Filtering by: Article

3:00 PM15:00

Digital4nx Group, Ltd announces their pledge to Support National Cybersecurity Awareness Month 2018 as a Champion

NCSAM Champion Logo.jpg

Digital4nx Group, Ltd. today announced they have become a Champion of National Cybersecurity Awareness Month (NCSAM) 2018. Rob Kleeger, Founder and Managing Director stated it’s proud to be joining a growing global effort among businesses, government agencies, colleges and universities, associations, nonprofit organizations and individuals to promote the awareness of online safety and privacy.   

As an official Champion, Digital4nx Group, Ltd. recognizes their commitment to cybersecurity, online safety and privacy.

About NCSA

NCSA is the nation's leading nonprofit, public-private partnership promoting cybersecurity and privacy education and awareness. NCSA works with a broad array of stakeholders in government, industry and civil society. NCSA's primary partners are DHS and NCSA's Board of Directors, which includes representatives from ADP; Aetna; AT&T Services Inc.; Bank of America; CDK Global, LLC; Cisco; Comcast Corporation; ESET North America; Facebook; Google; Intel Corporation; Logical Operations; Marriott International; Mastercard; Microsoft Corporation; Mimecast; NXP Semiconductors; Raytheon; RSA, the Security Division of EMC; Salesforce; Symantec Corporation; TeleSign; Visa and Wells Fargo. NCSA's core efforts include National Cyber Security Awareness Month (October); Data Privacy Day (Jan. 28); STOP. THINK. CONNECT™; and CyberSecure My Business™, which offers webinars, web resources and workshops to help businesses be resistant to and resilient from cyberattacks. For more information on NCSA, please visit  

View Event →
7:00 AM07:00

Rob Kleeger was profiled in the 4th Quarter CFO Studio Magazine

Rob Kleeger, Founder and Managing Director of Digital4nx Group, Ltd. was quoted in CFO Studio's 4th Quarter magazine. The quote and profile was taken from the 2016 Cyber Seminar which took place at the 2016 CFO INNOVATION CONFERENCE & AWARDs which took place at MetLife Stadium.  

“These [cyber] breaches are happening for a variety of reasons ...
The biggest threats that we see are the spear phishing, socially engineered attacks, and it’s getting a lot more sophisticated...
It’s not your firewall, it’s not your anti-virus... It’s your people and your process [lack of one]...
You need to understand what those crown jewels are. ...
What is it that your business has that if it fell into the wrong person’s hands could do damage? And oftentimes the damage is reputational, which is a lot more devastating than a financial loss. ...
Depending upon whether there’s a merger event, corporate espionage is clearly going on. Some of it is state-sponsored but a lot of it is happening here in the U.S.”

Feel free to review the magazine by clicking here.

View Event →
5:00 PM17:00

Rob Kleeger co-authored Security Breach Planning and Response Article for NJCPA Magazine

Security Breach Planning and Response

The below is an excerpt from the article by Robert Risk, Seth Danberry, Rob Kleeger and Ryan Cooper appeared in the May/June 2016 issue of New Jersey CPA magazine. Read the full article. 

Thieves are everywhere these days. You read about data security breaches every day from Target, Home Depot, Anthem, Sony, to American Express. These are the big companies but did you know that 94% of all breaches occur in companies with fewer than 100 employees. So what are small and midsize companies to do? The answer to this question is assume you will be breached and plan for it. The worst thing you can do is not be proactive because from a reactive position you risk permanently damaging your company brand and setting your company up for lawsuits and compliance issues.

Security Breach Response

Although many business executives agree that data is among their most valuable assets, it often takes a breach—or, at least, an attempted breach—to convince executives to beef up data protection. As we’ve seen over the past few years, no one is safe from data security attempts.

Unfortunately, most organizations are not aware a breach has occurred until it’s too late.  In a recent case, a small third party medical billing company who has additional staff outside the United States had migrated from a Microsoft 2003 Exchange environment to a newer Microsoft Exchange server environment.  Within two weeks of that migration, a camera crew and well known investigative news reporter shows up at the company asking the CEO to provide a statement on how nearly one hundred thousand patient records have been publically available (i.e. PHI breach).

The incident response team was dispatched onsite that afternoon. They began the forensic preservation of the old server and the new servers, capturing various system log files, interviewed the clients manages IT services firm, the CEO, and began conducting an analysis within a few days.  

In the end, it was discovered that the cause of the data breach was from the migration which had caused the FTP setting to default to an anonymous login, therefore it was publically facing and cached by Google’s bot.  The IT firm had simply forgotten to “check the box” to close the publicly facing FTP port.

Getting hacked is never a good thing, especially when the result is stolen or compromised customer data, PII, or PHI. But how a company reacts to the attack can make all the difference in the long run.  A prompt and effective reaction can minimize the damage or at least paint the organization in a fairly positive light with customers, business partners and the public at large.

The initial step is to keep calm, prioritize what is happening and what needs to be contained. Preserving evidence and identifying what has occurred is important, but the investigation can't begin until the scene is secured.  Depending upon the incident (i.e. passive network intruder, malicious attack, rogue employee, etc.), the primary objective is to provide intelligence about the technical skill-set and the motivation of the attacker, along with immediate steps to remediate and protect critical assets. This includes initial damage assessment, initial vector of compromise, indicators of compromise, preservation of forensic artifacts, and further forensic analysis of information collected.

Often, a critical step is to identify the incident by reviewing errors, log files and other artifacts from firewalls, intrusion-detection systems, and other digital assets.  Once the response team has identified the incidents, they will work on stabilizing or containment of the network to “Stop the bleeding”.

Forensic preservation is a very critical step, due to the potential legal notification and state data breach requirements, reputational risks, and possible litigation.  The earliest stage of any investigation is the most important one to get right.  In emergency medicine, there is a "golden hour" at the very outset, during which there is the highest likelihood that prompt expert response with a clear head and well thought out plan can make or break the best defensible position to support investigation or litigation needs.

View Event →
Real Time Analytics