Blog

Cybersecurity CEO: As COVID-19 Surged, So Did Demand for Cybercrime Fighters

Cybersecurity CEO: As COVID-19 Surged, So Did Demand for Cybercrime Fighters

The cybersecurity labor market bucks the trend. Los Angeles, Calif. – June 17, 2020 With unemployment rates plummeting globally, it’s hard to fathom a spike in demand for talent. But that’s exactly what the cybersecurity industry witnessed in the first half of 2020. A recent study by Gartner revealed that as the number of cases of COVID-19 spiked globally, so... Read More
June 22, 2020
10 Managed Services Trends You Need to Know in 2020

10 Managed Services Trends You Need to Know in 2020

Most organizations believe they will experience a security incident in the next 6-12 months. Recently, HG partnered with Cybersecurity Insiders to release the 2020 Managed Security Services Trends Report to highlight the opinions of IT security decision-makers across a variety of industries, such as healthcare, education, manufacturing, etc. We surveyed 400K security professionals to evaluate key challenges that organizations are... Read More
June 11, 2020
2 Years Later: How Has GDPR Impacted Your Business?

2 Years Later: How Has GDPR Impacted Your Business?

In May 2018, the European Union (EU) enacted a privacy regulation that would become a turning point for data protection and cybersecurity – the General Data Protection Regulation (GDPR). The goal of GDPR was to change how organizations conducted their data collection and storage practices. It applies to any business or individual that collects, stores, transfers, or processes personal data... Read More
June 4, 2020
Threat Advisory: Sandworm Actors Exploiting Exim Vulnerability

Threat Advisory: Sandworm Actors Exploiting Exim Vulnerability

A critical remote code execution vulnerability is actively being scanned for and exploited across the Internet. Herjavec Group initially published a Threat Advisory for CVE-2019-10149, known as “Return of the WIZard”, when it was discovered in June 2019. Recently, the NSA published an updated advisory regarding Sandworm threat group operators exploiting the same vulnerability in the Exim Mail Transfer Agent... Read More
May 29, 2020
Cybersecurity CEO: Identity Management is Here to Stay

Cybersecurity CEO: Identity Management is Here to Stay

Los Angeles, Calif. – May 25, 2020 Not long ago if you had asked any security pro about how they protect their perimeter, they would have said - firewalls. In fact, when I started Herjavec Group over 15 years ago, we were the first firewall reseller in Canada!   Today, the security landscape looks a lot different – especially with entire workforces forced to work remotely... Read More
May 25, 2020
Threat Advisory: Citrix ADC/Netscaler Breach Activity

Threat Advisory: Citrix ADC/Netscaler Breach Activity

Herjavec Group has been investigating a spike in Citrix ADC/NetScaler breaches as a result of recently published zero-day exploits for CVE-2019-19781 affecting Citrix Application Delivery Controller (ADC), formerly known as NetScaler ADC, Citrix Gateway, and NetScaler Gateway. The scope of this vulnerability includes Citrix ADC and Citrix Gateway Virtual Appliances (VPX) hosted on any of Citrix Hypervisor (formerly XenServer), ESX, Hyper-V,... Read More
May 19, 2020
CISA Alert: Top 10 Routinely Exploited Vulnerabilities, 2016-2019

CISA Alert: Top 10 Routinely Exploited Vulnerabilities, 2016-2019

Recently, the Cybersecurity & Infrastructure Security Agency (CISA), the FBI, and US government published an alert on the Top 10 Routinely Exploited Vulnerabilities identified by the US government between 2016 to 2019. The alert aims to provide organizations with a list of vulnerabilities, most of which are Common Vulnerabilities and Exposures (CVEs), that are being exploited repeatedly by cyber criminals.... Read More
May 13, 2020
The 4 Key Components of a Strong Vulnerability Management Program

The 4 Key Components of a Strong Vulnerability Management Program

A strong Vulnerability Management (VM) program allows organizations to identify potential security gaps including access points that threat actors leverage to gain entry into corporate networks, and then prioritize them for remediation. However, due to their complexity, most organizations experience challenges in building a robust VM program. According to Herjavec Group’s JR Cunningham, a strong Vulnerability Management program relies on... Read More
May 11, 2020
Strategy Magazine: Shoring Up Global Cybersecurity

Strategy Magazine: Shoring Up Global Cybersecurity

Everyone wants the convenience and speed of technology, but not what comes along with it—potential security threats. Blockchain and regulations are important steps to increasing cybersecurity says Robert Herjavec.  Originally published in Strategy Magazine By Kate Rockwood Data security, especially accountability, capability, and compliance, is increasingly keeping the c-suite up at night—and it’s going to continue to do so as... Read More
Threat Advisory: Phantom in the Command Shell Campaigns Target Financial Industry

Threat Advisory: Phantom in the Command Shell Campaigns Target Financial Industry

Researchers at Prevailion have reported a new operation called Phantom in the Command Shell. The operations have been targeting financial firms across the globe using the Evilnum malware, which is being distributed to victims using a Google Drive share link. Clicking on the Google Drive share link downloads a malicious zip archive file to the host. When decompressed, the file... Read More
May 8, 2020