Our Thoughts On

Sort by

Categories
Authors

Cybersecurity

Articles 201 - 210 of 288

New Orleans Under State of Emergency Due to Ransomware Attack

The city of New Orleans continues to operate under a state of emergency following a devastating ransomware attack. The hack was discovered in the early

Brian Krebs Sheds Light on Cybercrime at Pittsburgh’s Premiere Cybersecurity Event

On December 9, 2019, I was honored to represent the Pittsburgh Chapter of ISACA and Schneider Downs as the leader of Pittsburgh’s Information Security

Ryuk Ransomware Facts and Protections

Ransomware is a type of malicious software that either prevents access to existing files or to the computer entirely until a ransom is paid. It is so widespread

Russian Hackers Indicted in Pittsburgh

Two Russian nationals, Maksim Yakubets and Igor Turashev, were indicted in Pittsburgh on December 5th, for involvement in international multimillion-dollar
Register to receive our weekly newsletter with our most recent columns and insights.

Six Cybersecurity Tips for the Holiday Shopping Season

Ho, ho, ho, hold on before clicking on that link advertising an amazing deal this holiday season. Phishing, that ever-present and ever-growing organizational

Louisiana Issues Filing Extension After Ransomware Attack

The state of Louisiana became the latest victim of a string of cybersecurity incidents involving government agencies when a ransomware attack impacted

Teach a Man to Phish: Six Common Elements of a Phishing Scams and How to Spot Them

Sensationalist headlines about cybersecurity incidents have become the norm. Sadly, so too have clever email phishing scams. A recent notice issued by

Questions to Ask Before Ransomware Hits Your Business

In the past, a ransomware attack would target a single computer and ask the victim for $500. But now, what we see during our own cyber-incident response
Register to receive our weekly newsletter with our most recent columns and insights.

The Physical Side of Cybersecurity

At Schneider Downs, we always strive to uphold our responsibility to serve as trusted cybersecurity advisors to our clients and to the community at large.
Cybersecurity
Sean Thomas | 10.11.2019

Vulnerability Scanning versus Penetration Testing

When organizations look to assess the resiliency of their information systems, there tends to be some confusion around what exactly vulnerability scanning
Register to receive our weekly newsletter with our most recent columns and insights.

This site uses cookies to ensure that we give you the best user experience. Cookies assist in navigation, analyzing traffic and in our marketing efforts as described in our Privacy Policy.

×