Fulcrum Group Local Government Cybersecurity Best Practices Virtual Lunch & Learn

If you missed this week's virtual Lunch & Learn event on Cybersecurity Best Practices for local government, we've got it right here for you!

Fulcrum Group and leader in cybersecurity operations, Arctic Wolf teamed up for this event, covering information on the following topics - check out our YouTube channel for the event in its entirety!

Real-world cybersecurity incident analysis
What's At Risk?
Challenges specific to your cybersecurity
Cybersecurity basics and advanced practices
Criminal Justice Information Systems (CJIS) Public Safety Minimum Requirements - starting points
Discussion with Jim Johnson of Arctic Wolf ("Breach Lessons Learned" - real world cybersecurity analysis)

And, as always, reach out if you have questions!

Email Phishing Simulation – What Not To Do

A British railway firm has been criticized (and rightly so) for sending out an email phishing simulation test that ended up eroding employee trust in the company.

The firm sent out an email phishing simulation to employees telling them that would get a financial reward for their "hard work" during the pandemic.

Colonial Pipeline Hack

The cybercriminals who shut down the Colonial Pipeline this past weekend say they didn't mean to cause problems for society. This is a terrifying reminder that ransomware is targeted at all businesses, all the time, and the impact can be colossal.  Imagine if this attack had been perpetuated 3 months ago during the winter; the impact in lost lives could have been unimaginable.

April 13, 2021 is Identity Management Day!

Recent research reveals that 79% of organizations have experienced an identity-related security breach in the last two years, and 99% believe their identity-related breaches were preventable. According to the 2020 Verizon Data Breach Investigations Report, as many as 81% of hacking-related breaches leverage weak, stolen, or otherwise compromised passwords.

Business & IT Lessons From The Covid-19 Pandemic

January 22nd, 2021

It’s safe to say that no business owner was totally prepared for the massive impact of Covid-19 on a wide range of business functions. It has now been almost a year since the pandemic caused businesses to lock down and send employees to work from home.

Ransomware – Before, During & After

January 14th, 2021

Before During and After Ransomware attacks

We all have heard of one of the most popular cyberattacks used in today’s business environment – ransomware. What type of attack it is, how it is obtained, how to get it off your machines if you’re attacked, and how to prevent it from happening to your organization – we’ve got answers for you! Watch our quick video here, or see our Q & A below.

Employees Most Susceptible to Phishing Attacks

January 13th, 2021

We might be prone to considering breaches caused primarily by cybercriminals hacking corporate networks. But data show - especially in the case of phishing attacks - are most often facilitated unknowingly by employees or insiders. In fact, the most recent Verizon Data Breach Investigations Report (DBIR) revealed that 30 percent of breaches are caused by an internal actor.

5 Ways you can benefit from business dashboards

December 28th, 2020

Data dashboards have become increasingly popular for businesses over the past few years. They are a great data visualization tool that gives you an overview of how your business is performing, catering to a wide variety of users, from marketing staff to project managers.

Global Cyber Threats Growing Against US Government & Business

December 22nd, 2020

At the end of a challenging pandemic year, news has come to light about recent cyber assaults against US government agencies, government contractors, IT companies, Think Tanks, and other businesses in 2020.  These attacks illuminate the ways that the cybersecurity landscape continues to evolve and become even more dangerous.