SolCyber Blog

Stay in the loop on the latest cybersecurity news, trends and best practices from our team.

SolCyber Blog

Stay in the loop on the latest cybersecurity news, trends and best practices from our team.

Subscribe to our blog!

To receive the latest articles from our team, provide us with your email address.

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

Startup success: Why addressing cybersecurity from the beginning is critical

Startup success: Why addressing cybersecurity from the beginning is critical

As a startup, you can’t afford to ignore potential cybersecurity challenges No matter the size of your organization, a lack of preparedness will put you at risk for cybersecurity attacks. Often, startups think they are flying under the radar of most cyber criminals and are not as vulnerable. However, the reality is quite the opposite. CISA put out advice* in 2015 that’s still widely applicable today: Startups need to think about cybersecurity from day 1 or experience a higher risk […]

Avatar photo
Hwei Oh
Boost cybersecurity for small biz: Proven protection strategies

Boost cybersecurity for small biz: Proven protection strategies

One common misconception about cybersecurity is that small businesses mean small cyber risks; but, in fact, businesses of all sizes need to stay vigilant in the face of cyber threats. As distressing as those stats are, the worst news comes after a cyberattack. It is estimated that 60% of small businesses closed their doors within 6 months of a breach – meaning the hack was so bad that it left irreparable damage in its wake. Getting to a level of […]

Avatar photo
Hwei Oh
8 Takeaways from CISA’s latest report for cybersecurity

8 Takeaways from CISA’s latest report for cybersecurity

The Cybersecurity & Infrastructure Security Agency (CISA) recently released its latest report — covering 2022 Cross-Sector Cybersecurity Performance Goals (CPGs). These goals demonstrate a continued focus on the cybersecurity and risk management of small to medium-sized companies. These businesses are dealing with budgetary and resource constraints yet fall victim to the same kind of attacks that bedevil enterprise companies. In this article, we’re going to talk about the report, why it’s important for organizations of all sizes, and share our […]

Avatar photo
Charles Ho
MDR vs. MSSP vs. SolCyber – A Comparison

MDR vs. MSSP vs. SolCyber – A Comparison

When you’re tasked with choosing the right cybersecurity partner, it can be a challenge to sort out which services make sense for your organization. While managed services are necessary for many smaller and newer companies, it’s easy to get caught up in “acronym soup” – MSSP, MDR, XDR, MXDR – how do you sift through it all? Are you unsure what your company might need? Are you struggling to distinguish between services from various partners? We’re here to help you […]

Avatar photo
Hwei Oh
Cyber resilience and digitalization

Cyber resilience and digitalization

According to a McKinsey survey, the COVID-19 pandemic sped up digital transformation — or digitalization — by several years. Digital interactions between customers and organizations soared to 58%, three years ahead of expectations. And the percentage of businesses that now offer some form of digital product or service is at 55%, seven years ahead of expectations! Digitalization greatly improves efficiency. For example, bookkeeping software connects directly with bank accounts so that a company can track all its expenditures and income […]

Avatar photo
Hwei Oh
Are you the weakest link in the supply chain?

Are you the weakest link in the supply chain?

As a small business, you probably think you’re small potatoes to hackers. Unfortunately, the opposite can often be true. Smaller businesses that are part of supply chains are frequently chosen by hackers because they are an easy target as a valuable foot in the door to a substantially larger company. In fact, in 2022, businesses reported that about 1 in 5 data breaches came from a supplier. You want to be seen as an asset to the companies you serve, […]

Avatar photo
Charles Ho
Anatomy of an Incident Response Plan

Anatomy of an Incident Response Plan

In our previous two articles in this series, we talked about what an Incident Response (IR) plan is and how to get your team familiar with its steps and the process using tabletop exercises. In this article, we’re going to go into detail on what happens during IR and the nitty-gritty of what makes an IR plan work. An IR plan and robust IR strategy are both vital to ensure that a company recovers properly from an incident. Even companies […]

Avatar photo
Hwei Oh
Top cyber tips to help you stay vigilant over the holiday shopping season

Top cyber tips to help you stay vigilant over the holiday shopping season

The holiday shopping season is well underway and it’s often one of the busiest for retailers, eCommerce companies, and others who seek to use the holiday as an opportunity to offer discounted prices on their most popular products. Online shopping this year reached $9.1B on Black Friday and $11.3B on Cyber Monday and Google estimates that, on average, websites can see a traffic increase of 300% during the holiday shopping season. However, this period can also be an opportune time […]

Avatar photo
Hwei Oh
What’s a tabletop exercise and why is it needed?

What’s a tabletop exercise and why is it needed?

The thought of the Rams going onto the field with the 49ers without first spending months practicing would be unheard of. And the same is true of responding to cyberattacks in a company. Firefighters do fire drills. Actors do dress rehearsals. And IT and security teams do tabletop exercises. Tabletop exercises are a low-stress rehearsal of what might arise during an emergency situation. In this case, a cyberattack. Participants sit and discuss a scenario and their potential responses to it. […]

Avatar photo
Hwei Oh
What is an Incident Response (IR) plan and why do SMEs need one?

What is an Incident Response (IR) plan and why do SMEs need one?

A swift and adequate response to an active cybersecurity threat can mean the difference between your company surviving the incident or going under. Small to mid-sized enterprises (SMEs) are especially at risk because they are looked upon as low-hanging fruit by hackers and they tend to have fewer defense and response mechanisms in place than larger corporations, especially because of budget constraints. According to IBM’s Cost of a Data Breach Report for 2021, the average cost of a breach was […]

Avatar photo
Hwei Oh
Top 10 questions about cyber insurance…. answered!

Top 10 questions about cyber insurance…. answered!

The year 2021 saw ransomware attacks rising by a jaw-dropping 92%. And 22 billion records were exposed across 4,145 publicly disclosed attacks. Considering that a breach will cost companies an average of $4.5 million, the need for cyber insurance has never been so high. But what is cyber insurance exactly, and is it right for your business and industry? In this article, we will try and answer the questions most frequently asked about cyber insurance. 1. What exactly is cyber […]

Avatar photo
Hwei Oh
Take our 3-minute quiz to discover your cyber risk score and see how prepared you are in managing cyber threats effectively.
5 Lessons to Learn from the Uber Hack

5 Lessons to Learn from the Uber Hack

In September 2022, an 18-year-old hacker leveraged sophisticated social engineering techniques to smash into Uber’s network. Once inside, the hacker rummaged through a file share and found privileged credentials that gave access to enormous swathes of Uber’s source code and corporate cloud platforms. Luckily, no trip data was taken, according to Uber. But trusting luck is a terrible strategy for cybersecurity. How did the Uber hack happen? According to an official statement by Uber, the breach was carried out when […]

Avatar photo
Charles Ho
A CISO’s guide to setting up a SOC

A CISO’s guide to setting up a SOC

As organizations mature, they are exposed to ever-increasing internal and external risks. Internally, from the danger of executing projects with the same entrenched and unsecured processes. Externally, from the threat of cyberattacks that take advantage of any chink in the security armor. Few initiatives sit at the intersection of these concerns as the creation of a Security Operations Center (SOC). Building a SOC requires new tools and technology, diligent work with partners and vendors, as well as successful recruitment and […]

David Emerson
Cyber Resilience vs. Cybersecurity: What’s the difference?

Cyber Resilience vs. Cybersecurity: What’s the difference?

“A lock only keeps honest people out.” With the current cybersecurity threat landscape, SMEs need to secure their organization to lower their exposure to risk. While there are a lot of tools available that are designed to mitigate or prevent threats, employing the proper framework and approach that aligns with your cybersecurity goals will make the most difference in your planning efforts. Modern threats require modern approaches, and we can only prevent what we can anticipate. Because of this, it’s […]

Avatar photo
Hwei Oh
Startup success: Why addressing cybersecurity from the beginning is critical

Startup success: Why addressing cybersecurity from the beginning is critical

As a startup, you can’t afford to ignore potential cybersecurity challenges No matter the size of your organization, a lack of preparedness will put you at risk for cybersecurity attacks. Often, startups think they are flying under the radar of most cyber criminals and are not as vulnerable. However, the reality is quite the opposite. CISA put out advice* in 2015 that’s still widely applicable today: Startups need to think about cybersecurity from day 1 or experience a higher risk […]

Avatar photo
Hwei Oh
Boost cybersecurity for small biz: Proven protection strategies

Boost cybersecurity for small biz: Proven protection strategies

One common misconception about cybersecurity is that small businesses mean small cyber risks; but, in fact, businesses of all sizes need to stay vigilant in the face of cyber threats. As distressing as those stats are, the worst news comes after a cyberattack. It is estimated that 60% of small businesses closed their doors within 6 months of a breach – meaning the hack was so bad that it left irreparable damage in its wake. Getting to a level of […]

Avatar photo
Hwei Oh
8 Takeaways from CISA’s latest report for cybersecurity

8 Takeaways from CISA’s latest report for cybersecurity

The Cybersecurity & Infrastructure Security Agency (CISA) recently released its latest report — covering 2022 Cross-Sector Cybersecurity Performance Goals (CPGs). These goals demonstrate a continued focus on the cybersecurity and risk management of small to medium-sized companies. These businesses are dealing with budgetary and resource constraints yet fall victim to the same kind of attacks that bedevil enterprise companies. In this article, we’re going to talk about the report, why it’s important for organizations of all sizes, and share our […]

Avatar photo
Charles Ho

Subscribe to our blog!

To receive the latest articles from our team, provide us with your email address.

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

MDR vs. MSSP vs. SolCyber – A Comparison

MDR vs. MSSP vs. SolCyber – A Comparison

When you’re tasked with choosing the right cybersecurity partner, it can be a challenge to sort out which services make sense for your organization. While managed services are necessary for many smaller and newer companies, it’s easy to get caught up in “acronym soup” – MSSP, MDR, XDR, MXDR – how do you sift through it all? Are you unsure what your company might need? Are you struggling to distinguish between services from various partners? We’re here to help you […]

Avatar photo
Hwei Oh
Cyber resilience and digitalization

Cyber resilience and digitalization

According to a McKinsey survey, the COVID-19 pandemic sped up digital transformation — or digitalization — by several years. Digital interactions between customers and organizations soared to 58%, three years ahead of expectations. And the percentage of businesses that now offer some form of digital product or service is at 55%, seven years ahead of expectations! Digitalization greatly improves efficiency. For example, bookkeeping software connects directly with bank accounts so that a company can track all its expenditures and income […]

Avatar photo
Hwei Oh
Are you the weakest link in the supply chain?

Are you the weakest link in the supply chain?

As a small business, you probably think you’re small potatoes to hackers. Unfortunately, the opposite can often be true. Smaller businesses that are part of supply chains are frequently chosen by hackers because they are an easy target as a valuable foot in the door to a substantially larger company. In fact, in 2022, businesses reported that about 1 in 5 data breaches came from a supplier. You want to be seen as an asset to the companies you serve, […]

Avatar photo
Charles Ho
Anatomy of an Incident Response Plan

Anatomy of an Incident Response Plan

In our previous two articles in this series, we talked about what an Incident Response (IR) plan is and how to get your team familiar with its steps and the process using tabletop exercises. In this article, we’re going to go into detail on what happens during IR and the nitty-gritty of what makes an IR plan work. An IR plan and robust IR strategy are both vital to ensure that a company recovers properly from an incident. Even companies […]

Avatar photo
Hwei Oh
Top 10 questions about cyber insurance…. answered!

Top 10 questions about cyber insurance…. answered!

The year 2021 saw ransomware attacks rising by a jaw-dropping 92%. And 22 billion records were exposed across 4,145 publicly disclosed attacks. Considering that a breach will cost companies an average of $4.5 million, the need for cyber insurance has never been so high. But what is cyber insurance exactly, and is it right for your business and industry? In this article, we will try and answer the questions most frequently asked about cyber insurance. 1. What exactly is cyber […]

Avatar photo
Hwei Oh
5 Lessons to Learn from the Uber Hack

5 Lessons to Learn from the Uber Hack

In September 2022, an 18-year-old hacker leveraged sophisticated social engineering techniques to smash into Uber’s network. Once inside, the hacker rummaged through a file share and found privileged credentials that gave access to enormous swathes of Uber’s source code and corporate cloud platforms. Luckily, no trip data was taken, according to Uber. But trusting luck is a terrible strategy for cybersecurity. How did the Uber hack happen? According to an official statement by Uber, the breach was carried out when […]

Avatar photo
Charles Ho
A CISO’s guide to setting up a SOC

A CISO’s guide to setting up a SOC

As organizations mature, they are exposed to ever-increasing internal and external risks. Internally, from the danger of executing projects with the same entrenched and unsecured processes. Externally, from the threat of cyberattacks that take advantage of any chink in the security armor. Few initiatives sit at the intersection of these concerns as the creation of a Security Operations Center (SOC). Building a SOC requires new tools and technology, diligent work with partners and vendors, as well as successful recruitment and […]

David Emerson
Cyber Resilience vs. Cybersecurity: What’s the difference?

Cyber Resilience vs. Cybersecurity: What’s the difference?

“A lock only keeps honest people out.” With the current cybersecurity threat landscape, SMEs need to secure their organization to lower their exposure to risk. While there are a lot of tools available that are designed to mitigate or prevent threats, employing the proper framework and approach that aligns with your cybersecurity goals will make the most difference in your planning efforts. Modern threats require modern approaches, and we can only prevent what we can anticipate. Because of this, it’s […]

Avatar photo
Hwei Oh
Take our 3-minute quiz to discover your cyber risk score and see how prepared you are in managing cyber threats effectively.

Choose identity-first managed security.

We start with identity and end with transparency — protecting where attacks begin and keeping you informed, with as much visibility as you want. No black boxes, just clear, expert-driven security.
No more paying for useless bells and whistles.
No more time wasted on endless security alerts.
No more juggling multiple technologies and contracts.

Follow us!

Subscribe

Join our newsletter to stay up to date on features and releases.

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

©
2026
SolCyber. All rights reserved
|
Made with
by
Jason Pittock

I am interested in
SolCyber DPM++

I am interested in
SolCyber XDR++™

I am interested in
SolCyber MDR++™

I am interested in
SolCyber Extended Coverage™

I am interested in
SolCyber Foundational Coverage™

I am interested in a
Free Demo

2005