Blog

HIPAA Breach Notifications

      Organizations that utilize, store, or handle Private Health Information (PHI) are covered by HIPAA, the USA’s Health Insurance Portability and Accountability Act of 1996. The HIPAA Breach […]

How to Control and Detect Users Logging Onto Unauthorized Computers

  Windows gives you a number of options for limiting which computers a specific account can be used to log onto. Using these features is a crucial part of protecting […]

Top 3 High Risk Behaviors That Compromise IT Security

    The insider threat is often considerably less frequent than external attacks, but when it does occur, it usually poses a significantly greater risk to enterprises. While evil individuals […]

CYB3R-X in the 2023 IT Sales and Marketing Boot Camp

    Today, April 11, 2023, marks Day 1 of the IT Sales and Marketing Boot Camp hosted by Robin Robins of TMT. Over 1200 MSPs, including CYB3R-X, join this […]

Tracking Removable Storage with the Windows Security Log

  We are getting more requests for information on how to trace data traveling to and from removable storage, such as flash drives, as a result of data breaches and […]

When a SIEM is Like an Exercise Machine Stuck Behind the Junk in Your Garage

  We have a strong belief in detective controls and security analytics in general. You need the crucial defense-in-depth layers that detective controls give through tracking logs and all the […]

Breakdown of Cybersecurity’s Biggest Buzzwords

  It is exceedingly challenging to discern one infosecurity capacity from another in the cybersecurity industry because of the abundance of confusing buzzwords and competing acronyms. You’re not alone if […]

Can Small and Mid-size Companies Benefit from XDR?

Extended Detection and Response (XDR) is a security tool that gives you a complete insight into all of your cloud, hybrid, and on-premises data center resources and offers threat detection, […]

What are the crucial components of XDR?

  Extended Detection and Response (XDR) is a security tool that gives you complete insight into all of your cloud, hybrid, and on-premises data centre resources and offers threat detection, […]

Breaking 3 Cybersecurity Barriers

  The majority of security teams face challenges related to cyber-warfare that cannot be overcome by more technologically-based solutions alone. It is vital to find an all-encompassing, complete solution. CYB3R-X […]