Insights

Articles & Resources

Subscribe to Receive Updates

Connect

Technical Expertise Security Vulnerability Advisory

Cybersafe Solutions Security Advisory Bulletin March 29, 2024

March 29, 2024

Vulnerabilities in Ivanti's Standalone Sentry, Apple Security Patch for Vulnerability Flaws, Security Patch for Google Chrome and Desktop Browser

Read Now
For Business Leaders

Achieving Cybersecurity Compliance Amid Regulatory Challenges

March 28, 2024

Manage compliance better with tips on staying informed, adopting proactive cybersecurity strategies, and partnering with a cybersecurity expert.

Read Now
Technical Expertise Security Vulnerability Advisory

Cybersafe Solutions Security Advisory Bulletin March 22, 2024

March 22, 2024

Security Advisories for Atlassian, WordPress 'miniOrange Plugins', Fortra's FileCatalyst Transfer Tool, Security Patch for Google Chrome Desktop and Mozilla

Read Now
Technical Expertise Security Vulnerability Advisory

Cybersafe Solutions Security Advisory Bulletin March 15, 2024

March 15, 2024

Patches for Fortinet, Cisco, QNAP, AnyCubic, Microsoft Patch Tuesday, and Security Updates for Adobe Products and Google Chrome Desktop Browser

Read Now
For Business Leaders

Cybersecurity Laws and Regulations to Know

March 12, 2024

Discover key cybersecurity laws and regulations critical for compliance, protecting against cyber threats, and boosting your overall cybersecurity stance.

Read Now
Technical Expertise Security Vulnerability Advisory

Cybersafe Solutions Security Advisory Bulletin March 8, 2024

March 08, 2024

Security Advisories for SolarWinds, VMWare, JetBrains TeamCity, Microsoft, Apple and Android products

Read Now
For Business Leaders

The Key Elements of an Effective Data Protection Strategy

March 06, 2024

Explore the essentials of a robust data protection strategy to improve data privacy, integrity, and availability and boost operational excellence.

Read Now
Technical Expertise Security Vulnerability Advisory

Cybersafe Solutions Security Advisory Bulletin March 1, 2024

March 01, 2024

Security Updates for Progress Kemp’s LoadMaster, WordPress Plugin ‘Ulimate Member,’ Joomla, Google Chrome, and Mozilla Products

Read Now
Technical Expertise Security Vulnerability Advisory

Cybersafe Solutions Security Advisory Bulletin Feb 23, 2024

February 23, 2024

SolarWinds Patches 5 Critical Remote Code Execution Vulnerabilities, ConnectWise Patches Two Critical Flaws within ScreenConnect, Critical Zero-Day Vulnerability in Microsoft Defender SmartScreen, Critical Privilege Escalation Vulnerability in Windows Zoom Desktop, Zoom VDI, and Zoom Meeting SDK, Critical Remote Code Execution Vulnerability Exploited in Bricks WordPress Site Builder, QNAP Patches Two Critical Vulnerabilities (CVE-2023-47218 and CVE-2023-50358)

Read Now
Technical Expertise Security Vulnerability Advisory

Cybersafe Solutions Security Advisory Bulletin Feb. 16, 2024

February 16, 2024

Advisories for Cisco Expressway Gateways, FortiSIEM allowing RCE, MS Patch Tuesday Fixes Zero-Days, updates released for Google Chrome Browser and Adobe.

Read Now
Technical Expertise Security Vulnerability Advisory

Cybersafe Solutions Security Advisory Bulletin Feb. 9, 2024

February 09, 2024

Update to Critical Jenkins RCE, Vulnerabilities: TeamCity and Shim affecting Linux distros; Zero-day in Windows Event Log; Updates for Chrome and Android

Read Now
Technical Expertise Security Vulnerability Advisory

Cybersafe Solutions Security Advisory Bulletin Feb. 2, 2024

February 02, 2024

Vulnerabilities in Juniper Networks SRX Series Firewalls, Cisco Unified Communications & Contact Center Solutions, GNU C Library Linux Distros, Google Chrome

Read Now
Technical Expertise Security Vulnerability Advisory

Cybersafe Solutions Security Advisory Bulletin Jan 26, 2024

January 26, 2024

Selection of vulnerabilities that were released within the past week that could impact any number of organizations.

Read Now
For Business Leaders

Navigating the SEC’s New Cybersecurity Rules

January 25, 2024

Explore the SEC's new cybersecurity rules: the legal requirements, their impact on public companies, best practices for managing compliance, and more.

Read Now
Technical Expertise Security Vulnerability Advisory

Cybersafe Solutions Security Advisory Bulletin Jan. 19, 2024

January 19, 2024

Zero-Days in Citrix NetScaler ADC and Gateway and Google Chrome, SharePoint Elevation of Privilege, Confluence Data Center and Server, lead off this week’s advisory

Read Now
For Business Leaders

Balancing Compliance and Cybersecurity in 2024

January 15, 2024

Discover how merging compliance and cybersecurity in 2024 strengthens organizational defenses against cyber threats, turning regulatory adherence into a strategic advantage for resilience and growth.

Read Now
Technical Expertise Security Vulnerability Advisory

Cybersafe Solutions Security Advisory Bulletin Blog Jan. 12, 2024

January 12, 2024

Ivanti's Endpoint Manager, FortiOS and FortiProxy, RE#TURGENCE targets Microsoft SQL, updates for Microsoft, QNAP, Google Chrome, and Adobe products

Read Now
Technical Expertise Security Vulnerability Advisory

Cybersafe Solutions Security Advisory Bulletin Jan. 5, 2024

January 05, 2024

Microsoft disables MSIX App Installer Protocol, Terrapin attacks downgrade security of SSH protocol, security updates released by Qualcomm

Read Now
Technical Expertise Security Vulnerability Advisory

Cybersafe Solutions Security Advisory Bulletin December 29, 2023

December 29, 2023

Critical Remote Code Execution in Ivanti Avalanche, ESET fixes Secure Traffic Scanning, Agent Tesla Malware, Google Chrome Desktop and Mozilla Products

Read Now
Technical Expertise Security Vulnerability Advisory

Cybersafe Solutions Security Advisory Bulletin Dec. 22, 2023

December 22, 2023

3CX SQL Database Integrations, Perforce Helix Core Server, MongoDB Data Breach, Google Forms used in Phishing campaigns, FBI disrupts ALPHV Ransomware Group

Read Now
Cybersecurity Explained

The Importance of Having a Cyber Incident Response Plan

December 19, 2023

A cyber incident response plan (CIRP) plays a vital role in safeguarding businesses from the impacts of cyber attacks.

Read Now
For Business Leaders Cybersecurity Explained

What Is Cybersecurity Compliance and Why Is It Important?

December 15, 2023

Delve into cybersecurity compliance: Why it's crucial for data protection, legal adherence, and maintaining robust cyber defenses in today's digital landscape.

Read Now
Technical Expertise Security Vulnerability Advisory

Cybersafe Solutions Security Advisory Bulletin Dec. 15, 2023

December 15, 2023

Two Apple Zero-Days, Zero-Day in Sophos Firewall, Adobe Products Arbitrary Code Execution, WordPress Plugin, Microsoft, Google, and Adobe products.

Read Now
Technical Expertise Security Vulnerability Advisory

Cybersafe Solutions Security Advisory Bulletin Dec. 8, 2023

December 08, 2023

Zero-Days Patched by Apple and Microsoft, Malware in Google Play Store, VMware Cloud Director Appliance, Android, and Chrome Security Patch Updates

Read Now
Technical Expertise Security Vulnerability Advisory

Cybersafe Solutions Security Advisory Bulletin Dec. 1, 2023

December 01, 2023

Security Advisory for three (3) vulnerabilities in ownCloud could lead to information disclosure, zero-day found in Google Chrome Desktop Browser

Read Now
Cybersecurity Explained

Why Training Your Employees in Cybersecurity Awareness Is Crucial in 2024

November 30, 2023

Cyber attacks are increasing and firm-wide cybersecurity awareness training is crucial. Learn why Cybersafe Solutions is the go-to training partner for 2024.

Read Now
Technical Expertise Security Vulnerability Advisory

Cybersafe Solutions Security Advisory Bulletin Nov 24, 2023

November 24, 2023

Security Advisories for shopping related scams this holiday season, critical vulnerability in FortiSIEM, and multiple vulnerabilities in Mozilla products.

Read Now
Technical Expertise Security Vulnerability Advisory

Cybersafe Solutions Security Advisory Bulletin Nov. 17, 2023

November 17, 2023

Security Advisories: Lace Tempest exploits SysAid, VMware Cloud Director, Microsoft Patch Tuesday, Azure CLI, Google Chrome Desktop and Adobe Products

Read Now
Cybersecurity Explained

4 Indicators of an Effective Cybersecurity Awareness Training Program

November 13, 2023

Effective security awareness training and education includes baseline assessment, managed training, simulated phishing, and comprehensive reporting.

Read Now
Technical Expertise Security Vulnerability Advisory

Cybersafe Solutions Security Advisory Bulletin Nov. 10, 2023

November 10, 2023

Security Vulnerabilities in Veeam ONE, QNAP Fixes 2 Critical Vulnerabilities, 7-Zip Patched Remote Code Execution, and multiple in Android Products

Read Now
Technical Expertise Security Vulnerability Advisory

Cybersafe Solutions Security Advisory Bulletin November 3, 2023

November 03, 2023

Security Advisory in Confluence Data Center & Server, Citrix NetScaler ADC and Gateway, BIG-IP, Google Chrome and Apple products.

Read Now
Cybersecurity Awareness Month

Lessons Learned: Fortifying Cybersecurity with Cybersafe’s Fact or Hack Campaign

November 01, 2023

Explore the "Fact or Hack" campaign's insights on proactive cybersecurity, the significance of threat intelligence, and the pivotal role of a strategic SOC in safeguarding our digital landscape.

Read Now
Technical Expertise Security Vulnerability Advisory

Cybersafe Solutions Security Advisory Bulletin Oct. 27, 2023

October 27, 2023

Security Advisory for new zero-day in Cisco IOS XE Software Web UI, SolarWinds Access Rights Manager, VMware vCenter Server, Okta Breach, Chrome and Mozilla

Read Now
Technical Expertise Cybersecurity Awareness Month

Case Study: How Cybersafe as an Intuitive SOC Thwarted a Living Off the Land Cyber Attack

October 26, 2023

Discover Cybersafe's innovative approach in safeguarding XYZ Corporation from a hidden cyber threat, emphasizing the evolving importance of proactive defense in today's digital age.

Read Now
Technical Expertise Security Vulnerability Advisory

Cybersafe Solutions Security Advisory Bulletin Oct 20, 2023

October 20, 2023

Security Advisory for elevated issues in Cisco IOS XE, NetScaler ADC and Gateway, WS_FTP Server, and rise in phishing campaign targeting “debt.”

Read Now
Technical Expertise Cybersecurity Awareness Month

Elevating Cybersecurity: The Power of an Intuitive SOC With Proactive Threat Intelligence

October 19, 2023

Explore the transformative power of a proactive Security Operations Center (SOC) in today's cybersecurity landscape and discover how Cybersafe amplifies threat intelligence for robust protection.

Read Now
Technical Expertise Security Vulnerability Advisory

Cybersafe Solutions Security Advisory Bulletin Oct 13, 2023

October 13, 2023

Security Advisory for Citrix NetScaler ADC & Gateway, Zero-Days in Apple products, HTTP/2 Rapid Reset, Microsoft Patch Tuesday, Google Chrome & Adobe updates

Read Now
Technical Expertise Cybersecurity Awareness Month

Expert Q&A: Building Cybersecurity Resilience & Awareness With Thomas Pioreck, CISO, Cybersafe Solutions

October 10, 2023

In this Q&A, Cybersafe Solutions Chief Information Security Officer Thomas Pioreck answers questions about everything from endpoint security to incident response to help users improve cybersecurity posture. 

Read Now
Technical Expertise Security Vulnerability Advisory

Cybersafe Solutions Security Advisory Bulletin October 6, 2023

October 06, 2023

Security Advisory: 0-days in Exim mail servers and MS Edge, Teams, Skype, and Webp; vulnerabilities in Cisco Catalyst SD-Wan, Google, and Qualcomm Products

Read Now
Cybersecurity Explained Cybersecurity Awareness Month

Unveiling ‘Fact or Hack’: Why Cybersecurity Knowledge Is Power

October 02, 2023

In the digital age, where our lives are increasingly intertwined with technology, cybersecurity is a primary concern. The growing sophistication of cyber threats means that understanding the nuances of cybersecurity is no longer optional—it's a necessity. That's where ‘Fact or Hack’ comes into play. While it is a month-long initiative, these best practices are here to stay.

Read Now
Technical Expertise Security Vulnerability Advisory

Cybersafe Solutions Security Advisory Bulletin Sept 29, 2023

September 29, 2023

Security Advisory: zero-days in Apple Products and libwebp, Microsoft SharePoint Server, Okta’s measures to combat Social Engineering Campaigns.

Read Now
Cybersecurity Explained Cybersecurity Awareness Month

Understanding the 18 CIS Critical Security Controls: Your Roadmap for Cybersecurity Excellence

September 27, 2023

Adopting CIS Critical Security Controls helps organizations enhance cybersecurity posture, mitigate risks, and defend against evolving threats. 

Read Now
Technical Expertise Security Vulnerability Advisory

Cybersafe Solutions Security Advisory Bulletin Sept 22, 2023

September 22, 2023

Security Advisory for Trend Micro Apex One, Info-Stealer Malware 'MetaStealer' Targeting macOS Business Users, Microsoft Azure Data Leak using SAS Tokens

Read Now
In the News

Cybersafe Solutions Ranked 34th on MSSP Alert’s Top 250 MSSPs List [Press Release]

September 20, 2023

Cybersafe Solutions has been ranked 34th among the top 250 managed security service providers globally on MSSP Alert’s Top 250 MSSPs list and report for 2023.

Read Now
Technical Expertise Security Vulnerability Advisory

Cybersafe Solutions Security Advisory Bulletin Sept 15, 2023

September 15, 2023

Security Advisory for Cisco ASA and FTD, Apple, Microsoft Patch Tuesday, Adobe, Chrome, Mozilla, and Notepad++ products for the week of 9/15/23.

Read Now
Technical Expertise

MDR Vs. XDR: Determining the Right Solution for Your Business

August 24, 2023

MDR and XDR are often mischaracterized as competing solutions. In reality, XDR is a useful solution that can be utilized by MDR providers. Deciding what’s best for you comes down to whether you plan to manage cybersecurity in-house or outsource to a dedicated MDR provider.

Read Now
In the News

Cybersafe Earns Place on Prestigious MES Midmarket 100 List

August 11, 2023

Cybersafe secured a position on the MES Midmarket 100, honoring tech providers dedicated to advancing mid-sized enterprises.

Read Now
For Business Leaders

ChatGPT & Cybersecurity: Security Risks for Your Business to Consider

August 10, 2023

Mitigate potential risks associated with ChatGPT, including data protection and account exposures, by following best practices and improving your overall security posture. 

Read Now
For Business Leaders Cybersecurity Explained

The Basics of Cybersecurity Awareness Training for Your Employees

July 26, 2023

Security awareness training minimizes the potential for attacks by educating users on current and evolving cyber risks, and testing and reporting on their progress.

Read Now
Cybersecurity Explained

What Is Extended Detection & Response (XDR) in Cybersecurity?

July 18, 2023

Extended detection and response (XDR) correlates data from endpoints, networks, and cloud environments for efficient threat hunting and incident response.

Read Now
Cybersecurity Explained

What Is Managed Detection & Response?

June 27, 2023

Managed detection and response (MDR) leverages top-tier threat intelligence and technology to provide 24/7/365 monitoring, threat hunting, and incident response.

Read Now
Cybersecurity Explained

What Is SOC-as-a-Service?

June 08, 2023

Security Operations Center-as-a-service (SOCaaS) provides continuous monitoring, risk mitigation, and incident response to bolster cybersecurity posture. 

Read Now
Cybersecurity Explained

MSP vs. MSSP: What's the Difference?

June 01, 2023

While MSPs provide IT support for an organization's systems, databases, and applications, MSSPs enhance cybersecurity posture with continuous monitoring and additional security offerings.

Read Now
In the News

[Press Release] Rosana Filingeri Recognized on CRN’s Women of the Channel Power 80 List

May 08, 2023

Cybersafe Solutions’ Rosana Filingeri has been named one of the most influential women in IT leadership in CRN’s Women of the Channel Power 80 List.

Read Now
Cybersecurity Explained

What Is an MSSP?

April 27, 2023

A managed security service provider (MSSP) offers continuous monitoring, risk assessments, incident response, and training to bolster cybersecurity posture.

Read Now
In the News

Cybersafe Solutions Named AT&T's 2023 Global Partner of the Year

March 06, 2023

Cybersafe Solutions has been named AT&T's 2023 Global Partner of the Year—a prestigious honor recognizing its impressive growth and innovations in 2022.

Read Now
Technical Expertise

Cybersecurity Trends 2023

February 13, 2023

To defend against evolving threats, organizations should ensure their cybersecurity posture is informed by industry trends, such as zero trust, password-less authentication, SOCaaS, and more.

Read Now
In the News

[Press Release] Cybersafe Solutions’ Rosana Filingeri Named a 2023 CRN Channel Chief

February 06, 2023

Cybersafe Solutions Vice President of Business Development Rosana Filingeri has been named a 2023 CRN Channel Chief, a distinguished honor recognizing top IT channel executives in the industry.

Read Now
Technical Expertise

Cybersecurity Best Practices

January 26, 2023

As remote work, ongoing warfare, and other societal stressors heighten cyber vulnerabilities and attacks, it is crucial to implement cybersecurity best practices such as maintaining password hygiene, zero trust, and cloud backups, among others.

Read Now
Technical Expertise

The Importance of Continuous Monitoring After a Cyberattack

December 19, 2022

The majority of breached businesses suffer subsequent cyberattacks, making SOCaaS, continuous cybersecurity monitoring, security awareness training, and proactivity top priorities.

Read Now
Technical Expertise

Expert Interview: MFA, Continuous Monitoring, And Cybersecurity Trends in 2022 With James Ewing

October 24, 2022

In light of an uptick in cyberattacks, we sat down with Cybersafe Security Sales Engineer James Ewing to discuss the prevalence of cybercrimes in periods of crisis and the importance of measures like multi-factor authentication and continuous monitoring. Disclaimer: Questions and answers have been edited for clarity.

Read Now
In the News Technical Expertise

What Can Your Company Learn From the Uber Hack?

September 29, 2022

Following a cyberattack on rideshare service Uber, Cybersafe Solutions Chief Information Security Officer Thomas Pioreck discusses lessons learned and expert tips on multi-factor authentication, password protection, and empowering employee incident response.

Read Now
In the News

[Press Release] Cybersafe Solutions Named to MSSP Alert’s Top 250 MSSPs List for 2022

September 26, 2022

Cybersafe Solutions has been named on MSSP Alert’s Top 250 MSSPs list for 2022, an impressive honor recognizing the leading managed security service providers (MSSPs) worldwide.

Read Now
Technical Expertise

The Importance of Multifactor Authentication

September 01, 2022

Multifactor authentication (MFA) involves a two-factor verification of your personal information, making it more challenging for hackers to infiltrate your account and steal sensitive data.

Read Now
Technical Expertise

Visibility Into Endpoint Activity: Endpoint Detection & Response

July 19, 2022

Endpoint Detection and Response (EDR) services continuously monitor desktops, laptops, and mobile devices for suspicious activity, preventing, detecting, and responding to threats before they manifest as attacks.

Read Now
Technical Expertise

Essential Tools for Cyber Underwriting

June 14, 2022

During the cyber underwriting process, insurers determine appropriate policy coverage by utilizing tools such as non-invasive scanning, continuous monitoring assessments, breach history reporting, compliance verification, benchmarking, and cyber risk quantification.

Read Now
In the News

[Press Release] Cybersafe Solutions Recognized on CRN's 2022 SP 500 List

June 06, 2022

Cybersafe Solutions has been recognized on CRN's 2022 SP 500 List.

Read Now
Technical Expertise

What Can Cyber Insurance Cover?

May 19, 2022

Cyber insurance is a supplemental security measure, helping reduce the damaging effects of a breach and covering claims such as data damage, extortion, and liability.

Read Now
Technical Expertise

Can Businesses Get Hit With Ransomware More Than Once?

May 10, 2022

Yes. If your business has already been the victim of a ransomware attack, the chances for a repeat attack are higher, often due to poor security, lack of continuous monitoring, or because the hacker never left.

Read Now
Technical Expertise

The Cyber Underwriting Process

April 26, 2022

The cyber underwriting process determines policy coverage and entails a comprehensive assessment by insurers of a company’s existing monitoring software, data management, security procedures, breach history, relative benchmark, and more.

Read Now
Technical Expertise

What Is Cyber Underwriting?

April 08, 2022

Cyber underwriting is the process by which insurance firms assess businesses’ risk exposures and the extent to which they are mitigated when coordinating policy coverage.

Read Now
In the News

[Press Release] Cybersafe Solutions Recognized on CRN’s 2022 MSP 500 List

February 22, 2022

Cybersafe Solutions has been recognized on CRN’s 2022 MSP 500 List in the Security 100 category.

Read Now
Technical Expertise

The Costs of Ransomware

January 27, 2022

Ransomware attacks cost governments, institutions, and companies billions annually, with total ramifications far exceeding financial losses—affecting reputation, productivity, and much more.

Read Now
Solutions & Services

Cybersafe Spotlight: Breach & Attack Simulation

December 23, 2021

Our Breach & Attack Simulation provides realistic testing for security control validation.

Read Now
Solutions & Services

Cybersafe Spotlight: Penetration Testing

December 16, 2021

Cybersafe’s penetration testing helps highlight vulnerabilities, attack vectors, and detection capabilities so that you can minimize risks.

Read Now
Solutions & Services

Cybersafe Spotlight: SOL EDR

December 09, 2021

SOL EDR is Cybersafe’s endpoint monitoring solution, providing visibility into your desktops, laptops, servers, mobile devices, and IoT devices.

Read Now
Solutions & Services

Threat Hunt: Compromise Assessment

December 02, 2021

Threat Hunt: Compromise Assessment by Cybersafe Solutions is a critical tool to assess your security posture, discover vulnerabilities, and identify suspicious behaviors.

Read Now
Solutions & Services

Cybersafe Spotlight: Risk Assessment & Mitigation

November 18, 2021

Cybersafe Solutions’ risk assessment and mitigation services assess multiple aspects of your cybersecurity program for a comprehensive review of potential risks.

Read Now
In the News

[Press Release] Cybersafe Solutions’ Rosana Filingeri Recognized as One of CRN’s 2021 Next-Gen Solution Provider Leaders

November 04, 2021

Rosana Filingeri of Cybersafe Solutions was named one of CRN’s Next-Gen Solution Provider Leaders for a second consecutive year.

Read Now
Solutions & Services

Cybersafe Spotlight: SOL Dark Web

October 28, 2021

SOL Dark Web searches the dark web for your personally identifiable information and alerts you of potential compromises so that you can act quickly.

Read Now
Solutions & Services

Cybersafe Spotlight: SOL Training

October 14, 2021

SOL Training turns your users into defense assets by familiarizing them with phishing and simulating an attack to test them.

Read Now
Solutions & Services

Cybersafe Spotlight: SOL SIEM

September 30, 2021

SOL SIEM is Cybersafe’s network and cloud continuous monitoring solution, providing managed detection, containment, and response for these critical systems.

Read Now
In the News

[Press Release] Cybersafe Solutions Named to MSSP Alert’s Top 250 MSSPs List for 2021

September 23, 2021

MSSP Alert has named Cybersafe Solutions to its Top 250 MSSPs List for 2021.

Read Now
Solutions & Services

Cybersafe Spotlight: SOL XDR

September 09, 2021

SOL XDR is Cybersafe Solution’s most comprehensive continuous monitoring solution, providing visibility into your endpoints, networks, and cloud.

Read Now
Technical Expertise

Expert Analysis With Keith Strassberg: What You Should Know About Cybersecurity Threats Affecting Microsoft 365

September 02, 2021

Cybersafe Solutions Chief Operating Officer Keith Strassberg explains common Microsoft 365 cybersecurity threats.

Read Now
For Business Leaders

The Essentials of Cybersecurity Compliance

August 26, 2021

Cybersecurity compliance guidelines are intended to ensure systems are secure. Common standards include HIPAA, CMMC, NIST Cybersecurity Framework, ISO 27001, GDPR, PCI DSS, 23 NYCRR 5003, and SOC 2.

Read Now
For Business Leaders

7 Critical Facility Maintenance Systems That Face Cybersecurity Risks

August 11, 2021

Those in the facility maintenance industry should be aware of internet-connected systems at risk of cybersecurity incidents. Potential targets may include security, lighting, HVAC, fire protection, elevator and escalator, industrial control, building management, and building automation systems.

Read Now
In the News

[Press Release] A New Era in Cybersecurity Has Dawned

August 04, 2021

Cybersafe Solutions has relaunched its website and rebranded some of its most popular solutions.

Read Now
For Business Leaders

Cybersecurity For Manufacturing: Protecting the Modern Factory

July 28, 2021

Manufacturing facilities are susceptible to attacks by financially motivated hackers, competitors, and nation-states due to their focus on safety over security, the use of complex systems, disconnected IT and OT, and the false notion that small manufacturers face less risk, thereby necessitating cybersecurity for manufacturing.

Read Now
For Business Leaders

Why Cybersecurity Must Be a Priority in the Education Sector

July 14, 2021

Cyberattacks are common within the education sector due to increased remote learning, unsecured devices, and budget constraints, so administrators must take steps to fortify their cybersecurity systems.

Read Now
For Business Leaders

The Role of Cybersecurity in the Legal Field

June 30, 2021

To protect clients, strong cybersecurity in the legal field is critical. ABA rules and government legislation require specific safeguards, but hackers have strong motives to target law firms and other related businesses in the industry.

Read Now
For Business Leaders

The Role of Cybersecurity in the Healthcare Industry

June 16, 2021

The healthcare industry is a prime target for hackers, especially since the outbreak of the COVID-19 pandemic. Strong security measures are essential to meet HIPAA requirements and protect patients’ sensitive data, and overall safety.

Read Now
For Business Leaders

Cybersecurity Risks in the Financial Services Industry

June 02, 2021

The financial services sector is subject to unique cybersecurity risks that necessitate careful protections. Regulatory noncompliance, hacks, and insider attacks can be costly, warranting prevention, detection, and response protocols.

Read Now
In the News

[Press Release] Cybersafe’s Rosana Filingeri Interviewed by TBI

May 26, 2021

TBI recently featured Rosana Filingeri, Cybersafe Solutions’ Vice President of Business Development, in an interview for its Women of the Channel series.

Read Now
In the News

[Press Release] Cybersafe-Sponsored Racer Named a Roadracing World Young Gun

May 19, 2021

Joseph LiMandri Jr., sponsored by Cybersafe Solutions, was named a Young Gun by Roadracing World. This recognition honors promising young racers.

Read Now
In the News

[Press Release] Rosana Filingeri of Cybersafe Solutions Featured on CRN’s 2021 Women of the Channel List

May 10, 2021

Rosana Filingeri, Vice President of Business Development at Cybersafe Solutions, is featured on CRN’s 2021 Women of the Channel List, which recognizes female leaders in IT.

Read Now
Technical Expertise

Why Companies Should Be Concerned With Third-Party Risk

April 28, 2021

Businesses should be concerned with third-party cybersecurity risk because it can arise from anywhere, worsen with emerging trends, and cause irreparable harm.

Read Now
In the News

[Press Release] Cybersafe Solutions Sponsors NYIT Hackathon

April 21, 2021

Cybersafe Solutions is sponsoring NYIT’s eighth hackathon challenge, which is set to take place on April 30.

Read Now
In the News

What Is Cybersecurity Maturity Model Certification (CMMC)?

March 31, 2021

Cybersecurity Maturity Model Certification is a standards framework established by the U.S. Department of Defense that assesses a contractor’s capabilities to handle sensitive unclassified information securely. This certification will be required for all DoD contracts beginning in 2025, so organizations should implement continuous security monitoring now to prepare.

Read Now
In the News

[Press Release] Cybersafe Solutions Named to CRN’s 2021 Security 100

March 24, 2021

Cybersafe Solutions was named to CRN’s 2021 Security 100 list, which recognizes innovative IT channel security vendors.

Read Now
Technical Expertise

The Effects of Automated Ransomware & How to Respond

March 17, 2021

Automated ransomware attacks can be quick and efficient, necessitating continuous security monitoring with rapid detection, response, and containment capabilities.

Read Now
In the News

[Press Release] Allen Jenkins of SyCom Technologies Receives Cybersafe’s 2020 Diamond Award

March 11, 2021

Cybersafe Solutions recognizes the exceptional work of SyCom Technologies and Chief Information Security Officer & Vice President of Cybersecurity Consulting Allen Jenkins with Diamond Awards.

Read Now
In the News

[Press Release] Cybersafe Solutions Honored in New World Report's 2020 Software and Technology Awards

February 25, 2021

Cybersafe Solutions has been acknowledged in the 2020 Software and Technology Awards by New World Report.

Read Now
In the News

[Press Release] Cybersafe Solutions Has Moved

February 18, 2021

Cybersafe Solutions has relocated to Melville.

Read Now
In the News

[Press Release] Cybersafe Solutions’ Keith Strassberg Named One of Long Island’s Top Techies

January 21, 2021

LISTnet and the Long Island Press have named Cybersafe Solutions’ Keith Strassberg to their list of the 2020 Long Island Top Techies.

Read Now
Technical Expertise

What Is Cyber Insurance & What Does It Cover?

January 04, 2021

Cyber insurance is not a replacement for continuous security monitoring, but it adds an extra layer of protection from financial risks associated with a cybersecurity incident, including costs resulting from repairs, business interruption, and theft.

Read Now
For Business Leaders

How to Talk About Cybersecurity With Your Clients

December 21, 2020

Planning ahead, meeting with the right decision-makers, presenting facts and figures, discussing compliance, suggesting a risk assessment, focusing on key talking points, and highlighting the importance of continuous monitoring can help you broach the topic of cybersecurity with your clients.

Read Now
For Business Leaders

Why Agents and Consultants Should Discuss Cybersecurity With Their Clients

December 07, 2020

Agents and consultants should discuss cybersecurity and continuous monitoring with their clients to protect the clients’ interests, keep them aware of potential cybersecurity risks, demonstrate expertise, provide value, and more.

Read Now
In the News

[Press Release] Cybersafe Solutions’ Rosana Filingeri Named One of CRN’s 2020 Next-Gen Solution Provider Leaders

December 04, 2020

CRN®, a brand of The Channel Company, has recognized Rosana Filingeri, Vice President of Business Development, as one of its Next-Gen Solution Provider Leaders for 2020.

Read Now
Technical Expertise

What Are the Different Types of Cybersecurity Assessments?

November 10, 2020

Risk assessments, penetration tests, compromise assessments, and breach and attack simulations evaluate a company’s strengths and weaknesses regarding preparedness in thwarting an attack and protecting sensitive data.

Read Now
In the News

[Press Release] Cybersafe Solutions Partnering With Technology Brokerage Firm TBI

November 03, 2020

Read the full press release announcing Cybersafe's partnership with TBI.

Read Now
Technical Expertise

Is It Legal to Pay Ransom to Cybercriminals?

October 26, 2020

If the threat actor is affiliated with sanctioned nation-states, networks or individuals, paying ransom demands could violate several U.S. laws and regulations, and make you civilly liable.

Read Now
Technical Expertise

What's the Difference Between a Vulnerability Assessment & Penetration Test?

October 21, 2020

Vulnerability assessments analyze a company’s information system to identify and remediate potential security gaps, while penetration tests simulate cyberattacks to pinpoint exposures.

Read Now
Technical Expertise

The Truth About Cyber Protection: Why Prevention Alone Fails

October 09, 2020

Cyberattacks are inevitable. Cybersecurity processes that emphasizes detection and response can mitigate damages and maintain operations in the event of a breach.

Read Now
In the News

Do Your Part This National Cybersecurity Awareness Month!

October 01, 2020

The theme of National Cybersecurity Awareness Month this October is ‘Do Your Part. #BeCyberSmart,’ and focuses on steps everyone can take to improve personal accountability, such as using strong passwords, using MFA, and regularly updating software.

Read Now
Technical Expertise

Threat Hunting: What It Is & Why Your Business Needs It

September 24, 2020

Threat hunting is the proactive search of your networks and systems based on hypotheses to detect threats and empower teams to mitigate them.

Read Now
In the News

[Press Release] Cybersafe Solutions Named to MSSP Alert’s Top 250 MSSPs List for 2020

September 21, 2020

Read the full press release announcing the inclusion of Cybersafe on MSSP Alert’s Top 250 MSSPs List for 2020.

Read Now
In the News

[Press Release] Cybersafe Solutions Ranks No. 25 on the 2020 CRN® Fast Growth 150 List

August 03, 2020

Read the full press release announcing the inclusion of Cybersafe on the CRN® Fast Growth 150 List.

Read Now
In the News

[Press Release] CRN® Recognizes Cybersafe Solutions on the 2020 Emerging Vendor List

July 24, 2020

Read the full press release announcing the inclusion of Cybersafe on the CRN® list of Emerging Vendors for 2020.

Read Now
Technical Expertise

DDQs: What They Are and Why They Matter

July 16, 2020

A due diligence questionnaire (DDQ) assesses a company’s cybersecurity protocols to identify risks and thwart costly breaches.

Read Now
Technical Expertise

Top Cybersecurity Tools for Business

July 02, 2020

Businesses of all sizes and types are under increasing threat of cyber attack. Leading tools to mitigate these risks include firewalls, multi-factor authentication, and, most importantly, continuous network and endpoint security monitoring.

Read Now
Technical Expertise

Penetration Testing: Why Your Business Should Be Doing It

April 30, 2020

Penetration testing improves security, identifies vulnerabilities, facilitates regulatory compliance, and minimizes risks of breaches.

Read Now
In the News

[Press Release] Cybersafe Launches Threat 360

April 24, 2020

Read the full press release announcing the launch of Cybersafe's Threat 360 solution.

Read Now
Technical Expertise

Why Businesses Need To Take Cybersecurity More Seriously During The Coronavirus Pandemic

March 25, 2020

With hackers taking advantage of the coronavirus pandemic, organizations need to boost their cybersecurity protocols.

Read Now
Technical Expertise

The Key Components Of Cyber Incident Response

March 19, 2020

A robust cyber incident response plan involves preparation followed by identifying, containing, and analyzing threats when they occur.

Read Now
For Business Leaders

6 Cybersecurity Trends We're Monitoring In 2020

February 28, 2020

Six cybersecurity trends that Cybersafe is monitoring in 2020 include the rise in the 5G network, threats to clouds, the growing sophistication of deepfake attacks, and more.

Read Now
In the News

[Press Release] Cybersafe Solutions Expands Its Sales Operations into NYC

February 14, 2020

Read the full press release announcing Cybersafe's expansion into New York City.

Read Now
In the News

[Press Release] Cybersafe Solutions to Showcase "Cybersafe Threat 360" at MSP EXPO

February 04, 2020

Read the full press release announcing Cybersafe's attendance of the 2020 MSP EXPO.

Read Now
Technical Expertise

The Role of Cybersecurity Firms in GDPR Compliance

January 07, 2019

Cybersecurity firms provide critical services and expertise in helping companies remain compliant with the EU’s General Data Protection Regulation, such as safeguarding consumers’ personal data, mitigating threats, improving visibility and remediation, and providing continuous monitoring.

Read Now