Stars-image

Blog

Welcome to Silent Sector's blog, news, and resource area.

Haidon Storro

Haidon Storro
Cybersecurity Research & Content Manager, Silent Sector -- Haidon Storro is a Cyber Security Analyst for CVS Health. She has her BS in IT Cyber Security as well as security certifications like CompTIA Security+ and ISC2. While Haidon is newer to the security community, she has dedicated herself to learning as much as she can through internships, online courses, and conventions like DefCon. In her free time, she enjoys reading about new advancements in technology, going to security meetups and participating in cyber defense competitions. One of Haidon’s goals is to make the connected world safer by bridging the human aspect with technology.

Recent Posts

0 Comments

YOUR ORGANIZATION SHOULD CONSIDER THE ADVANTAGES OF NIST SP COMPLIANCE

Most companies are looking for ways to set themselves apart from their competition. One way they can stand apart is by proving their operational security maturity and adopting the National Institute of Standards and Technology Special Publication (NIST SP) framework 800-53. NIST is a non-regulatory agency of the U.S. Commerce Department that establishes standards across federal agencies. NIST SP 800-53 is a set of standards to assist federal agencies in meeting the requirements set by the Federal Information Security Management Act (FISMA). However, given the latest cyber security headlines, NIST 800-53 is starting to influence the private sector as well.Contact Us

Read More
0 Comments

Should Your Company Have a SOC 2 Audit?

The business profiles and mitigation priorities of service companies today are incredibly diverse. Furthermore, with breaches occurring left and right customers are increasingly expecting proof that their data is being properly secured. One way companies can meet this expectation is by attaining Service Organizational Control (SOC) 2 compliance. SOC 2 compliance was designed to validate that service providers are handling customer data in a confidential manner and with the utmost care. Ultimately, this provides organizations that seek to become SOC 2 compliant with a competitive advantage against industry competitors.

Read More
0 Comments

Cybersecurity in the Pandemic Panic - Remote Personnel Management & Collaboration

Remote work is becoming a new experience for many due to the current events that can be difficult for employers and employees to grasp. As more companies roll out mandatory remote work from home (WFH) in response to COVID-19, organizations need to consider what the new home office procedures are and the communication plan for remote personnel.

Read More
0 Comments

Cybersecurity in the Pandemic Panic - The Age of The Remote Workforce

The rise in employees forced to work from home (WFH) due to the COVID-19 outbreak has led to a major spike in companies realizing they are not prepared for the new onslaught of remote workers. There is no telling how long this period could last, and subsequently, businesses are starting to evaluate how they will securely facilitate long term access for their remote workers.

Read More
0 Comments

Cybersecurity in the Pandemic Panic - Patching Problems and Solutions

Vulnerability scanning and patching is a cornerstone of cybersecurity. Deploying relevant patches is a critical step in basic security measures to minimize any organization's endpoint vulnerabilities. In response to COVID-19, many companies are now required to have employees work from home (WFH). This sudden transition to a remote workforce has resulted in essential security practices and assessments like patching, to become either delayed, neglected or forgotten. As such, we can expect attackers to take advantage of this and use vulnerable devices to infiltrate an organization. 

Read More
0 Comments

Cybersecurity in the Pandemic Panic - A Silver Lining for Remote Workforces

Uncover the opportunities presented by COVID-19

It is easy to feel overwhelmed and helpless when disruptive events such as COVID-19 erupt out of nowhere. While there is no denying that this pandemic is incredibly horrific, it does not mean organizations should bask in the fear and take a break from normal operations. Instead, this period of uncertainty should be viewed as an opportunity for organizations to re-calibrate and highlight their mission-critical initiatives.

Read More
0 Comments

Benefits and Cybersecurity Tips for Your Remote Workforce

In a previous article, we highlighted the tactics scam artists are exploiting from COVID-19. Unfortunately, technologically savvy criminals are also exploiting the virus by taking advantage of the rapid Work from Home (WFH) adoption. Most organizations were not prepared for this overnight adoption and consequently cut corners during the implementation. We have compiled a list of key elements every organization employing WFH should consider.

Read More
0 Comments

Using Disasters like COVID-19 for Profit - a Criminal’s Dream!

Threat actors commonly leverage catastrophic events to launch attacks. As such, it comes as no surprise that COVID-19 is being used to forward cybercrime. What’s more, is that COVID-19 being a global phenomenon has provided a vehicle for scammers to shine. As a result, this prompted the United States Secret Service to release a statement warning individuals against the scams (see below for official PDF link).

To help protect you, we have collected a list of top scams to watch out for:

Read More
0 Comments

RobbinHood Ransomware Assaulting Cities and Businesses

Ransomware is perhaps one of the most tossed around buzzwords today. In reality, ransomware is simply the word used to describe malicious software that scrambles the data of a system and renders it completely inaccessible until the ransom is paid. In recent years, the ransomware variant titled ‘RobbinHood’ has seen a major uptick in infecting public municipalities.

Read More
0 Comments

Severe BlueKeep flaw still plaguing outdated connected medical devices

Despite Microsoft releasing a patch for the 2019 BlueKeep Vulnerability, CyberMDX dicovered, 22% of hospital Windows devices are still exposed to BlueKeep. This puts medical devices at a much higher risk for BlueKeep and ultimately ransomware.

Read More