SolCyber Blog

Stay in the loop on the latest cybersecurity news, trends and best practices from our team.

SolCyber Blog

Stay in the loop on the latest cybersecurity news, trends and best practices from our team.

Subscribe to our blog!

To receive the latest articles from our team, provide us with your email address.

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

Cybersecurity You Can Switch On

Cybersecurity You Can Switch On

Why oh why is cybersecurity so complex? I was at an event recently and the keynote speaker talked about how security is unique in its incredibly minimal consolidation. In the cloud, you have arguably three major players (Amazon, Microsoft, and Google). In mobile phones a few. In almost any area of life, consolidation happens (auto’s maybe 10, TV’s 3-4, etc). Yet, in information security, no one company has greater than 5% of the market. The equivalent of cyber security is […]

Avatar photo
Scott McCrady
How MSPs Can Quickly Grow Security Revenue with the Right Partner

How MSPs Can Quickly Grow Security Revenue with the Right Partner

The small to mid-sized enterprise (SME) market is wildly underserved in the cybersecurity sector, opening up massive opportunities for Managed Security Service Providers (MSSPs), as well as Managed Service Providers (MSPs) who could benefit from offering stronger security services as part of their overall IT offering.  Many MSPs are tempted to build out a security practice but this requires extensive investment and more importantly, will take time before the offering ever hits the market. Partnering with a MSSP can be […]

Avatar photo
Hwei Oh
The Dangers of Zero-Day Exploits

The Dangers of Zero-Day Exploits

Software vulnerabilities are a fact of life with more identified every day. In 2021, 28,695 new vulnerabilities were discovered in production software. These vulnerabilities can potentially create a backdoor to companies, letting attackers come in and out as they please. However, some vulnerabilities are significantly more dangerous than others with widespread impact. Many of these high-impact vulnerabilities — such as Log4j and Follina — are zero-days, where vulnerabilities are exploited by cyber threat actors in the wild before they become […]

Avatar photo
Charles Ho
Cyber risk management – the trifecta of cyber resilience

Cyber risk management – the trifecta of cyber resilience

Risk management is a core part of any organization’s business processes. Without the ability to manage risk, an unforeseen event could put the company out of business. Effective and comprehensive risk management requires an understanding of what can go wrong, how to minimize the probability of a risk event occurring, and how to recover if something does go wrong. In many ways, managing risk for the business is similar to owning a car. Car ownership comes with significant risks and […]

Avatar photo
Hwei Oh
How to build cyber resilience on a budget

How to build cyber resilience on a budget

SMEs have little wiggle room regarding cybersecurity. Smaller budgets and fewer dedicated security resources mean that cyberattack attempts are more likely to penetrate an SME’s defenses than those of a larger company.  Forty-three percent of all cyberattacks are aimed directly at small to medium businesses, and only 14% of SMEs are ready to defend against those attacks, according to a study by Accenture. Aside from being extremely inconvenient, these data breaches also get expensive. The cost of data breaches to […]

Avatar photo
Hwei Oh
What is Security “as a Service”?

What is Security “as a Service”?

Cybersecurity has become a top-of-mind concern for many organizations. The cyber threat landscape is evolving rapidly, and companies face near-constant attacks. These attacks are growing more sophisticated and subtle as well, making them more difficult to detect and remediate. At the same time, companies face significant barriers to their ability to protect themselves against these attacks. The cybersecurity industry is facing a significant talent shortage, making it difficult for organizations to attract and retain the cybersecurity professionals that they need […]

Avatar photo
Charles Ho
Why Visibility into Your Portfolio’s Cyber Risk is More Important Than Ever

Why Visibility into Your Portfolio’s Cyber Risk is More Important Than Ever

Risk management is an important part of the investors’ job. If a business they capitalize suffers significant losses due to various risks, the value of that business decreases, and the investors lose  money. Investors must consider a variety of different potential risks to organizations they are  considering as targets. Before committing funds, they’ll need to account for financial, compliance, reputational, and other risks to the business. However, in addition to the factors above, cyber risks have emerged as another major […]

Avatar photo
Hwei Oh
SolCyber: Celebrating our one year “stealthiversary”

SolCyber: Celebrating our one year “stealthiversary”

It’s been one year since we’ve come out of stealth, and it’s been an incredible experience for the whole team at SolCyber. It’s heartening to see how much progress we’ve made in the relatively short time since my first blog post introduced SolCyber to the market. Our mission of enabling small to mid-sized enterprises (SMEs) easy access to effective and affordable security has only been spurred on by the validation and feedback we’re receiving. As a CEO, there’s tremendous pressure […]

Avatar photo
Scott McCrady
Why VC and PE Firms Need to Consider Their Own Cybersecurity

Why VC and PE Firms Need to Consider Their Own Cybersecurity

Venture Capital (VC) and Private Equity (PE) firms take on a lot of risk when investing in a new startup or operating business. Although it is vital to perform all necessary due diligence on any new investment, VC/PE firms shouldn’t ignore their own risk. Rather, they need to take a hard look at their own cybersecurity posture. Hackers know that these companies may lead to significant payouts. After all, global venture investment in 2021 obliterated all previous records, hitting a […]

Avatar photo
Charles Ho
Are cybercriminals really targeting SMEs?

Are cybercriminals really targeting SMEs?

Yes, small to mid-sized enterprises (SMEs) continue to prove a fruitful target for cybercriminals.  The Allianz Risk Barometer reported that cyber risks are the largest concern for companies globally in 2022. And the number of cyberattack attempts per week reached an all-time high in Q4 of 2021.  Many hacking attempts — such as spam containing malicious links — are general in scope, not discriminating against the company’s size or sector. But the hit rate for small and medium businesses is […]

Avatar photo
Hwei Oh
Risky Roles! Which employees are most at risk of cyber attacks?

Risky Roles! Which employees are most at risk of cyber attacks?

When it comes to cybersecurity risk – it’s not just devices and networks that are susceptible to attacks. Employees are a prime target for threat actors. Research suggests that employees of small businesses will be hit with a 350% higher level of social engineering attacks than those who work in large businesses.  Companies with a minimal security posture in place are the most likely to be compromised. Because they may not have robust cybersecurity measures in place, they’re essentially leaving […]

Avatar photo
Hwei Oh
Take our 3-minute quiz to discover your cyber risk score and see how prepared you are in managing cyber threats effectively.
Latest cyber insurance stats and what’s trending

Latest cyber insurance stats and what’s trending

If there’s one thing we can definitely say about the post-2020 era is that we’re all more open to “going digital.” This comes with its own advantages and disadvantages. We are more open to remote work, and have access to more opportunities than ever, but we’re also more likely to become victims of cybercrime too. Cyber insurance stats and cybersecurity research show that now, more than ever, businesses of all sizes are more inclined to pay more attention to online […]

Avatar photo
Hwei Oh
Is cyber insurance necessary?

Is cyber insurance necessary?

Top 3 Reasons Cyber Insurance Policies Make Sense for SMEs Threat actors don’t discriminate and often leverage advanced attacks that are deployed continuously, ready to hit companies that may not have the resources, technology, or awareness to properly defend themselves. This often results in SMEs taking the brunt of these attacks. As a result, almost half of all small businesses admit to having been victims of cyberattacks in the last twelve months. Yet, despite this increase in risk, small businesses […]

Avatar photo
Hwei Oh
Cycling and cybersecurity

Cycling and cybersecurity

The importance of a curated stack, as told by a novice cyclist Around the start of Summer 2020 I began thinking: I really need to get outside more. This probably sounds familiar to anyone who was trying to make the best of a bad situation in 2020. I was already acclimated to a work-from-home situation, but my home office was feeling stuffy and I was tossing around the idea of getting a used bike. There was a large residential area […]

Avatar photo
Dustin Deckard
Cybersecurity You Can Switch On

Cybersecurity You Can Switch On

Why oh why is cybersecurity so complex? I was at an event recently and the keynote speaker talked about how security is unique in its incredibly minimal consolidation. In the cloud, you have arguably three major players (Amazon, Microsoft, and Google). In mobile phones a few. In almost any area of life, consolidation happens (auto’s maybe 10, TV’s 3-4, etc). Yet, in information security, no one company has greater than 5% of the market. The equivalent of cyber security is […]

Avatar photo
Scott McCrady
How MSPs Can Quickly Grow Security Revenue with the Right Partner

How MSPs Can Quickly Grow Security Revenue with the Right Partner

The small to mid-sized enterprise (SME) market is wildly underserved in the cybersecurity sector, opening up massive opportunities for Managed Security Service Providers (MSSPs), as well as Managed Service Providers (MSPs) who could benefit from offering stronger security services as part of their overall IT offering.  Many MSPs are tempted to build out a security practice but this requires extensive investment and more importantly, will take time before the offering ever hits the market. Partnering with a MSSP can be […]

Avatar photo
Hwei Oh
The Dangers of Zero-Day Exploits

The Dangers of Zero-Day Exploits

Software vulnerabilities are a fact of life with more identified every day. In 2021, 28,695 new vulnerabilities were discovered in production software. These vulnerabilities can potentially create a backdoor to companies, letting attackers come in and out as they please. However, some vulnerabilities are significantly more dangerous than others with widespread impact. Many of these high-impact vulnerabilities — such as Log4j and Follina — are zero-days, where vulnerabilities are exploited by cyber threat actors in the wild before they become […]

Avatar photo
Charles Ho

Subscribe to our blog!

To receive the latest articles from our team, provide us with your email address.

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

Cyber risk management – the trifecta of cyber resilience

Cyber risk management – the trifecta of cyber resilience

Risk management is a core part of any organization’s business processes. Without the ability to manage risk, an unforeseen event could put the company out of business. Effective and comprehensive risk management requires an understanding of what can go wrong, how to minimize the probability of a risk event occurring, and how to recover if something does go wrong. In many ways, managing risk for the business is similar to owning a car. Car ownership comes with significant risks and […]

Avatar photo
Hwei Oh
How to build cyber resilience on a budget

How to build cyber resilience on a budget

SMEs have little wiggle room regarding cybersecurity. Smaller budgets and fewer dedicated security resources mean that cyberattack attempts are more likely to penetrate an SME’s defenses than those of a larger company.  Forty-three percent of all cyberattacks are aimed directly at small to medium businesses, and only 14% of SMEs are ready to defend against those attacks, according to a study by Accenture. Aside from being extremely inconvenient, these data breaches also get expensive. The cost of data breaches to […]

Avatar photo
Hwei Oh
What is Security “as a Service”?

What is Security “as a Service”?

Cybersecurity has become a top-of-mind concern for many organizations. The cyber threat landscape is evolving rapidly, and companies face near-constant attacks. These attacks are growing more sophisticated and subtle as well, making them more difficult to detect and remediate. At the same time, companies face significant barriers to their ability to protect themselves against these attacks. The cybersecurity industry is facing a significant talent shortage, making it difficult for organizations to attract and retain the cybersecurity professionals that they need […]

Avatar photo
Charles Ho
Why Visibility into Your Portfolio’s Cyber Risk is More Important Than Ever

Why Visibility into Your Portfolio’s Cyber Risk is More Important Than Ever

Risk management is an important part of the investors’ job. If a business they capitalize suffers significant losses due to various risks, the value of that business decreases, and the investors lose  money. Investors must consider a variety of different potential risks to organizations they are  considering as targets. Before committing funds, they’ll need to account for financial, compliance, reputational, and other risks to the business. However, in addition to the factors above, cyber risks have emerged as another major […]

Avatar photo
Hwei Oh
Risky Roles! Which employees are most at risk of cyber attacks?

Risky Roles! Which employees are most at risk of cyber attacks?

When it comes to cybersecurity risk – it’s not just devices and networks that are susceptible to attacks. Employees are a prime target for threat actors. Research suggests that employees of small businesses will be hit with a 350% higher level of social engineering attacks than those who work in large businesses.  Companies with a minimal security posture in place are the most likely to be compromised. Because they may not have robust cybersecurity measures in place, they’re essentially leaving […]

Avatar photo
Hwei Oh
Latest cyber insurance stats and what’s trending

Latest cyber insurance stats and what’s trending

If there’s one thing we can definitely say about the post-2020 era is that we’re all more open to “going digital.” This comes with its own advantages and disadvantages. We are more open to remote work, and have access to more opportunities than ever, but we’re also more likely to become victims of cybercrime too. Cyber insurance stats and cybersecurity research show that now, more than ever, businesses of all sizes are more inclined to pay more attention to online […]

Avatar photo
Hwei Oh
Is cyber insurance necessary?

Is cyber insurance necessary?

Top 3 Reasons Cyber Insurance Policies Make Sense for SMEs Threat actors don’t discriminate and often leverage advanced attacks that are deployed continuously, ready to hit companies that may not have the resources, technology, or awareness to properly defend themselves. This often results in SMEs taking the brunt of these attacks. As a result, almost half of all small businesses admit to having been victims of cyberattacks in the last twelve months. Yet, despite this increase in risk, small businesses […]

Avatar photo
Hwei Oh
Cycling and cybersecurity

Cycling and cybersecurity

The importance of a curated stack, as told by a novice cyclist Around the start of Summer 2020 I began thinking: I really need to get outside more. This probably sounds familiar to anyone who was trying to make the best of a bad situation in 2020. I was already acclimated to a work-from-home situation, but my home office was feeling stuffy and I was tossing around the idea of getting a used bike. There was a large residential area […]

Avatar photo
Dustin Deckard
Take our 3-minute quiz to discover your cyber risk score and see how prepared you are in managing cyber threats effectively.

Choose identity-first managed security.

We start with identity and end with transparency — protecting where attacks begin and keeping you informed, with as much visibility as you want. No black boxes, just clear, expert-driven security.
No more paying for useless bells and whistles.
No more time wasted on endless security alerts.
No more juggling multiple technologies and contracts.

Follow us!

Subscribe

Join our newsletter to stay up to date on features and releases.

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

©
2026
SolCyber. All rights reserved
|
Made with
by
Jason Pittock

I am interested in
SolCyber DPM++

I am interested in
SolCyber XDR++™

I am interested in
SolCyber MDR++™

I am interested in
SolCyber Extended Coverage™

I am interested in
SolCyber Foundational Coverage™

I am interested in a
Free Demo

1581