TruBlog

Critical Security Information For Security Conscious Companies

Email Us - 877.583.2841 - Request A Demo

Use This Form To Have A TruShield Team Member Contact You With More Information.

  • This field is for validation purposes and should be left unchanged.

Use This Form To Contact TruShield Inc Directly. Or you can call us at: 877.583.2841. We will respond back as quickly as possible!

Brace Yourself for Another Ransomware Sh*tstorm

As the world sifts through the ashes left from the cybersecurity firestorm brought down on it over the weekend by a ransomware strain known as WannaCry, a new menace is growing from its shadows. This new ransomware comes from similar origins, an NSA exploit dump by Shadow Brokers.  While WannaCry used a weaponized exploit called EternalBlue, cybercriminals are currently developing weapons based upon an NSA exploit called “EsteemAudit.”  Similar to WannaCry, EsteemAudit targets yet another vulnerability found in Microsoft operation systems (MS17-010). This is the first of many weaponized zero-day exploits we predicted to come after WannaCry that were included in those dumps.

Continue Reading

Keeping Your Data Safe from WannaCry Ransomware

On Friday, May 12th, a flurry of activity was recorded in worldwide security operation centers (commonly referred to as SOCs) as cybersecurity specialists sprung into action across the globe. As you’ve probably heard, WannaCry was the reason the alarm bells started ringing, setting the stage for some very long weekends for IT and Security professionals… Continue Reading

The Developing Dangers of SCADA Systems

Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities in America, as well as in other countries. These devices are a part of the nation’s critical infrastructure and should be protected from the growing and evolving list of security threats that exist today.… Continue Reading

The Vulnerabilities of the President’s Twitter

By now, you have probably heard about how our fearless commander-in-chief is utilizing an outdated Android device, and maybe it makes you wonder if he has already been hacked.  Along the same lines, you might think his Twitter account is already potentially compromised (did you catch his thoughts on the whole Russia hacking topic?).  Here to speak… Continue Reading

Best Approaches and Solutions for Endpoint Detection and Response

From our guest contributor, Corey Lancaster Sr. Cybersecurity Solutions Architect Basic Upkeep and Awareness The best approach and solution for Endpoint Detection and Response is to prevent it from happening in the first place. Prevention can be broken down into a few identifiable categories. Often, IT leaders and Senior Management focus on the “block and… Continue Reading

The SEC’s Ultimatum on Cybersecurity

On January 12, 2017, the Securities and Exchange commission released their Office of Compliance and Inspections Examination (OCIE) priorities for the year.  Indicative of the increasing risks that are present in a highly-connected environment, cybersecurity continues to be a top focus for the SEC when examining its registrants.  Specifically, the OCIE stated that they “will… Continue Reading

Top FAQs on PCI Compliance

  What is PCI DSS and how to find resources about it? “The Payment Card Industry Data Security Standard (PCI DSS) is a set of requirements designed to ensure that all companies that process, store or transmit credit card information maintain a secure environment.” Continue Reading

Copyright © 2017