<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Incident Response Archives | Fortress SRM</title>
	<atom:link href="https://fortresssrm.com/category/incident-response/feed/" rel="self" type="application/rss+xml" />
	<link>https://fortresssrm.com/category/incident-response/</link>
	<description>Full-Spectrum Cybersecurity Protection</description>
	<lastBuildDate>Fri, 11 Apr 2025 01:39:55 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://fortresssrm.com/wp-content/uploads/2021/05/cropped-FORT_Favicon-32x32.png</url>
	<title>Incident Response Archives | Fortress SRM</title>
	<link>https://fortresssrm.com/category/incident-response/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Golden Triangle: Welcome to the Modern Wild, Wild, East (Part 2)</title>
		<link>https://fortresssrm.com/the-golden-triangle-welcome-to-the-modern-wild-wild-east-part-2/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Wed, 05 Mar 2025 14:54:29 +0000</pubDate>
				<category><![CDATA[Incident Prevention]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[Managed Security]]></category>
		<category><![CDATA[Security Consulting]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=1590</guid>

					<description><![CDATA[<p>Professional &#38; Organized: How the GTSEZ Encourages the Multi-functional Criminal Enterprise, and What To Do About It By Chuck Mackey Introduction In Part 1, we introduced you to the Golden ...</p>
<p>The post <a href="https://fortresssrm.com/the-golden-triangle-welcome-to-the-modern-wild-wild-east-part-2/">The Golden Triangle: Welcome to the Modern Wild, Wild, East (Part 2)</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>Professional &amp; Organized: How the GTSEZ Encourages the Multi-functional Criminal Enterprise, and What To Do About It</strong></p>



<p><strong><em>By Chuck Mackey</em></strong></p>



<p><strong>Introduction</strong></p>



<p>In Part 1, we introduced you to the <strong>Golden Triangle Special Economic Zone (GTSEZ)</strong>, established in 2007 in Laos&#8217; Bokeo Province. Initially envisioned as a beacon of economic development, the GTEZ, located at the convergence of Laos, Myanmar, and Thailand, promised prosperity and growth. However, behind its glittering facade, a dark unchecked underworld has flourished over the last 15 years.</p>



<p>The GTSEZ is now a notorious hub for <strong>transnational crime</strong>, including <em>drug trafficking, human trafficking, wildlife smuggling, and cybercrime</em>. Despite international sanctions and efforts to curb ever-expanding criminal activities, the zone remains a lawless enclave, where corruption and exploitation thrive unabated.</p>



<p>In this article, we will explore how the Multi-functional Criminal Enterprise (MFCE) has flourished by adopting the same professional management doctrines and principles used by legitimate businesses worldwide. These criminal organizations have evolved beyond traditional illicit activities, employing sophisticated business strategies to expand their operations and maximize profits. By understanding their methods, we can better develop strategies to disrupt their activities and mitigate their impact.<strong></strong></p>



<p><strong>How a Multi-functional Criminal Enterprise is Professionally Organized<a href="#_ftn1" id="_ftnref1"><strong>[1]</strong></a></strong></p>



<p><strong><em>The Principle of Diversification</em></strong><strong><em></em></strong></p>



<p>MFCEs have evolved into sophisticated operations, engaging in a wide array of illicit activities. Beyond traditional drug trafficking and extortion, they now delve heavily into cybercrime, human trafficking, arms smuggling, and environmental crimes. This diversification spreads risk across their entire operation and maximizes profits across various illegal markets.</p>



<p><strong><em>Business-like Operations</em></strong><strong><em></em></strong></p>



<p>MFCEs operate with a chilling level of professionalism. <em>They</em> <em>employ business strategies such as market analysis, supply chain management, and financial planning</em>. Legitimate businesses are often used as fronts to launder money and facilitate illegal activities. For instance, they invest in real estate, hospitality, or import-export businesses to mask their operations, creating a facade of legitimacy while conducting heinous crimes behind closed doors and aggressive expansion tactics.</p>



<p><strong><em>Use of Technology</em></strong></p>



<p>Advancements in technology have exponentially boosted the capabilities of MFCEs. They use encrypted communication, cryptocurrencies, and the dark web to conduct their activities with greater anonymity and security.</p>



<p>Cybercrime has become THE major component of their operations, with activities ranging from <em>ransomware attacks to large-scale financial fraud</em>. These enterprises exploit the anonymity of the Internet to perpetrate crimes on a global scale, often leaving victims powerless and law enforcement agencies struggling to keep up. Technology shrinks their “time-to-market” and enables cybercrime to expand on a global basis, hitting every single continent with endless phishing <a>scams</a>.</p>



<p><strong><em>Organizational Structure</em></strong></p>



<p>MFCEs have a hierarchical structure, not unlike any major corporation, with clear roles, responsibilities, and paychecks. This includes leaders, senior managers, advisors, and various heads of operations, finance, security, and external relations. Each division manages specific criminal activities, ensuring efficient and coordinated operations. This meticulous organization allows them to operate like well-oiled machines, executing complex criminal schemes with precision. See chart below.</p>



<figure class="wp-block-image size-full"><a href="https://fortresssrm.com/wp-content/uploads/2025/03/Org-structure.png"><img fetchpriority="high" decoding="async" width="685" height="634" src="https://fortresssrm.com/wp-content/uploads/2025/03/Org-structure.png" alt="" class="wp-image-1594" srcset="https://fortresssrm.com/wp-content/uploads/2025/03/Org-structure.png 685w, https://fortresssrm.com/wp-content/uploads/2025/03/Org-structure-300x278.png 300w, https://fortresssrm.com/wp-content/uploads/2025/03/Org-structure-100x93.png 100w" sizes="(max-width: 685px) 100vw, 685px" /></a></figure>



<p><strong>The GTSEZ Encourages the MFCE</strong></p>



<p><strong><em>Strategic Location</em></strong><em>&nbsp;</em></p>



<p>The GTSEZ&#8217;s location makes it an ideal transit point for illicit goods and activities. This strategic positioning facilitates the flow of drugs, human trafficking, smuggling, technology, and other illegal operations. The zone&#8217;s geographical advantage is exploited to the fullest, turning it into a bustling hub of criminal activity.</p>



<p><strong><em>Economic Development Facade</em></strong></p>



<p>The GTSEZ was initially established to promote economic development, attracting investments and tourists. However, this facade of legitimate economic activity provides perfect cover for criminal enterprises to operate with minimal scrutiny. Mixing legitimate and illegal operations blurs the line, creating a confusing, hard-to-unravel web of deceit.</p>



<p><strong><em>Corruption and Weak Law Enforcement</em></strong></p>



<p>The influx of illicit money has fueled corruption, undermined the rule of law, and eroded public trust in authorities. Efforts by Lao authorities to crack down on these activities have been severely limited and ineffective, allowing the GTSEZ to continue operating as a haven for transnational crime. Corrupt officials <a>turn a blind eye to</a> the rampant criminality, further entrenching the zone&#8217;s lawlessness.</p>



<p><strong><em>Cybercrime Operations</em></strong></p>



<p>The GTSEZ has become a breeding ground for cybercrime. Fraud factories, staffed by human trafficking victims operate within the zone, conducting elaborate global <a>scam</a> operations. The phishing email or text you receive liking was generated by a MFCE, not some random lone criminal. Victims (human trafficking) are coerced into working in these <a>scam</a> centers and “Phishing Farms” where they are forced to make fraudulent calls and outbound texts and engage in other illegal activities. The exploitation of human trafficking victims for cybercrime adds a horrifying layer to the already grim reality of the GTSEZ.</p>



<figure class="wp-block-image size-large"><a href="https://fortresssrm.com/wp-content/uploads/2025/03/Criminal-enterprise-scaled.jpeg"><img decoding="async" width="1024" height="683" src="https://fortresssrm.com/wp-content/uploads/2025/03/Criminal-enterprise-1024x683.jpeg" alt="" class="wp-image-1591" srcset="https://fortresssrm.com/wp-content/uploads/2025/03/Criminal-enterprise-1024x683.jpeg 1024w, https://fortresssrm.com/wp-content/uploads/2025/03/Criminal-enterprise-300x200.jpeg 300w, https://fortresssrm.com/wp-content/uploads/2025/03/Criminal-enterprise-768x512.jpeg 768w, https://fortresssrm.com/wp-content/uploads/2025/03/Criminal-enterprise-1536x1024.jpeg 1536w, https://fortresssrm.com/wp-content/uploads/2025/03/Criminal-enterprise-2048x1365.jpeg 2048w, https://fortresssrm.com/wp-content/uploads/2025/03/Criminal-enterprise-100x67.jpeg 100w, https://fortresssrm.com/wp-content/uploads/2025/03/Criminal-enterprise-1900x1267.jpeg 1900w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p><strong>What To Do About It</strong></p>



<p><strong><em>Strengthen Law Enforcement</em></strong></p>



<p>There is a need for stronger law enforcement within the GTSEZ to crack down on criminal activities. This includes increasing the capacity of local police, improving investigative techniques, and ensuring that law enforcement agencies are free from corruption. Without robust law enforcement, the cycle of crime and exploitation will continue unabated.</p>



<p><strong><em>International Cooperation</em></strong></p>



<p>Given the transnational nature of the crimes associated with the GTSEZ and MFCEs, international cooperation is crucial. Countries need to work together to share intelligence, conduct joint operations, and apply consistent pressure on criminal enterprises operating within the zone. A united global front is essential to dismantle these sophisticated criminal networks.</p>



<p><strong><em>Promote Legitimate Economic Development</em></strong></p>



<p>Efforts should be made to promote legitimate economic development within the GTSEZ. This includes attracting genuine investors, creating job opportunities for local populations, and ensuring that economic activities are transparent and accountable. By fostering legitimate economic growth, the grip of criminal enterprises on the zone is weakened.</p>



<p><strong><em>Protect Victims</em></strong></p>



<p>There should be a focus on protecting victims of human trafficking and exploitation within the GTSEZ. This includes providing support services, safe havens, and legal assistance to help victims escape from criminal enterprises and rebuild their lives. The human cost of the GTSEZ&#8217;s criminality is immense, and addressing it requires a compassionate and comprehensive approach.</p>



<p><strong><em>Address Corruption</em></strong></p>



<p>Combating corruption is essential to restoring the rule of law within the GTSEZ. This involves implementing anti-corruption measures, holding corrupt officials accountable, and promoting transparency in government operations. Without addressing the root cause of corruption, any efforts to combat crime in the GTSEZ will be futile.</p>



<p><strong><em>Public Awareness and Advocacy</em></strong></p>



<p>Raising public awareness about the criminal activities within the GTSEZ and the broader operations of MFCEs is also a critical component of the response. Media investigations and reports have shed light on the dark underworld of the GTSEZ, prompting calls for action from the international community. Advocacy efforts by human rights organizations are also putting pressure on governments to take decisive action.</p>



<p>These advancements represent significant steps forward in the fight against the criminal enterprises operating within the GTSEZ. Continued international cooperation, technological innovation, and robust law enforcement efforts are essential to achieving lasting success.</p>



<p><strong><em>Increased Regulation and Oversight</em></strong></p>



<p>Efforts by Lao authorities to improve regulations and increase law enforcement within the GTSEZ have been ongoing. Although challenges remain, these efforts are aimed at curbing the rampant criminal activities and restoring some level of order within the zone. This includes stricter enforcement of existing laws and the implementation of new regulations to address emerging threats.</p>



<p><strong><em>Technological Advancements</em></strong></p>



<p>Law enforcement agencies are leveraging advancements in technology to combat MFCEs more effectively. This includes the use of artificial intelligence (AI) for predictive policing, improved surveillance capabilities, and more efficient identification of potential threats. AI technologies are being deployed to analyze large datasets, identify patterns, and predict crime hotspots, enhancing the ability of law enforcement to respond proactively.</p>



<p><strong><em>Heightened International Scrutiny and Sanctions</em></strong></p>



<p>The GTSEZ faces intense scrutiny from international bodies and human rights organizations due to persistent human rights concerns and criminal activities. The United States Treasury Department has sanctioned the Kings Romans Group, its owner Zhao Wei, and the &#8220;Zhao Wei Transnational Crime Organization&#8221; for their involvement in money laundering and drug trafficking. These sanctions aim to disrupt the financial networks supporting these criminal enterprises.</p>



<p>By addressing these issues, the international community can help dismantle the criminal enterprises operating within the GTSEZ and support efforts to restore law and order in this troubled region. The stakes are high, and the consequences of inaction are dire.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p> <a id="_ftn1" href="#_ftnref1">[1]</a>Sources: Police 1, Business &amp; Human Rights Resource Centre, Forbes, Sci-Tech Today, Infosec Institute, Bolster AI, Living Security, The Diplomat, purplesec.us.</p>
<p>The post <a href="https://fortresssrm.com/the-golden-triangle-welcome-to-the-modern-wild-wild-east-part-2/">The Golden Triangle: Welcome to the Modern Wild, Wild, East (Part 2)</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Golden Triangle: Welcome to the Modern Wild, Wild, East (Part 1)</title>
		<link>https://fortresssrm.com/the-golden-triangle-welcome-to-the-modern-wild-wild-east-part-1/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Mon, 24 Feb 2025 16:41:43 +0000</pubDate>
				<category><![CDATA[Incident Prevention]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[Managed Security]]></category>
		<category><![CDATA[Security Consulting]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=1582</guid>

					<description><![CDATA[<p>Introduction In 2007, the Lao government, in collaboration with the Hong Kong-registered Kings Romans Group, established the Golden Triangle Special Economic Zone (GTSEZ)[1] in the Ton Pheung District of Bokeo ...</p>
<p>The post <a href="https://fortresssrm.com/the-golden-triangle-welcome-to-the-modern-wild-wild-east-part-1/">The Golden Triangle: Welcome to the Modern Wild, Wild, East (Part 1)</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>Introduction</strong></p>



<p>In 2007, the Lao government, in collaboration with the Hong Kong-registered Kings Romans Group, established the <strong>Golden Triangle Special Economic Zone (GTSEZ)<a href="#_ftn1" id="_ftnref1"><strong>[1]</strong></a></strong> in the Ton Pheung District of Bokeo Province, Laos.</p>



<p>This 3,000-hectare zone, nestled along the Mekong River, was envisioned as a beacon of economic development, promising prosperity, and growth. However, beneath the veneer of progress, a sinister underworld has flourished, transforming the GTSEZ into a notorious hub of criminal enterprises.</p>



<p>From its inception in 2007, the GTSEZ was dominated by the Kings Romans Casino, a glittering facade that attracted Chinese tourists and gamblers. Behind the casino&#8217;s opulent doors, a dark network of illicit activities began to take root. The zone quickly gained a reputation for being a lawless enclave, where <strong><em>drug trafficking, human trafficking, and wildlife smuggling</em></strong> thrived.</p>



<p>In January 2018, the United States Treasury Department sanctioned the Kings Romans Group, its owner Zhao Wei, and the<strong> &#8220;Zhao Wei Transnational Crime Organization,&#8221;</strong> accusing them of using the casino to <strong>launder money</strong> and traffic drugs.</p>



<p>Despite these sanctions, the criminal activities within the GTSEZ have only intensified. Reports of <strong>high-grade crystal methamphetamine seizures</strong> linked to the zone surged, with drugs and precursor chemicals flowing through Laos to neighboring countries.</p>



<p><strong>Now, the GTSEZ has become a breeding ground for cybercrime.</strong> Fraud factories, staffed by human trafficking victims, operate within the zone, conducting elaborate global scam operations. Victims from various countries are lured or coerced into working in these fraud centers and Phishing Farms<a href="#_ftn2" id="_ftnref2">[2]</a>, where they are forced to make fraudulent calls and engage in other illegal activities.</p>



<figure class="wp-block-image size-full is-resized"><a href="https://fortresssrm.com/wp-content/uploads/2025/02/Laos.jpg"><img decoding="async" width="2200" height="1467" src="https://fortresssrm.com/wp-content/uploads/2025/02/Laos.jpg" alt="" class="wp-image-1586" style="width:560px;height:auto" srcset="https://fortresssrm.com/wp-content/uploads/2025/02/Laos.jpg 2200w, https://fortresssrm.com/wp-content/uploads/2025/02/Laos-300x200.jpg 300w, https://fortresssrm.com/wp-content/uploads/2025/02/Laos-1024x683.jpg 1024w, https://fortresssrm.com/wp-content/uploads/2025/02/Laos-768x512.jpg 768w, https://fortresssrm.com/wp-content/uploads/2025/02/Laos-1536x1024.jpg 1536w, https://fortresssrm.com/wp-content/uploads/2025/02/Laos-2048x1366.jpg 2048w, https://fortresssrm.com/wp-content/uploads/2025/02/Laos-100x67.jpg 100w, https://fortresssrm.com/wp-content/uploads/2025/02/Laos-1900x1267.jpg 1900w" sizes="(max-width: 2200px) 100vw, 2200px" /></a></figure>



<p><strong>The Rise of the Multi-functional Criminal Enterprise</strong></p>



<p><strong>Multi-functional criminal enterprises (MFCE)</strong> have expanded beyond traditional activities like drug trafficking and extortion to include a wide range of illicit operations. These enterprises now engage in <strong><em>cybercrime, human trafficking for labor, arms smuggling, and environmental crimes</em></strong>.</p>



<p>This diversification allows them to spread risk and capitalize on various illegal markets.</p>



<p><strong><em>Business-like Operations</em></strong></p>



<p>The MFCE operate with a high degree of professionalism, employing business strategies such as <strong><em>market analysis, supply chain management, and financial planning</em></strong>.</p>



<p>They often use legitimate businesses as fronts to launder money and facilitate illegal activities. For example, they might invest in real estate, hospitality, or import-export businesses to mask their operations.</p>



<p>The zone&#8217;s unchecked criminality has had devastating consequences for the local population and the broader region<a href="#_ftn3" id="_ftnref3">[3]</a>. The influx of illicit money has fueled corruption, undermined the rule of law, and eroded public trust in authorities. Efforts by Lao authorities to crack down on these activities have been sporadic and ineffective, allowing the GTSEZ to continue operating as a haven for transnational crime.</p>



<p><strong><em>Worker Exploitation</em></strong></p>



<p>Worker exploitation within the MFCE takes many forms, often involving severe abuse and coercion.&nbsp;Here are just a few examples:</p>



<ul class="wp-block-list">
<li><strong>Forced labor</strong>&nbsp;is a common practice where workers are compelled to work under threat or coercion. They are subjected to long hours, minimal pay, and unsafe working conditions.</li>



<li><strong>Human Trafficking</strong>&nbsp;involves the recruitment, transportation, and harboring of individuals through force, fraud, or coercion for the purpose of exploitation. Victims are forced into labor or sexual exploitation. But a growing area of trafficking means victims are used in cybercrime operations, where they are made to send fraudulent emails or manage fake websites.</li>



<li><strong>Debt Bondage</strong>&nbsp;occurs when workers are forced to work to repay a debt. The debt is often manipulated to ensure that it can never be fully repaid, trapping the worker in a cycle of exploitation.</li>



<li><strong>Wage Theft</strong> occurs when employers withhold wages or deny workers the compensation to which they are legally entitled. This can include not paying for overtime, underreporting hours worked, or paying below the minimum wage.</li>



<li><strong>Psychological and Physical Abuse</strong> where workers are subjected to threats, intimidation, and violence to ensure compliance and prevent escape. This abuse can have long-lasting effects on their mental and physical health.</li>



<li><strong>Document Confiscation </strong>is where employers confiscate workers&#8217; identification documents, such as passports and work permits, to prevent them from leaving or seeking help.</li>
</ul>



<p><strong><em>Cybercrime: THE New Growth Strategy of the MFCE</em></strong></p>



<p>Cybercrime is a growing strategy. Although there are many forms, three are highly represented throughout the GTSEZ:</p>



<ol start="1" class="wp-block-list">
<li><strong>Phishing</strong>: Workers send emails that are from legitimate sources, tricking recipients into providing sensitive information. Launched from the GTSEZ, they are perpetrated on a global basis.</li>



<li><strong>Ransomware</strong>: Victims are made to deploy ransomware, which encrypts data on a victim&#8217;s computer and demands a ransom for its release.</li>



<li><strong>Fraud</strong>: This includes creating fake websites or profiles (synthetic fraud) to deceive individuals into providing personal information or making payments, and fraudulent wire transfers.</li>
</ol>



<p><strong><em>The GTSEZ Impact on the World</em></strong></p>



<p>The Golden Triangle Special Economic Zone (GTSEZ) has significant implications for the rest of the world, particularly in terms of its role in <em>transnational crime</em>, economic development, and regional stability.</p>



<p><strong>Hub of Transnational Crime</strong></p>



<p>The GTSEZ has become a notorious hub for various forms of transnational crime, including drug trafficking, human trafficking, wildlife smuggling, and cybercrime. The zone&#8217;s strategic location along the Mekong River, where Laos, Myanmar, and Thailand meet, makes it an ideal transit point for illicit goods and activities.</p>



<p>This has global repercussions, as the drugs and other illegal products trafficked through the GTSEZ often end up in markets around the world, fueling addiction, crime, and violence.</p>



<p><strong>Economic Development and Corruption</strong></p>



<p>While the GTSEZ was initially established to promote economic development, the influx of illicit money has led to widespread corruption and undermined the rule of law.</p>



<p>The economic benefits promised by the zone have been overshadowed by the criminal activities that dominate it. This has created a challenging environment for legitimate businesses and investors, deterring foreign investment and hindering sustainable development in the region.</p>



<p><strong>Regional Stability</strong></p>



<p>The criminal activities within the GTSEZ have significant implications for regional stability. The flow of drugs and precursor chemicals through Laos has exacerbated the drug crisis in neighboring countries, particularly Thailand and Vietnam. Additionally, the human trafficking operations within the zone contribute to regional instability by exploiting vulnerable populations and fueling illegal migration.</p>



<p><strong>International Response</strong></p>



<p>The international community has taken notice of the GTSEZ&#8217;s role in transnational crime. The United States Treasury Department sanctioned the Kings Romans Group, its owner Zhao Wei, and the &#8220;Zhao Wei Transnational Crime Organization&#8221; for their involvement in money laundering and drug trafficking. These sanctions have had no impact on the GTSEZ’s growth and expansion.</p>



<p><strong>Conclusion</strong></p>



<p>The GTSEZ serves as a stark example of how economic development initiatives can be co-opted by criminal enterprises, leading to significant negative consequences for the region and the world. Addressing the challenges posed by the GTSEZ requires a multifaceted approach, including stronger law enforcement, international cooperation, and efforts to promote legitimate economic development.</p>



<p><strong>Next Issue</strong></p>



<p><strong><em>Part 2: Professional &amp; Organized: How the GTSEZ Encourages the MFCE and What To Do About It</em></strong></p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p><a href="#_ftnref1" id="_ftn1">[1]</a> Sources: Berkeley Policial Review, Wikipedia, Bloomberg, Newsweek, LA Times, United States Department of State, Journal of Illicit Economies and Development, Development and Surges of Organized Crime: An Application of Enterprise Theory, United Nations Office of Drugs and Crime: The Role of Technology in Human Trafficking, Arkose Labs, and other news and research authorities.</p>



<p><a href="#_ftnref2" id="_ftn2">[2]</a> Phishing farms represent a dangerous intersection of human trafficking and cybercrime. Addressing this issue requires a coordinated effort from international law enforcement agencies, cybersecurity experts, and policymakers to dismantle these operations and protect vulnerable individuals from exploitation.</p>



<p><a href="#_ftnref3" id="_ftn3">[3]</a> Forecasted population growth is to 300,000 people by 2026.</p>
<p>The post <a href="https://fortresssrm.com/the-golden-triangle-welcome-to-the-modern-wild-wild-east-part-1/">The Golden Triangle: Welcome to the Modern Wild, Wild, East (Part 1)</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Understanding the Known Knowns, Known Unknowns, and Unknown Unknowns in Cybersecurity</title>
		<link>https://fortresssrm.com/understanding-the-known-knowns/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Tue, 28 Jan 2025 16:28:16 +0000</pubDate>
				<category><![CDATA[Incident Prevention]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[Managed Security]]></category>
		<category><![CDATA[Security Consulting]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=1570</guid>

					<description><![CDATA[<p>In cybersecurity, navigating the murky waters of risk management requires a deep understanding of the "known knowns," "known unknowns," and "unknown unknowns." These concepts, borrowed from military strategy, are incredibly relevant as businesses face increasingly sophisticated cyber threats in a constantly shifting landscape.</p>
<p>The post <a href="https://fortresssrm.com/understanding-the-known-knowns/">Understanding the Known Knowns, Known Unknowns, and Unknown Unknowns in Cybersecurity</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><em>Cybersecurity Matters Blog<br>Kevin Baker</em>, <em>CISO</em></p>



<p>In cybersecurity, navigating the murky waters of&nbsp;<strong>risk management</strong>&nbsp;requires a deep understanding of the &#8220;known knowns,&#8221; &#8220;known unknowns,&#8221; and &#8220;unknown unknowns.&#8221; These concepts, borrowed from <strong>military strategy</strong>, are incredibly relevant as businesses face increasingly sophisticated cyber threats in a constantly shifting landscape.</p>



<p><strong>Known Knowns: The Clear and Present Dangers</strong></p>



<p>The&nbsp;<strong>known knowns</strong>&nbsp;in cybersecurity are the risks we are already familiar with. These include everyday threats like&nbsp;<strong>phishing emails</strong>,&nbsp;<strong>ransomware attacks</strong>, and&nbsp;<strong>social engineering</strong>&nbsp;scams. The advantage of known threats is that we can deploy well-established defenses:&nbsp;<strong>firewalls</strong>,&nbsp;<strong>intrusion detection systems</strong>, and&nbsp;<strong>encryption protocols</strong>&nbsp;all work to mitigate these risks.</p>



<p>However, just because these threats are familiar doesn’t mean they can be ignored.&nbsp;Cybercriminals are constantly evolving their tactics, finding new ways to bypass security measures. The&nbsp;frequency and sophistication&nbsp;of ransomware attacks, for example, have skyrocketed in recent years. Therefore, while the threats may be known, businesses must continually refine their defenses and adapt to the evolving nature of these risks.</p>



<p><strong>Known Unknowns: A Step into Uncertainty</strong></p>



<p>The&nbsp;<strong>known unknowns</strong>&nbsp;are the risks we know exist, but don’t fully understand or predict. These might include&nbsp;<strong>zero-day vulnerabilities</strong>—undiscovered flaws in software that cybercriminals can exploit before a patch is released—or&nbsp;<strong>emerging threats</strong>&nbsp;from new technologies like&nbsp;<strong>quantum computing</strong>&nbsp;or&nbsp;<strong>AI-powered attacks</strong>.</p>



<p>While we may know the general areas where these threats could arise, we often don’t know their exact nature or the timing of an attack. Companies combat known unknowns by investing in&nbsp;<strong>advanced threat intelligence</strong>,&nbsp;<strong>AI-driven detection systems</strong>, and&nbsp;<strong>continuous monitoring</strong>. These tools allow organizations to rapidly detect anomalies and respond to new forms of attacks in real-time, giving them a fighting chance in an environment where the next exploit could emerge without warning.</p>



<p><strong>Unknown Unknowns: The Invisible Threats</strong></p>



<p>The&nbsp;<strong>unknown unknowns</strong>&nbsp;are the most dangerous category. These are threats that we can’t foresee because they exist outside the scope of our current understanding. Think of the&nbsp;<strong>2017 WannaCry ransomware attack</strong>—it crippled organizations worldwide and came seemingly out of nowhere. No one anticipated how quickly a worm-like ransomware could spread across the globe using a previously patched Windows vulnerability.</p>



<p>The rise of&nbsp;<strong>machine learning</strong>,&nbsp;<strong>IoT</strong>&nbsp;devices, and&nbsp;<strong>5G networks</strong>&nbsp;introduces a whole new set of unknown risks. Cybercriminals are likely already exploring weaknesses in these new technologies, preparing to launch attacks in ways we haven’t even imagined yet. To defend against the unknown, companies need more than just technological tools. They need to build&nbsp;<strong>adaptive, resilient systems</strong>&nbsp;and foster a culture of&nbsp;<strong>cybersecurity awareness</strong>. Regular&nbsp;<strong>tabletop exercises</strong>,&nbsp;<strong>disaster recovery simulations</strong>, and&nbsp;<strong>cross-industry collaboration</strong>&nbsp;are key to ensuring that when an unknown threat strikes, the organization can respond effectively.</p>



<p><strong>The Importance of a Holistic Approach</strong></p>



<p>In this complex landscape, it’s not enough to react to threats as they appear. Businesses need to be&nbsp;<strong>proactive</strong>, understanding that the cybersecurity battleground is constantly evolving. Companies that can skillfully navigate the known knowns while preparing for both the known unknowns and the unknown unknowns will be the ones that emerge resilient, even in the face of the next unexpected cyber onslaught.</p>



<p>The future of cybersecurity lies in&nbsp;<strong>adaptability</strong>—balancing technology and strategy while fostering a culture ready to face any challenge, whether we see it coming or not.</p>
<p>The post <a href="https://fortresssrm.com/understanding-the-known-knowns/">Understanding the Known Knowns, Known Unknowns, and Unknown Unknowns in Cybersecurity</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Protecting Your Business from Fraud: Sharing Knowledge Series</title>
		<link>https://fortresssrm.com/protecting-your-business-from-fraud-sharing-knowledge-series/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Thu, 19 Dec 2024 16:03:35 +0000</pubDate>
				<category><![CDATA[Incident Prevention]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[Managed Security]]></category>
		<category><![CDATA[Security Consulting]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=1562</guid>

					<description><![CDATA[<p>The post <a href="https://fortresssrm.com/protecting-your-business-from-fraud-sharing-knowledge-series/">Protecting Your Business from Fraud: Sharing Knowledge Series</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<div class="x-resp-embed x-is-video x-is-youtube"><iframe loading="lazy" title="Protecting your business from fraud: Sharing Knowledge Series" width="1778" height="1000" src="https://www.youtube.com/embed/Xpm52hlTx7k?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></div>
</div></figure>
<p>The post <a href="https://fortresssrm.com/protecting-your-business-from-fraud-sharing-knowledge-series/">Protecting Your Business from Fraud: Sharing Knowledge Series</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Cyber Security Recruiter talks to Jess Walpole, Chief Technology Officer, Fortress SRM</title>
		<link>https://fortresssrm.com/the-cyber-security-recruiter-talks-to-jess-walpole-fortress-srm/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Thu, 19 Dec 2024 15:54:23 +0000</pubDate>
				<category><![CDATA[Incident Prevention]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[Managed Security]]></category>
		<category><![CDATA[Security Consulting]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=1560</guid>

					<description><![CDATA[<p>The post <a href="https://fortresssrm.com/the-cyber-security-recruiter-talks-to-jess-walpole-fortress-srm/">The Cyber Security Recruiter talks to Jess Walpole, Chief Technology Officer, Fortress SRM</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube"><div class="wp-block-embed__wrapper">
<div class="x-resp-embed x-is-video x-is-youtube"><iframe loading="lazy" title="The Cyber Security Recruiter talks to Jess Walpole, Chief Technology Officer, Fortress SRM" width="1333" height="1000" src="https://www.youtube.com/embed/dmfY3U_A01U?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></div>
</div></figure>
<p>The post <a href="https://fortresssrm.com/the-cyber-security-recruiter-talks-to-jess-walpole-fortress-srm/">The Cyber Security Recruiter talks to Jess Walpole, Chief Technology Officer, Fortress SRM</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How the Grinch Stole Your Cookies: A Christmas Tale of AiTM Phishing Attacks</title>
		<link>https://fortresssrm.com/a-christmas-tale-of-aitm-phishing-attacks/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Tue, 17 Dec 2024 18:19:11 +0000</pubDate>
				<category><![CDATA[Incident Prevention]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[Managed Security]]></category>
		<category><![CDATA[Security Consulting]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=1558</guid>

					<description><![CDATA[<p>In the bustling city of Cyberville, the holiday season was in full swing, while a sinister threat lurked in the shadows of the digital world.</p>
<p>The post <a href="https://fortresssrm.com/a-christmas-tale-of-aitm-phishing-attacks/">How the Grinch Stole Your Cookies: A Christmas Tale of AiTM Phishing Attacks</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Once upon a time, in the bustling city of Cyberville, the holiday season was in full swing. The streets were adorned with twinkling lights, and the air was filled with the scent of pine and freshly baked cookies. As families gathered to celebrate Christmas, little did they know that a sinister threat lurked in the shadows of the digital world.&nbsp;</p>



<p>In a cozy home on Elm Street, the Johnson family was preparing for their annual Christmas Eve celebration. The children, Emma and Jack, were eagerly awaiting Santa&#8217;s arrival, while their parents, Sarah and Tom, were busy wrapping presents and setting up the Christmas tree. Unbeknownst to them, a group of cybercriminals was plotting an Adversary-in-the-Middle (AiTM) phishing attack to steal their session cookies and hijack their online accounts.&nbsp;</p>



<p>The cybercriminals, led by a notorious hacker known as &#8220;The Grinch,&#8221; had devised a plan to intercept the Johnson family&#8217;s online communications. They crafted a convincing phishing email that appeared to be from a popular online retailer, complete with festive graphics and a special Christmas discount offer. The email contained a link to a fake login page designed to capture the family&#8217;s credentials and session cookies.&nbsp;</p>



<p>As the Johnsons received the email, they were excited by the prospect of last-minute Christmas deals. Without suspecting any foul play, they clicked on the link and entered their login details on the fake page. The Grinch and his team began their attack, intercepting the family&#8217;s session cookies, which are small pieces of data that keep users logged into their accounts. By stealing these cookies, The Grinch could bypass the need for passwords and multi-factor authentication (MFA), gaining unauthorized access to the Johnsons&#8217; online accounts.&nbsp;</p>



<p>The Grinch chuckled as he watched the session cookies flow into his servers, knowing that he could use them to hijack the family&#8217;s accounts, steal sensitive information, and carry out fraudulent transactions. He relished the thought of ruining their holiday cheer.&nbsp;</p>



<p>However, not all hope was lost. In the heart of Cyberville, a group of cybersecurity experts known as the &#8220;Fortress Elves&#8221; was on high alert. Led by a brilliant analyst named Saint Nick, the Fortress Elves had been monitoring suspicious activity in the area. When they detected the phishing campaign, they sprang into action.&nbsp;</p>



<p>Saint Nick and his team quickly identified the source of the attack and began working to shut it down. They deployed advanced threat detection tools and initiated a counterattack to disrupt The Grinch&#8217;s operations. As the Fortress Elves worked tirelessly, they sent out warnings to the residents of Cyberville, urging them to be cautious of phishing emails and to verify the authenticity of any links before clicking.&nbsp;</p>



<p>Back at the Johnson household, Tom received the alert just in time. He quickly realized that they had fallen victim to a phishing attack and took immediate action. He changed all their passwords, enabled multi-factor authentication (MFA) on their accounts, and cleared their browser cookies and cache to remove any compromised session information. The family gathered around the fireplace, relieved that their personal information was safe, thanks to the quick actions of the Fortress Elves.&nbsp;</p>



<p>Meanwhile, The Grinch&#8217;s plans were falling apart. His servers were being overwhelmed by the Fortress Elves&#8217; counterattack, and his stolen session cookies were being invalidated. Frustrated and defeated, he realized that his scheme had been foiled.&nbsp;</p>



<p>As the clock struck midnight, the Johnson family celebrated Christmas with renewed joy and gratitude. They knew that the true spirit of the holiday was not just about presents and decorations, but also about the kindness and bravery of those who protect others from harm.&nbsp;</p>



<p>In the end, the Fortress Elves saved Christmas in Cyberville, ensuring that families could enjoy the holiday season without fear of cyber threats. And as for The Grinch, he learned a valuable lesson: that even in the digital world, good will always triumph over evil.&nbsp;</p>



<p>Merry Christmas to all, and to all a safe and secure night!</p>



<div style="height:40px" aria-hidden="true" class="wp-block-spacer"></div>



<p><strong>About Fortress SRM:</strong>&nbsp;<br>Fortress Security Risk Management protects companies&nbsp;from the financial, operational, and emotional trauma of&nbsp;cybercrime by&nbsp;enhancing&nbsp;the performance of their people, processes, and technology.&nbsp;&nbsp;</p>



<p>Offering a robust, co-managed solution to enhance an internal IT team’s capability and capacity, Fortress SRM features a full suite of managed security services (24/7/365 U.S. based monitoring, cyber hygiene (managed patching), &nbsp;endpoint detection and response (EDR), and air-gapped and immutable cloud backups) plus specialized services like Cybersecurity-as-a-Service, Incident Response including disaster recovery &amp; remediation, M&amp;A cyber due diligence, GRC advisory, identity &amp; access management, threat intelligence, vulnerability assessments, and technical testing.&nbsp;With headquarters in Cleveland, Fortress SRM supports companies with both domestic and international operations.&nbsp;</p>



<p>In Case of Emergency:&nbsp;<br><strong>Cyber Attack Hotline: 888-207-0123 | Report an Attack: IR911.com&nbsp;&nbsp;</strong></p>



<p>For Preventative and Emergency Resources, please visit:&nbsp;<br><a href="https://ransomwareclock.org/" target="_blank" rel="noreferrer noopener"><strong>RansomwareClock.org</strong></a><strong><u></u></strong></p>
<p>The post <a href="https://fortresssrm.com/a-christmas-tale-of-aitm-phishing-attacks/">How the Grinch Stole Your Cookies: A Christmas Tale of AiTM Phishing Attacks</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Uptick in Ransomware Attacks on Healthcare: Strengthening Cybersecurity for Patient Safety</title>
		<link>https://fortresssrm.com/cyberattacks-on-healthcare/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Fri, 01 Dec 2023 20:00:25 +0000</pubDate>
				<category><![CDATA[Incident Prevention]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[Managed Security]]></category>
		<category><![CDATA[Security Consulting]]></category>
		<category><![CDATA[cyberhealth]]></category>
		<category><![CDATA[cybersafetyinhealthcare]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=1312</guid>

					<description><![CDATA[<p>by Will Hudec In recent months, the healthcare sector has witnessed a concerning surge in cyberattacks, particularly ransomware attacks. These malicious acts pose a significant threat to patient care, data ...</p>
<p>The post <a href="https://fortresssrm.com/cyberattacks-on-healthcare/">The Uptick in Ransomware Attacks on Healthcare: Strengthening Cybersecurity for Patient Safety</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><em>by Will Hudec</em></p>



<p>In recent months, the healthcare sector has witnessed a concerning surge in cyberattacks, particularly ransomware attacks. These malicious acts pose a significant threat to patient care, data security, and the overall stability of healthcare organizations. This article explores the reasons behind the uptick in attacks on healthcare, how this differs from the norm of ransomware groups in the past and outlines key steps for ensuring good cybersecurity health in the healthcare industry. </p>



<p>Traditionally, ransomware attacks targeted businesses with the aim of financial gain, but they would often avoid healthcare due to the impact it could have on patients. There have even been instances of ransomware groups providing a free decryptor when they realized a healthcare organization was hit.&nbsp;&nbsp;</p>



<p>Late last year, Lockbit, one of the most prevalent ransomware gangs in the world, hit <a href="https://www.secureworld.io/industry-news/ransomware-gang-hospital-free-decryptor" target="_blank" rel="noreferrer noopener">Sick Kids Hospital</a> out of Toronto, but later formally apologized and offered the free decryptor: <img decoding="async" src="blob:https://fortresssrm.com/5a3a354a-a64e-49a2-8dcd-a6605ca2558c" alt="Image"></p>



<p>However, it seems cybercriminals have shifted their focus to healthcare institutions due to the high value of healthcare data and the critical nature of their services. The healthcare sector holds vast amounts of sensitive patient information, including medical records, personal identifiers, and financial data, making it an attractive target for cybercriminals seeking to exploit vulnerabilities for financial gain. Recently <a href="https://www.woodtv.com/news/michigan/corewell-priority-health-patients-affected-by-data-breach/" target="_blank" rel="noreferrer noopener">Corewell</a> and Priority Health in Michigan lost over 1 million patient records due to a breach of Welltok Inc., a system used to communicate with patients.&nbsp;</p>



<p>Unlike other industries, the consequences of ransomware attacks on healthcare organizations extend far beyond financial losses. These attacks can disrupt hospital operations, compromise patient care, and jeopardize patient safety. For instance, when critical systems are compromised, emergency room services may be disrupted, leading to delays in patient treatment and potentially life-threatening situations. Earlier this week, <a href="https://www.bleepingcomputer.com/news/security/ardent-hospital-ers-disrupted-in-6-states-after-ransomware-attack/" target="_blank" rel="noreferrer noopener">Ardent</a> Health Services, operating 30 hospitals in 6 U.S. states, had to divert emergency care patients to other hospitals in the area due to a cyber-attack. As a result of the attack, Ardent proactively took its network offline, suspending all user access to its information technology applications, including corporate servers, Epic software, internet, and clinical programs. Moreover, the loss or inaccessibility of patient records can hinder healthcare providers&#8217; ability to deliver timely and accurate care.&nbsp;</p>



<p>The uptick in ransomware attacks on healthcare differs from the norm of ransomware groups in the past. Cybercriminals now employ sophisticated tactics, such as targeted spear-phishing campaigns and exploiting vulnerabilities in outdated software, to gain unauthorized access to healthcare networks. They often demand exorbitant ransoms, knowing that healthcare organizations are more likely to pay to restore critical systems and protect patient safety. This shift in tactics highlights the need for healthcare organizations to adapt their cybersecurity strategies to combat these evolving threats effectively.&nbsp;</p>



<p><strong>Key Steps for Good Cybersecurity Health in Healthcare: </strong></p>



<p>To safeguard patient data and ensure the continuity of care, healthcare organizations must prioritize cybersecurity. Here are key steps to strengthen cybersecurity posture:&nbsp;</p>



<p><strong>1. Implement Robust Security Measures: </strong></p>



<p>Healthcare organizations should adopt a multi-layered security approach, including firewalls, intrusion detection systems, and encryption protocols. Regular security assessments and vulnerability scans can help identify and address potential weaknesses.&nbsp;</p>



<p><strong>2. Employee Training and Awareness: </strong></p>



<p>Human error is a common entry point for cyberattacks. Healthcare staff should receive comprehensive training on cybersecurity best practices, including recognizing phishing emails, using strong passwords, and reporting suspicious activities. Regular awareness campaigns can reinforce good cybersecurity habits.&nbsp;</p>



<p><strong>3. Regular Software Updates and Patch Management: </strong></p>



<p>Keeping software and systems up to date is crucial to prevent vulnerabilities that can be exploited by cybercriminals. Regular patch management and software updates should be prioritized to address known security flaws promptly.&nbsp;</p>



<p><strong>4. Data Backup and Recovery: </strong></p>



<p>Regularly backing up critical data and storing it securely offline or in the cloud can help mitigate the impact of ransomware attacks. Having a robust data recovery plan in place ensures that operations can be restored quickly in the event of an attack.&nbsp;</p>



<p><strong>5. Incident Response Planning: </strong></p>



<p>Healthcare organizations should develop and regularly test an incident response plan to effectively respond to and recover from cyberattacks. This includes establishing communication channels, identifying key stakeholders, and outlining the steps to contain and mitigate the impact of an attack.&nbsp;</p>



<p>The rise in ransomware attacks on the healthcare sector demands a proactive approach to cybersecurity. By implementing robust security measures, prioritizing employee training, maintaining up-to-date systems, and having a comprehensive incident response plan, healthcare organizations can enhance their cybersecurity posture and protect patient data and critical services from the growing threat of ransomware attacks. Strengthening cybersecurity in healthcare is not only crucial for protecting patient safety but also for maintaining public trust in the healthcare system&#8217;s ability to safeguard sensitive information.&nbsp;</p>



<p><strong>About Fortress SRM:</strong> <br>Fortress Security Risk Management protects companies from the financial, operational, and emotional trauma of cybercrime by enhancing the performance of their people, processes, and technology.  </p>



<p>Offering a robust, co-managed solution to enhance an internal IT team’s capability and capacity, Fortress SRM features a full suite of managed security services (24/7/365 U.S. based monitoring, cyber hygiene (managed patching),  endpoint detection and response (EDR), and air-gapped and immutable cloud backups) plus specialized services like Cybersecurity-as-a-Service, Incident Response including disaster recovery &amp; remediation, M&amp;A cyber due diligence, GRC advisory, identity &amp; access management, threat intelligence, vulnerability assessments, and technical testing. With headquarters in Cleveland, Fortress SRM supports companies with both domestic and international operations. </p>



<p>In Case of Emergency:&nbsp;<br><strong>Cyber Attack Hotline: 888-207-0123 | Report an Attack: IR911.com&nbsp;&nbsp;</strong></p>



<p>For Preventative and Emergency Resources, please visit:&nbsp;<br><a href="https://ransomwareclock.org/" target="_blank" rel="noreferrer noopener"><strong>RansomwareClock.org</strong></a><strong><u></u></strong></p>
<p>The post <a href="https://fortresssrm.com/cyberattacks-on-healthcare/">The Uptick in Ransomware Attacks on Healthcare: Strengthening Cybersecurity for Patient Safety</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Data Breach Prevention &#038; Response: What Legal Professionals Need to Know</title>
		<link>https://fortresssrm.com/data-breach-prevention-responsefor-legal-professionals/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Wed, 29 Nov 2023 21:37:24 +0000</pubDate>
				<category><![CDATA[Incident Prevention]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[Managed Security]]></category>
		<category><![CDATA[Security Consulting]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=1309</guid>

					<description><![CDATA[<p>Fortress SRM’s Deputy CISO Shawn Newman joined panelists from Innovative Driven, Dinsmore, Indeed, and Hylant at the Cleveland Bar Association to&#160;discuss several core topics for legal professionals regarding data breach ...</p>
<p>The post <a href="https://fortresssrm.com/data-breach-prevention-responsefor-legal-professionals/">Data Breach Prevention &#038; Response: What Legal Professionals Need to Know</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Fortress SRM’s Deputy CISO Shawn Newman joined panelists from Innovative Driven, Dinsmore, Indeed, and Hylant at the Cleveland Bar Association to&nbsp;discuss several core topics for legal professionals regarding data breach prevention and response—the critical message: Trust, but verify.</p>



<p></p>



<ul class="wp-block-list">
<li>Your first line of defense is ensuring policies and employee training are in place.</li>



<li>Take a proactive approach by conducting a thorough data inventory and analysis of business processes.</li>



<li>You may have a data retention schedule, but are you following it? Many companies retain indefinitely. You are increasing your company&#8217;s risk profile by not getting rid of stuff.</li>
</ul>



<p>Click below to view the recording.</p>



<div class="wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex">
<div class="wp-block-button is-style-fill"><a class="wp-block-button__link wp-element-button" href="https://onedrive.live.com/?authkey=%21AJibzS%2DoMecWTGQ&amp;cid=4075C19F2195C2FC&amp;id=4075C19F2195C2FC%21568&amp;parId=4075C19F2195C2FC%21567&amp;o=OneUp">Watch Video</a></div>
</div>
<p>The post <a href="https://fortresssrm.com/data-breach-prevention-responsefor-legal-professionals/">Data Breach Prevention &#038; Response: What Legal Professionals Need to Know</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>USI Cyber Tuesday Webinar – Agriculture Industry Focus</title>
		<link>https://fortresssrm.com/usi-cyber-webinar-agriculture/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Thu, 02 Nov 2023 16:00:01 +0000</pubDate>
				<category><![CDATA[Incident Prevention]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[Managed Security]]></category>
		<category><![CDATA[Security Consulting]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=1301</guid>

					<description><![CDATA[<p>As a Grand Finale honoring Cybersecurity Awareness Month, Fortress Security Risk Management joined USI Insurance’s Agribusiness Vertical Leader Ryan Chartier,&#160;Cyber Practice leader Tim Gotta, and National Cyber Leader Nadia Hoyte&#160;to ...</p>
<p>The post <a href="https://fortresssrm.com/usi-cyber-webinar-agriculture/">USI Cyber Tuesday Webinar – Agriculture Industry Focus</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>As a Grand Finale honoring Cybersecurity Awareness Month, Fortress Security Risk Management joined USI Insurance’s Agribusiness Vertical Leader Ryan Chartier,&nbsp;Cyber Practice leader Tim Gotta, and National Cyber Leader Nadia Hoyte&nbsp;to deliver a targeted and focused conversation about Cyber specific to Agriculture. Learn about the cybersecurity challenges in agribusiness, threat profile and actor activity, real life case studies and the multiple ways USI can help organizations by providing solutions that mitigate and transfer Cyber Risk, creating a more resilient cybersecurity posture.<br><br>The link for registration is below:</p>



<p><a href="https://info.usi.com/NAT-23-10-31-Agriculture-CyberWebinar_Registration.html">https://info.usi.com/NAT-23-10-31-Agriculture-CyberWebinar_Registration.html</a></p>
<p>The post <a href="https://fortresssrm.com/usi-cyber-webinar-agriculture/">USI Cyber Tuesday Webinar – Agriculture Industry Focus</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>BSides PGH: Incident Response Case Study</title>
		<link>https://fortresssrm.com/bsides-pgh-incident-response/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Wed, 16 Aug 2023 20:54:11 +0000</pubDate>
				<category><![CDATA[Incident Prevention]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[Managed Security]]></category>
		<category><![CDATA[Security Consulting]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=1246</guid>

					<description><![CDATA[<p>The post <a href="https://fortresssrm.com/bsides-pgh-incident-response/">BSides PGH: Incident Response Case Study</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<div class="x-resp-embed x-is-video x-is-youtube"><iframe loading="lazy" title="B Sides PGH Conference 2023 Track 02  Will Hudec" width="1778" height="1000" src="https://www.youtube.com/embed/DOYpPv3ai4o?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen></iframe></div>
</div></figure>
<p>The post <a href="https://fortresssrm.com/bsides-pgh-incident-response/">BSides PGH: Incident Response Case Study</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
