Blog Posts
Cover Your Assets: Cybersecurity and Social Engineering
Social engineering is any activity in which cybercriminals trick or manipulate victims into willingly revealing sensitive information. It’s a particularly diabolical exploit of human weakness. Human beings have a charming, and frequently catastrophic, tendency to...
Cybersecurity Threats: Old, New, and What to Do
In July, the U.S. Cybersecurity & Infrastructure Security Agency (CISA) — in cooperation with its UK and Australian counterparts and the FBI — released its latest report on the most routinely exploited cyber vulnerabilities. Of the common vulnerabilities and...
You’ve Been Hacked — Now What?
A data breach is an organization’s worst nightmare. The financial consequences are hard-hitting and difficult to recover from, damage to a company’s reputation is potentially devastating, and legal action may result from clients whose sensitive data was compromised by...
Automating Cybersecurity: High-Tech Protection from High-Tech Attacks
Every day seems to bring news of another high-profile hack. Cyberattacks are occurring more frequently for one simple, if ominous, reason. They’re getting smarter. Recent attacks have proven more efficient, more streamlined, and more aggressive — making it difficult...
Targeting the Cloud: Cybercrime’s Next Big Exploit
If there is one thing everyone knows about cybersecurity, it’s this: The cloud is secure. But as with everything in technology, what everyone knows is changing yet again. Bad actors — both rogue and state-sponsored — have aimed their recent attacks at what has...
Overcoming a Cybersecurity Talent Crunch
Are you a small business owner? Or maybe the CEO of a multinational corporation? Either way, you’re about to run into a serious security conundrum. Cybercrime is on the rise, and the talent to prevent it is in short supply. Cybersecurity Ventures predicted a record...
The Exchange Server Hack: What to Know — And Do — In Its Aftermath
The Microsoft Exchange Server attack In March of this year, Microsoft issued public warnings about zero-day attacks — first detected in January — on its Exchange Server software. The announcement coincided with the release of patches to address vulnerabilities....
How to Prevent Security Breaches from Third-Party Apps
Prevent security breaches from third-party apps Are we too trusting? Earlier this year, Security Magazine referenced a study revealing that 82% of companies allow third-party app vendors access to all their cloud data; 76% of companies give third-party app partners...
Value-Added Reselling, It’s What We Do
At the moment the world is abuzz, if you will pardon the pun, with COVID-19 and now the next threat in what seems like a monkey paw year, Murder Hornets. But with these seemingly apocalyptic natural occurrences, where does that leave infosec? What are we doing? How...
Password Rumble
Passwords- the dark necessity of the world, the prize of many bad actors, the security measure that drives users and security professionals alike insane. Special characters, 16 characters, 8 characters, use a passphrase, don’t use a passphrase they are easily...
New Year, New Threats
With the New Year well underway the biggest threats to cyber-security have already begun to rear their ugly heads. When combined with the cybersecurity skill shortages and the growth of development that occurs every day, 2020 is going to be in truth like every other...
Twas The Night Before Christmas And All Through The SOC
‘Twas the night before Christmas and all through the SOC, not an analyst was stirring, not even in the NOC. The servers were all updated in fear for the preparation of holiday cheer. The CISO was nestled all snug in his bed, while a laptop was stolen with admin creds,...