element. Don’t add more than one Google tag to each page.

Blog

 

Cloud Vendor Breach Harms Philanthropists

Data privacy laws may differ across the country and across industry, but as far as liability is concerned, there is a consensus: your organization is responsible for private data it holds and is liable for any breach of that data’s security, regardless of whether it was the result of failure by third party vendor or outsourced party.”  Ransomware image

Stelios Valavanis on Becker Group Business Leadership Podcast

Stelios Valavanis, founder and CEO of onShore Security, sat down recently with Scott Becker of the Becker Group to talk about cybercrime, startups, and empowering people with technology on the Business Leadership podcast. To listen to the interview, please click here or click on the image above.    

Illinois Schools Should Immediately Take Steps To Comply With New Privacy Laws Related To Student Data

Illinois Schools Should Immediately Take Steps To Comply With New Privacy Laws Related To Student Data Todd Rowe – Partner, Tressler LLP While protecting data is always important, there is a heightened effort to protect private data belonging to children and young adults. Unfortunately, there has also been a recent uptick in the number of recent breach incidents involving data from schools and vendors entrusted with data by schools. Of course, this data held by schools inevitably includes information belonging to children and young adults. Perhaps the worst incident involving students’ data was seen this summer when it was discovered…

Courts Are Still Picking Over The Bones From The 2013 Target Data Breach – Guest Blog

 

“It was a quaint, innocent time before social engineering scams, ransomware or any of the other threats had evolved to hassle both large and small data collectors. In 2014 and 2015, large-scale data breaches at Home Depot, Best Buy and Target roamed the Earth.”

The following is a guest blog, published with the author’s permission. Click here to read the original post at Tressler LLP.

Ransomware: Stop the Spread NOW!

 Ransomware, one of the most prevalent cybersecurity threats, has been making big news by crippling governmental organizations and large corporations with household names, but the story has started to change. Hackers have turned their low-effort but highly successful scams on minor municipalities and small business. Almost half of all breaches last year targeted small businesses. Prevention is essential in helping organizations avoid having their data held hostage by ransomware attackers, but your organization, your team, and your network need to be prepared for post-breach possibilities. Ransomware infections rapidly spread laterally from host to host in an attempt to bring…

GirlCon Chicago 2019

Last week, onShore Security’s Caron Grantham attended GirlCon Chicago, which we were proud to sponsor. GirlCon Chicago “was a really engaging event for the teen students”, says Caron, after the event at Google Chicago. Students attending the event ate lunch with cybersecurity practitioners and their peers, encouraged to ask questions of the professionals in attendance. Caron met some students from her high school alma mater; Kenwood Academy College Prep, as well as students from Lindbloom, King College Prep, and Walter Payton College Prep. Caron engaged with the students and discussed their interest in computer science and cybersecurity. After lunch, Caron…

Illinois’ Biometric Information Protection Act Gets More Tangled With Employment Law – Guest Blog

“Biometric data is playing a larger role in employment law as more employers begin using equipment to scan employees’ fingerprints to clock in for work.”

The following is a guest blog, published with the author’s permission. Click here to read the original post at Tressler LLP.

Illinois’ Biometric Information Protection Act Gets More Tangled With Employment Law

Biometric data is playing a larger role in employment law as more employers begin using equipment to scan employees’ fingerprints to clock in for work.

Modernize Your Network and Security Simultaneously

If you’ve modernized your network or are considering it, you know that security should be your top concern. Even if you’re using or are considering SD-WAN, there are security risks and challenges that you must consider: Egressing of traffic may not be inspected with critical advanced firewall capabilities. Internal traffic between sites may not be adequately protected. Network modernization solutions, including SD-WAN, may provide a false sense of security. No matter where you are in your network modernization journey, onShore Security provides a fully integrated, cloud-based network and security service that closes critical security vulnerabilities. We’d like to invite you to a live…

Be Vocal & Transparent: Stelios Valavanis on BizCastHQ

Our CEO, Stelios Valavanis, sat down for an interview with BizCastHQ to talk about onShore’s history and innovations in developing our cybersecurity practice to best serve our clients. Our tenacity, grit, and inventiveness have allowed us to enable clients in ways that have changed the industry. Stel’s biggest tip: be vocal and transparent. Our ability to communicate with stakeholders at every level of a project and listen to their concerns allow us to work with your team comfortably and efficiently. To see the whole interview, watch below or click here to visit BizCastHQ’s profile of Stel. Stel Valavanis – Founder &…

Enterprise Grade Cybersecurity Now Available for Small & Mid-Sized Organizations

The next evolution of onShore’s managed security service offers three levels of cybersecurity protection, including the newly developed, affordably-priced, entry level Security Management & Reporting as well as Managed Detection & Response (MDR) and Security Orchestration

Panoptic Cyberdefense in Banking & Beyond

Our next evolution of Panoptic Cyberdefense managed security service is now available.

To address the cybersecurity needs of small and mid-size banks, onShore created Panoptic Cyberdefense entry-level service, Security Management & Reporting with many higher-level features such as analysis and firewall reporting. Banks and other heavily regulated industries will appreciate the addition of continuous Compliance Violation Detection.

Senior Security Consultant Joins onShore Security

New Hire Comes as onShore Security Adds New Offerings for Small & Mid-Sized Businesses

Senior Security Consultant Joins onShore Security

George Quinlan has joined Chicago-based onShore Security as a Senior Security Consultant, bringing more than 26 years of security, GRC, IT infrastructure, network security, and engineering experience to our portfolio of cyberdefense and governance services.

The addition of Quinlan to our Cybersecurity Leadership Team comes as onShore completes the reorganization of our security solutions to allow businesses of all sizes to benefit from a deep and comprehensive security portfolio typically unavailable to all but the largest enterprises.

A Cybersecurity Audit Just for Banks

“The National Bank of Blacksburg lost $2.4 million to Russian hackers and its insurer only wants to reimburse it $50,000, according to a lawsuit the bank filed in U.S. District Court in Roanoke,” stated The Roanoke Times on July 26, 2018.

How could they have protected their assets more effectively? What gaps do they still have with their cybersecurity? Unless they conduct a cybersecurity audit, gaps may still exist that could be exploited with fraudulent transactions and ransomware.

Videoblog: Does Your Cyber Security Team Work with Banks?

After tricking employees into opening emails that gave them access to debit card account numbers at National Bankshares of Blacksburg, Virginia, Russian hackers stole $2.4 million from hundreds of ATMS across the country in 2016 and 2017, news accounts say.

To make matters worse, the bank’s insurer has offered only $50,000 to cover the loss, a dispute that is now in federal court.

Taking your insurance company to court is one way to reduce your cyber security losses. A better way is to arm yourself against such losses in the first place. At onShore Security, we have 20 years experience in protecting banks from cyber intrusions and a comprehensive system of detection, analysis, and ongoing vigilance that builds security, inside and out. Learn more from our CEO in the video below.

Are Cyber Insurance Policies Being “Spoofed” by Recent Computer Fraud Decisions? – Guest Blog

The following is a guest blog, published with the author’s permission. Click here to read the original post at Tressler LLP.

Are Cyber Insurance Policies Being “Spoofed” by Recent Computer Fraud Decisions? - Guest Blog

Courts have generally defined “spoofing” as “the practice of disguising a commercial e-mail to make the e-mail appear to come from an address from which it did not originate. Spoofing involves placing in the ‘from’ or ‘reply-to’ lines, or in other portions of e-mail messages, an email address other than the actual sender’s address, without the consent or authorization of the user of the e-mail address whose address is spoofed.”

DDOS Protection

DDOS Protection

A question we’ve been asked recently is why an IPS isn’t sufficient to protect a financial institution (or any organization) from a DDOS attack. The explanation is quite simple, with an understanding of what a DDOS attack is and what an IPS is and does.

Videoblog: VPNFilter Malware

Recently, it was revealed that more than 500,000 routers in 54 countries were infected with the VPNFilter malware. VPNFilter has new capabilities, including the ability to perform an active man-in-the-middle attack. In our latest videoblog, Stel discusses the network detection that is necessary to protect your business from this attack.

Securing Personal Information: Cyber Security Guest Blog

The following is a guest blog, published with the author’s permission. Click here to read the original post at Hogan Injury.

Technology has come a long way. The advancement of technology has paved the way for much more development in the fields of medicine, transportation, economics, finance, and many more. Along with the multitude of benefits that came with the rapid growth of technology came some issues, one of which is cybersecurity.