Home
Blog
Security

Security articles

What is a Managed Security Program?

What is a Managed Security Program?

Data from the FBI’s IC3 (Internet Crime Complaint Center) painted a stark picture of digital crime in 2022. The center recorded 800,944 complaints, leading to financial losses exceeding $10.3 billion. The increased sophistication in these crimes is driven, in part, by advancements in artificial intelligence technology. Many companies are still inadequately equipped to counter these escalating cyber threats because of the following factors: All of the above adds up to an immense investment required from SMBs to keep cybercriminals out […]

Avatar photo
Hwei Oh
Evolving cyber threats in 2023

Evolving cyber threats in 2023

To stay competitive and relevant in business, we have to understand how to move at the pace of technology. We see this on both the consumer and business sides – expectations evolve alongside emerging trends, such as AI and machine learning. The same is true for cybercriminals. They also move at the pace of technology, and they’re counting on businesses to be behind the curve. While many attacks are known, such as phishing, business email compromise (BEC), and ransomware, tactics […]

Avatar photo
Charles Ho
Why the Legal Industry Needs to Pay Attention to Cybersecurity

Why the Legal Industry Needs to Pay Attention to Cybersecurity

Cyberattacks across all industries are on the rise, but the numbers are particularly troubling for the legal industry. According to American Bar Association’s 2022 Legal Technology Survey Report, 27% of respondents claimed to have experienced a security breach – up from 25% the year before. An additional 25% reported not knowing if their firm had experienced a security breach. A 2021 report released by security firm BlueVoyant found that while 15% of thousands of law firms showed signs of compromised networks, […]

Avatar photo
Hwei Oh
Why the Healthcare Industry Needs to Rethink Cybersecurity in 2023

Why the Healthcare Industry Needs to Rethink Cybersecurity in 2023

No industry was more affected by the COVID-19 pandemic than the healthcare industry. While stories of frontline worker heroics and employee shortages took center stage, another important story has been brewing over the last few years — the significant increase in cybersecurity attacks in the healthcare space. With stay-at-home orders and social distancing requirements in place throughout 2020, many healthcare systems were forced to rapidly adopt healthcare technology that allowed for telemedicine and the remote monitoring of patients. The way […]

Avatar photo
Hwei Oh
Preparing for SEC Recommendations

Preparing for SEC Recommendations

Update Aug 16, 2023: On July 26th, the SEC officially released newly adopted rules on disclosing any data breaches and cyber incidents for any company under SEC jurisdiction and regulation, including foreign private issuers. The rules require disclosure of any cyber incident four days after the registrant (the affected entity) finds the incident to be a material incident, meaning it can affect shareholders and investors. Registrants will also have to detail any processes that pertain to “assessing, identifying, and managing material risks from cybersecurity […]

Avatar photo
Charles Ho
DNS threat protection with DNSFilter and SolCyber

DNS threat protection with DNSFilter and SolCyber

As part of our partnership launch with DNSFilter, we talk to Dave Raphael, COO at DNSFilter and David Emerson, CTO at SolCyber about the impact of network security for the modern business and why DNSFilter was a clear partner of choice for SolCyber and an integral part of our Foundational Coverage service. Provide us with an overview on what DNSFilter | SolCyber does? Dave: At DNSFilter, we provide protective DNS at the recursive DNS level to mitigate threats in real-time. […]

Avatar photo
Hwei Oh
Understanding Outsourced Cybersecurity: Managed vs. Monitoring

Understanding Outsourced Cybersecurity: Managed vs. Monitoring

Cyberattacks continue to increase. In 2020, 77% of IT leaders reported an uptick in how often cyberattacks were happening, according to Cybersecurity Magazine. Despite the rise in attacks, companies had to cut headcounts, leading to an additional burden on IT teams. In 2021, 83% of IT leaders were considering outsourcing their security needs, likely because they couldn’t properly manage so many threats. Although outsourcing security significantly reduces the workload on internal teams, choosing the right outsourced solution can be difficult, […]

Avatar photo
Charles Ho
How the energy and renewables sector can protect against cyberattacks

How the energy and renewables sector can protect against cyberattacks

Cyberattacks are one of the biggest threats facing businesses today, and the energy and renewables sector is not exempt. In fact, energy companies frequently make the list of the top 10 industries targeted by attackers. As the industry undergoes massive change, it’s entirely possible that energy companies become an even more enticing target. There are several reasons the industry is so vulnerable, but chief among them is the large attack surface. Vulnerabilities exist not just in power plants, but in […]

Avatar photo
Hwei Oh
Practical vulnerability management for SMEs

Practical vulnerability management for SMEs

As SMEs look to find new ways of being cost-effective, efficient, and reaching broader audiences, they often turn to digitalization. While an expanding digital environment presents more growth opportunities for businesses, it also creates problems for leaders who are looking to manage and maintain risk. This often emerges in the form of an increased attack surface and a rise in common vulnerabilities and high risk vulnerabilities. This can result in potential threats reaching your network, becoming a major business risk […]

Avatar photo
Charles Ho
Is your cybersecurity enough for 2023? 

Is your cybersecurity enough for 2023? 

3 key questions to ask yourself to evaluate your cybersecurity preparedness. The cybersecurity landscape changes fast, and in 2023 we’re seeing shifts at a faster clip than ever before. We’re likely to see continuing increased attacks on the supply chain, threats to critical infrastructure, a rise in ransomware, and pros and cons arising from the proliferation of artificial intelligence. Economic uncertainty, continued remote work trends, and skill shortages will be some of the major contributing factors to this landscape. Threats […]

Avatar photo
Hwei Oh
Cybersecurity and the metaverse: How to protect your virtual identity

Cybersecurity and the metaverse: How to protect your virtual identity

For many, the metaverse represents an idyllic future. Users can delve into a fully immersive virtual world, where geographic and physical barriers are removed. They can develop a perfectly crafted online identity, in the form of an avatar, which can move through various virtual environments to work, play games, shop, and socialize. Yet, while many are excited by the development of the metaverse, some are concerned about the cybersecurity risks it poses. Cybercrime is already a common occurrence. In fact, […]

Avatar photo
Charles Ho
Startup success: Why addressing cybersecurity from the beginning is critical

Startup success: Why addressing cybersecurity from the beginning is critical

As a startup, you can’t afford to ignore potential cybersecurity challenges No matter the size of your organization, a lack of preparedness will put you at risk for cybersecurity attacks. Often, startups think they are flying under the radar of most cyber criminals and are not as vulnerable. However, the reality is quite the opposite. CISA put out advice* in 2015 that’s still widely applicable today: Startups need to think about cybersecurity from day 1 or experience a higher risk […]

Avatar photo
Hwei Oh
Boost cybersecurity for small biz: Proven protection strategies

Boost cybersecurity for small biz: Proven protection strategies

One common misconception about cybersecurity is that small businesses mean small cyber risks; but, in fact, businesses of all sizes need to stay vigilant in the face of cyber threats. As distressing as those stats are, the worst news comes after a cyberattack. It is estimated that 60% of small businesses closed their doors within 6 months of a breach – meaning the hack was so bad that it left irreparable damage in its wake. Getting to a level of […]

Avatar photo
Hwei Oh
8 Takeaways from CISA’s latest report for cybersecurity

8 Takeaways from CISA’s latest report for cybersecurity

The Cybersecurity & Infrastructure Security Agency (CISA) recently released its latest report — covering 2022 Cross-Sector Cybersecurity Performance Goals (CPGs). These goals demonstrate a continued focus on the cybersecurity and risk management of small to medium-sized companies. These businesses are dealing with budgetary and resource constraints yet fall victim to the same kind of attacks that bedevil enterprise companies. In this article, we’re going to talk about the report, why it’s important for organizations of all sizes, and share our […]

Avatar photo
Charles Ho

Follow us!

Subscribe

Join our newsletter to stay up to date on features and releases.

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

©
2026
SolCyber. All rights reserved
|
Made with
by
Jason Pittock

I am interested in
SolCyber DPM++

I am interested in
SolCyber XDR++™

I am interested in
SolCyber MDR++™

I am interested in
SolCyber Extended Coverage™

I am interested in
SolCyber Foundational Coverage™

I am interested in a
Free Demo

2590