SolCyber Blog

Stay in the loop on the latest cybersecurity news, trends and best practices from our team.

SolCyber Blog

Stay in the loop on the latest cybersecurity news, trends and best practices from our team.

Subscribe to our blog!

To receive the latest articles from our team, provide us with your email address.

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

Why the Healthcare Industry Needs to Rethink Cybersecurity in 2023

Why the Healthcare Industry Needs to Rethink Cybersecurity in 2023

No industry was more affected by the COVID-19 pandemic than the healthcare industry. While stories of frontline worker heroics and employee shortages took center stage, another important story has been brewing over the last few years — the significant increase in cybersecurity attacks in the healthcare space. With stay-at-home orders and social distancing requirements in place throughout 2020, many healthcare systems were forced to rapidly adopt healthcare technology that allowed for telemedicine and the remote monitoring of patients. The way […]

Avatar photo
Hwei Oh
Preparing for SEC Recommendations

Preparing for SEC Recommendations

Update Aug 16, 2023: On July 26th, the SEC officially released newly adopted rules on disclosing any data breaches and cyber incidents for any company under SEC jurisdiction and regulation, including foreign private issuers. The rules require disclosure of any cyber incident four days after the registrant (the affected entity) finds the incident to be a material incident, meaning it can affect shareholders and investors. Registrants will also have to detail any processes that pertain to “assessing, identifying, and managing material risks from cybersecurity […]

Avatar photo
Charles Ho
Some Common Pitfalls that SMEs Should Try to Avoid

Some Common Pitfalls that SMEs Should Try to Avoid

Guest author, Chris Witham, Director of Operations, Sicarius  For over 20 years, Chris has honed his skills across a wide variety of IT disciplines, including systems administration, IT security, digital forensics, risk and compliance, and incident response. Chris has provided first-rate digital forensic services for cutting edge organisations in federal law enforcement and private enterprise, both locally in Australia and Internationally. His resume includes working with the Australian Federal Police, Blackpanda and KordaMentha, supporting sophisticated, and at times high-profile investigations. […]

Avatar photo
Chris Witham
Cybersecurity: Why SMEs in Australia and New Zealand Must Act Now

Cybersecurity: Why SMEs in Australia and New Zealand Must Act Now

A spate of high-profile attacks affecting millions of people have hit Australia and New Zealand. These unprecedented data breaches have led to increased government scrutiny, as well as a new look at what cybersecurity resilience and posture should be for companies housing sensitive and personal customer data. The increase in cybersecurity attacks we’re seeing in these countries underscores the point that small businesses are just as much a target as enterprise companies. In fact, out of over 3 million businesses […]

Avatar photo
Hwei Oh
DNS threat protection with DNSFilter and SolCyber

DNS threat protection with DNSFilter and SolCyber

As part of our partnership launch with DNSFilter, we talk to Dave Raphael, COO at DNSFilter and David Emerson, CTO at SolCyber about the impact of network security for the modern business and why DNSFilter was a clear partner of choice for SolCyber and an integral part of our Foundational Coverage service. Provide us with an overview on what DNSFilter | SolCyber does? Dave: At DNSFilter, we provide protective DNS at the recursive DNS level to mitigate threats in real-time. […]

Avatar photo
Hwei Oh
Understanding Outsourced Cybersecurity: Managed vs. Monitoring

Understanding Outsourced Cybersecurity: Managed vs. Monitoring

Cyberattacks continue to increase. In 2020, 77% of IT leaders reported an uptick in how often cyberattacks were happening, according to Cybersecurity Magazine. Despite the rise in attacks, companies had to cut headcounts, leading to an additional burden on IT teams. In 2021, 83% of IT leaders were considering outsourcing their security needs, likely because they couldn’t properly manage so many threats. Although outsourcing security significantly reduces the workload on internal teams, choosing the right outsourced solution can be difficult, […]

Avatar photo
Charles Ho
The Do’s and Don’ts of Managing a Strained IT Department

The Do’s and Don’ts of Managing a Strained IT Department

In today’s economic climate, most managers are faced with the challenge of doing more with their existing tools or holding back on acquiring new ones due to tight budgets following the pandemic. Additionally, the current soaring inflation rate, which we haven’t seen since the early 1980s, has made companies hold on to their cash and tighten their purse strings. The recent SVB collapse and Credit Suisse’s plummeting share price have further fueled fears of a recession. Under such circumstances, managers […]

Avatar photo
Hwei Oh
How the energy and renewables sector can protect against cyberattacks

How the energy and renewables sector can protect against cyberattacks

Cyberattacks are one of the biggest threats facing businesses today, and the energy and renewables sector is not exempt. In fact, energy companies frequently make the list of the top 10 industries targeted by attackers. As the industry undergoes massive change, it’s entirely possible that energy companies become an even more enticing target. There are several reasons the industry is so vulnerable, but chief among them is the large attack surface. Vulnerabilities exist not just in power plants, but in […]

Avatar photo
Hwei Oh
Practical vulnerability management for SMEs

Practical vulnerability management for SMEs

As SMEs look to find new ways of being cost-effective, efficient, and reaching broader audiences, they often turn to digitalization. While an expanding digital environment presents more growth opportunities for businesses, it also creates problems for leaders who are looking to manage and maintain risk. This often emerges in the form of an increased attack surface and a rise in common vulnerabilities and high risk vulnerabilities. This can result in potential threats reaching your network, becoming a major business risk […]

Avatar photo
Charles Ho
The Pitfalls of Not Having an Incident Response (IR) Retainer

The Pitfalls of Not Having an Incident Response (IR) Retainer

The wrong time to look for flood insurance is during a flood. Similarly, the wrong time to look for an Incident Response (IR) team is when you’re already under a cyberattack. We get it. Inflation is skyrocketing, and businesses are tightening their purse strings. The rise in energy and gas prices also isn’t helping. Companies need cash flow, and hiring another vendor on retainer might seem counterintuitive while the world is still recovering following the pandemic. But inflation and gas […]

Avatar photo
Hwei Oh
The cybersecurity implications of AI

The cybersecurity implications of AI

AI went mainstream almost overnight. The technology has already changed how we live, work, and interact with each other. The use cases for AI are practically endless. Here are some of the things people are doing with AI: Unfortunately, the nascent technology has already shown several weaknesses, potentially opening the door to unforeseen types of hacks. Cybercriminals are already finding ways to use AI to their advantage, the consequences of which can be devastating. Criminals can use new technology just […]

Avatar photo
Charles Ho
Take our 3-minute quiz to discover your cyber risk score and see how prepared you are in managing cyber threats effectively.
Securing your business during economic uncertainty

Securing your business during economic uncertainty

In 2023, layoffs, hiring freezes, and tightening budgets are top-of-mind for many employers. 2022 was a difficult year for the world economy; and, in 2023, the aftershocks keep coming. It might feel like there’s news of another company laying off a significant part of its workforce every week, and that feeling isn’t too far off from what’s projected. Over 60% of business leaders surveyed by ResumeBuilder say they are likely to have layoffs in 2023, with 57% of these respondents […]

Avatar photo
Hwei Oh
Is your cybersecurity enough for 2023? 

Is your cybersecurity enough for 2023? 

3 key questions to ask yourself to evaluate your cybersecurity preparedness. The cybersecurity landscape changes fast, and in 2023 we’re seeing shifts at a faster clip than ever before. We’re likely to see continuing increased attacks on the supply chain, threats to critical infrastructure, a rise in ransomware, and pros and cons arising from the proliferation of artificial intelligence. Economic uncertainty, continued remote work trends, and skill shortages will be some of the major contributing factors to this landscape. Threats […]

Avatar photo
Hwei Oh
Cybersecurity and the metaverse: How to protect your virtual identity

Cybersecurity and the metaverse: How to protect your virtual identity

For many, the metaverse represents an idyllic future. Users can delve into a fully immersive virtual world, where geographic and physical barriers are removed. They can develop a perfectly crafted online identity, in the form of an avatar, which can move through various virtual environments to work, play games, shop, and socialize. Yet, while many are excited by the development of the metaverse, some are concerned about the cybersecurity risks it poses. Cybercrime is already a common occurrence. In fact, […]

Avatar photo
Charles Ho
Why the Healthcare Industry Needs to Rethink Cybersecurity in 2023

Why the Healthcare Industry Needs to Rethink Cybersecurity in 2023

No industry was more affected by the COVID-19 pandemic than the healthcare industry. While stories of frontline worker heroics and employee shortages took center stage, another important story has been brewing over the last few years — the significant increase in cybersecurity attacks in the healthcare space. With stay-at-home orders and social distancing requirements in place throughout 2020, many healthcare systems were forced to rapidly adopt healthcare technology that allowed for telemedicine and the remote monitoring of patients. The way […]

Avatar photo
Hwei Oh
Preparing for SEC Recommendations

Preparing for SEC Recommendations

Update Aug 16, 2023: On July 26th, the SEC officially released newly adopted rules on disclosing any data breaches and cyber incidents for any company under SEC jurisdiction and regulation, including foreign private issuers. The rules require disclosure of any cyber incident four days after the registrant (the affected entity) finds the incident to be a material incident, meaning it can affect shareholders and investors. Registrants will also have to detail any processes that pertain to “assessing, identifying, and managing material risks from cybersecurity […]

Avatar photo
Charles Ho
Some Common Pitfalls that SMEs Should Try to Avoid

Some Common Pitfalls that SMEs Should Try to Avoid

Guest author, Chris Witham, Director of Operations, Sicarius  For over 20 years, Chris has honed his skills across a wide variety of IT disciplines, including systems administration, IT security, digital forensics, risk and compliance, and incident response. Chris has provided first-rate digital forensic services for cutting edge organisations in federal law enforcement and private enterprise, both locally in Australia and Internationally. His resume includes working with the Australian Federal Police, Blackpanda and KordaMentha, supporting sophisticated, and at times high-profile investigations. […]

Avatar photo
Chris Witham

Subscribe to our blog!

To receive the latest articles from our team, provide us with your email address.

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

Cybersecurity: Why SMEs in Australia and New Zealand Must Act Now

Cybersecurity: Why SMEs in Australia and New Zealand Must Act Now

A spate of high-profile attacks affecting millions of people have hit Australia and New Zealand. These unprecedented data breaches have led to increased government scrutiny, as well as a new look at what cybersecurity resilience and posture should be for companies housing sensitive and personal customer data. The increase in cybersecurity attacks we’re seeing in these countries underscores the point that small businesses are just as much a target as enterprise companies. In fact, out of over 3 million businesses […]

Avatar photo
Hwei Oh
DNS threat protection with DNSFilter and SolCyber

DNS threat protection with DNSFilter and SolCyber

As part of our partnership launch with DNSFilter, we talk to Dave Raphael, COO at DNSFilter and David Emerson, CTO at SolCyber about the impact of network security for the modern business and why DNSFilter was a clear partner of choice for SolCyber and an integral part of our Foundational Coverage service. Provide us with an overview on what DNSFilter | SolCyber does? Dave: At DNSFilter, we provide protective DNS at the recursive DNS level to mitigate threats in real-time. […]

Avatar photo
Hwei Oh
Understanding Outsourced Cybersecurity: Managed vs. Monitoring

Understanding Outsourced Cybersecurity: Managed vs. Monitoring

Cyberattacks continue to increase. In 2020, 77% of IT leaders reported an uptick in how often cyberattacks were happening, according to Cybersecurity Magazine. Despite the rise in attacks, companies had to cut headcounts, leading to an additional burden on IT teams. In 2021, 83% of IT leaders were considering outsourcing their security needs, likely because they couldn’t properly manage so many threats. Although outsourcing security significantly reduces the workload on internal teams, choosing the right outsourced solution can be difficult, […]

Avatar photo
Charles Ho
The Do’s and Don’ts of Managing a Strained IT Department

The Do’s and Don’ts of Managing a Strained IT Department

In today’s economic climate, most managers are faced with the challenge of doing more with their existing tools or holding back on acquiring new ones due to tight budgets following the pandemic. Additionally, the current soaring inflation rate, which we haven’t seen since the early 1980s, has made companies hold on to their cash and tighten their purse strings. The recent SVB collapse and Credit Suisse’s plummeting share price have further fueled fears of a recession. Under such circumstances, managers […]

Avatar photo
Hwei Oh
The cybersecurity implications of AI

The cybersecurity implications of AI

AI went mainstream almost overnight. The technology has already changed how we live, work, and interact with each other. The use cases for AI are practically endless. Here are some of the things people are doing with AI: Unfortunately, the nascent technology has already shown several weaknesses, potentially opening the door to unforeseen types of hacks. Cybercriminals are already finding ways to use AI to their advantage, the consequences of which can be devastating. Criminals can use new technology just […]

Avatar photo
Charles Ho
Securing your business during economic uncertainty

Securing your business during economic uncertainty

In 2023, layoffs, hiring freezes, and tightening budgets are top-of-mind for many employers. 2022 was a difficult year for the world economy; and, in 2023, the aftershocks keep coming. It might feel like there’s news of another company laying off a significant part of its workforce every week, and that feeling isn’t too far off from what’s projected. Over 60% of business leaders surveyed by ResumeBuilder say they are likely to have layoffs in 2023, with 57% of these respondents […]

Avatar photo
Hwei Oh
Is your cybersecurity enough for 2023? 

Is your cybersecurity enough for 2023? 

3 key questions to ask yourself to evaluate your cybersecurity preparedness. The cybersecurity landscape changes fast, and in 2023 we’re seeing shifts at a faster clip than ever before. We’re likely to see continuing increased attacks on the supply chain, threats to critical infrastructure, a rise in ransomware, and pros and cons arising from the proliferation of artificial intelligence. Economic uncertainty, continued remote work trends, and skill shortages will be some of the major contributing factors to this landscape. Threats […]

Avatar photo
Hwei Oh
Cybersecurity and the metaverse: How to protect your virtual identity

Cybersecurity and the metaverse: How to protect your virtual identity

For many, the metaverse represents an idyllic future. Users can delve into a fully immersive virtual world, where geographic and physical barriers are removed. They can develop a perfectly crafted online identity, in the form of an avatar, which can move through various virtual environments to work, play games, shop, and socialize. Yet, while many are excited by the development of the metaverse, some are concerned about the cybersecurity risks it poses. Cybercrime is already a common occurrence. In fact, […]

Avatar photo
Charles Ho
Take our 3-minute quiz to discover your cyber risk score and see how prepared you are in managing cyber threats effectively.

Choose identity-first managed security.

We start with identity and end with transparency — protecting where attacks begin and keeping you informed, with as much visibility as you want. No black boxes, just clear, expert-driven security.
No more paying for useless bells and whistles.
No more time wasted on endless security alerts.
No more juggling multiple technologies and contracts.

Follow us!

Subscribe

Join our newsletter to stay up to date on features and releases.

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

©
2026
SolCyber. All rights reserved
|
Made with
by
Jason Pittock

I am interested in
SolCyber DPM++

I am interested in
SolCyber XDR++™

I am interested in
SolCyber MDR++™

I am interested in
SolCyber Extended Coverage™

I am interested in
SolCyber Foundational Coverage™

I am interested in a
Free Demo

2454