Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Baseline Security (Posture) Monitoring is the New Breach Monitoring

As part of the 2021 MSP 500 project, CRN asked MSPs to describe their most significant challenges for 2021. Their answers ranged from 'finding and hiring highly trained new employees' to 'fulfilling clients' sophisticated IT security needs whilst sustaining business in the saturated MSP market.' In 2021 the cybersecurity threats have taken different shades and have compelled the MSPs to refine and increase their security offering to stay relevant and thriving in the market.

NIST Cybersecurity Framework for Office 365

‍With more than a decade long history of businesses adopting cloud computing, less than one-third of the enterprises have a documented cloud strategy as per Gartner's estimation. Despite the increased migration to cloud security, we discussed the top cloud security risks that security experts are afraid of today.

Zero Trust Model for Cloud Security

(Guest Blog) For decades, companies have relied on perimeter protection solutions to restrict their digital resources. These included passwords to authenticate users, intrusion detection systems and firewalls. With time, passwords became inadequate in preventing unauthorized access, and most shifted to two-factor authentication systems like one-time SMS codes or tokens. This change significantly enhanced security, but the approach only focused on securing the perimeter.

Public vs Private Cloud Security: A Simple Explanation

(Guest Post) There is no worse feeling than the heartache you get after recording your child’s milestones, only for the mobile phone to start warning that the internal storage is running low. Or maybe you cannot function without music, and you have been downloading so many songs that both your internal storage and memory card are full. Most people would rush to delete some of the songs, but you should not have to decide between two of your favourite artists because you are not one of them.

Security Trends for Managed IT Service Providers

The global managed security services market was valued at $19.4 billion in 2017 and is forecast to reach $46.1 billion by 2023 at a CAGR of 14.9%. There has been an upward trend seen in the need for threat-intelligence by several sectors today. Due to an increased requirement to fight against the advanced threat landscape, customers today expect managed IT service providers and MSPs to adopt advanced security technologies to detect better and anticipate potential threats well in time.

Top 4 Security Pain Points in Office 365 and their Solutions

According to research by Spanning Cloud, a lack of expertise is one of the most significant issues with the company's Office 365 security and compliance strategy. When referring to Microsoft Office 365 security pain points, it is necessary to understand that the lack of security features in Office 365 is not the issue. The learning curve that follows with these features, is.

Cloud Security vs. Network Security: Which is Best for your SME?

Being in cybersecurity line of business and being aware of the issues faced by multiple small to mid-sized businesses, we often come across various jargon which may be unclear to some. One of the most common questions for SMEs is should they focus on cloud security or network security. It is hard for SMEs to prioritise their security budget and find affordability with security. To make an informed decision, it’s important to understand the options.

SME Cybersecurity Automation Tools Using Microsoft 365

With one in three SMEs adopting cloud-first strategy more than ever, cybersecurity concerns have only grown exponentially. In the wake of the pandemic, nearly 95% of cybersecurity professionals have shown concerns regarding public cloud security. Microsoft Office 365 is at the heart of most small to mid-sized businesses. Combined with a rapid cloud adoption rate, security concerns are not far behind.

The Biggest Cyber Attacks and Tips to Build Cyber Resilience

A Q3 Report by Risk Based Security on data breaches in 2020 showed that by the end of Q2, 2020 was already considered as the worst year in terms of data exposed. To add a cherry on the top, in Q3, a total of six breaches together accounted for approximately 8 billion exposed records. The pandemic further made the health sector most vulnerable to data breaches. No surprises there!

Lessons to Learn from the Latest Business Email Compromise Scam and AZORult Stealer

Ever heard of AZORult? Sounds like some nerdy stuff. I am not gonna lie, it slightly is! It is a trojan that steals various data including login credentials, browser history, cookies, and more. The history of AZORult is well known by those in the cyber security industry. AZORult was initially discovered back in 2016. As the years passed, we saw some of its ongoing malicious attacks.