Proudly serving Virginia, Maryland and DC // Call us today! 703.396.6120
V2 SystemsV2 Systems

By Erik Briceno

Your Organization Needs ATP Right Now

Advanced Threat Protection, or ATP, is a suite of options that provides an additional layer of defense for businesses and organizations to protect against constantly evolving cyberthreats designed to thwart traditional security solutions.

An ATP solution allows companies to defend against sophisticated malware or hacking-based attacks that target their sensitive data. With an ATP, you can leverage enterprise technology to achieve the most effective security solution, because firewalls and antivirus packages are not enough to protect a network.   Read more

Concerned About Russia/Ukraine Spillover, CISA Urges Businesses to Take Precautions

By Erik Briceno

Concerned About Russia/Ukraine Spillover, CISA Urges Businesses to Take Precautions

In our previous post, we shared the joint advisory issued from the FBI and the U.S. Cybersecurity and Infrastructure Security Agency (CISA). Today we’re delving into the key sections of the advisory that CISA outlines specifically to mitigate cybersecurity threats from WhisperGate and HermeticWiper caused by spillover. Here are a few items from the list that require special attention.   Read more

The Russian Attack on Ukraine Put U.S. Businesses at Risk

By Erik Briceno

The Russian Attack on Ukraine Put U.S. Businesses at Risk

With the Russian invasion of Ukraine, government officials here in the U.S. are warning organizations nationwide to prepare for possible retaliation from Russia and associated cybercriminal gangs. Regardless of whether you work with the government and/or are part of the supply chain, everyone is at risk.

Here is a rundown of the joint alert and a summary of what all businesses and organizations need to be aware of right now.   Read more

By Erik Briceno

2022 Predictions, Part 1: Supply Chains, Ransomware and Cyberterrorism

As we ease into 2022, many of the uncertainties that shaped 2021 remain. The cybersecurity challenges that accompanied the pandemic have persisted, as hybrid remote workspaces have become a way of life. And through it all, the threat landscape continues to evolve, as innovations in cloud computing and other arenas open up new threats.

The fallout from attacks like the SolarWinds supply chain incident and the Colonial Pipeline breach was all over the headlines in 2021. These served to demonstrate just how successful attacks of this nature can be, and as such, we can expect much more to come. In part 1 of our 3-part series, we make a few predictions.   Read more

By Erik Briceno

2022 Cybersecurity Trends

As we enter 2022, it’s not about “if” a cybersecurity incident will occur, but “when.” There’s an urgent need for organizations to increase cybersecurity awareness and education to better prepare themselves against these inevitable events. Here are the top cybersecurity trends worth keeping an eye on throughout the new year and beyond.   Read more

Holiday Phishing Scams

By Erik Briceno

Holiday Phishing Scams

For those who celebrate, it’s that time of year again — a time for decorations, eating food you normally wouldn’t and, of course, maxing out credit cards on holiday shopping for gifts or the aforementioned expenditures. But with many of us doing both our shopping and our working from home this year due to COVID-19, the environment in 2021 poses an even greater risk to cybersecurity.

This year, it’s not just individuals who need to keep an eye on their wallets and protect themselves from scammers and thieves. Businesses and organizations of all sizes need to be aware of holiday phishing scams and how they pose a risk to your entire company.   Read more

Understanding and Mitigating Ransomware

By Erik Briceno

Understanding and Mitigating Ransomware

Without question, ransomware is quickly becoming the largest threat to cybersecurity and cyber infrastructure worldwide. When it begins to affect vital ecosystems such as hospitals, fuel pipelines and even food production, it’s time to start taking it seriously. And indeed it is now.   Read more

An Offensive Approach to Malware Prevention

By V2 Systems

An Offensive Approach to Malware Prevention

When it comes to preventing malware, there’s one key component that has more impact than any other when it comes to keeping your computer, or any device, safe: you. You don’t need expert knowledge or special training. You just need vigilance to avoid downloading and installing anything you do not understand or trust, no matter how tempting.

To avoid malware, the best defense is a good offense. In today’s blog, we’re providing a refresher on how to take a more offensive approach to malware.   Read more

A Warning from DHS and Other Government Agencies Regarding Remote Working

By Erik Briceno

A Warning from DHS and Other Government Agencies Regarding Remote Working

In light of the growing Coronavirus (COVID-19) pandemic, in our previous blog, we highlighted some of the numerous remote working solutions that are available to those who are forced to work from home during this worrying time. However, even now at the time of writing, we are hearing warnings and reports from several government agencies on how malicious actors are taking advantage of the crisis to push malware, ransomware, and phishing campaigns into even higher gear. Those who are working from home are especially at risk for a variety of reasons. Today we’re going to outline some of these vulnerabilities that DHS, NIST and other agencies are cautioning on, and what each person can do to secure themselves as much as possible on their end in their own home.   Read more

Password Security in 2020 - Part 2

By Erik Briceno

Password Security in 2020 – Part 2

In our last blog, we covered some generalized password advice that everyone should know. Unfortunately, there is no such thing as a password that can’t be hacked. Phishing scams and malware infections are ongoing problems, and now that we’re in 2020, these serious cyberthreats are on the rise and quickly making traditional password security depreciated.

But the good news is, current efforts to phase out passwords are also giving rise to additional security methods that can (and should) be used in conjunction with standard account protection practices. In today’s article, we’re outlining some very necessary steps to take in addition to simply coming up with a strong password.   Read more

1 2
Your Organization Needs ATP Right Now
Concerned About Russia/Ukraine Spillover, CISA Urges Businesses to Take Precautions
Concerned About Russia/Ukraine Spillover, CISA Urges Businesses to Take Precautions
The Russian Attack on Ukraine Put U.S. Businesses at Risk
The Russian Attack on Ukraine Put U.S. Businesses at Risk
2022 Predictions, Part 1: Supply Chains, Ransomware and Cyberterrorism
2022 Cybersecurity Trends
Holiday Phishing Scams
Holiday Phishing Scams
Understanding and Mitigating Ransomware
Understanding and Mitigating Ransomware
An Offensive Approach to Malware Prevention
An Offensive Approach to Malware Prevention
A Warning from DHS and Other Government Agencies Regarding Remote Working
A Warning from DHS and Other Government Agencies Regarding Remote Working
Password Security in 2020 - Part 2
Password Security in 2020 – Part 2