Blog

Demystifying MDR: Five Myths for MSSPs

MSPs are always looking for new ways to protect their data and increase their resiliency against persistent criminals by bolstering their cyber defenses. However, their security service providers frequently discover […]

MSPs: How to Add Security Services Fast and Affordably

You’ve seen it over and over again in the headlines – small subcontractors are often soft-target gateways for hacking large clients. Middle-tier businesses are very attractive and vulnerable targets for […]

Why Every Business Needs to Implement Threat Hunting

If you think your company is too small to be targeted by threat actors, think twice. Organizations are now going on the offensive and thinking about a proactive way to […]

How to Combat the Rising Costs of Cybersecurity Insurance

Even if your company has cybersecurity insurance, that doesn’t mean you can avoid taking the necessary precautions to avoid disaster. It’s no secret that, similar to our own healthcare, being […]

What is EDR and Why It is Important to SMB Security

Standard endpoint security techniques such as anti-virus software applications are no match for the growing elegance and volume of complicated risks found in the existing danger landscape. According to the […]

Cloud and SaaS Security: Mind the Gap

For both large and small businesses, software-as-a-service (SaaS) applications and infrastructure providers like Amazon Web Services (AWS) and Microsoft Azure have become the norm. Given the proliferation of cloud workloads […]

Use MITRE ATT&CK to Thwart Ransomware Faster

Ransomware has made a resurgence and is impacting both IT service providers and the businesses they serve. What if you had insights into cyber criminal tactics and techniques happening in […]

Prevention is Key in Cybersecurity

“You see, but you don’t pay attention.” The distinction is unmistakable.” In “A Scandal in Bohemia,” Sherlock Holmes tells John Watson this. The number of steps from the hall to […]

This Malware Might Be Undetectable To Some Antivirus Programs

  For a time, a few months ago, it seemed like the gang behind the dreaded Trickbot network and malware was on the ropes. Law enforcement had rocked the group […]

Ten Steps to Defend Your Microsoft Servers from ProxyLogon Exploit

Multiple zero-day exploits have been discovered that are being used to attack on-premises versions of Microsoft Exchange Server, according to Microsoft. According to reports, the number of attacks exploiting critical […]