Monitoring deep, dark and surface web to detect exposure of your sensitive data, secret projects and initiatives, privileged users, critical systems, IT infrastructure, and more.
Monitoring and alerting of third party data breaches impacting your employees’ emails, usernames, and personally identifiable information.
Assess the risk footprint and security posture of key business relationships to get a handle on external risk introduced through your extended attack surface.

Sign Up for Updates

Digital risk monitoring of key personnel with telemetry and risk metrics. VIPRecon provides broad coverage of social media, deep and dark web, as well as physical threat assessments.
Our Ransomware Response Readiness Assessment, Playbook and Table Top Exercise gives your organization the best chance to survive and recover.
Gain visibility of your digital footprint by reaching into the most active areas of the cyber underground.
Fully managed and tailored Threat Intelligence services that becomes an extension of your current security processes and provides real-time visibility on new threats.
Providing research and investigations into known threats, to save security teams time and stress during a cyber emergency.

Sign Up for Updates

GroupSense offers a comprehensive package of services for assessing and responding to ransomware attacks, including negotiations with threat actors.
Actively researching and monitoring threats from vendors or third-party companies that can affect organizational security.
Monitoring for threats to elections, VIPs, and more on social media to proactively prevent or mitigate digital risk.
Focusing on the threats and risks that matter to your security processes and providing intelligence and insights to prevent or mitigate digital risk.
Taking the next step in security services, by proactively taking down phishing sites or anonymously interacting with threat actors to provide better intelligence.
Active monitoring of your brand's digital assets to protect its reputation and stop further brand abuse from targeting unsuspecting victims.

Sign Up for Updates

Combining your cyber and fraud programs to effectively fight threat actors continually scamming or threatening assets within an organization.
Executives are prime targets for fraudulent activities, but with a proactive approach, any attacks or threats can be neutralized before causing any damage.
Governments, political parties and candidates must all act now to activate cyber threat intelligence services to harden their information security and get ahead of inevitable cyber threats to the election process.
Resouce Banner

Resources

Hacking Humans Podcast with Kurtis Minder

By Editorial Team on Nov 10, 2022 2:07:41 PM

GroupSense CEO and chief ransomware negotiator Kurtis Minder was featured on the Hacking Humans podcast. During the episode, Kurtis speaks with host Dan Bittner about how legislation leaves small businesses out of the discussion of ransomware response. 

Topics: Blog Video Podcast

Hitting the Moving Target

By Editorial Team on Nov 2, 2022 9:12:25 AM

On October 31, CEO Kurtis Minder was honored to present on the panel, "Hitting the Moving Target: cyber, data privacy and artificial intelligence (AI) compliance and governance," at this year's International Bar Association Annual Conference in Miami, FL. 

Topics: Blog Events

Just. Stop. Clicking.

By Editorial Team on Oct 25, 2022 9:16:38 AM

October has been a busy month for GroupSense. During three speaking opportunities including the Trellix Cybersecurity Summit, NVTC’s Capital Cyber Summit, and the Wisconsin Governor’s Cybersecurity Summit, Kurtis Minder has one important takeaway for employees of your organization: Just. Stop. Clicking. Just stop! 

Topics: Blog Events

Cybersecurity Tips from GroupSense Analysts

By Editorial Team on Oct 5, 2022 9:14:23 AM

This October, GroupSense is celebrating Cybersecurity Awareness Month (CSAM). As a CSAM champion, it’s our duty to pass on lessons learned and practical advice that will make you and your organization more secure. This year, Stay Safe Online, CISA, and CSAM champions are exploring four key behaviors: 

Topics: Blog

Calling in the Ransomware Negotiator

By Editorial Team on Sep 27, 2022 10:12:47 AM

This week, GroupSense CEO Kurtis Minder was featured on the Lock and Code podcast. During his episode, "Calling in the Ransomware Negotiator," Kurtis and host David Ruiz discuss the intricacies of ransomware negotiation. "In his experience, Minder has also learned that the current debate over whether companies should pay the ransom has too few options. For a lot of small and medium-sized businesses, the question isn't an ideological one, but an existential one: Pay the ransom or go out of business."

Topics: Blog Podcast

EDR Misses 80% of Threats

By Editorial Team on Sep 22, 2022 9:08:02 AM

If you work in the cybersecurity field, you’ve seen an explosion of EDR (endpoint detection and response) tools in the last few years. There are EDR, MDR (managed detection and response), and XDR, (extended detection and response) tools everywhere, covering cyber threats in your network. That market expansion won’t be slowing down anytime soon— the global market size is expected to grow from $2.6 billion this year to $5.6 billion by 2027. 

Topics: Blog

Local Elections Are Now More Hostile for Candidates

By Editorial Team on Sep 15, 2022 9:46:34 AM

Local elections are an essential part of our democratic process. Smaller offices typically have a much larger impact on constituents' day-to-day lives, but what happens when those candidates don't feel safe enough to run? Recently, Bloomberg City Lab wrote about the hostility directed at candidates in local elections rising over the last couple of years. GroupSense Director of Intelligence Operations, Bryce Webster-Jacobsen, was featured in the article, commenting on threats to candidates in cyber space.

Topics: News Blog

How Cyber Identity Fraud Impacts the Government

By Editorial Team on Sep 7, 2022 9:00:00 AM

When you think of security in a government agency, lots of images might come to mind: key card scanners, color-coded security clearances, and complex access management systems. If you’ve ever worked for a government agency or contractor, you probably recall the hours of training modules on security protocols. When it comes to controlling access to information, these agencies have things locked down, but much like third-party data breaches or security incidents, there are weak links in the system. 

Topics: Blog

What Recent Phishing Attacks Can Teach You About Suspicious Domains

By Editorial Team on Aug 18, 2022 9:34:31 AM

Over the past few months, threat actors carried out highly targeted SMS phishing attacks against Twilio, CloudFlare, and Cisco. With security or cybersecurity practices of their own, threat actors were particularly bold in carrying out these attacks, and they achieved varying levels of success. One thing that threat actors can count on, however, is that people will click on links no matter how much security training they go through— human error caused 82% of breaches in 2021.

Topics: Blog

Prevent a Ransomware Attack on Your Business

By Editorial Team on Aug 11, 2022 10:07:56 AM

GroupSense CEO Kurtis Minder was honored to present at the Metroport Chamber Membership Luncheon on August 10. The Metroport Chamber brings seven business communities together to connect and build lasting partnerships that strengthen the Texas business community. 

Topics: Blog Events