Innovative Minds - On Point - One Group  

ISP Blog

This is the blog for MindPoint Group's Information Security & Privacy (ISP) division. We hope to use this to contribute to and debate ideas among the ISP community.
20
Sep
2018

Insider Threat Mitigation – Just Players in a Risk Management Game

By:

Let’s meet some actors in this game, shall we?  First, we have Roger, who is angry that his peers have gotten promoted over him and he received a paltry bonus this year.  Roger decided to reset production server accounts to a password only he knows, cover his tracks, and proclaim ignorance when a severe incident

Read More

06
Sep
2018

Social Engineering Part 3: Phishing

By:

If you survey your co-workers, chances are high you will find they have received a phishing email at some point. It’s not surprising since phishing is the number one cause of breaches in the world, with an average of more than 46,000 new phishing sites created per day, or nearly 1.5 million each month (Webroot

Read More

26
Aug
2018

MindPoint Group Achieving Diversity Without Mandate…What’s in the Secret Sauce?

By:

Frequently stated, not often enough repeated, “Diversity is an action, inclusivity is a culture, and belonging is a feeling” (Forbes, 2017). Earlier this year, MindPoint Group (MPG) sponsored a group of employees, including myself, to attend the 5th Annual Lesbians Who Tech Summit. During the conference, I remember feeling chills run through my body as

Read More

15
Aug
2018

Social Engineering Part 2: Open-Source Intelligence (OSINT)

By:

“Most scams work because victims are successfully convinced the scam is real. Thus, victims give criminals their information more often than it is maliciously stolen. A scammer’s main goal is to convince you to hand over your information voluntarily, as opposed to using forceful intimidation or threats.” “While hostility is one social engineering methodology, expert

Read More

18
Jul
2018

A Tale Of Two Tools: When Splunk met SecurityCenter

By:

Co-Authors:  Keith Rhea and Alex Nanthavong It was the best of times, it was the worst of times, it was the age of technological advancements, it was the age of attack, it was the epoch of cybercrime, it was the epoch of opportunity, it was the season of Remediation, it was the season of Exploitation,

Read More