Erich is a self-proclaimed geek and experienced information security leader who is passionate about cyber security, but is still able to effectively communicate with the highest levels of leadership. His proven track record of advancement in the industry spans a broad spectrum of experience including security roles, large scale technical project management, hands-on technical work and senior leadership roles. This wide range of experience allows him to have a unique, holistic view of information systems which results in the implementation of secure technical and policy-based solutions that work well, and are easily maintained.
With attackers’ average dwell times, the time from when they gain access to a system to the time they are discovered, running in the hundreds of days, any information that can lead to spotting them is incredibly valuable. By sharing security incident information, organizations can develop Indicators of Compromise (IoCs) that can help other organizations defend against current and future attacks.4 April 2021
Even at home, their IP address is likely to change. This makes fraudulent logins difficult to pinpoint.4 April 2021
Causing a Windows computer to reboot in safe mode can disable software, potentially even antivirus or anti-ransomware software, that is working to keep your computer safe. This would then allow the attackers to make changes that may otherwise not be allowed in normal running mode.4 April 2021