Last updated August 19, 2022 Summary: Operations Technology (OT) is increasingly being targeted by cyber attacks.In recent years, high-profile cyber incidents at Stuxnet and Norsk Hydro caused tens...
Managed Services Posts
Subscription Model Software: Pros and Cons
Last updated August 19, 2022 Summary: Subscription-based cloud and managed IT and security services help SMBs eliminate the up-front costs of setting up their own in-house systems.Managing IT and...
MDR vs EDR: What is the Difference?
Last updated August 18, 2022 Summary: MDR and EDR are two different approaches to protecting an organization’s digital assets (including data and systems).EDR (Endpoint Detection and Response) uses...
Identifying a Breach: Finding Indicators of Compromise (IOC)
Last updated August 19, 2022 Summary: Cybersecurity breaches like malware, phishing, and DDoS attacks) can cost organizations millions and damage their reputation beyond repair.In addition to having...
Making Sense of TTPs, Cybersecurity, & What That Means for Your Business
Last updated August 19, 2022 Summary: TTPs are tactics, tools, & procedures that threat actors to orchestrate cyber attacks.Analyzing TTPs helps organizations identify who is responsible for...
What Are the Risks of Using Unsupported Hardware?
Last updated September 27, 2022 Summary: Holding off on replacing your hardware until it breaks can seem like an easy way to save money, but old hardware comes with numerous drawbacks.Old hardware...
Terms & Phrases Used in the Managed IT & Cybersecurity Industries
Last updated September 27, 2022 Summary: Not everyone knows what a managed IT provider does—or how to define cybersecurity. Learning some technical terms used in the industry can help you understand...
The SMBs Guide to Getting Started With Cybersecurity
Last updated September 27, 2022 Summary: Two thirds of the world’s SMBs had experienced a cyberattack as of 2019, but only 45% considered their cybersecurity posture ineffective.Common cybersecurity...
The Digital Partridges in the Cybercrime Pear Tree
The holidays may be a time for spending time with loved ones and exchanging gifts, but the gifts cybercriminals bring aren’t jolly at all. 2020 Has been a rough year, and many organizations have...
Identity Management is Really Just Cybersecurity Best Practices With a Fancy (& Expensive) Name
Last updated August 19, 2022 Summary: Identity and Access Management (IAM) strategies define and manage the roles and access privileges for a network’s users.Under an IAM strategy, individuals often...
Hackers Are Increasingly Targeting People Through Their Phones
Last updated September 27, 2022 Summary: Hackers target phones for several reasons: to steal money and financial data, eavesdrop on phone calls, blackmail users with stolen personal information,...
Leveraging Your MSSP in an "IT Light" Environment
Not every organization can afford to support a full team of IT experts, but that doesn’t mean you can’t benefit from expert knowledge and advice. By leveraging your Managed Security Services...
The Ultimate Guide to Cybersecurity in the Healthcare Industry
Last updated September 27, 2022 Summary: Cyberattacks that target organizations in the healthcare industry often have consequences beyond financial losses.Interruptions to operations and access to...
Cybersecurity for the Manufacturing Industry, What You Need to Know Now
Last updated August 19, 2022 Summary: When it comes to cyber attacks, the manufacturing industry is the second most targeted industry in the United States. Cyber criminals tend to target smaller...
The Costs & Infrastructure Tied to a Remote Workforce
COVID-19 & the Sudden Shift to Remote Work As COVID-19 forces employees to practice social distancing, or even to self-isolate or shelter in place, the ability for employees to work remotely has...
COVID-19 Demonstrates the Power of Remote Workplaces (But Those Are Not Without Risks)
COVID-19 is changing the way society handles a lot of things, including how we work. As companies rapidly shift to remote workplaces, we can expect there to be a few hiccups along the way. In...
The Ultimate Guide to Managed Threat Intelligence (2020 Edition)
Cybersecurity is incredibly important for any organization, regardless of size or industry, and a robust cybersecurity strategy rests on real-time, accurate threat intelligence. What is Threat...
Cloud Isn't the "Future"; It's the Now
Technology is continually changing and evolving, creating new and innovative ways to conduct business. While many of us may still think the cloud is some futuristic concept, in reality, it’s already...
The Rising Cost of Health Care Industry Data Breaches
The 2019 edition of the Cost of a Data Breach Report, sponsored by IBM and published by Ponemonis causing quite a stir in the cybersecurity world. The annual report, which draws its data from...
What Kind of Relationship Should You Have With Your MSSP?
Last updated September 27, 2022 Summary: MSSP stands for managed security services provider. These third-party organizations provide ongoing IT and cybersecurity services for organizations.Many...
Latest Posts

Cybersecurity & the Legal Industry: What You Need to Know (& Protect)
Technology has become a fact of life in the business world, and the legal industry is no exception. Here’s what you need to know about legal cybersecurity.

Cyber Warfare: How the Rules of Conduct Are Changing
Safeguarding your organization’s digital assets used to feel simple. However, with the internet now crucial to many business functions, it’s become a necessity.

Social Engineering 101 (& How to Protect Your Data)
How vulnerable are you and your organization to social engineering attacks? The answer might surprise you. Let the experienced cybersecurity professionals at VirtualArmour give you an overview of how modern social engineering works and show you steps you can take to protect yourself from its potentially disastrous effects.