SolCyber Blog

Stay in the loop on the latest cybersecurity news, trends and best practices from our team.

SolCyber Blog

Stay in the loop on the latest cybersecurity news, trends and best practices from our team.

Subscribe to our blog!

To receive the latest articles from our team, provide us with your email address.

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

Healthcare’s ongoing vulnerability with persistent cyberthreats

Healthcare’s ongoing vulnerability with persistent cyberthreats

The healthcare industry has had a rough start to 2024. It’s still reeling from February’s attack on Change Healthcare that brought production screeching to a halt. The breach shut down offices and healthcare facilities, cut off patient access to medication and care, and cost large hospitals and pharmacies upward of $100 million per day. Though Change has managed to get many of its systems back online, an American Medical Association survey conducted on April 29 found that 60% of respondents […]

Avatar photo
Hwei Oh
How MSPs Can Boost Their Security Offerings

How MSPs Can Boost Their Security Offerings

Businesses are desperate for cybersecurity offerings, and business owners often turn to you, the MSPs, for help. An MSP is the logical first choice to consult because you’re already handling the business’s IT. Unfortunately, the sophistication and growing number of cybersecurity threats mean that MSPs may not have the resources or expertise to stay current and offer their customers reliable and consistent security service. Organizational cybersecurity needs have grown multifaceted and vast. The move to cloud-first services opens the door […]

Avatar photo
Hwei Oh
How XDR can benefit your organization

How XDR can benefit your organization

Organizations of all sizes face multiple cybersecurity challenges these days. Speaking recently at the Munich Security Conference, FBI director Christopher A. Wray said that the current threat environment is “more severe and more complex than ever before.” Not only have hacking tools grown more sophisticated, but they’re also easier to obtain. Additionally, artificial intelligence and the use of deep fakes make threat actors more convincing when using social engineering tactics, as reported by the U.S. Department of Homeland Security. Adding […]

Avatar photo
Hwei Oh
NIST CSF 2.0: A Closer Look

NIST CSF 2.0: A Closer Look

Cybersecurity is no longer a “nice to have.” It’s a necessity for businesses of all sizes in all industries – whether or not they have a full-scale security team to implement and manage the program. However, setting up a cybersecurity program is significant work, and keeping up with best practices is challenging, even for large organizations. That’s why public cybersecurity frameworks have been developed.  Cybersecurity frameworks are sets of standards and processes that businesses use to implement and manage security […]

Avatar photo
Charles Ho
Securing M&A with cybersecurity focus

Securing M&A with cybersecurity focus

Last year, mergers and acquisitions reached their lowest level in a decade but are now picking up again, says a report by PwC. However, the down market, geopolitical factors, and the immense growth in the use of digital technologies mean the approach to M&A deals will look very different in 2024. And cybersecurity tops the list of factors that need to be revisited. The 2020 pandemic drove companies towards digital transformation. This trend, which became central to many business models, […]

Avatar photo
Hwei Oh
Take our 3-minute quiz to discover your cyber risk score and see how prepared you are in managing cyber threats effectively.
4 Key Takeaways from the Change Healthcare Ransomware Incident

4 Key Takeaways from the Change Healthcare Ransomware Incident

It’s not often that we cover specific breaches, but sometimes one comes along that is so substantial and insightful that we believe it’s worth talking about. Such is the case with the recent Change Healthcare ransomware attack. This attack disrupted the entire U.S. healthcare system, forcing facilities to shut down, leaving patients without access to medication and care, and costing large hospitals and pharmacies upwards of $100 million per day. In many ways, the Change attack was nothing new. Bad […]

Avatar photo
Hwei Oh
Healthcare’s ongoing vulnerability with persistent cyberthreats

Healthcare’s ongoing vulnerability with persistent cyberthreats

The healthcare industry has had a rough start to 2024. It’s still reeling from February’s attack on Change Healthcare that brought production screeching to a halt. The breach shut down offices and healthcare facilities, cut off patient access to medication and care, and cost large hospitals and pharmacies upward of $100 million per day. Though Change has managed to get many of its systems back online, an American Medical Association survey conducted on April 29 found that 60% of respondents […]

Avatar photo
Hwei Oh

Subscribe to our blog!

To receive the latest articles from our team, provide us with your email address.

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

How MSPs Can Boost Their Security Offerings

How MSPs Can Boost Their Security Offerings

Businesses are desperate for cybersecurity offerings, and business owners often turn to you, the MSPs, for help. An MSP is the logical first choice to consult because you’re already handling the business’s IT. Unfortunately, the sophistication and growing number of cybersecurity threats mean that MSPs may not have the resources or expertise to stay current and offer their customers reliable and consistent security service. Organizational cybersecurity needs have grown multifaceted and vast. The move to cloud-first services opens the door […]

Avatar photo
Hwei Oh
How XDR can benefit your organization

How XDR can benefit your organization

Organizations of all sizes face multiple cybersecurity challenges these days. Speaking recently at the Munich Security Conference, FBI director Christopher A. Wray said that the current threat environment is “more severe and more complex than ever before.” Not only have hacking tools grown more sophisticated, but they’re also easier to obtain. Additionally, artificial intelligence and the use of deep fakes make threat actors more convincing when using social engineering tactics, as reported by the U.S. Department of Homeland Security. Adding […]

Avatar photo
Hwei Oh
Securing M&A with cybersecurity focus

Securing M&A with cybersecurity focus

Last year, mergers and acquisitions reached their lowest level in a decade but are now picking up again, says a report by PwC. However, the down market, geopolitical factors, and the immense growth in the use of digital technologies mean the approach to M&A deals will look very different in 2024. And cybersecurity tops the list of factors that need to be revisited. The 2020 pandemic drove companies towards digital transformation. This trend, which became central to many business models, […]

Avatar photo
Hwei Oh
4 Key Takeaways from the Change Healthcare Ransomware Incident

4 Key Takeaways from the Change Healthcare Ransomware Incident

It’s not often that we cover specific breaches, but sometimes one comes along that is so substantial and insightful that we believe it’s worth talking about. Such is the case with the recent Change Healthcare ransomware attack. This attack disrupted the entire U.S. healthcare system, forcing facilities to shut down, leaving patients without access to medication and care, and costing large hospitals and pharmacies upwards of $100 million per day. In many ways, the Change attack was nothing new. Bad […]

Avatar photo
Hwei Oh
Take our 3-minute quiz to discover your cyber risk score and see how prepared you are in managing cyber threats effectively.

Choose identity-first managed security.

We start with identity and end with transparency — protecting where attacks begin and keeping you informed, with as much visibility as you want. No black boxes, just clear, expert-driven security.
No more paying for useless bells and whistles.
No more time wasted on endless security alerts.
No more juggling multiple technologies and contracts.

Follow us!

Subscribe

Join our newsletter to stay up to date on features and releases.

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

©
2026
SolCyber. All rights reserved
|
Made with
by
Jason Pittock

I am interested in
SolCyber DPM++

I am interested in
SolCyber XDR++™

I am interested in
SolCyber MDR++™

I am interested in
SolCyber Extended Coverage™

I am interested in
SolCyber Foundational Coverage™

I am interested in a
Free Demo

8170