Logo

Copyright adaquestsecurity 2017
 
  • All
  • Cybersecurity
  • GDPR
  • secure talk

          In our last post, we looked at the increased incidents of cryptojacking and what were the factors behind the increase. We are now going to look at the detection and prevention of cryptojacking attacks. The number one sign that your device has been cyptojacked is a sudden...

            Nature, and apparently cyberspace, both abhor a vacuum. Thus, while the number of ransomware attacks have dropped significantly in 2017*, there’s a new “kid” on the cybersecurity block, and that kid’s name is cryptojacking. What’s cryptojacking? Cryptojacking is the unauthorized use of someone’s computing device to mine...

Cybersecurity Update May 14th, 2018 The latest info on threats, tools, and trends related to cybersecurity and compliance. Brought to you by adaQuest, your cybersecurity and compliance partner. Secure Talk - May 14th, 2018   adaQuest Blog adaQuest Talks GDPR at ISSA Puget Sound   Secure Talk Podcast Interview with Nathan House How to Get a...

View this email in your browser Cybersecurity Update April 30th, 2018 The latest info on threats, tools, and trends related to cybersecurity and compliance. Brought to you by adaQuest, your cybersecurity and compliance partner.  Secure Talk - April 30th 2018   adaQuest Blog Posts adaQuest Delivers GDPR Presentation at ISSA Puget Sound Microsoft’s Cyber...

[caption id="attachment_1278" align="alignleft" width="300"] Hiram Machado Discusses GDPR and Data Protection[/caption] On Thursday, April 19th adaQuest’s Hiram Machado, Paul Johnson, and Mark Shriner participated in the ISSA Puget Sound monthly chapter meeting. After watching an informative  presentation from Chapter President Justin White that covered some of the...

[caption id="attachment_1269" align="alignleft" width="300"] Team adaQuest at the Microsoft Cybercrime Center[/caption]               Recently several members of the adaQuest team were invited by Microsoft to tour Microsoft’s Cyber Defense Operations Center (CDOC) and the Microsoft Cybercrime Center (MCC). While we were only allowed to enter and view a limited...

          It used to be, and in many cases still is, that IT security was synonymous with firewalls and restricted access. Organisations would build a powerful firewall around their on-premises IT infrastructure, limit access to critical functions, and hope that the “bad guys” wouldn’t be able to...

              Cybersecurity is becoming increasingly important for organizations and individuals. We all need to protect our systems and our data from being compromised.  Unfortunately, there’s a lot of wrong information and inappropriate advice being circulated. This, in addition to the context in which the media frames cyber...

            So, OK, you are responsible for your organization’s IT security. Where should you start? Data protection, device detection, patches, passwords, GDPR, HIPPA, compliance vs. business requirements? It can all be a bit overwhelming.   At adaQuest we help companies understand their current IT security posture, see...

        Most organizations are aware that if they control or process data that relates to EU residents, they will need to be compliant with the EU’s General Data Protection Regulation (GDPR). These regulations come into effect from May 25, 2018. For those found to be non-compliant, potential...