Insights

Articles & Resources

Subscribe to Receive Updates

Connect

Technical Expertise

Expert Interview: MFA, Continuous Monitoring, And Cybersecurity Trends in 2022 With James Ewing

October 24, 2022

In light of an uptick in cyberattacks, we sat down with Cybersafe Security Sales Engineer James Ewing to discuss the prevalence of cybercrimes in periods of crisis and the importance of measures like multi-factor authentication and continuous monitoring. Disclaimer: Questions and answers have been edited for clarity.

Read Now
In the News Technical Expertise

What Can Your Company Learn From the Uber Hack?

September 29, 2022

Following a cyberattack on rideshare service Uber, Cybersafe Solutions Chief Information Security Officer Thomas Pioreck discusses lessons learned and expert tips on multi-factor authentication, password protection, and empowering employee incident response.

Read Now
In the News

[Press Release] Cybersafe Solutions Named to MSSP Alert’s Top 250 MSSPs List for 2022

September 26, 2022

Cybersafe Solutions has been named on MSSP Alert’s Top 250 MSSPs list for 2022, an impressive honor recognizing the leading managed security service providers (MSSPs) worldwide.

Read Now
Technical Expertise

The Importance of Multifactor Authentication

September 01, 2022

Multifactor authentication (MFA) involves a two-factor verification of your personal information, making it more challenging for hackers to infiltrate your account and steal sensitive data.

Read Now
Technical Expertise

Visibility Into Endpoint Activity: Endpoint Detection & Response

July 19, 2022

Endpoint Detection and Response (EDR) services continuously monitor desktops, laptops, and mobile devices for suspicious activity, preventing, detecting, and responding to threats before they manifest as attacks.

Read Now
Technical Expertise

What Is Extended Detection & Response (XDR)?

June 28, 2022

Extended detection and response (XDR) services provide multifaceted monitoring of networks, endpoints, and cloud environments 24/7/365 to seamlessly detect, contain, and mitigate cyber threats.

Read Now
Technical Expertise

Essential Tools for Cyber Underwriting

June 14, 2022

During the cyber underwriting process, insurers determine appropriate policy coverage by utilizing tools such as non-invasive scanning, continuous monitoring assessments, breach history reporting, compliance verification, benchmarking, and cyber risk quantification.

Read Now
In the News

[Press Release] Cybersafe Solutions Recognized on CRN's 2022 SP 500 List

June 06, 2022

Cybersafe Solutions has been recognized on CRN's 2022 SP 500 List.

Read Now
Technical Expertise

What Can Cyber Insurance Cover?

May 19, 2022

Cyber insurance is a supplemental security measure, helping reduce the damaging effects of a breach and covering claims such as data damage, extortion, and liability.

Read Now
Technical Expertise

Can Businesses Get Hit With Ransomware More Than Once?

May 10, 2022

Yes. If your business has already been the victim of a ransomware attack, the chances for a repeat attack are higher, often due to poor security, lack of continuous monitoring, or because the hacker never left.

Read Now
Technical Expertise

The Cyber Underwriting Process

April 26, 2022

The cyber underwriting process determines policy coverage and entails a comprehensive assessment by insurers of a company’s existing monitoring software, data management, security procedures, breach history, relative benchmark, and more.

Read Now
Technical Expertise

What Is Cyber Underwriting?

April 08, 2022

Cyber underwriting is the process by which insurance firms assess businesses’ risk exposures and the extent to which they are mitigated when coordinating policy coverage.

Read Now
In the News

[Press Release] Cybersafe Solutions Recognized on CRN’s 2022 MSP 500 List

February 22, 2022

Cybersafe Solutions has been recognized on CRN’s 2022 MSP 500 List in the Security 100 category.

Read Now
Technical Expertise

The Costs of Ransomware

January 27, 2022

Ransomware attacks cost governments, institutions, and companies billions annually, with total ramifications far exceeding financial losses—affecting reputation, productivity, and much more.

Read Now
Solutions & Services

Cybersafe Spotlight: Breach & Attack Simulation

December 23, 2021

Our Breach & Attack Simulation provides realistic testing for security control validation.

Read Now
Solutions & Services

Cybersafe Spotlight: Penetration Testing

December 16, 2021

Cybersafe’s penetration testing helps highlight vulnerabilities, attack vectors, and detection capabilities so that you can minimize risks.

Read Now
Solutions & Services

Cybersafe Spotlight: SOL EDR

December 09, 2021

SOL EDR is Cybersafe’s endpoint monitoring solution, providing visibility into your desktops, laptops, servers, mobile devices, and IoT devices.

Read Now
Solutions & Services

Threat Hunt: Compromise Assessment

December 02, 2021

Threat Hunt: Compromise Assessment by Cybersafe Solutions is a critical tool to assess your security posture, discover vulnerabilities, and identify suspicious behaviors.

Read Now
Solutions & Services

Cybersafe Spotlight: Risk Assessment & Mitigation

November 18, 2021

Cybersafe Solutions’ risk assessment and mitigation services assess multiple aspects of your cybersecurity program for a comprehensive review of potential risks.

Read Now
In the News

[Press Release] Cybersafe Solutions’ Rosana Filingeri Recognized as One of CRN’s 2021 Next-Gen Solution Provider Leaders

November 04, 2021

Rosana Filingeri of Cybersafe Solutions was named one of CRN’s Next-Gen Solution Provider Leaders for a second consecutive year.

Read Now
Solutions & Services

Cybersafe Spotlight: SOL Dark Web

October 28, 2021

SOL Dark Web searches the dark web for your personally identifiable information and alerts you of potential compromises so that you can act quickly.

Read Now
Solutions & Services

Cybersafe Spotlight: SOL Training

October 14, 2021

SOL Training turns your users into defense assets by familiarizing them with phishing and simulating an attack to test them.

Read Now
Solutions & Services

Cybersafe Spotlight: SOL SIEM

September 30, 2021

SOL SIEM is Cybersafe’s network and cloud continuous monitoring solution, providing managed detection, containment, and response for these critical systems.

Read Now
In the News

[Press Release] Cybersafe Solutions Named to MSSP Alert’s Top 250 MSSPs List for 2021

September 23, 2021

MSSP Alert has named Cybersafe Solutions to its Top 250 MSSPs List for 2021.

Read Now
Solutions & Services

Cybersafe Spotlight: SOL XDR

September 09, 2021

SOL XDR is Cybersafe Solution’s most comprehensive continuous monitoring solution, providing visibility into your endpoints, networks, and cloud.

Read Now
Technical Expertise

Expert Analysis With Keith Strassberg: What You Should Know About Cybersecurity Threats Affecting Microsoft 365

September 02, 2021

Cybersafe Solutions Chief Operating Officer Keith Strassberg explains common Microsoft 365 cybersecurity threats.

Read Now
For Professionals

The Essentials of Cybersecurity Compliance

August 26, 2021

Cybersecurity compliance guidelines are intended to ensure systems are secure. Common standards include HIPAA, CMMC, NIST Cybersecurity Framework, ISO 27001, GDPR, PCI DSS, 23 NYCRR 5003, and SOC 2.

Read Now
For Professionals

7 Critical Facility Maintenance Systems That Face Cybersecurity Risks

August 11, 2021

Those in the facility maintenance industry should be aware of internet-connected systems at risk of cybersecurity incidents. Potential targets may include security, lighting, HVAC, fire protection, elevator and escalator, industrial control, building management, and building automation systems.

Read Now
In the News

[Press Release] A New Era in Cybersecurity Has Dawned

August 04, 2021

Cybersafe Solutions has relaunched its website and rebranded some of its most popular solutions.

Read Now
For Professionals

Cybersecurity For Manufacturing: Protecting the Modern Factory

July 28, 2021

Manufacturing facilities are susceptible to attacks by financially motivated hackers, competitors, and nation-states due to their focus on safety over security, the use of complex systems, disconnected IT and OT, and the false notion that small manufacturers face less risk, thereby necessitating cybersecurity for manufacturing.

Read Now
For Professionals

Why Cybersecurity Must Be a Priority in the Education Sector

July 14, 2021

Cyberattacks are common within the education sector due to increased remote learning, unsecured devices, and budget constraints, so administrators must take steps to fortify their cybersecurity systems.

Read Now
For Professionals

The Role of Cybersecurity in the Legal Field

June 30, 2021

To protect clients, strong cybersecurity in the legal field is critical. ABA rules and government legislation require specific safeguards, but hackers have strong motives to target law firms and other related businesses in the industry.

Read Now
For Professionals

The Role of Cybersecurity in the Healthcare Industry

June 16, 2021

The healthcare industry is a prime target for hackers, especially since the outbreak of the COVID-19 pandemic. Strong security measures are essential to meet HIPAA requirements and protect patients’ sensitive data, and overall safety.

Read Now
For Professionals

Cybersecurity Risks in the Financial Services Industry

June 02, 2021

The financial services sector is subject to unique cybersecurity risks that necessitate careful protections. Regulatory noncompliance, hacks, and insider attacks can be costly, warranting prevention, detection, and response protocols.

Read Now
In the News

[Press Release] Cybersafe’s Rosana Filingeri Interviewed by TBI

May 26, 2021

TBI recently featured Rosana Filingeri, Cybersafe Solutions’ Vice President of Business Development, in an interview for its Women of the Channel series.

Read Now
In the News

[Press Release] Cybersafe-Sponsored Racer Named a Roadracing World Young Gun

May 19, 2021

Joseph LiMandri Jr., sponsored by Cybersafe Solutions, was named a Young Gun by Roadracing World. This recognition honors promising young racers.

Read Now
In the News

[Press Release] Rosana Filingeri of Cybersafe Solutions Featured on CRN’s 2021 Women of the Channel List

May 10, 2021

Rosana Filingeri, Vice President of Business Development at Cybersafe Solutions, is featured on CRN’s 2021 Women of the Channel List, which recognizes female leaders in IT.

Read Now
In the News

[Press Release] Cybersafe’s Rosana Filingeri Featured in CRN’s “Debunking The 10 Top Myths About Millennials”

May 05, 2021

As one of the 2020 CRN Next-Gen Solution Provider Leaders, Vice President of Business Development Rosana Filingeri was recently featured in CRN’s “Debunking The 10 Top Myths About Millennials"

Read Now
Technical Expertise

Why Companies Should Be Concerned With Third-Party Risk

April 28, 2021

Businesses should be concerned with third-party cybersecurity risk because it can arise from anywhere, worsen with emerging trends, and cause irreparable harm.

Read Now
In the News

[Press Release] Cybersafe Solutions Sponsors NYIT Hackathon

April 21, 2021

Cybersafe Solutions is sponsoring NYIT’s eighth hackathon challenge, which is set to take place on April 30.

Read Now
In the News

What Is Cybersecurity Maturity Model Certification (CMMC)?

March 31, 2021

Cybersecurity Maturity Model Certification is a standards framework established by the U.S. Department of Defense that assesses a contractor’s capabilities to handle sensitive unclassified information securely. This certification will be required for all DoD contracts beginning in 2025, so organizations should implement continuous security monitoring now to prepare.

Read Now
In the News

[Press Release] Cybersafe Solutions Named to CRN’s 2021 Security 100

March 24, 2021

Cybersafe Solutions was named to CRN’s 2021 Security 100 list, which recognizes innovative IT channel security vendors.

Read Now
Technical Expertise

The Effects of Automated Ransomware & How to Respond

March 17, 2021

Automated ransomware attacks can be quick and efficient, necessitating continuous security monitoring with rapid detection, response, and containment capabilities.

Read Now
In the News

[Press Release] Allen Jenkins of SyCom Technologies Receives Cybersafe’s 2020 Diamond Award

March 11, 2021

Cybersafe Solutions recognizes the exceptional work of SyCom Technologies and Chief Information Security Officer & Vice President of Cybersecurity Consulting Allen Jenkins with Diamond Awards.

Read Now
In the News

[Press Release] Cybersafe Solutions Honored in New World Report's 2020 Software and Technology Awards

February 25, 2021

Cybersafe Solutions has been acknowledged in the 2020 Software and Technology Awards by New World Report.

Read Now
In the News

[Press Release] Cybersafe Solutions Has Moved

February 18, 2021

Cybersafe Solutions has relocated to Melville.

Read Now
In the News

[Press Release] Cybersafe Solutions’ Keith Strassberg Named One of Long Island’s Top Techies

January 21, 2021

LISTnet and the Long Island Press have named Cybersafe Solutions’ Keith Strassberg to their list of the 2020 Long Island Top Techies.

Read Now
Technical Expertise

Managed Detection & Response, Simplified

January 15, 2021

Managed detection and response (MDR) is a comprehensive, outsourced security platform providing threat hunting, identification, and remediation services.

Read Now
Technical Expertise

What Is Cyber Insurance & What Does It Cover?

January 04, 2021

Cyber insurance is not a replacement for continuous security monitoring, but it adds an extra layer of protection from financial risks associated with a cybersecurity incident, including costs resulting from repairs, business interruption, and theft.

Read Now
For Professionals

How to Talk About Cybersecurity With Your Clients

December 21, 2020

Planning ahead, meeting with the right decision-makers, presenting facts and figures, discussing compliance, suggesting a risk assessment, focusing on key talking points, and highlighting the importance of continuous monitoring can help you broach the topic of cybersecurity with your clients.

Read Now
For Professionals

Why Agents and Consultants Should Discuss Cybersecurity With Their Clients

December 07, 2020

Agents and consultants should discuss cybersecurity and continuous monitoring with their clients to protect the clients’ interests, keep them aware of potential cybersecurity risks, demonstrate expertise, provide value, and more.

Read Now
In the News

[Press Release] Cybersafe Solutions’ Rosana Filingeri Named One of CRN’s 2020 Next-Gen Solution Provider Leaders

December 04, 2020

CRN®, a brand of The Channel Company, has recognized Rosana Filingeri, Vice President of Business Development, as one of its Next-Gen Solution Provider Leaders for 2020.

Read Now
Technical Expertise

What Are the Different Types of Cybersecurity Assessments?

November 10, 2020

Risk assessments, penetration tests, compromise assessments, and breach and attack simulations evaluate a company’s strengths and weaknesses regarding preparedness in thwarting an attack and protecting sensitive data.

Read Now
In the News

[Press Release] Cybersafe Solutions Partnering With Technology Brokerage Firm TBI

November 03, 2020

Read the full press release announcing Cybersafe's partnership with TBI.

Read Now
Technical Expertise

Is It Legal to Pay Ransom to Cybercriminals?

October 26, 2020

If the threat actor is affiliated with sanctioned nation-states, networks or individuals, paying ransom demands could violate several U.S. laws and regulations, and make you civilly liable.

Read Now
Technical Expertise

What's the Difference Between a Vulnerability Assessment & Penetration Test?

October 21, 2020

Vulnerability assessments analyze a company’s information system to identify and remediate potential security gaps, while penetration tests simulate cyberattacks to pinpoint exposures.

Read Now
Technical Expertise

The Truth About Cyber Protection: Why Prevention Alone Fails

October 09, 2020

Cyberattacks are inevitable. Cybersecurity processes that emphasizes detection and response can mitigate damages and maintain operations in the event of a breach.

Read Now
In the News

Do Your Part This National Cybersecurity Awareness Month!

October 01, 2020

The theme of National Cybersecurity Awareness Month this October is ‘Do Your Part. #BeCyberSmart,’ and focuses on steps everyone can take to improve personal accountability, such as using strong passwords, using MFA, and regularly updating software.

Read Now
Technical Expertise

Threat Hunting: What It Is & Why Your Business Needs It

September 24, 2020

Threat hunting is the proactive search of your networks and systems based on hypotheses to detect threats and empower teams to mitigate them.

Read Now
In the News

[Press Release] Cybersafe Solutions Named to MSSP Alert’s Top 250 MSSPs List for 2020

September 21, 2020

Read the full press release announcing the inclusion of Cybersafe on MSSP Alert’s Top 250 MSSPs List for 2020.

Read Now
In the News

TBI's BIG Event: Domenick Gandolfo, Cybersafe Co-Founder & Chief Security Strategist, to Serve as Panelist

August 12, 2020

Cybersafe Co-Founder and Chief Security Strategist Domenick Gandolfo will participate in a panel discussion entitled 'Small Business, Big Risk – SMB Security Strategies' as part of TBI's BIG Event.

Read Now
In the News

[Press Release] Cybersafe Solutions Ranks No. 25 on the 2020 CRN® Fast Growth 150 List

August 03, 2020

Read the full press release announcing the inclusion of Cybersafe on the CRN® Fast Growth 150 List.

Read Now
In the News

[Press Release] CRN® Recognizes Cybersafe Solutions on the 2020 Emerging Vendor List

July 24, 2020

Read the full press release announcing the inclusion of Cybersafe on the CRN® list of Emerging Vendors for 2020.

Read Now
Technical Expertise

DDQs: What They Are and Why They Matter

July 16, 2020

A due diligence questionnaire (DDQ) assesses a company’s cybersecurity protocols to identify risks and thwart costly breaches.

Read Now
Technical Expertise

Top Cybersecurity Tools for Business

July 02, 2020

Businesses of all sizes and types are under increasing threat of cyber attack. Leading tools to mitigate these risks include firewalls, multi-factor authentication, and, most importantly, continuous network and endpoint security monitoring.

Read Now
Technical Expertise

Penetration Testing: Why Your Business Should Be Doing It

April 30, 2020

Penetration testing improves security, identifies vulnerabilities, facilitates regulatory compliance, and minimizes risks of breaches.

Read Now
In the News

[Press Release] Cybersafe Launches Threat 360

April 24, 2020

Read the full press release announcing the launch of Cybersafe's Threat 360 solution.

Read Now
Technical Expertise

Why Businesses Need To Take Cybersecurity More Seriously During The Coronavirus Pandemic

March 25, 2020

With hackers taking advantage of the coronavirus pandemic, organizations need to boost their cybersecurity protocols.

Read Now
Technical Expertise

The Key Components Of Cyber Incident Response

March 19, 2020

A robust cyber incident response plan involves preparation followed by identifying, containing, and analyzing threats when they occur.

Read Now
For Professionals

6 Cybersecurity Trends We're Monitoring In 2020

February 28, 2020

Six cybersecurity trends that Cybersafe is monitoring in 2020 include the rise in the 5G network, threats to clouds, the growing sophistication of deepfake attacks, and more.

Read Now
In the News

[Press Release] Cybersafe Solutions Expands Its Sales Operations into NYC

February 14, 2020

Read the full press release announcing Cybersafe's expansion into New York City.

Read Now
In the News

[Press Release] Cybersafe Solutions to Showcase "Cybersafe Threat 360" at MSP EXPO

February 04, 2020

Read the full press release announcing Cybersafe's attendance of the 2020 MSP EXPO.

Read Now
Technical Expertise

The Role of Cybersecurity Firms in GDPR Compliance

January 07, 2019

Cybersecurity firms provide critical services and expertise in helping companies remain compliant with the EU’s General Data Protection Regulation, such as safeguarding consumers’ personal data, mitigating threats, improving visibility and remediation, and providing continuous monitoring.

Read Now