Fortscale Insider Blog

data theft

18 May Data Theft —Top 5—Who’s Stealing Your Data?

There’s lots of information available about how cybercriminals steal our data. But there’s significantly less intelligence regarding just who is stealing it. So I decided to do a bit of research and put together a quick informal study on just who is behind today’s data theft cybercrimes. After reading dozens of papers and reports on the subject, I compiled and averaged...

Read More
compromised credentials spin data breach - it's Ground Hog Day again

17 May Compromised Credentials Spin Wendy’s Data Breach, It’s Ground Hog Day Again

Every time I look at the news and read about the latest data breach I’m reminded of the film Ground Hog Day where every morning actor Bill Murray would wake up to find an exact repeat of previous events. Compromised Credentials Last week it was fast food chain Wendy’s that came clean about their recent data breach, and yes, it’s the same old story about third-party vendor...

Read More
Fortcale

12 May Fortscale Update: Sitewide Upgrades

Fortscale will be working on sitewide upgrades beginning at noon PDT on Friday, May 13, 2016. Did you know that fear of Friday the 13th has a scientific name? "Triskaidekaphobia"; and an analogy to this the fear of Friday the 13th is called paraskevidekatriaphobia, from the Greek words Paraskeví (Παρασκευή, meaning "Friday"), and dekatreís (δεκατρείς, meaning "thirteen"). No Friday the 13th fear here—we...

Read More
cybersecurity apathy in the meeting room

11 May Cybersecurity Apathy – A misunderstood or bound for failure endeavor

Between all the firewalls, malware protection, threat intelligence, insider threat protection, IDS/IPS, managed security, certification and accreditation, and biometrics, why in the world are system owners still getting crushed? One word, apathy. When we look at the definition of the word, it is almost ironic if it were not so problematic. noun lack of interest, enthusiasm, or concern. synonyms: indifference, lack of interest, lack...

Read More

10 May When Someone Else Gets Hacked – Watch Out!

Those responsible for their organization’s data security may be thinking “I’m sure glad that didn’t happen to us” when they learn that some other company experienced a data breach. But in reality, when someone else get’s hacked, especially a big enterprise, it can put everyone else at greater risk of being breached – and we need to watch out all...

Read More
Fortscale momentum continues

06 May Fortscale Leadership Momentum Continues

It's an exciting time for Fortscale as our company continues to expand at a rapid pace—it is also crucial to have a top-notch leadership team in place that can keep Fortscales' momentum growing. We are delighted to announce the appointment of three key members that we believe will aid us in not only surpassing our immediate goals, but will also help develop our long-term strategy as our...

Read More
Fort Friday Security Clips

06 May Fort Friday Security Clips— Fortscale, Locky & DDoS

Fortscale is growing: We recently added three key members to our expanding leadership team. Joining Fortscale are David Somerville as Senior Vice President, Worldwide Sales, Sathvik Krishnamurthy to Fortscale’s Board of Directors, and Patrick Heim to the Fortscale Advisory Board. All three offer deep security and executive experience, and will help guide Fortscale as it enters its next phase of growth. “Fortscale’s...

Read More
Gambling with Sloppy Security Practices

05 May Gambling with Sloppy Security Practices

  This week I’ve been studying a number of recent, very large data breaches. The victims all had one thing in common—sloppy security practices. Unfortunately these organizations are not alone in their casual attitudes about security. Everywhere we look I see evidence that far too many companies are playing a very high stakes game of gambling with sloppy security practices. Here are...

Read More
Top 10 Ways to spot a phishing atttack

04 May Top 10 Ways to Spot a Phishing Expedition

The FTC defines phishing as "Internet fraudsters who impersonate a business to trick you into giving out your personal information." How to Spot a Phishing attack I continue to be amazed at the number and sophistication of phishing attacks. The just released 2016 Verizon Data Breach Investigations Report indicates that stolen user credentials continue to be the most common method cybercriminals use...

Read More
ransomware is like shackles on your data

03 May RANSOMWARE —It’s like VISA—It’s everywhere you want to be

Since the start of 2016, Ransomware has been making all the headlines.  Unlike a traditional break in and pilfer of data, ransomware renders a victim’s computer system(s) utterly useless unless a “ransom”, in BitCoins is paid.  When we think of a hacker trying to earn a buck taking on “the man”, we generally think about FORTUNE 500 companies or the...

Read More