Our Insights
Providing you the latest industry-specific news and insights.
- All Topics
- Arete Analysis
- At Arete
- Client Stories
- Combating Ransomware
- Cyber Threats
- Cybersecurity 101
- Cybersecurity Trends
- Data Transfer
- Dear Ramey
- Endpoint Detection and Response
- Forensic Investigations
- Identity Protection
- Managed Services
- Recovery
- Security Recommendations
- Social Media
- Threat Actors
- Tips
- Workplace Security
- article
Dear Ramey: Missteps During an Incident Response Investigation Can Further Complicate Recovery
DEAR RAMEY: MISSTEPS DURING AN INCIDENT RESPONSE INVESTIGATION CAN FURTHER COMPLICATE RECOVERY Answering burning questions from victims of cyber events DEAR RAMEY: What can go wrong during an incident investigation? – Murphy L DEAR…
Read more - article
Dear Ramey: Five Ways to Maximize Your Security Budget in 2022
ANSWERING BURNING QUESTIONS FROM VICTIMS OF CYBER EVENTS DEAR RAMEY: Happy New Year! Our organization made it through the holiday season without a security event. While we were probably one of the few, we’d like to build up our defenses and carry…
Read more - article
Dear Ramey: Company Boards Bring Security to the Forefront
ANSWERING BURNING QUESTIONS FROM VICTIMS OF CYBER EVENTS. DEAR RAMEY: Our board’s top priority is cybersecurity. We have a large information security organization led by a chief information security officer (CISO) and we’ve also sponsored…
Read more - article
Dear Ramey: Security Awareness Must Be Continual Awareness
ANSWERING BURNING QUESTIONS FROM VICTIMS OF CYBER EVENTS. DEAR RAMEY: Last year during the holidays, I remember seeing a lot of articles about breaches. As we move towards this holiday season, should we expect the same? What can we do to protect…
Read more - article
Dear Ramey: Watering Hole Attacks Explained
ANSWERING BURNING QUESTIONS FROM VICTIMS OF CYBER EVENTS. DEAR RAMEY: I heard this phrase “watering hole attack.” I understand the concept of a phishing email but how is a watering hole attack different? – Safari Sam DEAR SAFARI SAM: Even…
Read more - article
Dear Ramey: Tips to Improve the Security of Data Sharing
ANSWERING BURNING QUESTIONS FROM VICTIMS OF CYBER EVENTS. DEAR RAMEY: The more I read in the news about cyberattacks, the more I worry about all the information that could wind up in the wrong hands. Social media sites, law firms, and…
Read more - article
Dear Ramey: What Can We Do to Minimize the Target on Our Back?
ANSWERING BURNING QUESTIONS FROM VICTIMS OF CYBER EVENTS. DEAR RAMEY: We haven’t experienced a breach or unauthorized access — at least not that we know of — but recent news headlines have my company concerned and wondering how we can minimize our…
Read more - article
Dear Ramey: Could I Lose My Job Over This Cyberattack?
ANSWERING BURNING QUESTIONS FROM VICTIMS OF CYBER EVENTS DEAR RAMEY: My organization recently recovered from a devastating cyberattack. We lost access to our information for a few days. Root cause analysis determined that the threat actor…
Read more - article
Dear Ramey: Bad Guys Deleted Our Data. How Do We Get It Back?
ANSWERING BURNING QUESTIONS FROM VICTIMS OF CYBER EVENTS DEAR RAMEY: My organization was hacked. The bad guy found our data and deleted it — including our backups! All they left was a note stating, “Send a message to this email address to get your…
Read more - article
Dear Ramey: We Paid the Ransom. Has Our Data Been Deleted?
ANSWERING BURNING QUESTIONS FROM VICTIMS OF CYBER EVENTS DEAR RAMEY: I’m a bit embarrassed to say this, but we were hacked. They stole our data, posted a blog about it, and said they’d only remove the post if we paid a ransom. It was a…
Read more - article
Dear Ramey: Will I Be Hacked Again?
ANSWERING BURNING QUESTIONS FROM VICTIMS OF CYBER EVENTS DEAR RAMEY: My organization was hacked, and ransomware encrypted our files. We have no interest in paying the ransom because we don’t want to encourage malicious activity. Do we have any…
Read more - article
Dear Ramey: On Prosecuting Cybercriminals
ANSWERING BURNING QUESTIONS FROM VICTIMS OF CYBER EVENTS DEAR RAMEY: I’ve read a lot about the recent events in cybersecurity involving supply chain breaches, ransomware attacks, and theft of sensitive information from both large and small…
Read more