SolCyber Blog

Stay in the loop on the latest cybersecurity news, trends and best practices from our team.

SolCyber Blog

Stay in the loop on the latest cybersecurity news, trends and best practices from our team.

Subscribe to our blog!

To receive the latest articles from our team, provide us with your email address.

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

Identity-First Cloud Security with Ermetic and SolCyber

Identity-First Cloud Security with Ermetic and SolCyber

As public clouds supersede the datacenter for our customers, it’s not enough to represent just one facet of a general trend toward the dissolution of traditional perimeters. This trend requires a novel and comprehensive suite of controls around identity, configuration management, and endpoints, which represent the new attack surface. Ermetic provides crucial analysis of these modern infrastructure fixtures which is essential to delivering robust managed security to our customers. To launch our partnership with Ermetic, we talk to Arick Goomanovsky, […]

Avatar photo
Hwei Oh
8 email attack methods you should know about

8 email attack methods you should know about

Small businesses suffer 43% of all cyberattacks, according to data from Accenture, but only 14% of small businesses are ready to defend themselves. Considering that cybersecurity incidents cost businesses an average of $200,000 and that 60% of small businesses will go out of business within six months of an attack, cybersecurity should be a top-of-mind concern for small to mid-sized enterprises (SMEs). Email is an enormous attack vector for SMEs, and it is often the doorway to much more sophisticated […]

Avatar photo
Charles Ho
Can MSPs deliver effective cybersecurity?

Can MSPs deliver effective cybersecurity?

In the past, Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) performed very different roles. MSPs were responsible for an organization’s IT infrastructure (storage, desktop management, backups, network, etc.), and MSSPs focused on protecting the organization against cyber threats. However, as cybersecurity becomes of increasing concern for companies, the lines between MSPs and MSSPs have begun to blur. In addition to managing companies’ IT infrastructure, MSPs have begun pivoting to becoming MSSPs as well. However, the services that […]

Avatar photo
Charles Ho
Are you in acquisition mode? Make sure assessing cyber risk is part of your due diligence plan

Are you in acquisition mode? Make sure assessing cyber risk is part of your due diligence plan

As the cyber threat landscape evolves, cybercrime is becoming more professional, leading to more frequent and sophisticated attacks. All businesses are experiencing increased cyber risk – no one is excluded.  Mergers and acquisitions can cause an even higher period of risk as cybercriminals take advantage of the confusion, disarray, and shift in processes that can reduce an organization’s ability to detect and respond to potential attacks. Since small businesses make up a significant portion of acquisitions, they are a common […]

Avatar photo
Charles Ho
How a CFO’s role in cybersecurity strategy is changing

How a CFO’s role in cybersecurity strategy is changing

Traditionally, cybersecurity fell under the jurisdiction of IT, tech, or product teams and was overseen by the CISO. While these teams are still the primary players in cybersecurity decisions, the risk landscape is expanding, causing many companies to shift their thinking when it comes to cyber risk and cybersecurity. Because potential cyberattacks pose a larger risk to a business, the entire leadership team and the board (if it exists) should become key stakeholders over a business’ security efforts. The person […]

Avatar photo
Hwei Oh
How ransomware is affecting the cyber insurance industry

How ransomware is affecting the cyber insurance industry

Remember the good old days when ransomware wasn’t so rampant across industries and all types of companies, large and small? Us too. Unfortunately, the way in which hackers are using ransomware has changed significantly in the last several years, leaving every company vulnerable. So, many companies have turned to cyber insurance to protect their bottom line in the case of an attack.  A recent SonicWall 2022 Cyber Threat Report claimed that governments around the world saw a 1,885% increase in […]

Avatar photo
Charles Ho
Sizing up a new portfolio investment? Here’s why cybersecurity matters

Sizing up a new portfolio investment? Here’s why cybersecurity matters

Any investment comes with an element of risk, and when you’re conducting due diligence on a potential startup or are working to mature a company in your portfolio, cybersecurity risk should be assessed and considered as early as possible. That’s because it can quickly spiral out of control and result in financial, reputational, continuity, legal, and compliance risk to the company and the investors In the past, cybersecurity might seem like something that could have been kicked down the line, […]

Avatar photo
John London
Why SMEs should invest in cybersecurity early

Why SMEs should invest in cybersecurity early

Many small and mid-sized enterprises (SMEs) choose not to invest in cybersecurity early on, and it’s understandable why, given its impact to the bottom line. Cybersecurity tools, software and services can be expensive, and it’s time consuming to determine which tools you need. You need to weed through more than 3,500 vendors offering solutions and the process of finding the right vendors and onboarding them can take years. Fast-moving startups and SMEs neither have the expertise, time or the money.  […]

Avatar photo
Hwei Oh
The true cost of a data breach for SMEs

The true cost of a data breach for SMEs

7 costs of a data breach and how to minimize them It’s no secret that data breaches are occurring more frequently and they’re expensive. Just turn on the news and you’re sure to hear a story about the millions a major company lost thanks to a leak. Unfortunately, in too many cases, businesses experience a costly breach that could have been prevented. Something as simple as a misconfigured or insecure firewall or lack of two-factor authentication can cost a company […]

Avatar photo
Hwei Oh
Incident Response (IR) Planning for SMEs

Incident Response (IR) Planning for SMEs

Given sufficient time, resources, and motivation, a cyber threat group can breach any organization. While prevention is important, companies should treat data breaches as inevitable and ensure that they are prepared to handle them and minimize their impact. According to the 2021 Cost of a Data Breach Report developed by Ponemon and IBM, the average cost of a data breach is $4.24 million. However, having an incident response (IR) plan in place is one of the best ways to drive […]

Avatar photo
Charles Ho
Five Ways SMEs Can Break The Kill Chain

Five Ways SMEs Can Break The Kill Chain

Cyberattacks have become a risk that all organizations need to address. As cybercrime has become more organized and professionalized, cyberattacks have also become more numerous, automated, and sophisticated. The reality is that any company can be the target of a cyberattack, and prevention is not enough to protect an organization. Even the most effective cyber solution will miss some attacks so organizations need to be prepared to address an attack at every stage of the kill chain (see diagram below). […]

Avatar photo
Charles Ho
Take our 3-minute quiz to discover your cyber risk score and see how prepared you are in managing cyber threats effectively.
FOMO on the latest security tech?

FOMO on the latest security tech?

We discuss what to consider before buying in. The cybersecurity market is complex, to say the least. The current market has over 3500 vendors with new ones being added daily. Coupled with the fact that the threat landscape keeps changing, it’s difficult for any security or risk leaders, especially those in SMEs, to know how to navigate this environment. Does a new threat or risk require a new tool, or does a current vendor have it covered? Vendors aren’t making […]

Avatar photo
Charles Ho
How SMEs can prevent cyber debt from accruing

How SMEs can prevent cyber debt from accruing

A majority of small and mid-sized enterprises (SME) have outstanding debt. It’s the cost of growing a business. But you might be surprised to know that your debt can extend far beyond the money owed to a lender. Many SMEs are also accumulating technical debt — the costs associated with reworking code, products, and solutions that have been improperly implemented to deliver a product more quickly. One of the more costly types of technical debt is cyber debt.  Cyber debt […]

Avatar photo
Charles Ho
Security Advisory for the Russia – Ukraine conflict

Security Advisory for the Russia – Ukraine conflict

The world is watching the terrible conflict currently happening in Ukraine. Russia has attacked the nation in more ways than one, including leveraging cyberattacks as part of the escalating discord. SolCyber, and the information security sector as a whole is on high alert and we recommend organizations know what the elevated risk is and what they can expect from the conflict. CISA, The U.S. Cybersecurity & Infrastructure Security Agency, has issued a “Shields Up” warning to all businesses as a […]

Avatar photo
Charles Ho
Identity-First Cloud Security with Ermetic and SolCyber

Identity-First Cloud Security with Ermetic and SolCyber

As public clouds supersede the datacenter for our customers, it’s not enough to represent just one facet of a general trend toward the dissolution of traditional perimeters. This trend requires a novel and comprehensive suite of controls around identity, configuration management, and endpoints, which represent the new attack surface. Ermetic provides crucial analysis of these modern infrastructure fixtures which is essential to delivering robust managed security to our customers. To launch our partnership with Ermetic, we talk to Arick Goomanovsky, […]

Avatar photo
Hwei Oh
8 email attack methods you should know about

8 email attack methods you should know about

Small businesses suffer 43% of all cyberattacks, according to data from Accenture, but only 14% of small businesses are ready to defend themselves. Considering that cybersecurity incidents cost businesses an average of $200,000 and that 60% of small businesses will go out of business within six months of an attack, cybersecurity should be a top-of-mind concern for small to mid-sized enterprises (SMEs). Email is an enormous attack vector for SMEs, and it is often the doorway to much more sophisticated […]

Avatar photo
Charles Ho
Can MSPs deliver effective cybersecurity?

Can MSPs deliver effective cybersecurity?

In the past, Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) performed very different roles. MSPs were responsible for an organization’s IT infrastructure (storage, desktop management, backups, network, etc.), and MSSPs focused on protecting the organization against cyber threats. However, as cybersecurity becomes of increasing concern for companies, the lines between MSPs and MSSPs have begun to blur. In addition to managing companies’ IT infrastructure, MSPs have begun pivoting to becoming MSSPs as well. However, the services that […]

Avatar photo
Charles Ho

Subscribe to our blog!

To receive the latest articles from our team, provide us with your email address.

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

Are you in acquisition mode? Make sure assessing cyber risk is part of your due diligence plan

Are you in acquisition mode? Make sure assessing cyber risk is part of your due diligence plan

As the cyber threat landscape evolves, cybercrime is becoming more professional, leading to more frequent and sophisticated attacks. All businesses are experiencing increased cyber risk – no one is excluded.  Mergers and acquisitions can cause an even higher period of risk as cybercriminals take advantage of the confusion, disarray, and shift in processes that can reduce an organization’s ability to detect and respond to potential attacks. Since small businesses make up a significant portion of acquisitions, they are a common […]

Avatar photo
Charles Ho
How a CFO’s role in cybersecurity strategy is changing

How a CFO’s role in cybersecurity strategy is changing

Traditionally, cybersecurity fell under the jurisdiction of IT, tech, or product teams and was overseen by the CISO. While these teams are still the primary players in cybersecurity decisions, the risk landscape is expanding, causing many companies to shift their thinking when it comes to cyber risk and cybersecurity. Because potential cyberattacks pose a larger risk to a business, the entire leadership team and the board (if it exists) should become key stakeholders over a business’ security efforts. The person […]

Avatar photo
Hwei Oh
How ransomware is affecting the cyber insurance industry

How ransomware is affecting the cyber insurance industry

Remember the good old days when ransomware wasn’t so rampant across industries and all types of companies, large and small? Us too. Unfortunately, the way in which hackers are using ransomware has changed significantly in the last several years, leaving every company vulnerable. So, many companies have turned to cyber insurance to protect their bottom line in the case of an attack.  A recent SonicWall 2022 Cyber Threat Report claimed that governments around the world saw a 1,885% increase in […]

Avatar photo
Charles Ho
Sizing up a new portfolio investment? Here’s why cybersecurity matters

Sizing up a new portfolio investment? Here’s why cybersecurity matters

Any investment comes with an element of risk, and when you’re conducting due diligence on a potential startup or are working to mature a company in your portfolio, cybersecurity risk should be assessed and considered as early as possible. That’s because it can quickly spiral out of control and result in financial, reputational, continuity, legal, and compliance risk to the company and the investors In the past, cybersecurity might seem like something that could have been kicked down the line, […]

Avatar photo
John London
Five Ways SMEs Can Break The Kill Chain

Five Ways SMEs Can Break The Kill Chain

Cyberattacks have become a risk that all organizations need to address. As cybercrime has become more organized and professionalized, cyberattacks have also become more numerous, automated, and sophisticated. The reality is that any company can be the target of a cyberattack, and prevention is not enough to protect an organization. Even the most effective cyber solution will miss some attacks so organizations need to be prepared to address an attack at every stage of the kill chain (see diagram below). […]

Avatar photo
Charles Ho
FOMO on the latest security tech?

FOMO on the latest security tech?

We discuss what to consider before buying in. The cybersecurity market is complex, to say the least. The current market has over 3500 vendors with new ones being added daily. Coupled with the fact that the threat landscape keeps changing, it’s difficult for any security or risk leaders, especially those in SMEs, to know how to navigate this environment. Does a new threat or risk require a new tool, or does a current vendor have it covered? Vendors aren’t making […]

Avatar photo
Charles Ho
How SMEs can prevent cyber debt from accruing

How SMEs can prevent cyber debt from accruing

A majority of small and mid-sized enterprises (SME) have outstanding debt. It’s the cost of growing a business. But you might be surprised to know that your debt can extend far beyond the money owed to a lender. Many SMEs are also accumulating technical debt — the costs associated with reworking code, products, and solutions that have been improperly implemented to deliver a product more quickly. One of the more costly types of technical debt is cyber debt.  Cyber debt […]

Avatar photo
Charles Ho
Security Advisory for the Russia – Ukraine conflict

Security Advisory for the Russia – Ukraine conflict

The world is watching the terrible conflict currently happening in Ukraine. Russia has attacked the nation in more ways than one, including leveraging cyberattacks as part of the escalating discord. SolCyber, and the information security sector as a whole is on high alert and we recommend organizations know what the elevated risk is and what they can expect from the conflict. CISA, The U.S. Cybersecurity & Infrastructure Security Agency, has issued a “Shields Up” warning to all businesses as a […]

Avatar photo
Charles Ho
Take our 3-minute quiz to discover your cyber risk score and see how prepared you are in managing cyber threats effectively.

Choose identity-first managed security.

We start with identity and end with transparency — protecting where attacks begin and keeping you informed, with as much visibility as you want. No black boxes, just clear, expert-driven security.
No more paying for useless bells and whistles.
No more time wasted on endless security alerts.
No more juggling multiple technologies and contracts.

Follow us!

Subscribe

Join our newsletter to stay up to date on features and releases.

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

©
2026
SolCyber. All rights reserved
|
Made with
by
Jason Pittock

I am interested in
SolCyber DPM++

I am interested in
SolCyber XDR++™

I am interested in
SolCyber MDR++™

I am interested in
SolCyber Extended Coverage™

I am interested in
SolCyber Foundational Coverage™

I am interested in a
Free Demo

1220