Jessica Grube

Jessica Grube is a Senior Security Engineer and vulnerability risk management expert at CyberMaxx.
Find me on:

Recent Posts

FBI, DHS, HHS Warn of Imminent Ransomware Threat Against US Hospitals

Posted by Jessica Grube on Oct 30, 2020 10:37:35 AM

During late afternoon Wednesday, October 28th several federal agencies, including HHS and the FBI, issued a joint cybersecurity advisory that cited "credible information of an increased and imminent cybercrime threat to U.S. hospitals and healthcare providers." The advisory warned of Russian criminal groups targeting American hospitals with Ryuk ransomware. The threat advisory is consistent with attack activity observed by CyberMaxx over the past weeks. All indicators point to an uptick in ransomware attacks targeting healthcare providers. The attacks also coincide with a nation-wide surge in COVID-19 cases.

Read More

Topics: cybersecurity, healthcare, ransomware

Microsoft Warns This New Vulnerability Could Lead To The Next WannaCry

Posted by Jessica Grube on May 16, 2019 3:45:36 PM

Microsoft is warning that an exploit with the magnitude of the WannaCry attack that crippled computers worldwide two years ago could be imminent if people fail to patch a high-severity vulnerability. 

Read More

Topics: cybersecurity, cyber attack, wannacry, microsoft, vulnerability

Do You Need Vulnerability Risk Management?

Posted by Jessica Grube on Apr 4, 2019 1:22:38 PM

Across the globe cybersecurity teams work around the clock to keep up with scanning and patching vulnerabilities, and identifying threats.  This form of Vulnerability Risk Management is becoming a top priority within IT security teams.

As such, more and more risk personnel are reaching out to vendors of VRM to help with vulnerability management and the struggle to reduce security cyber risk. But do you really need a vulnerability risk management solution?

Read More

What is Vulnerability Risk Management and Why Do You Need It?

Posted by Jessica Grube on Apr 3, 2019 10:43:51 AM

Today there are more devices connected to the internet than there have ever been before – an inconceivable number of connections. An ever-growing rate of connections provides more and more opportunities for hackers to exploit digital vulnerabilities. In this blog post, we'll discuss why VRM has never been more of a priority in the realm of cybersecurity.

Read More

Topics: vulnerability risk management, VRM

5 Cybersecurity Policy Necessities for Responding to a Network Intrusion

Posted by Jessica Grube on Mar 4, 2019 7:04:00 AM

A Life of Crime

Have you ever considered a life of crime? If so, cyber crime might be a good field for you to take a look at. Many organizations aren’t very good at responding to network intrusion... so you might actually get away with it. Plus, prosecuting cyber criminals is tough to do; evidence against your dastardly deed seldom stands up in court.

When your victim has a cybersecurity policy in place for responding to network intrusion, clues will be hard for them to come by, and even harder to trace back to you.

Read More

6 Questions To Ask When Creating Your Incident Response Strategy

Posted by Jessica Grube on Feb 22, 2019 10:59:30 AM

With cybersecurity attacks and costly data breaches on the rise, and a wide range of industries being targeted, companies of all sizes should be preparing for the worst. Just as we prepare for a natural disaster, companies should prepare for a cybersecurity disaster, and in both instances, proper planning, preparation and practicing potential scenarios is key.

Read More

Topics: Blog, cybersecurity, incident response, tabletop exercises, data breach, cyber attack

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.

Recent Insight