• The 2 Kinds of Victims in Cybersecurity – The Attractive and the Easy

    The 2 Kinds of Victims in Cybersecurity – The Attractive and the Easy

    Do threat actors see your organization as an attractive target or an easy target? Learn the distinction and how to protect your organization from cyber attacks.

  • Common Entry Points #6 – Open Ports and Services

    Common Entry Points #6 – Open Ports and Services

    Every internet-facing system in your network must undergo a risk assessment and, if necessary, be secured by avoiding default ports and applying stringent restrictions.

  • Avoiding APT Attacks: The MDR Advantage

    Avoiding APT Attacks: The MDR Advantage

    In the digital world, it’s rare to see a crime of passion. Most cyberattacks fall into the crimes of opportunity category, taking advantage of a situation that presents itself unexpectedly. They are usually launched by individuals or groups using readily available automated tools to target and exploit known vulnerabilities. Often referred to as “script kiddies,”…

  • The Legal and Financial Importance of Digital Forensics 

    The Legal and Financial Importance of Digital Forensics 

    Fans of classic police investigator shows on television understand the importance of the iconic yellow crime tape. It marks the boundary of a crime scene that restricts access to prevent contamination of the crime scene. Similarly, in the aftermath of a significant ransomware attack or data breach, it’s time for digital and forensic experts to…

  • Ransomware Payment – Can You Avoid a Lose-Lose Situation?

    Ransomware Payment – Can You Avoid a Lose-Lose Situation?

    Facing a ransomware attack is every company’s worst nightmare. The dilemma following data encryption and ransom demand is agonizing: Do you give in to the attackers’ demands and pay, hoping to regain access to your critical data? Or do you refuse, potentially facing permanent data loss, operational downtime, and potentially crippling financial losses? Both options…

  • Understanding and Leveraging the MITRE ATT&CK Advantage

    Understanding and Leveraging the MITRE ATT&CK Advantage

    Whether you are playing a friendly game of chess, planning a flanking attack for a modernized military force, or protecting your business against malicious threat actors, one thing is for certain: it is advantageous to be able to anticipate your adversary’s next move. A chess master, for example, memorizes famous moves to improve strategy and…

Sign Up for Updates