Last updated August 19, 2022 Summary: Subscription-based cloud and managed IT and security services help SMBs eliminate the up-front costs of setting up their own in-house systems.Managing IT and...
Cybersecurity Posts
Why Your Company Could be the Next Equifax or CapitalOne
Last updated September 27, 2022 Summary: The Equifax breach in 2017 and the CapitalOne breach in 2019 were disruptive, high-profile cyber attacks on major businesses. However, organizations of every...
VirtualArmour Expands Sales Force to Meet Surging Cybersecurity Solution Demands
VirtualArmour was taken private in Q3 2021. These legacy press releases are kept online for informational purposes. VirtualArmour is a proud member of the Evergreen Services Group family of...
MDR vs EDR: What is the Difference?
Last updated August 18, 2022 Summary: MDR and EDR are two different approaches to protecting an organization’s digital assets (including data and systems).EDR (Endpoint Detection and Response) uses...
Phishing Attacks are Evolving: What You Need to Know to Keep Your Company Safe
Last updated August 19, 2022 Summary: Phishing is a form of social engineering where the attacker impersonates a trusted party for the purpose of gaining access to sensitive information like login...
What is Cybersecurity Insurance (& Does Your Business Need It?)
Last updated September 27, 2022 Summary: In 2020, there was one ransomware victim every 10 seconds—and the average cost of a data breach that year was $3.86 million.Organizations in every industry...
Making Sense of TTPs, Cybersecurity, & What That Means for Your Business
Last updated August 19, 2022 Summary: TTPs are tactics, tools, & procedures that threat actors to orchestrate cyber attacks.Analyzing TTPs helps organizations identify who is responsible for...
The Ultimate Guide to Cybersecurity in the Healthcare Industry
Last updated September 27, 2022 Summary: Cyberattacks that target organizations in the healthcare industry often have consequences beyond financial losses.Interruptions to operations and access to...
How the Financial Industry Can Strengthen Their Cybersecurity
Last updated September 27, 2022 Summary: 35% of all data breaches target financial institutions. These hacks can do more than steal money—they can also access huge amounts of customer data,...
Cybersecurity for the Manufacturing Industry, What You Need to Know Now
Last updated August 19, 2022 Summary: When it comes to cyber attacks, the manufacturing industry is the second most targeted industry in the United States. Cyber criminals tend to target smaller...
The Capital One Hack: The Latest in a Series of High-Profile Breaches
Last updated September 27, 2022 Summary: The CapitalOne hack occurred in late March 2019 but took months to discover. In that time, 140,000 social security numbers, 1 million Canadian social...
Cybersecurity & the Legal Industry: What You Need to Know (& Protect)
Summary of Key Points Legal organizations store and handle large volumes of sensitive client data, making them particularly likely to be targeted by cybercriminals. Legal firms and other...
Cyber Warfare: How the Rules of Conduct Are Changing
Summary of Key Points Cyber warfare is similar to cybercrime, but it typically involves nation-states (rather than rival corporations or independent hacker groups). Cyber warfare is not currently...
What Are Endpoints (& How Does Endpoint Security Work)?
Summary of Key Points Endpoints are access points to an organization’s network—including tablets, smartphones, laptops, desktops, and any other device that can access your digital information. IoT...
Top 5 Financial Industry Cyber Attacks
Summary of Key Points The financial services industry faces significant pressure from a cybersecurity perspective The top cyber attacks in the financial industry include phishing, ransomware, DDoS...
The Benefits of XDR: How AI is Improving Your Cybersecurity Posture
Summary of Key Points XDR empowers organizations with holistic security while reducing administration and management XDR reduces reliance on human resources, using AI to “screen” false alerts and...
The 7 Most Common Types of Malware
Last updated August 19, 2022 Summary of Key Points: Malware is software designed to steal data, damage equipment, or spy on users. Viruses infiltrate a program or device and then spread across a...
OT Security: Safeguarding Your OT Assets in An Increasingly Connected World
Last updated August 19, 2022 Summary: Operations Technology (OT) is increasingly being targeted by cyber attacks. In recent years, high-profile cyber incidents at Stuxnet and Norsk Hydro caused tens...
What the War in Ukraine Means for American Cybersecurity Engineers
Last updated September 27, 2022 Summary: The war in Europe has devastating physical consequences, but it’s also being conducted in cyberspace. Cyberattacks have already targeted Ukraine’s Defense...
Hack the Chat
Last updated August 19, 2022 Summary: By the end of 2022, 70% of white collar workers will interact with chatbots on a daily basis—but chatbots can pose a cybersecurity risk if they are not properly...
Latest Posts

Cybersecurity in 2025: Current Trends & Future Predictions
The world of cybersecurity is a rapidly evolving one. Each year, hackers and other bad actors utilize a new set of advanced tools that are designed to steal the data of organizations with vulnerabilities in their security stacks. Keeping on top of the latest trends in...

Advanced Threat Prevention with Palo Alto: Strategies and Tools
The modern attack surface for businesses operating over digital networks is a complex beast. The rapid growth of hybrid workforces and evolving technologies makes protecting your network from outside forces a daily struggle. At risk are your organization’s assets and...

Cybersecurity Challenges in the Age of Remote Work
The world has recently and rapidly adapted to a new reality where remote workers make up a significant percentage of the workforce. While many workers have been going back to the office over the past couple of years, Upwork estimates that roughly 22% of the workforce...