War Stories and Other Helpful Information

The Blog

3 Tips to help deal with phishing threats

Three Tips to Help Deal with Phishing Threats

Although new threats that are cropping up in the cybersecurity space – phishing — one of the oldest pain points in cybersecurity — is continuing to wreak havoc. Phishing is one of the most dangerous “action varieties” to an organization’s cybersecurity health. Phishing has been a mainstay in the cybersecurity threat landscape for decades, even though its not talked about much in the media. Because it continues to work, phishing is still a common tactic used by threat actors. In 2020, 74 percent of US organizations experienced a successful phishing attack. In addition, 43 percent of cyberattacks in 2020 featured

Read More »

Five Simple Tips to Mitigate Cyber Risk

Being cyber smart is the best way to protect yourself and others from cyber attacks. In honor of Cyber Security Awareness Month, Blue Team Alpha has compiled 5 simple tips to mitigate your cyber risk. Following these tips is easy, and free. Using all of these tips together can make a real difference for taking control of your online presence. But it’s important to keep in mind that no single tip is full proof on it’s own. Read on to learn 5 simple tips to mitigate your cyber risk that you can implement today. 1) Use strong passphrases/password manager While

Read More »

September 2021 Microsoft Exchange Proxyshell Vulnerability

September 2021 Microsoft Exchange Proxyshell Vulnerability What is the September 2021 Microsoft Exchange Proxyshell Vulnerability? Exchange servers are under attack, again. These are not the Hafnium Webshells, these are Proxyshells that are being used to compromise onsite Exchange environments. Microsofts latest patch may not be effective in keeping your Exchange environment safe.   Indicators of compromise: One indicator of compromise is draft emails that were not created by the mailbox owner.   Associated CVE’s:  CVE-2021-31207  CVE-2021-34473  CVE-2021-34523  Is there a patch available? There was a patch made available by Microsoft on August 24th 2021. These patches and vulnerabilities are now under review

Read More »
5 dos and don'ts of a ransomware attack, ransomware removal, and how to remove ransomware

5 Dos and Don’ts if You’ve Been Hit with Ransomware

Walking in to a ransomware splash screen on your organizations’ computers can be terrifying; and trust us, ransomware was designed to terrify. Often times untraceable bitcoin payments are involved (and sometimes even extortion demands) in order to gain access to your computer, encrypted files, or network. Ransomware is currently considered by many reports as one of the top cybersecurity threats, and for good reason. Not only is data theft a profitable industry, costing companies on average $761,106 per payout, but attackers have taken things a step further by publicly disclosing sensitive data on leak sites. If you discover ransomware in your system, the most important thing to do first is not to panic.

Read More »

Introducing Blue Team Alpha’s New CISO: Jeff Wheat

Today we are excited to announce Jeff Wheat as our new Chief Information Security Officer (CISO). Jeff joins us with more than 35 years of experience in information security, IT architecture, cyber operations, and risk management. In the role of CISO, Jeff will be responsible for Blue Team Alpha’s cyber security policies, security operations, and data and platform protection.

Read More »

What is the Microsoft Exchange Attack?

By now you’ve probably heard about the Microsoft Exchange hack, or the Hafnium attack—a cybersecurity cautionary tale circulating the news. But for many businesses around the globe, the attack is more than a story: it’s at their back door.

Read More »

Top 4 Cybersecurity Protections for Small Businesses on a Budget

With cyberattacks on the rise, it’s important for small and medium-sized business owners to look at their cybersecurity plans. Sometimes it can be difficult to know where to start, but even on a budget there are a few basic hygiene measures (like a password manager) you can implement to keep your company and systems secure.

Read More »

Top 10 Questions to Ask When You Hire a Virtual CISO

At Blue Team Alpha, we firmly believe in the importance of a Chief Information Security Officer (CISO) for both large and small companies. As cybersecurity attacks continue to rise, the C-Suite demands a role fully dedicated to protecting enterprise networks, applications, and data. It’s the only way to properly defend against an attack.

Read More »
Subscribe To Our Blog
Blue Team Alpha - First 5 Things You Need To Do
Ransomware Response Checklist