What is proactive incident response?

What is proactive incident response?

Incident response as a term is reactive, so it’s no wonder that a proactive approach to incident response is a foreign concept to many clients and resellers that we work with.  Let’s look at a few common scenarios to understand why proactive incident...
Poorly Written Ransomware Still Infects Unpatched Systems

Poorly Written Ransomware Still Infects Unpatched Systems

WannaCry malware hit the news in 2017 when reports of the damaging attack spread through more than 150 countries.  The National Health Service in the UK, and FedEx where two of the worst hit organizations, but countless others, including small business, schools, and...
3 Key things to make your MSSP relationship a success

3 Key things to make your MSSP relationship a success

There is a lot of confusion around the term MSSP (Managed Services Security Provider). What are they? What do they do? What is their value? Can’t I just do that myself? The term MSSP had its genesis in the internet service providers (ISPs) in the 1990s the ISP...
What is cyber threat hunting?

What is cyber threat hunting?

A buzz term of today’s cybersecurity is ‘threat hunting’. It gives you images of clandestine agents hiding in the shadows, ready to spring into action to neutralize a threat. Well that’s not exactly what cyber threat hunting is, but it’s also not necessarily what many...
Growing Revenue with Foresite

Growing Revenue with Foresite

We are very excited about 2019 as our Reseller Channel continues to grow. We know that in addition to wanting to solve cybersecurity and compliance problems for your clients, you also partnered (or are considering partnering) with Foresite to grow revenue.   Here...
Be Aware of Business Process Compromise

Be Aware of Business Process Compromise

We have all heard about data breaches and compromises that target specific data within an organization. However there are other types of cyber attacks. Today let’s talk about business process compromise. Business Process Compromise (BPC) is when an attacker...