Ransomware Risk Factors & Risk Reduction Strategies
Ransomware risk factors continue to be a top concern for organizations of all sizes and across all industries. From widely publicized cases affecting health care [...]
The Insider’s Guide to Password Spraying, Brute Force & Credential Stuffing Attacks
Authentication attacks come in different variations with some distinct nuances. Most folks are at least familiar with the term “brute-force attacks.” But, are you aware [...]
What Should & Should NOT Be Part of Your Social Engineering Prevention Training
I am a strong believer that every company should have comprehensive cybersecurity training and testing for all employees – including a variety of test campaigns [...]
Top 10 Cybersecurity Program Design Activities & Tips to Improve Your Cyber Maturity
At LMG Security, we work with organizations whose cybersecurity programs span the whole spectrum of maturity levels – from organizations just getting started with cybersecurity [...]
Stop Data Breach Shaming: Ending the Data Breach Notification Stigma
Let’s talk about theft. If an armed robber holds up a bank and leaves with cash, is your first inclination to blame the teller who [...]
Office 365 Tools for Digital Forensics Still Scarce Since the Magic Unicorn Tool’s Untimely Demise
While there have been multiple important updates to Office 365 tools and logging, on the anniversary of the infamous “Magic Unicorn Tool”, Microsoft still has [...]
Security in the Palm of Your Hand: A 10-Step Mobile Security Checklist You Can Start Today
In today’s digital world, we are incorporating technology into our daily lives at an unprecedented pace. According to the Pew Research Center, 81% of U.S. [...]
Black Hat 2020 Delivered Numerous Cybersecurity Takeaways
"When one door closes, another door opens." At Black Hat 2020, that couldn't be more true. The infamous cybersecurity hacker conference, which normally takes place [...]
A Pentest is Just the Beginning
Have you been involved in a pentest in the past? Did you know what was going to be required of you and what you were [...]
Surprising Lessons from Incident Response Testing
When LMG Security’s consultants work with clients on a security program review, we always ask about whether they test their organization’s incident response preparedness. Having [...]