Cyber insurance: why you need it, what it takes to qualify

cyber insurance

We’ve written time and time again about protecting your company and its assets from cyber attacks. Threat vectors are multiplying in both form and function while the rise of ransomware-as-a-service should give any business leader nightmares for how accessible it makes carrying out sophisticated cyberattacks to would-be hackers. So what do you do? How do you protect yourself against downside … Read More

IT management vs cybersecurity

IT management

IT management and cybersecurity go hand in hand. There are few companies in 2022 that can be successful without high-level performance on both fronts. For most small and medium-sized businesses, these may not even be treated as separate functions or departments, but rather lumped together into the “technology” bucket (which isn’t exactly wrong, either). But, there are important distinctions between … Read More

Critical Apache Log4j vulnerability — what you need to know

Log4j

Every week it seems, the public finds out about a critical piece of digital infrastructure that’s providing an unwitting vulnerability for hackers to exploit. Unless you’re a CIO or work in cybersecurity/risk mitigation, you may not even know how integral some of these systems are when the vulnerabilities are disclosed. That might be true for the most recent high-profile announcement … Read More

Ransomware (mostly) isn’t costly because of the ransom

ransomware remediation

When you think about ransomware, I have to imagine you envision the ignominy of paying millions of dollars out of pocket to get access to your data back. The scary part is right there in the name: ransomware. The ransom is the nightmare scenario. While there is certainly a built-in, deep-seeded personal affront to being the victim of a ransom … Read More

Microsoft Power apps misconfiguration exposes 38MM sensitive records

misconfiguration

Not every major data breach or cybersecurity incident is the work of master hackers with government-level resources and support. As we’ve discussed here before, ransomware as a service is a large and growing threat to small and medium-sized businesses the country over. But, it’s not always nefarious actors who are deliberately targeting you that you have to worry about — … Read More

The ransomware protection checklist

ransomware

The Cybersecurity and Infrastructure Security Agency (CISA) recently released a detailed report about the ransomware-du-jour, BlackMatter. Similar to other Ransomware-as-a-Service threat vectors (which we’ve written about before), it’s cheap and easy to deploy, utterly devastating to infected systems, and cause for real concern in the IT community. I wish this wasn’t such a tired story, but this is life in … Read More

How SIEM can protect your business from cyberattacks

SIEM

There really is no way to overstate the cyberthreat environment small and medium-sized businesses find themselves in today. Attacks are up across the board (and not just for large enterprises). The tools hackers are using are both more advanced and more pernicious… all while being more widely available. Now, this shouldn’t come as that big of a surprise to anyone … Read More

President Biden calls critical meeting to combat cyberattacks

cyberattacks

News of cyberattacks are no longer the exclusive purview of industry publications. They’re not even confined to the more niche tech publications like The Verge or Wired any more. No, cybersecurity (and the inevitable failures when they occur) is so integral to modern life, that when almost any breach occurs, it’s international news across medium and outlet. Even companies that … Read More

Phishing attempts (and success rate) through the roof in 2021

phishing

Phishing. It’s a tale as old as time (well, as old as email, anyway…). It’s been a persistent threat for decades, but is becoming more sophisticated, more successful and more insidious with every passing year. Yes, our understanding and expectations of being phished are rising… but so too are the skill, cunning and ruthlessness of the phishers. And so far … Read More

Ransomware-as-a-Service — the darker side of the Colonial Pipeline hack

Ransomware-as-a-service

It would have been pretty hard to miss the news of the Colonial Pipeline hack. We wrote about it here to advise our enterprise clients what they needed to know about, and what it meant for their collective futures. It got play in outlets the media world over, and for good reason — when the pipeline that feeds the entire … Read More