Five Tips for Selecting a Managed Detection and Response Service Provider
Relentless threat actors and complex technology stacks make it challenging for IT teams to keep up with the volume of cybersecurity threats - and even more difficult to respond to them rapidly. Compounding…
June 9, 2022/by ProficioWhy Gartner is Urging Organizations to Protect Against Identity Threats and Credential Abuse
With the growing support for a hybrid work environment and continued migration to cloud applications, Gartner is predicting an increased trend in identity-based attacks and credential abuse. Today’s…
June 1, 2022/by ProficioTakeaways From Notable Law Firm Data Breaches
Law firms collect sensitive and privileged data, making them prime targets for cyberattacks. Unfortunately, some of these attacks succeed and the news of a law firm data breach becomes part of the public…
April 6, 2022/by ProficioIncreased Cybersecurity Risks from Russian Cyber Attacks Resulting From the Russia Ukraine Conflict
A barrage of sanctions from the U.S. and E.U. continues to rain down on Russia following Vladimir Putin’s decision to invade Ukraine. The damage inflicted by these sanctions poses concerns about possible…
February 28, 2022/by Proficio7 Major Cyber Attacks in 2021 and Lessons Learned to Strengthen Your Defenses in 2022
Cyber attackers continued to successfully target organizations in all sectors and of all sizes during 2021. The biggest cyber attacks in 2021 resulted in damaging financial, reputational, and even societal…
January 3, 2022/by ProficioBest Practices for Endpoint Security
In today’s highly technical world, endpoint devices are everywhere. Endpoint devices, such as employee workstations, laptops, tablets, and smartphones, connect to and communicate with an organization’s…
September 30, 2021/by Kim MaibaumWhy An MDR Service Provider for Healthcare Organizations Makes Sense
Healthcare organizations collect and process a lot of sensitive data, making them a prime target for opportunistic cybercriminals. Managing security in-house is a complex undertaking, which is why many…
July 23, 2021/by Chris KaneLessons Learned: Ransomware Attacks in 2021
While ransomware attacks in 2021 never cease to stop, several high-profile occurrences in the first half of the year gained swift notoriety for either the scale of damage they inflicted or the targets…
June 16, 2021/by Kim Maibaum#HowTo: Identify and Appoint the Right Security Partner for Your Organization
This article originally appeared in InfoSecurity Magazine
In the field of cybersecurity, finding a partner you trust can be daunting. It’s an area that still creates uncertainty within many organizations,…
May 10, 2021/by Brad TaylorIn the field of cybersecurity, finding a partner you trust can be daunting. It’s an area that still creates uncertainty within many organizations,…
Want to stay up to date on the latest in the cybersecurity space?