Sr. Solutions Architect
Brian began his career at Ingram Micro in 2012, specializing in network security and cybersecurity. Over the past few years, he has held several roles in the company, including pre-sales engineer, technical account manager and solutions architect. Brian’s current focus is MDR, SOCaas, Fortinet (MSSP program development) and NormShield (SME).
Think ransomware is so “last year”? Not so fast.
Ransomware remains a popular attack method in the public sector, where aging antimalware solutions struggle to keep up. It’s also been reported that “state-linked adversaries will likely increasingly abuse IoT devices to further espionage efforts.”*
Solution? Talk with your state and local government customers about steps they’re taking to protect against ransomware, and as always, maintain cold backups.
State actors and state-sponsored attackers are looking to take a bite out of the energy sector, and recent attacks on the U.S. power grid show efforts to conduct battle space preparation. Are you up to snuff on industrial control systems (ICS) and how to keep them safe?
Solution? Contact Ingram Micro’s Partner Technical Enablement group to learn how to engage with customers in the industrial controls space and become a trusted advisor.
Phishing and other forms of con artistry (aka social engineering) remain the most popular tools for attacking organizations, with the attack vector being responsible for 98% of breaches in 2018.
Solution? Talk to your customers today about email defense products and user awareness training tools.
Subcontractors for major organizations are becoming hot targets for attack, as they help an attacker gain access to the “big fish” that they’re really after. Take the 2013 Target breach for example, where the HVAC vendor was initially compromised to gain access to Target’s primary systems. In the end, every organization has something that attackers can use for their own gain.
Solution? Ensure that policy and governance measures are in place to protect both your organization and subcontractors from hacking efforts.
*Source: 2019 Cyber Threat Outlook, Booz Allen Hamilton