The large volume of financial, banking, and insurance firms doing business in New York makes the state’s financial services and insurance industry a rich environment for hackers. For this reason, it comes as no surprise to learn the New York Department of Financial Services (NYDFS) passed far-reaching and detailed regulations designed to protect New [...]
About SoteriaThis author has not yet filled in any details.
So far Soteria has created 34 blog entries.
Login credential management platforms are valuable tools for organizing and securing a business’s or individual’s account usernames and passwords. While password management platforms simplify the process of creating and managing secure account credentials, they are not a 100% solution for account security practices at your business. On May 31, 2017, OneLogin, a credential management [...]
COLUMBIA, SC - May 23, 2017 - Soteria, LLC, a Charleston-based cyber security consulting and product development firm, received the SC Cyber Award of Excellence for Industry at the 2017 Cybersecurity Summit. Recipients of the SC Cyber Award of Excellence must have a demonstrated commitment to advance talent, techniques, and tools required to defend [...]
Defending against WannaCrypt and other Ransomware Attacks The WannaCrypt attack, a massive ransomware attack impacting businesses and individuals alike, has been making headlines around the world. Not only did this event hit a large number of victims, this attack has been further sensationalized because it utilized exploits said to be developed by the National Security [...]
Outsourcing IT operations to managed IT services providers (MSP) is a common trend for a business looking to maintain its operational efficiency while cutting down on cost. In addition to assisting with IT infrastructure management, 38 percent of businesses that hire an MSP do so with the expectation that their business will have enhanced security [...]
When a firm experiences a cyber event or security intrusion, it is often a chaotic experience. Responders are focused on detecting the breach source, locking down their IT infrastructure, and understanding the extent of their losses. However, when responding to an incident, it is important for firms to not overlook their other required breach [...]
Due to the ever-growing threat of cyber attacks, businesses operating in the NY State financial services and insurance industries are required to establish cybersecurity programs. The New York State Department of Financial Services (NYDFS) passed a set of regulations (23 NYCRR 500) requiring banks, insurance companies, and other financial services institutions supervised by NYDFS [...]
@nismoguy1, social engineering is an important security topic that impacts individuals and businesses alike! Before answering your question, it is important to define the term social engineering. A broad definition of “social engineering” is influencing someone to react in a certain way by exploiting one’s interests, habits, etc. In the context of cybersecurity, “social [...]
@CarsonSallis1, you bring up a very interesting question that is starting to become a hot topic in cyber security research. Internet of Things (IoT) ransomware is not yet a widespread threat to IoT devices, but there is evidence to indicate that it could become a growing threat. Security researchers (and hackers) are proving that [...]
@Pwdrkeg, effective and comprehensive phishing attack protection should combine technical solutions with user education. It is important to note that protecting against phishing attacks is a process that must constantly be revisited and adjusted as appropriate. We have outlined four recommendations for a well-rounded approach for effective phishing attack protection. 1.Configure email spam filters [...]