Prevention - centric cybersecurity
blog

BLOG

EDR v. Threat Hunting v. Endpoint Protection

It seems like everyone you speak with has their favorite tool –  EDR v. threat hunting v. endpoint protection. Unfortunately, this often leads to relying on one tool while ignoring the others...

Is Your EDR Vulnerable?

Recently, cybersecurity experts reported that many EDRs are vulnerable to an attack that takes advantage of the “delete after reboot” command to maliciously wipe data.  Endpoint security solutions...

Correlation, Causation, or Checking Boxes

“I need a SIEM. I need a SOAR.” These are requests we field everyday from MSPs. Our first question is always, “What are you looking to accomplish?” Unfortunately, the vast...

IRaaS is a Step Backward for the Channel

Over two decades ago, the IT industry began to shift from break-fix to managed services. Savvy business owners on both sides of the equation recognized that it made a lot more sense to have...

Get on the YOLO Bus AKA Find Work-Life Balance

Friday, March 4, was the National Day of Unplugging. This begs the question, when did you last really unplug? Some companies took the day off Friday, as a mandatory day to relax; but we’re willing to...

Top 3 Cybersecurity Mistakes MSPs Make

Working with MSPs every day, we see a lot of cybersecurity mistakes. In fact, preventing these mistakes is the whole reason for BLOKWORX existence. These are the top 3 cybersecurity mistakes we see...