SolCyber Blog

Stay in the loop on the latest cybersecurity news, trends and best practices from our team.

SolCyber Blog

Stay in the loop on the latest cybersecurity news, trends and best practices from our team.

Subscribe to our blog!

To receive the latest articles from our team, provide us with your email address.

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

Why Hospitality Is the Second Most Vulnerable Industry

Why Hospitality Is the Second Most Vulnerable Industry

The World Travel & Tourism Council predicts that travel-related GDP will grow an average of 5.8% annually between 2022 and 2032. While this is good news for the hospitality industry, but an increase in online bookings and web traffic also makes it an even more enticing target for hackers. In fact, the industry has long attracted hackers with PwC’s Hotels Outlook Report 2018-2022 naming hospitality as the second-most-attacked industry. Even more interesting is the number of high-profile breaches that have […]

Avatar photo
Hwei Oh
The Crucial Role of Cybersecurity in Financial Services

The Crucial Role of Cybersecurity in Financial Services

The finance industry is one of the most targeted industries for cyberattacks, and it makes sense. When most cyberattacks are conducted for financial gain, bad actors would naturally be inclined to go directly where the money is. However, the mass disruption caused by digitization and FinTech has created recent shifts in the industry making them particularly vulnerable. As the finance world becomes more digitized and financial institutions become increasingly interconnected, banking and financial services have become more efficient and inclusive […]

Avatar photo
Hwei Oh
Evolving cyber threats in 2023

Evolving cyber threats in 2023

To stay competitive and relevant in business, we have to understand how to move at the pace of technology. We see this on both the consumer and business sides – expectations evolve alongside emerging trends, such as AI and machine learning. The same is true for cybercriminals. They also move at the pace of technology, and they’re counting on businesses to be behind the curve. While many attacks are known, such as phishing, business email compromise (BEC), and ransomware, tactics […]

Avatar photo
Charles Ho
Managed Security Services for Small Businesses

Managed Security Services for Small Businesses

Recent data from Verizon reveals that small and large businesses suffer from similar vulnerabilities and attack surfaces, yet small businesses face much more difficult challenges. Small businesses are typically less prepared for a cyberattack than their larger counterparts and attackers are often more successful when targeting small businesses. Verizon’s report indicates that cybercriminals have far more success penetrating small businesses with fewer than 1,000 employees than businesses with over 1,000 employees. Given that ninety-eight percent of cyberattacks were financially motivated, […]

Avatar photo
Hwei Oh
Why the Legal Industry Needs to Pay Attention to Cybersecurity

Why the Legal Industry Needs to Pay Attention to Cybersecurity

Cyberattacks across all industries are on the rise, but the numbers are particularly troubling for the legal industry. According to American Bar Association’s 2022 Legal Technology Survey Report, 27% of respondents claimed to have experienced a security breach – up from 25% the year before. An additional 25% reported not knowing if their firm had experienced a security breach. A 2021 report released by security firm BlueVoyant found that while 15% of thousands of law firms showed signs of compromised networks, […]

Avatar photo
Hwei Oh
How to Manage Breach Reporting as Part of an IR Strategy

How to Manage Breach Reporting as Part of an IR Strategy

In December 2022, FBI Supervisory Special Agent Michael Sohn cautioned small businesses that they were being targeted by cybercriminals. While larger corporations are investing more in hardening their security posture, the relative weakness of smaller businesses makes them prime targets for hackers. However, no matter how much cybersecurity a company has in place, no one can guarantee that its network will never be breached. That’s why a comprehensive risk strategy for cybersecurity includes cyber insurance and incident response to mitigate […]

Avatar photo
Hwei Oh
Why the Healthcare Industry Needs to Rethink Cybersecurity in 2023

Why the Healthcare Industry Needs to Rethink Cybersecurity in 2023

No industry was more affected by the COVID-19 pandemic than the healthcare industry. While stories of frontline worker heroics and employee shortages took center stage, another important story has been brewing over the last few years — the significant increase in cybersecurity attacks in the healthcare space. With stay-at-home orders and social distancing requirements in place throughout 2020, many healthcare systems were forced to rapidly adopt healthcare technology that allowed for telemedicine and the remote monitoring of patients. The way […]

Avatar photo
Hwei Oh
Preparing for SEC Recommendations

Preparing for SEC Recommendations

Update Aug 16, 2023: On July 26th, the SEC officially released newly adopted rules on disclosing any data breaches and cyber incidents for any company under SEC jurisdiction and regulation, including foreign private issuers. The rules require disclosure of any cyber incident four days after the registrant (the affected entity) finds the incident to be a material incident, meaning it can affect shareholders and investors. Registrants will also have to detail any processes that pertain to “assessing, identifying, and managing material risks from cybersecurity […]

Avatar photo
Charles Ho
Some Common Pitfalls that SMEs Should Try to Avoid

Some Common Pitfalls that SMEs Should Try to Avoid

Guest author, Chris Witham, Director of Operations, Sicarius  For over 20 years, Chris has honed his skills across a wide variety of IT disciplines, including systems administration, IT security, digital forensics, risk and compliance, and incident response. Chris has provided first-rate digital forensic services for cutting edge organisations in federal law enforcement and private enterprise, both locally in Australia and Internationally. His resume includes working with the Australian Federal Police, Blackpanda and KordaMentha, supporting sophisticated, and at times high-profile investigations. […]

Avatar photo
Chris Witham
Cybersecurity: Why SMEs in Australia and New Zealand Must Act Now

Cybersecurity: Why SMEs in Australia and New Zealand Must Act Now

A spate of high-profile attacks affecting millions of people have hit Australia and New Zealand. These unprecedented data breaches have led to increased government scrutiny, as well as a new look at what cybersecurity resilience and posture should be for companies housing sensitive and personal customer data. The increase in cybersecurity attacks we’re seeing in these countries underscores the point that small businesses are just as much a target as enterprise companies. In fact, out of over 3 million businesses […]

Avatar photo
Hwei Oh
DNS threat protection with DNSFilter and SolCyber

DNS threat protection with DNSFilter and SolCyber

As part of our partnership launch with DNSFilter, we talk to Dave Raphael, COO at DNSFilter and David Emerson, CTO at SolCyber about the impact of network security for the modern business and why DNSFilter was a clear partner of choice for SolCyber and an integral part of our Foundational Coverage service. Provide us with an overview on what DNSFilter | SolCyber does? Dave: At DNSFilter, we provide protective DNS at the recursive DNS level to mitigate threats in real-time. […]

Avatar photo
Hwei Oh
Take our 3-minute quiz to discover your cyber risk score and see how prepared you are in managing cyber threats effectively.
Understanding Outsourced Cybersecurity: Managed vs. Monitoring

Understanding Outsourced Cybersecurity: Managed vs. Monitoring

Cyberattacks continue to increase. In 2020, 77% of IT leaders reported an uptick in how often cyberattacks were happening, according to Cybersecurity Magazine. Despite the rise in attacks, companies had to cut headcounts, leading to an additional burden on IT teams. In 2021, 83% of IT leaders were considering outsourcing their security needs, likely because they couldn’t properly manage so many threats. Although outsourcing security significantly reduces the workload on internal teams, choosing the right outsourced solution can be difficult, […]

Avatar photo
Charles Ho
The Do’s and Don’ts of Managing a Strained IT Department

The Do’s and Don’ts of Managing a Strained IT Department

In today’s economic climate, most managers are faced with the challenge of doing more with their existing tools or holding back on acquiring new ones due to tight budgets following the pandemic. Additionally, the current soaring inflation rate, which we haven’t seen since the early 1980s, has made companies hold on to their cash and tighten their purse strings. The recent SVB collapse and Credit Suisse’s plummeting share price have further fueled fears of a recession. Under such circumstances, managers […]

Avatar photo
Hwei Oh
How the energy and renewables sector can protect against cyberattacks

How the energy and renewables sector can protect against cyberattacks

Cyberattacks are one of the biggest threats facing businesses today, and the energy and renewables sector is not exempt. In fact, energy companies frequently make the list of the top 10 industries targeted by attackers. As the industry undergoes massive change, it’s entirely possible that energy companies become an even more enticing target. There are several reasons the industry is so vulnerable, but chief among them is the large attack surface. Vulnerabilities exist not just in power plants, but in […]

Avatar photo
Hwei Oh
Why Hospitality Is the Second Most Vulnerable Industry

Why Hospitality Is the Second Most Vulnerable Industry

The World Travel & Tourism Council predicts that travel-related GDP will grow an average of 5.8% annually between 2022 and 2032. While this is good news for the hospitality industry, but an increase in online bookings and web traffic also makes it an even more enticing target for hackers. In fact, the industry has long attracted hackers with PwC’s Hotels Outlook Report 2018-2022 naming hospitality as the second-most-attacked industry. Even more interesting is the number of high-profile breaches that have […]

Avatar photo
Hwei Oh
The Crucial Role of Cybersecurity in Financial Services

The Crucial Role of Cybersecurity in Financial Services

The finance industry is one of the most targeted industries for cyberattacks, and it makes sense. When most cyberattacks are conducted for financial gain, bad actors would naturally be inclined to go directly where the money is. However, the mass disruption caused by digitization and FinTech has created recent shifts in the industry making them particularly vulnerable. As the finance world becomes more digitized and financial institutions become increasingly interconnected, banking and financial services have become more efficient and inclusive […]

Avatar photo
Hwei Oh
Evolving cyber threats in 2023

Evolving cyber threats in 2023

To stay competitive and relevant in business, we have to understand how to move at the pace of technology. We see this on both the consumer and business sides – expectations evolve alongside emerging trends, such as AI and machine learning. The same is true for cybercriminals. They also move at the pace of technology, and they’re counting on businesses to be behind the curve. While many attacks are known, such as phishing, business email compromise (BEC), and ransomware, tactics […]

Avatar photo
Charles Ho

Subscribe to our blog!

To receive the latest articles from our team, provide us with your email address.

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

Managed Security Services for Small Businesses

Managed Security Services for Small Businesses

Recent data from Verizon reveals that small and large businesses suffer from similar vulnerabilities and attack surfaces, yet small businesses face much more difficult challenges. Small businesses are typically less prepared for a cyberattack than their larger counterparts and attackers are often more successful when targeting small businesses. Verizon’s report indicates that cybercriminals have far more success penetrating small businesses with fewer than 1,000 employees than businesses with over 1,000 employees. Given that ninety-eight percent of cyberattacks were financially motivated, […]

Avatar photo
Hwei Oh
Why the Legal Industry Needs to Pay Attention to Cybersecurity

Why the Legal Industry Needs to Pay Attention to Cybersecurity

Cyberattacks across all industries are on the rise, but the numbers are particularly troubling for the legal industry. According to American Bar Association’s 2022 Legal Technology Survey Report, 27% of respondents claimed to have experienced a security breach – up from 25% the year before. An additional 25% reported not knowing if their firm had experienced a security breach. A 2021 report released by security firm BlueVoyant found that while 15% of thousands of law firms showed signs of compromised networks, […]

Avatar photo
Hwei Oh
How to Manage Breach Reporting as Part of an IR Strategy

How to Manage Breach Reporting as Part of an IR Strategy

In December 2022, FBI Supervisory Special Agent Michael Sohn cautioned small businesses that they were being targeted by cybercriminals. While larger corporations are investing more in hardening their security posture, the relative weakness of smaller businesses makes them prime targets for hackers. However, no matter how much cybersecurity a company has in place, no one can guarantee that its network will never be breached. That’s why a comprehensive risk strategy for cybersecurity includes cyber insurance and incident response to mitigate […]

Avatar photo
Hwei Oh
Why the Healthcare Industry Needs to Rethink Cybersecurity in 2023

Why the Healthcare Industry Needs to Rethink Cybersecurity in 2023

No industry was more affected by the COVID-19 pandemic than the healthcare industry. While stories of frontline worker heroics and employee shortages took center stage, another important story has been brewing over the last few years — the significant increase in cybersecurity attacks in the healthcare space. With stay-at-home orders and social distancing requirements in place throughout 2020, many healthcare systems were forced to rapidly adopt healthcare technology that allowed for telemedicine and the remote monitoring of patients. The way […]

Avatar photo
Hwei Oh
DNS threat protection with DNSFilter and SolCyber

DNS threat protection with DNSFilter and SolCyber

As part of our partnership launch with DNSFilter, we talk to Dave Raphael, COO at DNSFilter and David Emerson, CTO at SolCyber about the impact of network security for the modern business and why DNSFilter was a clear partner of choice for SolCyber and an integral part of our Foundational Coverage service. Provide us with an overview on what DNSFilter | SolCyber does? Dave: At DNSFilter, we provide protective DNS at the recursive DNS level to mitigate threats in real-time. […]

Avatar photo
Hwei Oh
Understanding Outsourced Cybersecurity: Managed vs. Monitoring

Understanding Outsourced Cybersecurity: Managed vs. Monitoring

Cyberattacks continue to increase. In 2020, 77% of IT leaders reported an uptick in how often cyberattacks were happening, according to Cybersecurity Magazine. Despite the rise in attacks, companies had to cut headcounts, leading to an additional burden on IT teams. In 2021, 83% of IT leaders were considering outsourcing their security needs, likely because they couldn’t properly manage so many threats. Although outsourcing security significantly reduces the workload on internal teams, choosing the right outsourced solution can be difficult, […]

Avatar photo
Charles Ho
The Do’s and Don’ts of Managing a Strained IT Department

The Do’s and Don’ts of Managing a Strained IT Department

In today’s economic climate, most managers are faced with the challenge of doing more with their existing tools or holding back on acquiring new ones due to tight budgets following the pandemic. Additionally, the current soaring inflation rate, which we haven’t seen since the early 1980s, has made companies hold on to their cash and tighten their purse strings. The recent SVB collapse and Credit Suisse’s plummeting share price have further fueled fears of a recession. Under such circumstances, managers […]

Avatar photo
Hwei Oh
How the energy and renewables sector can protect against cyberattacks

How the energy and renewables sector can protect against cyberattacks

Cyberattacks are one of the biggest threats facing businesses today, and the energy and renewables sector is not exempt. In fact, energy companies frequently make the list of the top 10 industries targeted by attackers. As the industry undergoes massive change, it’s entirely possible that energy companies become an even more enticing target. There are several reasons the industry is so vulnerable, but chief among them is the large attack surface. Vulnerabilities exist not just in power plants, but in […]

Avatar photo
Hwei Oh
Take our 3-minute quiz to discover your cyber risk score and see how prepared you are in managing cyber threats effectively.

Choose identity-first managed security.

We start with identity and end with transparency — protecting where attacks begin and keeping you informed, with as much visibility as you want. No black boxes, just clear, expert-driven security.
No more paying for useless bells and whistles.
No more time wasted on endless security alerts.
No more juggling multiple technologies and contracts.

Follow us!

Subscribe

Join our newsletter to stay up to date on features and releases.

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

©
2026
SolCyber. All rights reserved
|
Made with
by
Jason Pittock

I am interested in
SolCyber DPM++

I am interested in
SolCyber XDR++™

I am interested in
SolCyber MDR++™

I am interested in
SolCyber Extended Coverage™

I am interested in
SolCyber Foundational Coverage™

I am interested in a
Free Demo

2540