Black Talon Security (@blacktaloncyber) 's Twitter Profile
Black Talon Security

@blacktaloncyber

Black Talon Security is a dedicated cybersecurity company that goes above & beyond traditional IT measures to provide increased protection against cyberthreats.

ID: 1655059141361008641

calendar_today07-05-2023 03:58:04

220 Tweet

14 Followers

11 Following

Black Talon Security (@blacktaloncyber) 's Twitter Profile Photo

"Hi, this is your software vendor. We need remote access to update your system." Sounds legitimate, right? Your front desk staff is trained to help. Attackers know this and exploit it. The human firewall is your most vulnerable defense. Is yours trained? blacktalon.co/4rOMnnd

"Hi, this is your software vendor. We need remote access to update your system."

Sounds legitimate, right? Your front desk staff is trained to help. Attackers know this and exploit it. The human firewall is your most vulnerable defense. Is yours trained? blacktalon.co/4rOMnnd
Black Talon Security (@blacktaloncyber) 's Twitter Profile Photo

Ever heard of Ghost Tapping? In this live interview on FOX 5 NY, Black Talon CEO Gary Salman explained this newest scam that can impact anyone. Watch the full segment @ blacktalon.co/482olxZ #GhostTapping #CyberCrime #CyberSafety #ScamAlert #FraudPrevention

Black Talon Security (@blacktaloncyber) 's Twitter Profile Photo

BEFORE MSSP: 1,500–2,000 vulnerabilities detected AFTER MSSP: 10,000+ vulnerabilities detected. Wait — that sounds worse, right? Wrong. Enhanced scanning revealed risks that were always there, lurking undetected. Full case study → blacktalon.co/4df09fn

BEFORE MSSP: 1,500–2,000 vulnerabilities detected AFTER MSSP: 10,000+ vulnerabilities detected. Wait — that sounds worse, right? Wrong. Enhanced scanning revealed risks that were always there, lurking undetected. 

Full case study → blacktalon.co/4df09fn
Black Talon Security (@blacktaloncyber) 's Twitter Profile Photo

That's the federal mandate for remediating Known Exploitable Vulnerabilities. Most practices can't patch that fast. Here's what real-time vulnerability management looks like: blacktalon.co/4taZosc #CyberSecurity #CISA #RansomwareProtection #DentalSecurity #DSO

That's the federal mandate for remediating Known Exploitable Vulnerabilities.

Most practices can't patch that fast. Here's what real-time vulnerability management looks like:  blacktalon.co/4taZosc

#CyberSecurity #CISA #RansomwareProtection #DentalSecurity #DSO
Black Talon Security (@blacktaloncyber) 's Twitter Profile Photo

Hackers exploit new vulnerabilities within hours of discovery. Most dental practices scan for them quarterly. That gap is where breaches happen. 🔗 blacktalon.co/419Bly2 #CyberSecurity #VulnerabilityManagement #DentalCybersecurity #BlackTalonSecurity

Hackers exploit new vulnerabilities within hours of discovery.
Most dental practices scan for them quarterly.

That gap is where breaches happen. 🔗 blacktalon.co/419Bly2

#CyberSecurity #VulnerabilityManagement #DentalCybersecurity #BlackTalonSecurity
Black Talon Security (@blacktaloncyber) 's Twitter Profile Photo

"We didn't know about the vulnerability." Hard to argue when CISA, Homeland Security, and the FBI were publicly mandating its remediation. Class action lawsuits after breaches are now near certain. Is your practice protected? blacktalon.co/4v1A9KR #CyberSecurity #Dental #DSO

"We didn't know about the vulnerability."

Hard to argue when CISA, Homeland Security, and the FBI were publicly mandating its remediation. Class action lawsuits after breaches are now near certain. Is your practice protected?  blacktalon.co/4v1A9KR

#CyberSecurity #Dental #DSO
Black Talon Security (@blacktaloncyber) 's Twitter Profile Photo

🚨 BREAKING: Your network is completely secure because you have antivirus! ...April Fools. Antivirus is not a security strategy. Sure, it catches known threats, but it doesn't monitor behavior, detect lateral movement, or stop an attacker. Learn more @ blacktalon.co/4dG1Brt

🚨 BREAKING: Your network is completely secure because you have antivirus!

...April Fools. Antivirus is not a security strategy. Sure, it catches known threats, but it doesn't monitor behavior, detect lateral movement, or stop an attacker.

Learn more @ blacktalon.co/4dG1Brt
Black Talon Security (@blacktaloncyber) 's Twitter Profile Photo

Most orthodontic practices think they’re protected because they have an IT company, backups, are “in the Cloud”, use antivirus, etc. In this myth-busting webinar, Gary Salman joins Dr. Lisa Alvetro to separate cybersecurity fact from fiction. Watch Now @ blacktalon.co/4e5EhDk

Most orthodontic practices think they’re protected because they have an IT company, backups, are “in the Cloud”, use antivirus, etc. 

In this myth-busting webinar, Gary Salman joins Dr. Lisa Alvetro to separate cybersecurity fact from fiction. Watch Now @
blacktalon.co/4e5EhDk
Black Talon Security (@blacktaloncyber) 's Twitter Profile Photo

#Cybercriminals don't clock out at 5 PM. They don't take weekends off. They prefer holidays — when your IT team is unavailable and your guard is down. If your #security sleeps, you're vulnerable. A true MSSP operates a 24/7/365 #SOC → blacktalon.co/4c9F8Az

#Cybercriminals don't clock out at 5 PM. They don't take weekends off. They prefer holidays — when your IT team is unavailable and your guard is down. If your #security sleeps, you're vulnerable.

A true MSSP operates a 24/7/365 #SOC → blacktalon.co/4c9F8Az
Black Talon Security (@blacktaloncyber) 's Twitter Profile Photo

A #ransomware attack encrypted an entire network over a weekend. By Mon. AM: no patient charts, no X-rays, no scheduling, no billing. It's the difference between having security tools and having security coverage. What does real threat monitoring entail→ blacktalon.co/41Q7cnG

A #ransomware attack encrypted an entire network over a weekend.

By Mon. AM: no patient charts, no X-rays, no scheduling, no billing. It's the difference between having security tools and having security coverage. What does real threat monitoring entail→ blacktalon.co/41Q7cnG
Black Talon Security (@blacktaloncyber) 's Twitter Profile Photo

Your front desk team is trained to be: Friendly, Accommodating, Helpful, Trusting These qualities make a great patient experience, and also what attackers deliberately exploit. #SocialEngineering works because it targets human nature. Visit blacktalon.co/4dE5Gwh

Your front desk team is trained to be: Friendly, Accommodating, Helpful, Trusting

These qualities make a great patient experience, and also what attackers deliberately exploit. #SocialEngineering works because it targets human nature. Visit blacktalon.co/4dE5Gwh
Black Talon Security (@blacktaloncyber) 's Twitter Profile Photo

Be honest: When's the last time your #dental practice had a penetration test? The answer should be within the last 6 months. If it's been longer — or never — your vulnerabilities are likely visible to attackers right now. Comment below with your answer. No judgment, just data.

Be honest: When's the last time your #dental practice had a penetration test?

The answer should be within the last 6 months. If it's been longer — or never — your vulnerabilities are likely visible to attackers right now.

Comment below with your answer. No judgment, just data.
Black Talon Security (@blacktaloncyber) 's Twitter Profile Photo

Your firewall can't stop an employee from clicking a malicious link. Approximately 60% of cybersecurity risk walks through the front door every morning. Is your team trained to handle it? blacktalon.co/3OfDlSp #CyberSecurity #DentalCybersecurity #BlackTalonSecurity

Your firewall can't stop an employee from clicking a malicious link.

Approximately 60% of cybersecurity risk walks through the front door every morning.

Is your team trained to handle it? blacktalon.co/3OfDlSp

#CyberSecurity #DentalCybersecurity #BlackTalonSecurity
Black Talon Security (@blacktaloncyber) 's Twitter Profile Photo

Threat actors have been exploiting a previously unknown zero-day vulnerability in Adobe Reader since late 2025. This is a sophisticated PDF exploit and likely involves an element of social engineering with the attackers luring users into opening the files. blacktalon.co/47Ud4jh

Black Talon Security (@blacktaloncyber) 's Twitter Profile Photo

Your security stack is only as strong as the people behind it. Black Talon Security #CISO Josh Hyman breaks down why a people-first approach is your best #cyberdefense — featured in the March issue of CyberDefenseMagazine (page 104). 🔒 📖 blacktalon.co/4vJPRuD #Cybersecurity

Your security stack is only as strong as the people behind it.

<a href="/blacktaloncyber/">Black Talon Security</a> #CISO Josh Hyman breaks down why a people-first approach is your best #cyberdefense — featured in the March issue of <a href="/cyberdefensemag/">CyberDefenseMagazine</a> (page 104). 🔒

📖 blacktalon.co/4vJPRuD 

#Cybersecurity
Black Talon Security (@blacktaloncyber) 's Twitter Profile Photo

Security Alert: Critical #Microsoft SharePoint Patches Released Microsoft has just issued urgent #security updates to address vulnerabilities in #SharePoint that could leave orgs at risk. Review these updates and prioritize deployment immediately: blacktalon.co/42dy01e

Black Talon Security (@blacktaloncyber) 's Twitter Profile Photo

A #honeypot exposed to the internet. How long until #cyberattackers gained access? Not 3 days. Not 3 weeks. 3 hours. This is the reality in 2026. Automated scanners are constantly probing networks. Visit blacktalon.co/4vyJs51 to learn how EAGLEi™ provides 24/7 visibility.

A #honeypot exposed to the internet. How long until #cyberattackers gained access? Not 3 days. Not 3 weeks. 3 hours.

This is the reality in 2026. Automated scanners are constantly probing networks.

Visit blacktalon.co/4vyJs51 to learn how EAGLEi™ provides 24/7 visibility.
Black Talon Security (@blacktaloncyber) 's Twitter Profile Photo

At the #AAO2026, Gary Salman is joining an FBI Agent, a healthcare attorney, and an orthodontist who survived a cyberattack: Under Attack: A Real-World Look at Cybercrime in Orthodontic Practices May 1, 8:30 AM Moderated by Dr. Lisa Alvetro More info @ blacktalon.co/4tOoxt5

At the #AAO2026, Gary Salman is joining an FBI Agent, a healthcare attorney, and an orthodontist who survived a cyberattack:

Under Attack: A Real-World Look at Cybercrime in Orthodontic Practices
May 1, 8:30 AM 
Moderated by Dr. Lisa Alvetro

More info @ blacktalon.co/4tOoxt5
Black Talon Security (@blacktaloncyber) 's Twitter Profile Photo

You wouldn't let students grade their own exams. So why let your #MSP audit their own security? The conflict of interest is real — and it's putting patient data at risk. Learn more in our blog: blacktalon.co/4dT0vIS #CyberSecurity #Dental #DSO #HealthIT

You wouldn't let students grade their own exams.

So why let your #MSP audit their own security? 

The conflict of interest is real — and it's putting patient data at risk. Learn more in our blog: blacktalon.co/4dT0vIS

#CyberSecurity #Dental #DSO #HealthIT
Black Talon Security (@blacktaloncyber) 's Twitter Profile Photo

Your cyber insurer sent a forensic investigator after the breach. They found MFA wasn't on all systems. EDR was missing from remote workers. Backups were never tested. Claim denied. 🚫 Know what your policy actually requires: 🔗blacktalon.co/4cnKglX #CyberInsurance #Dental

Your cyber insurer sent a forensic investigator after the breach.

They found MFA wasn't on all systems. EDR was missing from remote workers. Backups were never tested.

Claim denied. 🚫
Know what your policy actually requires: 🔗blacktalon.co/4cnKglX

#CyberInsurance #Dental