Insights
Articles & Resources
- Browse by category:
- All
- Cybersecurity Explained
- For Business Leaders
- In the News
- Solutions & Services
- Technical Expertise
Article: Cybersafe Solutions Security Advisory Bulletin Sept 22, 2023
Security Advisory for Trend Micro Apex One, Info-Stealer Malware 'MetaStealer' Targeting macOS Business Users, Microsoft Azure Data Leak using SAS Tokens
Read Now : Article: Cybersafe Solutions Security Advisory Bulletin Sept 22, 2023Article: Cybersafe Solutions Security Advisory Bulletin Sept 15, 2023
Security Advisory for Cisco ASA and FTD, Apple, Microsoft Patch Tuesday, Adobe, Chrome, Mozilla, and Notepad++ products for the week of 9/15/23.
Read Now : Article: Cybersafe Solutions Security Advisory Bulletin Sept 15, 2023Article: MDR Vs. XDR: Determining the Right Solution for Your Business
MDR and XDR are often mischaracterized as competing solutions. In reality, XDR is a useful solution that can be utilized by MDR providers. Deciding what’s best for you comes down to whether you plan to manage cybersecurity in-house or outsource to a dedicated MDR provider.
Read Now : Article: MDR Vs. XDR: Determining the Right Solution for Your BusinessArticle: Cybersecurity Trends 2023
To defend against evolving threats, organizations should ensure their cybersecurity posture is informed by industry trends, such as zero trust, password-less authentication, SOCaaS, and more.
Read Now : Article: Cybersecurity Trends 2023Article: Cybersecurity Best Practices
As remote work, ongoing warfare, and other societal stressors heighten cyber vulnerabilities and attacks, it is crucial to implement cybersecurity best practices such as maintaining password hygiene, zero trust, and cloud backups, among others.
Read Now : Article: Cybersecurity Best PracticesArticle: The Importance of Continuous Monitoring After a Cyberattack
The majority of breached businesses suffer subsequent cyberattacks, making SOCaaS, continuous cybersecurity monitoring, security awareness training, and proactivity top priorities.
Read Now : Article: The Importance of Continuous Monitoring After a CyberattackArticle: Expert Interview: MFA, Continuous Monitoring, And Cybersecurity Trends in 2022 With James Ewing
In light of an uptick in cyberattacks, we sat down with Cybersafe Security Sales Engineer James Ewing to discuss the prevalence of cybercrimes in periods of crisis and the importance of measures like multi-factor authentication and continuous monitoring. Disclaimer: Questions and answers have been edited for clarity.
Read Now : Article: Expert Interview: MFA, Continuous Monitoring, And Cybersecurity Trends in 2022 With James EwingArticle: What Can Your Company Learn From the Uber Hack?
Following a cyberattack on rideshare service Uber, Cybersafe Solutions Chief Information Security Officer Thomas Pioreck discusses lessons learned and expert tips on multi-factor authentication, password protection, and empowering employee incident response.
Read Now : Article: What Can Your Company Learn From the Uber Hack?Article: The Importance of Multifactor Authentication
Multifactor authentication (MFA) involves a two-factor verification of your personal information, making it more challenging for hackers to infiltrate your account and steal sensitive data.
Read Now : Article: The Importance of Multifactor Authentication