News Archives | Critical Start
Prepare your business with On-Demand Breach Response
Webinar Series | Once More unto the Breach | Lessons Learned from Billion Dollar Breaches

China Vows Retaliation After U.S. Ordered Its Houston Consulate Closed Within 72 Hours

China vowed to retaliate Wednesday after the United States abruptly ordered the closure of its consulate in Houston, a move that further inflamed tensions between the two superpowers.  Wang Wenbin, a spokesman for China’s foreign ministry, said China was notified on Tuesday that it must close the consulate within 72 hours. In a regular daily news briefing, he described the action […]

Read More…

Hackers Target Contact Tracing Applications

NBC News and Boston 25’s Blair Miller interviews Quentin Rhoads-Herrera of CRITICALSTART‘s TEAMARES about the vulnerabilities associated with contact tracing and how hackers are targeting companies and individuals through these apps.   Video Transcript: M. Davenport:  Health officials want to know how people are contracting the Coronavirus, who they are catching it from, but one […]

Read More…

Accuracy in AppSec Is Critical to Reducing False Positives

According to a new report from the Neustar International Security Council (NISC), over one-quarter of security alerts fielded within organizations are false positives. Surveying senior security professionals across five European countries and the U.S., the report highlights the need for more advanced and accurate security solutions to help reduce alert-wary cybersecurity teams overwhelmed by massive alert volumes. Alert […]

Read More…

Tennessee Has Just 25 Percent of Recommended Contact Tracers

Tennessee has just 25 percent of the recommended amount of contact tracers, leaving the state 1,500 people short for the critical disease mitigation effort. The National Association of County and City Health Officials is recommending just over 2,040 in Tennessee for its population. Nashville has just 75 contract tracers which needs to be tripled to […]

Read More…

Transparency Key to Heading Off Qualms About Contact Tracing, Experts Say

In late April, Gov. Andrew Cuomo announced the state’s partnership with Bloomberg Philanthropies for New York’s contact tracing program. Last week, New York City started recruiting 1,000 workers to conduct contact tracing. This week, privacy concerns about the initiative have emerged. The focus was not as much on flaws on the tracing program as it was […]

Read More…

Politico: An Unusual Hacking Threat

  The education system might be overlooking an unexpected threat with the whole world moving online: SAT and ACT hacking. Unlike other hacking threats, nation-states and criminals aren’t the primary risks, said Quentin Rhoades-Herrera, director of professional services at computer security firm CRITICALSTART. “Students in the past have hacked their own universities to change their own […]

Read More…

Assessing Your Cyber Risk Impact: Intent vs. Opportunity

Cybersecurity is no longer just a concern for large corporations and government entities. One of the largest attack surfaces today is healthcare where facilities rely on ease of access and fast sharing of data to facilitate immediate and effective care. Breaches in healthcare are occurring more frequently than ever before. According to HIPAA Journal, an […]

Read More…

16 Smart Project-Management Strategies Every Tech Leader Can Use

Task and project management is a must-have skill in the technology industry, especially for tech leaders. Most are handling multiple projects and demands on their time, so it’s important to be able to prioritize and get everything done. As some of the top professionals in the field, the members of Forbes Technology Council have spent years cultivating […]

Read More…

Cybersecurity During a Pandemic: An Interview With CRITICALSTART

Chris Ward speaks with Quentin Rhoads-Herrera of CRITICALSTART to discuss cybersecurity in a time of a pandemic. In our current time of crisis, it’s a sad fact that there are many taking advantage of distracted governments, businesses, and individuals. With the majority of workforces in the Western world currently working from home, often on insecure […]

Read More…

Virtual Draft Makes NFL Teams Potential Targets for Hackers

A hacker could provide entertainment value by disrupting the virtual NFL draft that begins Thursday. Desperation for any sports entertainment shouldn’t make us forget that these things are boring. The few moments of suspense as picks and trades are announced are drowned out by incessant chatter by talking heads and nonstop loops of player highlights. […]

Read More…

Security Versus Convenience

Zoom’s biggest challenge isn’t just fixing its security blunders — it’s doing so while maintaining what makes it so popular in the first place. Zoom has become nearly synonymous with office meetings and socializing as people around the world have adapted to life at home amid the Coronavirus outbreak. That has put the roughly 9-year-old […]

Read More…

5 Things IT Teams Can Learn From Initial Weeks of Telecommuting

In the wake of the ongoing coronavirus pandemic, we have witnessed a surge in telecommuting as more companies transition to remote work. Over the last couple of weeks, we’ve seen a spike in web traffic (including a record-setting number of Zoom calls) as companies make the switch. Initially, there was even concern that this massive onslaught in web traffic […]

Read More…

A researcher found zero-days in one city’s software. Then he realized the problem could be bigger.

For Quentin Rhoads-Herrera, this was not a typical security test. A big municipal government in the U.S. had just handed him the source code for software the city uses to manage contracts and track infrastructure projects. He unpacked the code, sifted through it, and found more than a dozen previously undisclosed vulnerabilities, or zero-days, that a hacker could […]

Read More…

AI’s Great, but It Still Takes Humans to Enforce Cybersecurity

When it comes to protecting computers and information systems from cyber attack, artificial intelligence and machine learning can help — but they’re no cure-all for a growing problem. Notwithstanding the current excitement over AI and its increasing ability to best humans on numerous fronts, it’s no magic bullet for shoring up cybersecurity, says Randy Watkins, […]

Read More…

Using Password Crackers to Analyze the Virus

In addition to helping doctors provide care, technologists are helping researchers find a vaccine for the coronavirus. White hat hackers are using crowdsourced simulations to understand how the virus behaves. The red team at CRITICALSTART found that the company’s password cracker Cthulhu can be used to run computer simulations that mimic the same complex protein […]

Read More…

Interview: 2020 Election Security and the Future of Online Voting

Jordan Mauriello, SVP of Managed Security, shares his thoughts with Steve Gruber of the Steve Gruber Podcast on election security and the vulnerabilities associated with polling places in light of the coming 2020 elections. Full Video Transcript: SG: It is six states going to the polls today, and critical states. Bernie Sanders would like nothing […]

Read More…

The Cost to Defend: Automation is Key in Combatting Cybercrime

As organizations find themselves short on budget and talent, security automation that supplements the work of security experts can reduce discovery costs. It’s no secret: cybercrime is skyrocketing. Security breaches in the last five years grew by 67 percent for public and private sector organizations, according to Accenture and Ponemon Institute’s 2019 “Cost of Cybercrime Study,” […]

Read More…

Super Tuesday: Election Cybersecurity Survey

A recent survey by computer security firm CRITICALSTART showed 66 percent of Super Tuesday voters said they fear the elections aren’t secure — with many believing one of the campaigns would seek to influence the election and others concerned a foreign power, like Russia, might try to interfere. Jordan Mauriello, CRITICALSTART Senior Vice President of Managed […]

Read More…

Q&A: How Firms Can Stop Wasting Time Pursuing ‘Cyber Ghosts’

In an increasingly connected and digital world, no company or industry is safe from the growing threat posed by malicious online actors. How can companies attempt to manage this? Rob Davis of CRITICALSTART provides some advice for businesses. For many firms, as cyberattacks are increasing in number and sophistication, there are still countless hours wasted […]

Read More…

Data Breaches and Their Main Causes

A data breach is an incident in which a victim’s sensitive information is accessed without permission. According to a recent article by FOX Business, the main causes of data breaches are the lack of employee cybersecurity training, the tendency for vulnerable users’ to click on malicious links, unsecured and out-of-date company computer networks, and weak passwords without multifactor authentication. […]

Read More…

First in MC: Super Tuesday Hack Safety Confidence Low

Two-thirds of voting-age adults in Super Tuesday states believe the election is vulnerable to foreign interference, a poll by cybersecurity company CRITICALSTART discovered. While most believe their states are trying to address the problem, about half the respondents said they feel more confident with in-person paper ballots, and those who believe their state is secure are […]

Read More…

New Survey: 66% of Super Tuesday Voters Fear Elections Aren’t Secure

New Survey: 66% of Super Tuesday Voters Fear Elections Aren’t Secure With less than one week to go before voters in 13 states cast their Presidential Primary Ballots, two-thirds of voting-age adults in Super Tuesday states do not believe their state’s election is secure from hacking or other technological threats. 44% believe one of the […]

Read More…

CRITICALSTART Named to CRN’s Managed Service Provider (MSP) 500 list for 2020

CRITICALSTART has been named to CRN’s MSP 500 list for 2020, in the Security 100 category. CRN’s Managed Service Provider 500 list recognizes the top technology providers and consultants whose forward-thinking approach to providing managed services is changing the landscape of the IT channel. This annual list honors solution providers who bring innovative approaches to […]

Read More…

Ransomware Is Back: Tips for Avoiding the Growing Context-Based Ransomware

Cryptojacking is so 2019. Ransomware is reemerging as the top cybercrime of choice, with attacks expected to increase in 2020. The pivot back to ransomware can largely be attributed to the attacker’s ability to contextualize the malware and weaponize it in targeted attacks. These enhanced capabilities are exacerbated by the ease of access through ransomware […]

Read More…