BLOG
Emotet, a self-updating modular trojan horse malware, has again raised its ugly head. Emotet, also known as “The Banker,” was first discovered in 2014 as a banking Trojan. However, over...
Although a patch alleviates the threat, a vulnerability dubbed GhostToken reveals the danger of installing third-party integrations into sanctioned apps. GhostToken allowed attackers irrevocable...
You’re investigating a new tool and it appears to solve all the problems you’ve been facing. The value justifies the cost, but you just can’t seem to pull the trigger. Why? You don’t have the time or...
It seems like everyone you speak with has their favorite tool – EDR v. threat hunting v. endpoint protection. Unfortunately, this often leads to relying on one tool while ignoring the others...
Recently, cybersecurity experts reported that many EDRs are vulnerable to an attack that takes advantage of the “delete after reboot” command to maliciously wipe data. Endpoint security solutions...
“I need a SIEM. I need a SOAR.” These are requests we field everyday from MSPs. Our first question is always, “What are you looking to accomplish?” Unfortunately, the vast...
Over two decades ago, the IT industry began to shift from break-fix to managed services. Savvy business owners on both sides of the equation recognized that it made a lot more sense to have...
Friday, March 4, was the National Day of Unplugging. This begs the question, when did you last really unplug? Some companies took the day off Friday, as a mandatory day to relax; but we’re willing to...
Working with MSPs every day, we see a lot of cybersecurity mistakes. In fact, preventing these mistakes is the whole reason for BLOKWORX existence. These are the top 3 cybersecurity mistakes we see...