?  Find out here.

SANS Institute Information Security Resource Center – from white papers to tools to tips of the day – most everything security related can be found here.

Daily ISC Stormcast – a daily network security update from the Internet Storm Center.

OnGuardOnline for Small Business

North Texas Electronic Crimes Task Force (N-TEC)

Krebs On Security

RSA Speaking Of Security Blog

Sophos Naked Security Blog

Google Online Security Blog


Tips to prevent Ransomware Attacks:

US-CERT and CCIRC recommend users and administrators take the following preventive measures to protect their computer networks from ransomware infection:

  • Perform regular backups of all critical information to limit the impact of data or system loss and to help expedite the recovery process. Ideally, this data should be kept on a separate device, and backups should be stored offline.
  • Maintain up-to-date anti-virus software.
  • Keep your operating system and software up-to-date with the latest patches.
  • Do not follow unsolicited web links in email. Refer to the Security Tip Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.
  • Use caution when opening email attachments. For information on safely handling email attachments, see Recognizing and Avoiding Email Scams.
  • Follow safe practices when browsing the web. See Good Security Habits and Safeguarding Your Data for additional details.
Individuals or organizations are not encouraged to pay the ransom, as this does not guarantee files will be released. Report instances of fraud to the FBI at the Internet Crime Complaint Center or contact the CCIRC


Data Breach Investigation Reports

Verizon’s 2015 Data Breach investigation Report

Verizon’s 2014 Data Breach Investigation Report

2013’s Data Breach Investigation Report




National Cyber Security Awareness Month, an opportunity to engage EVERYONE in building a safer cyber community, is increasingly supported throughout the community during the month of October.  The Fulcrum Group participates in National Cyber Security Awareness Month

Find out how you can take part in efforts to help strengthen your online community at The Department of Homeland Security.  We’ve always got a lot to say about security, so you’ll find it in many places around our site, including our blog (especially during the month of October), our events page (with links to scheduled security-themed Twitter chats and more), current and past newsletters and our collection of more informative white papers.

Scan all of our resources and let us know if we can be of further help!