Incident Response

Protect IT: Keep Incident Response Top of Mind When Designing Your Backup and Data Log Recovery

Protect IT: Keep Incident Response Top of Mind When Designing Your Backup and Data Log Recovery

Cybersecurity Awareness Month (CSAM) is a global initiative created by the Department of Homeland Security 16 years ago to recognize the importance of digital security for consumers and organizations alike. Enterprises, employees, and end-users alike need to band together to #BeCyberSmart. Herjavec Group is proud to be a CSAM Champion! Contributed by Matt Anthony, VP of Incident Response, Herjavec Group... Read More
October 21, 2019
Herjavec Group Announces Partnership with Chronicle, Now Part of Google Cloud, to Bring Advanced Security Solutions to Market in Canada

Herjavec Group Announces Partnership with Chronicle, Now Part of Google Cloud, to Bring Advanced Security Solutions to Market in Canada

Herjavec Group adds Chronicle to vast security portfolio to advance managed security services, threat hunting and speed of incident investigation. Herjavec Group, the leader in global cybersecurity operations, specializing in Managed Security Services and Incident Response, is the first service provider across Canada to leverage and be certified in Chronicle’s security intelligence products: Backstory and VirusTotal. Herjavec Group is the... Read More
August 27, 2019
Threat Advisory: URGENT/11 Zero-Day Vulnerability

Threat Advisory: URGENT/11 Zero-Day Vulnerability

News of the URGENT/11 zero-day vulnerabilities has begun to emerge.  These vulnerabilities affect the VxWorks real-time operating system created by Wind River and may allow a remote attacker to gain full control over an impacted device.  The VxWorks operating system is used by over 2 billion Internet of Things (IoT) devices globally including printers, VOIP phones, firewalls, routers, medical equipment,... Read More
July 30, 2019
Threat Advisory: OAuth Phishing Awareness

Threat Advisory: OAuth Phishing Awareness

Traditional phishing messages often target users to deliver malware or obtain credentials. New tools are being released that also enable OAuth abuse in phishing attacks. OAuth has become the de-facto protocol used by companies such as Google, Facebook, Amazon, and Microsoft to manage access to user data across their platforms.   However, this creates an opportunity for an attacker to... Read More
July 24, 2019
HG Q2 2019 Threat Summary Analysis

HG Q2 2019 Threat Summary Analysis

Stay ahead of the threat curve Most organizations developing a Threat Management program strive to stay ahead of the threat curve. At Herjavec Group, we partner with enterprises to map attack verticals, drive threat modelling, and conduct Red Team exercises. Herjavec Group’s Threat Management Team circulates a Quarterly Threat Summary to provide an overview of the most common threats and... Read More
July 21, 2019
Threat Advisory: New Vulnerability Affecting Exim Servers

Threat Advisory: New Vulnerability Affecting Exim Servers

A critical remote code execution vulnerability is actively being scanned for and exploited across the Internet. Known as "Return of the WIZard", the vulnerability (tracked under CVE-2019-10149) affects the Exim mail transfer relays (versions 4.87-4.91), which currently operate on more than half of all mail servers on the Internet. The vulnerability was exploited as early as June 9, 2019. While... Read More
June 13, 2019
How To Prevent and Manage a Ransomware Attack

How To Prevent and Manage a Ransomware Attack

A new organization will fall victim to ransomware every 14 seconds in 2019, and every 11 seconds by 2021 (Cybersecurity Ventures). Ransomware is constantly evolving and as long as adversaries can keep up with the latest defense tactics, the result is always the same. When infected by ransomware, users get a message informing them, “Your files have been encrypted”, followed... Read More
June 6, 2019
Cybersecurity CEO: Recognizing Incident Response as the Emergency It Is

Cybersecurity CEO: Recognizing Incident Response as the Emergency It Is

The industry is moving from an IT-centric model to crisis centric incident response. – Robert Herjavec Los Angeles, Calif. – May 21, 2019 The old “IT” way of responding to security incidents with the CIO standing over your shoulder asking, “Is it fixed yet?”, is long gone. We’ve seen a drastic change in how enterprises today are speaking about incident... Read More
May 21, 2019
Are You Properly Testing Your Cyber Security Systems?

Are You Properly Testing Your Cyber Security Systems?

Nathan Sherlock is VP Managed Services Client Advocacy for Herjavec Group who will be moderating a track at the April CIO Peer Forum in Vancouver. He has worked within the Managed Services field for over 10 years and is passionate about SIEM and security monitoring. Nathan holds various certifications including CISSP, CEH, GCIH, GSLC, and always strives to advance his security knowledge while... Read More
February 21, 2018
Herjavec Group Cybersecurity Cast: Cybersecurity Conversations For The C-Suite in 2018

Herjavec Group Cybersecurity Cast: Cybersecurity Conversations For The C-Suite in 2018

Herjavec Group has launched its very own podcast, The Cybersecurity Cast! Produced by Herjavec Group, The Cybersecurity Cast features discussions on the latest news, trends, vulnerabilities, and exploits in the cybersecurity space. Topics include healthcare, ransomware, identity and access management, and more. Episode 6: Cybersecurity Conversations For The C-Suite in 2018 We recently published the 2018 Cybersecurity Conversation For The... Read More
February 12, 2018