Handling Malware

7 Tips to Reduce the Risk of Handling Malware

Many people call any program that an attacker uses to their advantage, including publicly available tools, “malware.” That is not a good practice as the term “malware” is far too generic and makes its handling much riskier than needed. Further categorizing the malware better identifies the attackers’ goals and answers the question, “What does the…

Disaster Response: Recovery Site Seating

Disaster Recovery: 5 Tips to Avoid the “Game of Thrones”

When any type of disaster takes an organization offline and disrupts its critical functions, incident response teams scramble to address the issue. While IT attempts to reinstate data and communication capabilities, it may be necessary to activate a secondary recovery site. Astute leadership will have prioritized and allocated obvious resources well in advance. But did…