Catch-IT

Breach Response Checklist for Businesses

These days data breaches have become almost commonplace.  It's no longer "if you get breached" but rather "when you get breached".  While prevention is still key, it is important to implement procedures to quickly detect breaches and contain the damage once confirmed.   Likened to fire preparedness in an office building, [...]

By |2019-01-03T16:49:45-05:00July 9th, 2018|Categories: Advisory, CyberSecurity|Tags: , |

Microsoft Issues Update for Critical Flaw Found in Malware Protection Engine

Microsoft revealed a critical vulnerability in its Malware Protection Engine (MPE) on Thursday (12/7) that allows an attacker to take full control of a target’s computer. Enabled by default, Microsoft Malware Protection provides the core cybersecurity capabilities for Microsoft anti-virus and anti-spyware programs in all of the company’s products. The vulnerability is [...]

By |2018-01-02T11:31:25-05:00December 8th, 2017|Categories: BMT Announcement, Catch IT, CyberSecurity|Tags: , |

Cybersecurity Protocols and the Way We Do Business

The challenges of cybersecurity are changing the business landscape. As the risks associated with a data breach continue to rise, businesses are taking a closer look at their existing protocols and implementing formal risk assessments, policies and standards. Proactive companies not only audit themselves, but also look at vendors [...]

By |2019-07-31T13:08:48-05:00June 12th, 2017|Categories: Advisory, Catch IT, CyberSecurity|Tags: , |

Recent Phishing Tactics – What to Look For and How to Avoid Falling Victim

Hackers are getting sophisticated when it comes to phishing scams.  Recently, Google Gmail and Microsoft Office users were targets of a phishing attack that included graphics and a login page that were nearly identical to the mentioned providers.  These improved tactics increase the likelihood of recipients falling victim to the [...]

By |2019-07-31T12:59:01-05:00March 22nd, 2017|Categories: Advisory, Catch IT, CyberSecurity|Tags: , , , , , |
Go to Top