Extended Detection and Response (XDR) is a new security technology that promises to change the way security organizations operate, and introduce important efficiencies to day-to-day processes. In particular, XDR is expected to have a huge impact on incident response teams. In this article, we’ll explain the basics of XDR, show how it addresses incident response … Continued
In an unprecedented incident that has left medical authorities in Western Australia (WA) in disbelief, a local teenager has been found to be the mastermind behind a massive data breach. The breach intercepted thousands of names, phone numbers and communications between doctors responding to the COVID-19 crisis from their pagers. This is an unfortunate incident … Continued
Cyber Risk in a Growing Business Within the cyber security industry, it is well known that as a company grows, so does its attack surface. This trend lends itself largely to the fact that as more employees are hired, more company-owned machines (laptops, tablets, etc.) are distributed. The risk is that once a company-owned machine … Continued
A security operations center (SOC) is the centralization of your security processes and tooling. It can enable you to monitor for, evaluate, and respond to incidents across your organization with increased efficiency and effectiveness. By centralizing your security efforts, you create greater visibility into your systems and can better analyze and detect threats. At the … Continued
New Jersey-based service provider Cognizant is the latest victim of the Maze ransomware attack. This is an unfortunate reality check, proving that hackers don’t stop their calculated, malicious activities for COVID-19. Accordingly, managed service providers (MSPs) are still largely vulnerable to these malicious crimes. This post provides insight into the latest Maze ransomware attack, followed … Continued
Azure is a cloud computing vendor, ranked among the top providers. Like all cloud vendors, Azure uses a shared responsibility model. This means that some of the responsibilities are taken care of by the cloud vendor, while the rest should be taken care of by the cloud user. In this article, you will learn about … Continued
A new cyberattack occurs roughly every 39 seconds. Each of these attacks leaves behind a variety of evidence, including IP addresses, log events and malicious files. This evidence can be incredibly valuable to security teams but only if it’s analyzed and placed in context. There is simply too much attack data from too many sources … Continued
“OnPage solved a mandatory requirement we had in our data center for regulatory cybersecurity intrusion compliance. To cover physical or cyber intrusions, we have OnPage notifications sent out to the group on an on-call rotation for incident response.” – Philip Huff, Director of IT Security Compliance OnPage provides secure, high-priority notifications in case of … Continued
The current business environment requires organizations to implement cybersecurity safeguards to avert disasters associated with breaches, loss of data and hefty fines. Simply implementing a cybersecurity plan isn’t enough, it’s also important to incorporate the right solutions and workflows to prevent a disaster. This post will discuss the current state of cybersecurity, highlighting what organizations … Continued