blog

BLOG

Ransomware Prevention: A Persistent Problem Top of Mind for The City of Dallas

Ransomware continues to be a pressing cybersecurity threat, causing significant disruptions and financial losses for individuals, businesses, and municipalities. The recent 2023 Dallas ransomware...

Cybersecurity Tools: Is More Security Better Security?

Recently, we attended several industry events. Looking around the vendor halls, there were no less than 30 vendors providing cybersecurity tools. All of them presented value and hit different portions...

EvilExtractor: Awareness and Hygiene!

EvilExtractor malware extracts sensitive or confidential information from a victim’s computer system without their consent or knowledge. It falls under the category of information-stealing...

Infamous Emotet is Back in Play

Emotet, a self-updating modular trojan horse malware, has again raised its ugly head. Emotet, also known as “The Banker,” was first discovered in 2014 as a banking Trojan. However, over...

Third-Party Integrations – Productivity vs. Risk

Although a patch alleviates the threat, a vulnerability dubbed GhostToken reveals the danger of installing third-party integrations into sanctioned apps. GhostToken allowed attackers irrevocable...

Onboarding – A White Glove Experience

You’re investigating a new tool and it appears to solve all the problems you’ve been facing. The value justifies the cost, but you just can’t seem to pull the trigger. Why? You don’t have the time or...

EDR v. Threat Hunting v. Endpoint Protection

It seems like everyone you speak with has their favorite tool –  EDR v. threat hunting v. endpoint protection. Unfortunately, this often leads to relying on one tool while ignoring the others...

Is Your EDR Vulnerable?

Recently, cybersecurity experts reported that many EDRs are vulnerable to an attack that takes advantage of the “delete after reboot” command to maliciously wipe data.  Endpoint security solutions...

Correlation, Causation, or Checking Boxes

“I need a SIEM. I need a SOAR.” These are requests we field everyday from MSPs. Our first question is always, “What are you looking to accomplish?” Unfortunately, the vast...