
Tales from the SOC: Classic Crypto – Operation GUNMAN | S1 Ep023
Cold War cryptographic capers in a real-world Spy vs. Spy scenario!
By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

The healthcare industry has had a rough start to 2024. It’s still reeling from February’s attack on Change Healthcare that brought production screeching to a halt. The breach shut down offices and healthcare facilities, cut off patient access to medication and care, and cost large hospitals and pharmacies upward of $100 million per day. Though Change has managed to get many of its systems back online, an American Medical Association survey conducted on April 29 found that 60% of respondents […]

Just how much security does a VPN give you?
What could go wrong with the security you think you’re enjoying, and what potential problems do you need to be aware of?


Just how much security does a VPN give you? What could go wrong with the security you think you’re enjoying, and what potential problems do you need to be aware of?

Businesses are desperate for cybersecurity offerings, and business owners often turn to you, the MSPs, for help. An MSP is the logical first choice to consult because you’re already handling the business’s IT. Unfortunately, the sophistication and growing number of cybersecurity threats mean that MSPs may not have the resources or expertise to stay current and offer their customers reliable and consistent security service. Organizational cybersecurity needs have grown multifaceted and vast. The move to cloud-first services opens the door […]

Do you back yourself to spot the scams that drop into your email inbox?
Could you teach your friends, family and colleagues to do the same?

Organizations of all sizes face multiple cybersecurity challenges these days. Speaking recently at the Munich Security Conference, FBI director Christopher A. Wray said that the current threat environment is “more severe and more complex than ever before.” Not only have hacking tools grown more sophisticated, but they’re also easier to obtain. Additionally, artificial intelligence and the use of deep fakes make threat actors more convincing when using social engineering tactics, as reported by the U.S. Department of Homeland Security. Adding […]

Could quantum computers kill off encryption as we know it? If so, what can we do about it, and how long do we have to get ready?

Cybersecurity is no longer a “nice to have.” It’s a necessity for businesses of all sizes in all industries – whether or not they have a full-scale security team to implement and manage the program. However, setting up a cybersecurity program is significant work, and keeping up with best practices is challenging, even for large organizations. That’s why public cybersecurity frameworks have been developed. Cybersecurity frameworks are sets of standards and processes that businesses use to implement and manage security […]

Could quantum computers kill off encryption as we know it? If so, what can we do about it, and how long do we have to get ready?

We look at the sort of bugs that lead to cybersecurity trouble, the jargon you need to understand them, and why it can be a life’s work to keep on top of them.

Last year, mergers and acquisitions reached their lowest level in a decade but are now picking up again, says a report by PwC. However, the down market, geopolitical factors, and the immense growth in the use of digital technologies mean the approach to M&A deals will look very different in 2024. And cybersecurity tops the list of factors that need to be revisited. The 2020 pandemic drove companies towards digital transformation. This trend, which became central to many business models, […]


The ‘mal’ in malware is short for malicious, so clearly you can’t have ‘good’ malware.
Or can you?

It’s not often that we cover specific breaches, but sometimes one comes along that is so substantial and insightful that we believe it’s worth talking about. Such is the case with the recent Change Healthcare ransomware attack. This attack disrupted the entire U.S. healthcare system, forcing facilities to shut down, leaving patients without access to medication and care, and costing large hospitals and pharmacies upwards of $100 million per day. In many ways, the Change attack was nothing new. Bad […]

Avoiding public Wi-Fi while you are out and about is easier said than done.
Here are some simple precautions that can help.

The healthcare industry has had a rough start to 2024. It’s still reeling from February’s attack on Change Healthcare that brought production screeching to a halt. The breach shut down offices and healthcare facilities, cut off patient access to medication and care, and cost large hospitals and pharmacies upward of $100 million per day. Though Change has managed to get many of its systems back online, an American Medical Association survey conducted on April 29 found that 60% of respondents […]

Just how much security does a VPN give you?
What could go wrong with the security you think you’re enjoying, and what potential problems do you need to be aware of?

Just how much security does a VPN give you? What could go wrong with the security you think you’re enjoying, and what potential problems do you need to be aware of?
By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

Businesses are desperate for cybersecurity offerings, and business owners often turn to you, the MSPs, for help. An MSP is the logical first choice to consult because you’re already handling the business’s IT. Unfortunately, the sophistication and growing number of cybersecurity threats mean that MSPs may not have the resources or expertise to stay current and offer their customers reliable and consistent security service. Organizational cybersecurity needs have grown multifaceted and vast. The move to cloud-first services opens the door […]

Do you back yourself to spot the scams that drop into your email inbox?
Could you teach your friends, family and colleagues to do the same?

Organizations of all sizes face multiple cybersecurity challenges these days. Speaking recently at the Munich Security Conference, FBI director Christopher A. Wray said that the current threat environment is “more severe and more complex than ever before.” Not only have hacking tools grown more sophisticated, but they’re also easier to obtain. Additionally, artificial intelligence and the use of deep fakes make threat actors more convincing when using social engineering tactics, as reported by the U.S. Department of Homeland Security. Adding […]


Could quantum computers kill off encryption as we know it? If so, what can we do about it, and how long do we have to get ready?




Last year, mergers and acquisitions reached their lowest level in a decade but are now picking up again, says a report by PwC. However, the down market, geopolitical factors, and the immense growth in the use of digital technologies mean the approach to M&A deals will look very different in 2024. And cybersecurity tops the list of factors that need to be revisited. The 2020 pandemic drove companies towards digital transformation. This trend, which became central to many business models, […]

The ‘mal’ in malware is short for malicious, so clearly you can’t have ‘good’ malware.
Or can you?

It’s not often that we cover specific breaches, but sometimes one comes along that is so substantial and insightful that we believe it’s worth talking about. Such is the case with the recent Change Healthcare ransomware attack. This attack disrupted the entire U.S. healthcare system, forcing facilities to shut down, leaving patients without access to medication and care, and costing large hospitals and pharmacies upwards of $100 million per day. In many ways, the Change attack was nothing new. Bad […]

Avoiding public Wi-Fi while you are out and about is easier said than done.
Here are some simple precautions that can help.


By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.






