Are Macs Free From Cyber Risks?

By Tom McDonald | Jun 13, 2022 8:12:28 AM

We see so many clients who don’t realize they need more robust cybersecurity because Macs are notoriously secure.

Read More >

3 Elements of Managed Detection and Response Services in New Haven

By Derek Marin | Dec 17, 2020 12:51:00 PM

With the threat landscape constantly evolving, identifying the best cybersecurity service for your organization can be challenging. A lot of organizations turn to outsourced cybersecurity services such as Managed Detection and Response (MDR) as a way to enhance security layers in a cost-efficient way.

We’ve covered why every SMB should consider Managed Detection and Response. In this blog, you’ll learn the core elements of an MDR service so you can fully understand what the service entails and are able to compare providers knowing the three fundamental areas of the service.

Read More >

Selecting a Managed Detection and Response Service

By Derek Marin | Mar 12, 2020 8:45:00 AM

In the era of digital transformation, many organizations find it a never-ending struggle to defend against rampant cybercrime. Preventative security is no match for today’s threat actors, yet the advanced cybersecurity capabilities that organizations need are beyond the level of maturity that small-to-midsize enterprises (SMEs) possess.

At the same time, the expanding attack surface makes the IT environment increasingly vulnerable. Identifying and managing vulnerabilities has become exponentially more complex with more devices joining the corporate network, a mobile workforce connecting to the network from anywhere, and applications moving to the cloud.

Given the limited in-house resources, the cybersecurity skills gap, and the rapidly growing number and sophistication of threats, it doesn’t surprise anyone that security teams can’t keep up.

In this kind of reality, a data breach or network outage is all but inevitable. And the result is not only loss of productivity and revenue but also potential liability, regulatory noncompliance, and reputational damage. The ripple effects of these consequences can last for years.

Organizations are starting to recognize the inherent challenges that come with the lack of advanced technology and professional experts on staff. The question then becomes: What is the answer to the dilemma they face?

Read More >

Why every SMB needs Managed Detection and Response (MDR)

By Derek Marin | Mar 4, 2020 7:15:00 AM

In this article you’ll learn the basics about a type of cybersecurity strategy that hackers despise and that has grown by 200% in just the last 2 years.

Read More >

The Makings of Cybersecurity Culture

By Derek Marin | Feb 27, 2020 10:32:40 AM

Organizations that have a strong cybersecurity posture are not only leveraging technology but also investing heavily in changing behavior — moving away from fear-based tactics to those of healthy paranoia, where communication and repetition work in favor of building cybersecurity habits. 

Read More >

Four Pillars of Building a Cybersecurity Culture

By Derek Marin | Feb 5, 2020 8:15:00 AM

If someone asked you, “what’s it like to work at [your company]?”, what would you reply? I suppose it depends on your role, how long you’ve worked there and the impression you want to relay, but it’s safe to assume that some aspect of your answer would include elements of culture.

“Culture” can seem like a fuzzy concept, but it’s definition does help pin to unpack it.

“Culture is the total way of life of particular groups of people. It includes everything that a group of people thinks, says, does and makes — its systems, attitudes and feelings. Culture is learned and transmitted from generation to generation.”

In this post we’re talking about an important subset of corporate culture; we’re analyzing and providing tips on how to shape “attitudes” and “behaviors” towards cybersecurity.

Read More >

The Business Impact of  Cybersecurity Culture (Infographic)

By Derek Marin | Jan 29, 2020 7:45:00 AM

We know that in today’s digital workplace, flexibility is essential to retain our best employees, but this flexibility comes at a cost. Employees have more access to customer data and proprietary information from a variety of applications and devices that can also be  entry points for malicious attacks. What are you doing to protect against these internal threats?

Read More >

What is Spear Phishing?

By Derek Marin | Jan 22, 2020 9:36:15 AM

 

Read More >

What are the most common misunderstandings about vulnerability assessments?

By Derek Marin | Dec 4, 2019 9:23:51 AM

Let's say you were in line at a deli and you overheard someone ask "hey, what the heck is a vulnerability assessment anyway?"

Would you feel an urge to chime in or strain to hear the reply? 

Okay, if it were me, I'd probably be more concerned about which sandwich to order but the point is that answers to that question vary widely.

Read More >

In The Trenches of a Real Security Breach

By Derek Marin | Aug 13, 2019 8:57:40 AM

Some IT providers talk about ransomware but they’ve never been to war in a real case.

In this interview with Tom, he shares an example of a real situation a client was under, what happened during that stressful time and how we were able to climb out of it.

Read More >
Client Referral Program | NSI