<img src="https://secure.leadforensics.com/71120.png" style="display:none;">

Kalki Blog

Header_about.png

What is Phishing?

Posted by Vikas Bhatia on Oct 17, 2016 8:46:37 AM

Did you know…In 2015, there were 1,966,324 registered notifications about attempted malware infections that aimed to steal money via online access to bank accounts.  In 2013 there were over 3 there were at least 72,758 phishing attacks worldwide!

Read More

Topics: identity theft, Phishing

CyberSecurity in the Middle Market

Posted by Vikas Bhatia on Oct 17, 2016 8:35:00 AM

This week marks Week 3 in the National Cyber Security Awareness Month (NCSAM).  With the focus on Recognizing and Combating Cybercrime we have decided to focus on the underserved population, the Midmarket.

The US Middle Market, a.k.a. midmarket, in the US accounts for 1/3 of all jobs and 1/3 of private sector GDP and according to the National Center for the Middle Market, "If the U.S. middle market were a country, its GDP would rank it as the third-largest economy in the world". 

Read More

Topics: Risk Management, Cyber security, midmarket

New York State presents Cybersecurity to the Board of Directors

Posted by Vikas Bhatia on Sep 23, 2016 7:30:00 AM

New York State proposes game changing regulations for financial services organization and their suppliers

Read More

Topics: Cyber Risk management, compliance, Board of Directors

SMB Insurance companies & NAIC's Cyber Security Regulations

Posted by Vikas Bhatia on Aug 26, 2016 4:00:00 PM

Till now our experience with insurance agencies has been fairly reactive and driven by IT.  In the background we've been keeping an eye on the National Association of Insurance Commissioners (the NAIC) regulations and how they would impact Small and Medium Sized Businesses (SMB).  In April the Cybersecurity (EX) Task Force (the Task Force) first presented the Insurance Data Security Model Law (the Model Law) it generated more than 40 comment letters from trade associations, market participants and regulators. insurance industry association .  It appears that the, "something has happened, now can you help us fix, resolve, remediate it" approach to Data / Information or Cyber Security is about to change drastically.

Read More

Topics: Regulations, Risk Management, Cyber Insurance, kalkiconsulting compliance, SMB, CISO, CIO

Want Apple to block your iPhone from recording video at gigs?

Posted by Vikas Bhatia on Jul 4, 2016 10:11:05 AM

Was your recent concert visit be annoyed by iPhones blocking the view?  Apple may have the answer to your problems!  Apple was awarded a US patent last week for a system could restrict your iPhone's ability to  capture videos at concert venues by deploying an infrared signal to block your phone from recording
video at concerts.

Read More

Topics: Mobile Devices, BYOD, Malware

Social Engineering Examples: Business Email Compromise

Posted by Stacy Willis on Jun 21, 2016 9:00:00 AM

Social engineering and phishing scams come in many different forms, infinite forms really as attackers are constantly coming up with new ways to trick victims. One flavor of attack has become increasingly popular because it is so effective: Business Email Compromise (BEC). In 2015 alone, BEC attacks cost companies over $1.2 Billion. A BEC attacks all have these phases:

Read More

Topics: Phishing

Cyber Insurance Coverage: Will it be there when I need it?

Posted by Stacy Willis on Jun 15, 2016 4:03:28 PM

Cyber Insurance is one of the more tricky subjects for companies to tackle today. It is becoming increasingly common among businesses of all sizes and is even beginning to be looked at as a requirement when partnering with other firms.

Read More

Topics: Cyber Insurance

You don't have to be high-tech to use 2 Factor Authentication

Posted by Stacy Willis on Apr 20, 2016 7:00:00 AM

What is it?

Let's start with the definition of authentication. Essentially the process of authentication involves proving you are who you say you are. There are three ways of authenticating:

Read More

Topics: Security technology

What is a Zero-Day Attack?

Posted by Stacy Willis on Apr 6, 2016 7:00:00 AM

There are plenty of cyber security buzzwords flying around these days but few are heard as often as the phrase "zero-day attacks." In fact, it even made an appearance in our article on predicted threats for 2016. Experts see zero-day attacks becoming much more prevalent and continuing to do so throughout 2016. While many people have heard the phrase, we often find that unless the person is highly technical or a security professional, they don't know what it means. So we are here to help!

Read More

Topics: Attack, Malware

Ransomware and Recent Varients

Posted by Alex Merry on Apr 5, 2016 10:52:33 AM

Systems Affected

Networked Systems

Read More

Topics: Security Update