<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">
Skip to main content

Blog

Blog Category // Cybersecurity (5)

Hidden Threats: Preventing cyberattacks with a layered security approach

Advanced attacks are out there. Advanced malware threats are hiding in software applications many of us use daily and trust. So much so that legitimate software can be difficult to distinguish. New attack vectors are continuously being discovered and attackers are finding ...

The Tax Professional’s Guide to New Cybersecurity Law

The Internal Revenue Service (IRS) has issued a news release reminding professional tax preparers that they are required by law to have a written data security plan.

Infogressive EDR dominates MITRE ATT&CK Product Evaluations: What it Means for You

What is the MITRE ATT&CK Product Evaluation? The ATT&CK evaluation framework, according to MITRE, is a new development that provides a transparent, customer-centric approach to product evaluation for cyber detection software and solutions. The ATT&CK evaluation ...

MSSPs: The Ultimate Guide to Making the Right Choice

Finding the right people to fill cybersecurity positions in your organization is getting harder and harder. In 2018, according to the Information Systems Audit and Control Association (ISACA), three in five organizations have unfilled cybersecurity or IT security positions, ...

Combining the Power of NGAV and EDR

Traditional antivirus simply isn’t enough to fight the advanced, targeted attacks being deployed today. How do you fight back? What solutions do you need to prevent the dramatic loss that can rampage through your company? It’s time to fight back with the next generation of ...

Continuous Monitoring: Proactive Security

What’s your plan if an attack makes it past your defenses? While there are many tools and technologies that fight to keep attackers out, it’s just as important to have a plan if those fail.

IT Governance with an Information Security Management System (ISMS)

Setting up a strong information governance framework with well-defined roles and responsibilities is an essential task for any organization with a data management system.

The Five Stages of Vulnerability Management

What sounds better? Proactively fighting potential threats or scrambling to pick up the pieces after an attacker has successfully made their way onto your system? As threats continue to become more complex and targeted, it’s more important than ever to focus your efforts to ...

Lateral Movement: Legitimate Activity or Real Threat

A good disguise can go a long way. Concealing your real identity and priorities can get you far, especially in cybersecurity. When an attacker is disguised as a legitimate user, it’s harder to detect their presence, often until it’s too late. This is most evident during the ...

Fileless Malware: How to Protect Against This Rising Attacker Trend

The threat landscape is changing. Fileless malware is a phrase that is rapidly picking up popularity in the cybersecurity industry. In fact, 77% of successful cyberattacks in 2017 utilized some form of fileless malware. So you’ve probably heard of it, and you know you ...

Network Visibility: What Can't You See?

Every network has its weaknesses. But do you know what they are and the impact they have on your network security? With the large amount of data on systems and advances in attack sophistication, it’s more important than ever to have a complete picture of what’s going on in ...

How an Incomplete Cybersecurity Operation Creates Potential Risks to Business

As the framework for what constitutes a “workforce” evolves in tandem with rapidly developing communication technologies, the advent of the remote workforce has gained momentum and all but redefined the relationship employees have with office environments.

Advanced Persistent Threat: Challenge Accepted

The battle of cybersecurity is constantly advancing. As hackers move to more complex, focused efforts, their strategies have changed and the threat has increased. One of these strategies, advanced persistent threats (APT), is a customized, focused attack that is difficult ...

What is EDR & How Can it Protect You?

What’s your game plan if prevention fails? As attack techniques continue to advance, it’s crucial to have a plan in place. Last year, 77% of successful attacks used fileless attack techniques, something even the best antivirus solution can’t track or prevent.

Your Game Plan to Disrupt the Cyberattack Lifecycle

Cyberattacks don’t happen overnight. They take weeks, even months of planning, research, and deliberate actions. At each stage, from the preparation to the finished attack, there’s great potential to detect the malicious activity and break down the entire operation.