Blog

Selecting the Right XDR Provider

You might be forgiven for wondering why, with all of the sophisticated cybersecurity systems at our fingertips, hackers still manage to penetrate those defenses. This has prompted companies on the […]

Executive Involvement in Cybersecurity Leadership

  Organization leaders have many competing initiatives for their time and budgets as they run the business. Cybersecurity ┬áis an executive-level issue for several reasons It impacts day-to-day operations, long-term […]

Change Your NAS Device Password To Avoid Ransomware Attacks

A NAS manufacturer based in Taiwan called Synology recently issued a warning to its customers relating to the StealthWorker botnet. This botnet has been targeting a wide range of NAS […]

This Malware Could Be Using Your PC To Make Money

If you haven’t heard of a malware strain called Crackonosh, be aware that it might be abusing your system, and specifically, Windows Safe Mode, to make money for its controllers. […]

Criminal Gang NOBELIUM Ramps Up Attacks

  Threat researchers detected threat group NOBELIUM conducting several waves of malicious spear phishing email campaigns. Each wave used different technical lures and social engineering to fine-tune which threat performed […]

Use MITRE ATT&CK to Thwart Ransomware Faster

Ransomware has made a resurgence and is impacting both IT service providers and the businesses they serve. What if you had insights into cyber criminal tactics and techniques happening in […]

MDR is a critical capability for MSPs: Keys to making the right choice

  MSPs need airtight threat detection and rapid, reliable remediation. The optimal way to do this is to ensure you have top-notch MDR capabilities 24/7/365. Many MSPs partner with an […]

Building Trust: Four Tips for MSPs

          As the threat landscape continues to evolve, you can build trust by adding value to security outcomes and emphasizing your expertise. How do you position […]