Fortress Security Risk Management Logo
Report an Attack
  • Security Consulting
  • Managed Security
  • Incident Response
  • Resources
    • Blog
    • Infographics
    • Videos
    • RansomwareClock.org
  • About Us
    • Our Team
    • Careers
    • Contact Us
Report an Attack
Fortress Security Risk Management Logo
View Post

Cybersecurity Safe Harbor: What You Need to Know

In Incident Response, Security Consulting by Kara BirchOctober 5, 2021

The information provided in this blog post does not, and is not intended to, constitute legal advice; instead, all information, content, and materials available on this site are for general …

View Post

Webinar Recording: Cybersecurity Lessons for Business Leaders

In Incident Prevention, Incident Response, Managed Security, Security Consulting, Uncategorized, Videos by Kara BirchSeptember 21, 2021

View Post

Ransomware: To Pay or Not to Pay? That Is the Question

In Incident Response by Fortress SRMJune 9, 2021

It’s a big question for businesses hit by a ransomware attack: should we pay the ransom or not? Ransomware is malware that encrypts files on a device, making them inaccessible …

View Post

Ransomware Over the Rainbow

In Incident Response, Infographics by Fortress SRMFebruary 20, 2021

Cybercriminals want you to pay no attention to that man behind the curtain as they ransom your company’s data.

View Post

The Hacker’s Jukebox

In Incident Response, Infographics by Fortress SRMDecember 7, 2020

Cybersecurity is serious business and it is our mission to protect every organization’s data. Every year, new records are set regarding data breaches, so we wondered, what records would we …

View Post

A Guide to Phishing Attacks

In Incident Response by Fortress SRMOctober 20, 2020

Phishing is an online scam where cyber criminals send messages that appear legitimate to get the recipient to click a link and enter confidential information. Once a phishing link is …

View Post

Black Hat vs. White Hat Hacking

In Incident Response, Infographics by Fortress SRMOctober 12, 2020

There are many different types of hackers. Some use their powers for good (white hat hackers) while some use their skills for not-so-good (black hat hackers). And then there are …

View Post

Let’s Go Phishing! A Guide to Phishing Attacks

In Incident Response, Infographics by Fortress SRMAugust 30, 2020

Phishing is an online scam in which cybercriminals send messages that appear to be real to get the recipient to click a link and enter confidential information. Once a link …

View Post

What Will A Data Breach Cost You?

In Highlight, Incident Response, Infographics by Fortress SRMAugust 15, 2020

Only you will be able to estimate the financial impact and business disruption a data breach will have on your company, so we provide some potential costs to guide your …

View Post

5 Phases of Cyber Incident Response

In Incident Response, Infographics by Fortress SRMJune 10, 2020

These 5 phases are actions that every incident response program should contain to address cybersecurity threats an organization might face.

Fortress Security Risk Management Logo
833-574-2370

Services

Security Consulting
Managed Security
Incident Response

About

Our Team
Resources
Contact Us

Copyright © Fortress Security Risk Management. All rights reserved.

Privacy Policy
  • Security Consulting
  • Managed Security
  • Incident Response
  • Resources
    • Blog
    • Infographics
    • Videos
    • RansomwareClock.org
  • About Us
    • Our Team
    • Careers
    • Contact Us