Posted on 25 Feb 2021
Earlier this month, a Florida wastewater treatment plant’s computer system was compromised by an unknown threat actor. This hacker was able to remotely gain access via an employee’s login credentials and attempted to alter the chemical composition of the public water supply to dangerous levels. Thankfully, a plant operator was watching this all unfold and
Posted on 01 Feb 2021
Overview Phish Tale of the Week New cybersecurity hirings in the new administration. Looking for cybersecurity experts? Consider hiring veterans. How Can Netizen Help? Phish Tale of the Week Phishing attempts can often target specific groups that can be exploited by malicious actors. In this instance, we see a phishing scam targeting business/work emails offering
Posted on 14 Jan 2021
On December 13, 2020 cybersecurity company FireEye announced they had discovered a state-of-the-art exploit that created a backdoor in SolarWind’s Orion application. This hack was then distributed to thousands of systems running this application as a routine update from the manufacturer. With no reason to suspect any issues, IT administrators all over the country unknowingly
Posted on 22 Dec 2020
Overview Phish Tale of the Week IoT Cybersecurity Improvement ACT Passed Universities Across The Globe Attacked by Phishing Scam How Can Netizen Help? Phish Tale of the Week Phishing attempts can often target specific groups that can be exploited by malicious actors. In this instance, we see a phishing scam targeting unsuspecting Amazon customers. This
Posted on 25 Sep 2020
Although DFARS CUI compliance and CMMC programs do overlap, the assessment (audit) process will be significantly different moving forward
Posted on 24 Aug 2020
Minimize your risk and assume the worst when considering your exposed data. Consider what the likelihood and impacts of the loss of your data would be, and implement security controls in accordance with that level of risk.
Posted on 08 Jul 2020
Routine vulnerability assessments evaluate what risks and threats exist for your business systems, assign severity levels to them, and ultimately recommend modifications or countermeasures to minimize the risk of a breach.
Posted on 05 Jun 2020
The Cybersecurity Maturity Model Certification (CMMC) was created by the Department of Defense (DoD) in order to put a cybersecurity assessment model and certification program in place.
Posted on 17 Mar 2020
Remote work is here to stay and, as the most recent COVID-19 pandemic declaration is beginning to demonstrate, it can be a highly effective disaster mitigation and recovery strategy when implemented properly. However, too many companies and other organizations have been caught unprepared technologically, and attackers have been waiting for just such an opportunity to
Posted on 04 Sep 2019
Overview Phish Tale of the Week Google Discovers Mass iPhone Hacking Hacking Group Targets WordPress Vulnerabilities How Can Netizen/CyberSecure Solutions help? Phish Tale of the Week Phishing is a type of online scam where criminals send an email that appears to be from a legitimate source such as a company or a doctor’s office and
Telephone: 1-844-NETIZEN
Email: Team (at) Netizen.net
Office Locations:
Allentown, PA (Headquarters)
Arlington, VA (DC Region)
Charleston, SC (Southeast Region)
Government visitors can view our contracts page for ways to reach us through streamlined acquisition or direct award options.
We've made it easy and affordable for government agencies to access Netizen's trusted expertise and award-winning solutions.