20 Basic Network Security Concepts You Need to Know
Since we are constantly being bombarded by the terms Artificial Intelligence and Machine Learning I decided to write this blog post with an AI tool. I absolutely had to give it quite a bit of help in terms of adding
Choosing the Right Security Services Provider
Managed Security Services – the Next Frontier Several weeks ago we wrote a blog post titled, “A Look at 2023’s Top 5 Cyber Risks – and Strategies for Defending Against Them;” we discussed the following Cyber Risk issues: Strategy 1: Build Your
Building a Next-Generation Security Operations Center
Building an enterprise Security Operations Center (SOC) calls for careful planning and the precise coordination of people, processes, and technologies, as we covered in our previous post, 7 Steps to Building a Security Operations Center. However, once you’ve established a solid
7 Steps to Building a Security Operations Center
Reviewing cybercrime statistics for the year is always a sobering exercise, and 2022 is no exception. Threat actors continue to up the ante, and data breaches grew significantly in Q3 2022, surging by 70% quarter-over-quarter. Looking ahead to 2023, experts predict that
What is Layered Security, including Phishing Defense?
As the rapidly changing cyber threat landscape continues to increase, so must our approaches to protecting against these threats. However, most organizations only realize they're vulnerable after a breach has occurred. Nearly 50% of the respondents reported having been victimized by
How EDR Solutions are Bolstering Cybersecurity Defenses
Endpoint Detection and Response (EDR), also referred to as endpoint detection and threat response (EDTR), is an endpoint security solution that continuously monitors end-user devices to detect and respond to cyber threats like ransomware and malware. Coined by the ex-Gartner Analyst
Ransomware and Business Email Compromise (BEC) Account for 70% of Breaches
Ransomware and business email compromises (BEC) topped the list of the types of attacks on organizations in the past year, making up 70% of the total number, according to the 2022 Unit 42 Incident Response Report from Unit 42 by
Extended Detection and Response (XDR) is Changing SecOps
XDR emerged as a market category in response to the complexity of collecting, aggregating, analyzing, and investigating the thousands of alerts thrown off by dozens of security technologies. The basic premise or the solution is a simple one: XDR is
How to Defend Against Magecart Skimming Cyber Attacks
Defending Against Magecart Skimming Cyber Attacks Prior to the holidays last year and a couple of months before the outbreak of the Coronavirus pandemic we wrote about our concern with regard to the increase in Magecart attacks against online retailers which
Over 90% of all Cyber-Attacks Involve Phishing – Tips to Stop Phishing Attacks
Phishing Accounts for Over 90% of Cyber-Attacks – Learn How to Stop Them Among the billions of e-mails transmitted each day around the world, a significant and growing portion consists of e-mail attacks aimed at breaching an organization’s defenses to conduct