Last updated August 19, 2022 Summary: Subscription-based cloud and managed IT and security services help SMBs eliminate the up-front costs of setting up their own in-house systems.Managing IT and...
Risk Mitigation & Prevention Posts
Why Your Company Could be the Next Equifax or CapitalOne
Last updated September 27, 2022 Summary: The Equifax breach in 2017 and the CapitalOne breach in 2019 were disruptive, high-profile cyber attacks on major businesses. However, organizations of every...
MDR vs EDR: What is the Difference?
Last updated August 18, 2022 Summary: MDR and EDR are two different approaches to protecting an organization’s digital assets (including data and systems).EDR (Endpoint Detection and Response) uses...
Phishing Attacks are Evolving: What You Need to Know to Keep Your Company Safe
Last updated August 19, 2022 Summary: Phishing is a form of social engineering where the attacker impersonates a trusted party for the purpose of gaining access to sensitive information like login...
What is Cybersecurity Insurance (& Does Your Business Need It?)
Last updated September 27, 2022 Summary: In 2020, there was one ransomware victim every 10 seconds—and the average cost of a data breach that year was $3.86 million.Organizations in every industry...
The Ultimate Guide to Cybersecurity in the Healthcare Industry
Last updated September 27, 2022 Summary: Cyberattacks that target organizations in the healthcare industry often have consequences beyond financial losses.Interruptions to operations and access to...
How the Financial Industry Can Strengthen Their Cybersecurity
Last updated September 27, 2022 Summary: 35% of all data breaches target financial institutions. These hacks can do more than steal money—they can also access huge amounts of customer data,...
Cybersecurity for the Manufacturing Industry, What You Need to Know Now
Last updated August 19, 2022 Summary: When it comes to cyber attacks, the manufacturing industry is the second most targeted industry in the United States. Cyber criminals tend to target smaller...
Cybersecurity & the Legal Industry: What You Need to Know (& Protect)
Summary of Key Points Legal organizations store and handle large volumes of sensitive client data, making them particularly likely to be targeted by cybercriminals. Legal firms and other...
Cyber Warfare: How the Rules of Conduct Are Changing
Summary of Key Points Cyber warfare is similar to cybercrime, but it typically involves nation-states (rather than rival corporations or independent hacker groups). Cyber warfare is not currently...
What Are Endpoints (& How Does Endpoint Security Work)?
Summary of Key Points Endpoints are access points to an organization’s network—including tablets, smartphones, laptops, desktops, and any other device that can access your digital information. IoT...
Top 5 Cyber Attacks on Retail Businesses
Summary of Key Points Nearly half of all data breach incidents target retailers, and nearly 20% of customers say they’ll stop shopping at companies that let themselves get hacked—which makes...
The Benefits of XDR: How AI is Improving Your Cybersecurity Posture
Summary of Key Points XDR empowers organizations with holistic security while reducing administration and management XDR reduces reliance on human resources, using AI to “screen” false alerts and...
The 7 Most Common Types of Malware
Last updated August 19, 2022 Summary of Key Points: Malware is software designed to steal data, damage equipment, or spy on users. Viruses infiltrate a program or device and then spread across a...
OT Security: Safeguarding Your OT Assets in An Increasingly Connected World
Last updated August 19, 2022 Summary: Operations Technology (OT) is increasingly being targeted by cyber attacks. In recent years, high-profile cyber incidents at Stuxnet and Norsk Hydro caused tens...
What the War in Ukraine Means for American Cybersecurity Engineers
Last updated September 27, 2022 Summary: The war in Europe has devastating physical consequences, but it’s also being conducted in cyberspace. Cyberattacks have already targeted Ukraine’s Defense...
Hack the Chat
Last updated August 19, 2022 Summary: By the end of 2022, 70% of white collar workers will interact with chatbots on a daily basis—but chatbots can pose a cybersecurity risk if they are not properly...
What Your Vulnerability Scan Report is Telling You (& What It’s Not)
Last updated August 18, 2022 Summary: Vulnerability scans provide visibility of your cybersecurity posture’s weaknesses before cybercriminals can exploit them. They look for weak points in your...
Guide to Creating an Effective Incident Response Plan
Last updated August 19, 2022 Summary: Incident Response Plans (IRPs) are instructions that tell your team how to detect, respond to, and recover from cybersecurity threats.Strong IRPs have 5 steps:...
Identifying a Breach: Finding Indicators of Compromise (IOC)
Last updated August 19, 2022 Summary: Cybersecurity breaches like malware, phishing, and DDoS attacks) can cost organizations millions and damage their reputation beyond repair.In addition to having...
Latest Posts

Advanced Threat Prevention with Palo Alto: Strategies and Tools
The modern attack surface for businesses operating over digital networks is a complex beast. The rapid growth of hybrid workforces and evolving technologies makes protecting your network from outside forces a daily struggle. At risk are your organization’s assets and...

Cybersecurity Challenges in the Age of Remote Work
The world has recently and rapidly adapted to a new reality where remote workers make up a significant percentage of the workforce. While many workers have been going back to the office over the past couple of years, Upwork estimates that roughly 22% of the workforce...

What is SD-WAN? A Comprehensive Guide to Software-Defined Networking
Securely connecting employees with the branch offices, data centers, and web applications that drive our businesses is a necessary step for doing business in today’s environment. We are increasingly distributing our networks across the globe, and the data our users...