Blog Posts

Cover Your Assets: Cybersecurity and Social Engineering

Cover Your Assets: Cybersecurity and Social Engineering

Social engineering is any activity in which cybercriminals trick or manipulate victims into willingly revealing sensitive information. It’s a particularly diabolical exploit of human weakness. Human beings have a charming, and frequently catastrophic, tendency to...

read more
Cybersecurity Threats: Old, New, and What to Do

Cybersecurity Threats: Old, New, and What to Do

In July, the U.S. Cybersecurity & Infrastructure Security Agency (CISA) — in cooperation with its UK and Australian counterparts and the FBI — released its latest report on the most routinely exploited cyber vulnerabilities. Of the common vulnerabilities and...

read more
You’ve Been Hacked — Now What?

You’ve Been Hacked — Now What?

A data breach is an organization’s worst nightmare. The financial consequences are hard-hitting and difficult to recover from, damage to a company’s reputation is potentially devastating, and legal action may result from clients whose sensitive data was compromised by...

read more
Targeting the Cloud: Cybercrime’s Next Big Exploit

Targeting the Cloud: Cybercrime’s Next Big Exploit

If there is one thing everyone knows about cybersecurity, it’s this: The cloud is secure. But as with everything in technology, what everyone knows is changing yet again. Bad actors — both rogue and state-sponsored — have aimed their recent attacks at what has...

read more
Overcoming a Cybersecurity Talent Crunch

Overcoming a Cybersecurity Talent Crunch

Are you a small business owner? Or maybe the CEO of a multinational corporation? Either way, you’re about to run into a serious security conundrum. Cybercrime is on the rise, and the talent to prevent it is in short supply. Cybersecurity Ventures predicted a record...

read more
How to Prevent Security Breaches from Third-Party Apps

How to Prevent Security Breaches from Third-Party Apps

Prevent security breaches from third-party apps Are we too trusting? Earlier this year, Security Magazine referenced a study revealing that 82% of companies allow third-party app vendors access to all their cloud data; 76% of companies give third-party app partners...

read more
Value-Added Reselling, It’s What We Do

Value-Added Reselling, It’s What We Do

At the moment the world is abuzz, if you will pardon the pun, with COVID-19 and now the next threat in what seems like a monkey paw year, Murder Hornets. But with these seemingly apocalyptic natural occurrences, where does that leave infosec? What are we doing? How...

read more
Password Rumble

Password Rumble

Passwords- the dark necessity of the world, the prize of many bad actors, the security measure that drives users and security professionals alike insane. Special characters, 16 characters, 8 characters, use a passphrase, don’t use a passphrase they are easily...

read more
New Year, New Threats

New Year, New Threats

With the New Year well underway the biggest threats to cyber-security have already begun to rear their ugly heads. When combined with the cybersecurity skill shortages and the growth of development that occurs every day, 2020 is going to be in truth like every other...

read more
Twas The Night Before Christmas And All Through The SOC

Twas The Night Before Christmas And All Through The SOC

‘Twas the night before Christmas and all through the SOC, not an analyst was stirring, not even in the NOC. The servers were all updated in fear for the preparation of holiday cheer. The CISO was nestled all snug in his bed, while a laptop was stolen with admin creds,...

read more