5 Takeaways From Reviewing 2018’s Healthcare Data Breaches

2018 healthcare data breaches report

In 2018, the U.S. Healthcare Industry Remained a Hot Target for Data Breaches. Last year alone, over 15 million patient records were affected with an average of one data breach occurring every 24 hours in the healthcare industry. It goes without saying that hackers and cyber attackers are finding ways around/through/past security defenses—exploiting vulnerabilities and…

Read More

Hunting, Detecting, and Responding to Hidden Threats Using FSA

hidden cyber attacks

A Brief History of Forensic State Analysis Prior to starting Infocyte, our co-founders, Chris Gerritz and Russ Morris, created the first enterprise-scoped threat hunting team for the entire U.S. Department of Defense. Their teams were responsible for hunting, detecting, and responding to highly sophisticated attacks across an 800,000-node network. With virtually unlimited resources and access…

Read More

Cybersecurity 101: What You Need To Know About False Positives

false positives false negatives siem alerts

… and False Negatives An Overview of False Positives and False Negatives Understanding the differences between false positives and false negatives, and how they’re related to cybersecurity is important for anyone working in information security. Why? Investigating false positives is a waste of time/resources and distracts your team from focusing on real cyber incidents (alerts)…

Read More

Three Use Cases For Proactive Threat Hunting and Detection Within Healthcare Organizations

cyber threat hunting healthcare

Malware Hunting is a Necessity in Today’s Enterprise IT Environments Cyber attacks are evolving so rapidly that security teams are struggling to integrate and operationalize security tools that apply to only one area of the protection model. Malware Hunting (threat hunting) for example is becoming a necessity in today’s enterprise IT environments — especially for…

Read More

How Infocyte’s MDR Services Significantly Reduce Cyber Risk

infocyte cyber risk scoring

Case Study: Building on our latest three blog posts in our series outlining how to manage and reduce your organization’s cyber risk, we wanted to show you how these principles (of reducing cyber risk) apply in a real-world case study. To do so, we’ll quickly drill down into detection and response capabilities that can reduce…

Read More

Reducing Cyber Risk: 5 Tweaks to Your Incident Response Plan

cyber security incident response planning

An Incident Response Plan is a Crucial Set of Instructions Designed to help your IT department—security team at larger companies—properly deal with the slew of network security incidents that can hamper your business at any given moment. Such incidents include (but are not limited to) ransomware, data breaches, service outages, and cyber crimes such as…

Read More

Three Quick Ways To Manage and Reduce Your Cyber Risk

manage and reduce your cyber risk

Manage your Cyber Risk Beyond the Core Protection There are plenty of ways to manage (and reduce) your cyber risk beyond the core protection and compliance investments. Here are the three methods of managing cyber risk we find most effective. 1. Detect and Patch Security Vulnerabilities Faster “Known vulnerabilities offer cyber-criminals an easy, relatively frictionless…

Read More

Managed Detection & Response (MDR)

nist cybersecurity framework

How Infocyte Eliminates Cyber Risk Within The NIST Framework This blog is part two in our ROI series on reducing cyber risk and how Infocyte HUNT reduces your risk within the NIST framework. This post drills down into the managed detection and response (MDR) capabilities that can lower your overall risk and how Infocyte enables…

Read More

Managing Cybersecurity Risk and a Framework for Making Investments

managing cybersecurity risk formula

New Programs to Reduce your Cyber Risk Everyone agrees that core protection tools are necessary from a risk management and compliance standpoint, but what about adding new programs to reduce your cyber risk? Quantifying your cyber risk is difficult but necessary to establish a prudent financial evaluation and planning process that provides you the right…

Read More