Blog
Disaster Recovery vs. Cyber Recovery – Different Plans Preparing for Different Struggles
As Bob Dylan so eloquently said in his classic song from the 1960s, “Times they are a-changin,” sixty years later they still are. Modern society has grown accustomed to change. It’s the pace of it that can cause you to catch your breath at times. Just as the bulk of rock and country music is…
-
Ransomware Myths SMBs Need to Be Familiar With
Ransomware attacks are skyrocketing so quickly alarm bells should be going off at every company. No one is safe, and experts predict 2022 will be a devastating year for ransomware attacks. This should come as no surprise, as attackers these days don’t even need to write their own ransomware code. They can launch an attack…
-
Disaster Recovery vs. Cyber Recovery – Different Plans Preparing for Different Struggles
As Bob Dylan so eloquently said in his classic song from the 1960s, “Times they are a-changin,” sixty years later they still are. Modern society has grown accustomed to change. It’s the pace of it that can cause you to catch your breath at times. Just as the bulk of rock and country music is…
-
Women: A Powerful Part of Any Cybersecurity Company
On March 8th, our company will proudly celebrate International Women’s Day. While this year’s theme, Break the Bias, applies to women in every professional field and country, we find it particularly relevant to the cybersecurity industry. Gender bias has gone on for too long. Many women haven’t been given the recognition and opportunities they deserve. …
-
Multitenancy – Why it’s crucial for MSSPs
Today, more SMBs are acknowledging that they are prime targets for hackers. As they know they lack the internal resources to hire an entire staff of cyber experts, they are turning to managed security service providers (MSSPs) for support. That makes this an exciting and opportune time for MSSPs to grow but managing multiple clients…
-
Ransomware – It’s all about the Benjamins
It was Ott Biederman, an accountant for American organized crime back at the turn of the 19th century that originally issued the famous immortal line, “Nothing personal, its just business.” That is what ransomware is today – just business. While there are occasional ransomware attacks initiated by state-sponsored groups to bring down the operations of…
-
How to achieve effective cybercrime investigations
Different organizations and companies will define the stages within the lifecycle of a cyber security event a little differently. The National Institute of Standards and Technology (NIST) follows a four-step process of preparation, detection & analysis, containment, eradication & recovery, and post-incident activity. The International Organization for Standardization (ISO) quantifies the process with five stages: prepare, identify, assess, respond…