Recover Your Data And Your Trust

While it’s true that cyberattacks are stressful, it’s very likely that you won’t be aware of the attack until after it’s over. Days, weeks, or even months might pass before you realize your company was the victim of a security breach. If the damage is already done, you might feel like the problem is out…

Read More

Did You Fall Victim to a Cyber Attack Over the Holidays?

If your business fell victim to a cyberattack over the holidays, you are far from alone. Unfortunately, the holidays are a very common time for cybercriminals to strike.  In this article, we’ll get into the reasons why cybercriminals are most active around the holiday season, along with steps to take if you were targeted.   …

Read More

What Is Considered Insider Threat?

An insider threat includes any malicious activity that comes from within – from users that have access to an organization’s network, their applications, or their databases. The users might be current employees, former employees, or even third parties like partners, contractors, or temporary workers. All they need is access to the organization’s physical or digital…

Read More

[Cyber Alert] Fortigate CWE-122

Video Overview Publications IR Number: FG-IR-21-115 CVSSv3 Score: 7.3 CVE ID CVE-2021-36173 Summary A heap-based buffer overflow [CWE-122] in the firmware signature verification function of FortiOS may allow an attacker to execute arbitrary code via specially crafted installation images. Logs While Fortinet has not provided any information on how the flaw is being exploited, they shared…

Read More

8 Ways to Avoid Phishing Scams

Phishing is when cybercriminals contact you via email or text message in an attempt to steal your passwords, account numbers, or Social Security numbers. When they get hold of this information, they might be able to access your email, bank account, or other sensitive data that you definitely don’t want scammers near.  Common Tactics In…

Read More

The Techniques of A Cyber Attacker

A cyber attack is when a computer system is accessed in an unauthorized manner with the goal of sizing, modifying, or stealing data. It’s important to be aware of the techniques of a cyber criminal because, if you understand their tactics, you can better protect yourself and your business.  Cyberthreats come with varying degrees of…

Read More

Types of Attacks Your Business Could Experience

Small and large businesses are both at risk of cybersecurity threats. While some may think that small businesses fly under the radar of cybercriminals, such is not the case, as it’s possible for hackers to target hundreds or even thousands of small businesses at one time. Due to this fact, it’s necessary to stay vigilant…

Read More

Benefits 24/7 Incident Response Coverage

At Barricade Cyber Solutions, we understand the importance of quick response time – that’s why we implement a 24/7 incident response coverage. We are at your service any time of day, any day of the week, because we know how detrimental a cyberattack can be for your business.  The reason we are always on call…

Read More

Phases of Incident Response

A cyberattack can throw your life and business into complete turmoil, but there are many measures you can take to prevent the worst-case scenario from happening. This blog will discuss some of the different phases of incident response so you’ll be better prepared if confronted with a cyber threat.  What is Incident Response? Any business…

Read More