TruBlog

Critical Security Information For Security Conscious Companies

Email Us - 877.583.2841 - Request A Demo

Use This Form To Have A TruShield Team Member Contact You With More Information.

  • This field is for validation purposes and should be left unchanged.

Use This Form To Contact TruShield Inc Directly. Or you can call us at: 877.583.2841. We will respond back as quickly as possible!

Cybercriminals are Targeting Law Firms

It’s no secret that the legal industry is now recognized as one of the biggest targets for cybercriminals today. Clients trust you with their private information and believe that you will keep it safe. In a PwC report entitled, Safeguarding Your Firm From Cyber Attacks, they note, “Privacy and confidentiality are bedrock qualities for law firms. The theft of client information could be devastating to a firm’s reputation, which is their most important asset.”

As more attacks are being perpetrated against law firms, it’s time to take a serious look at your cybersecurity strategic plan. Is your firm prepared to withstand an attack? Continue Reading

Brace Yourself for Another Ransomware Sh*tstorm

As the world sifts through the ashes left from the cybersecurity firestorm brought down on it over the weekend by a ransomware strain known as WannaCry, a new menace is growing from its shadows. This new ransomware comes from similar origins, an NSA exploit dump by Shadow Brokers.  While WannaCry used a weaponized exploit called… Continue Reading

Keeping Your Data Safe from WannaCry Ransomware

On Friday, May 12th, a flurry of activity was recorded in worldwide security operation centers (commonly referred to as SOCs) as cybersecurity specialists sprung into action across the globe. As you’ve probably heard, WannaCry was the reason the alarm bells started ringing, setting the stage for some very long weekends for IT and Security professionals… Continue Reading

The Developing Dangers of SCADA Systems

Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities in America, as well as in other countries. These devices are a part of the nation’s critical infrastructure and should be protected from the growing and evolving list of security threats that exist today.… Continue Reading

The Vulnerabilities of the President’s Twitter

By now, you have probably heard about how our fearless commander-in-chief is utilizing an outdated Android device, and maybe it makes you wonder if he has already been hacked.  Along the same lines, you might think his Twitter account is already potentially compromised (did you catch his thoughts on the whole Russia hacking topic?).  Here to speak… Continue Reading

Best Approaches and Solutions for Endpoint Detection and Response

From our guest contributor, Corey Lancaster Sr. Cybersecurity Solutions Architect Basic Upkeep and Awareness The best approach and solution for Endpoint Detection and Response is to prevent it from happening in the first place. Prevention can be broken down into a few identifiable categories. Often, IT leaders and Senior Management focus on the “block and… Continue Reading

The SEC’s Ultimatum on Cybersecurity

On January 12, 2017, the Securities and Exchange commission released their Office of Compliance and Inspections Examination (OCIE) priorities for the year.  Indicative of the increasing risks that are present in a highly-connected environment, cybersecurity continues to be a top focus for the SEC when examining its registrants.  Specifically, the OCIE stated that they “will… Continue Reading

Copyright © 2017