Home
Blog
Security

Security articles

MDR vs. MSSP vs. SolCyber – A Comparison

MDR vs. MSSP vs. SolCyber – A Comparison

When you’re tasked with choosing the right cybersecurity partner, it can be a challenge to sort out which services make sense for your organization. While managed services are necessary for many smaller and newer companies, it’s easy to get caught up in “acronym soup” – MSSP, MDR, XDR, MXDR – how do you sift through it all? Are you unsure what your company might need? Are you struggling to distinguish between services from various partners? We’re here to help you […]

Avatar photo
Hwei Oh
Cyber resilience and digitalization

Cyber resilience and digitalization

According to a McKinsey survey, the COVID-19 pandemic sped up digital transformation — or digitalization — by several years. Digital interactions between customers and organizations soared to 58%, three years ahead of expectations. And the percentage of businesses that now offer some form of digital product or service is at 55%, seven years ahead of expectations! Digitalization greatly improves efficiency. For example, bookkeeping software connects directly with bank accounts so that a company can track all its expenditures and income […]

Avatar photo
Hwei Oh
Are you the weakest link in the supply chain?

Are you the weakest link in the supply chain?

As a small business, you probably think you’re small potatoes to hackers. Unfortunately, the opposite can often be true. Smaller businesses that are part of supply chains are frequently chosen by hackers because they are an easy target as a valuable foot in the door to a substantially larger company. In fact, in 2022, businesses reported that about 1 in 5 data breaches came from a supplier. You want to be seen as an asset to the companies you serve, […]

Avatar photo
Charles Ho
Anatomy of an Incident Response Plan

Anatomy of an Incident Response Plan

In our previous two articles in this series, we talked about what an Incident Response (IR) plan is and how to get your team familiar with its steps and the process using tabletop exercises. In this article, we’re going to go into detail on what happens during IR and the nitty-gritty of what makes an IR plan work. An IR plan and robust IR strategy are both vital to ensure that a company recovers properly from an incident. Even companies […]

Avatar photo
Hwei Oh
Top cyber tips to help you stay vigilant over the holiday shopping season

Top cyber tips to help you stay vigilant over the holiday shopping season

The holiday shopping season is well underway and it’s often one of the busiest for retailers, eCommerce companies, and others who seek to use the holiday as an opportunity to offer discounted prices on their most popular products. Online shopping this year reached $9.1B on Black Friday and $11.3B on Cyber Monday and Google estimates that, on average, websites can see a traffic increase of 300% during the holiday shopping season. However, this period can also be an opportune time […]

Avatar photo
Hwei Oh
Cyber Resilience vs. Cybersecurity: What’s the difference?

Cyber Resilience vs. Cybersecurity: What’s the difference?

“A lock only keeps honest people out.” With the current cybersecurity threat landscape, SMEs need to secure their organization to lower their exposure to risk. While there are a lot of tools available that are designed to mitigate or prevent threats, employing the proper framework and approach that aligns with your cybersecurity goals will make the most difference in your planning efforts. Modern threats require modern approaches, and we can only prevent what we can anticipate. Because of this, it’s […]

Avatar photo
Hwei Oh
Cybersecurity You Can Switch On

Cybersecurity You Can Switch On

Why oh why is cybersecurity so complex? I was at an event recently and the keynote speaker talked about how security is unique in its incredibly minimal consolidation. In the cloud, you have arguably three major players (Amazon, Microsoft, and Google). In mobile phones a few. In almost any area of life, consolidation happens (auto’s maybe 10, TV’s 3-4, etc). Yet, in information security, no one company has greater than 5% of the market. The equivalent of cyber security is […]

Avatar photo
Scott McCrady
How MSPs Can Quickly Grow Security Revenue with the Right Partner

How MSPs Can Quickly Grow Security Revenue with the Right Partner

The small to mid-sized enterprise (SME) market is wildly underserved in the cybersecurity sector, opening up massive opportunities for Managed Security Service Providers (MSSPs), as well as Managed Service Providers (MSPs) who could benefit from offering stronger security services as part of their overall IT offering.  Many MSPs are tempted to build out a security practice but this requires extensive investment and more importantly, will take time before the offering ever hits the market. Partnering with a MSSP can be […]

Avatar photo
Hwei Oh
The Dangers of Zero-Day Exploits

The Dangers of Zero-Day Exploits

Software vulnerabilities are a fact of life with more identified every day. In 2021, 28,695 new vulnerabilities were discovered in production software. These vulnerabilities can potentially create a backdoor to companies, letting attackers come in and out as they please. However, some vulnerabilities are significantly more dangerous than others with widespread impact. Many of these high-impact vulnerabilities — such as Log4j and Follina — are zero-days, where vulnerabilities are exploited by cyber threat actors in the wild before they become […]

Avatar photo
Charles Ho
Cyber risk management – the trifecta of cyber resilience

Cyber risk management – the trifecta of cyber resilience

Risk management is a core part of any organization’s business processes. Without the ability to manage risk, an unforeseen event could put the company out of business. Effective and comprehensive risk management requires an understanding of what can go wrong, how to minimize the probability of a risk event occurring, and how to recover if something does go wrong. In many ways, managing risk for the business is similar to owning a car. Car ownership comes with significant risks and […]

Avatar photo
Hwei Oh
How to build cyber resilience on a budget

How to build cyber resilience on a budget

SMEs have little wiggle room regarding cybersecurity. Smaller budgets and fewer dedicated security resources mean that cyberattack attempts are more likely to penetrate an SME’s defenses than those of a larger company.  Forty-three percent of all cyberattacks are aimed directly at small to medium businesses, and only 14% of SMEs are ready to defend against those attacks, according to a study by Accenture. Aside from being extremely inconvenient, these data breaches also get expensive. The cost of data breaches to […]

Avatar photo
Hwei Oh
What is Security “as a Service”?

What is Security “as a Service”?

Cybersecurity has become a top-of-mind concern for many organizations. The cyber threat landscape is evolving rapidly, and companies face near-constant attacks. These attacks are growing more sophisticated and subtle as well, making them more difficult to detect and remediate. At the same time, companies face significant barriers to their ability to protect themselves against these attacks. The cybersecurity industry is facing a significant talent shortage, making it difficult for organizations to attract and retain the cybersecurity professionals that they need […]

Avatar photo
Charles Ho
SolCyber: Celebrating our one year “stealthiversary”

SolCyber: Celebrating our one year “stealthiversary”

It’s been one year since we’ve come out of stealth, and it’s been an incredible experience for the whole team at SolCyber. It’s heartening to see how much progress we’ve made in the relatively short time since my first blog post introduced SolCyber to the market. Our mission of enabling small to mid-sized enterprises (SMEs) easy access to effective and affordable security has only been spurred on by the validation and feedback we’re receiving. As a CEO, there’s tremendous pressure […]

Avatar photo
Scott McCrady
Why VC and PE Firms Need to Consider Their Own Cybersecurity

Why VC and PE Firms Need to Consider Their Own Cybersecurity

Venture Capital (VC) and Private Equity (PE) firms take on a lot of risk when investing in a new startup or operating business. Although it is vital to perform all necessary due diligence on any new investment, VC/PE firms shouldn’t ignore their own risk. Rather, they need to take a hard look at their own cybersecurity posture. Hackers know that these companies may lead to significant payouts. After all, global venture investment in 2021 obliterated all previous records, hitting a […]

Avatar photo
Charles Ho

Follow us!

Subscribe

Join our newsletter to stay up to date on features and releases.

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

©
2026
SolCyber. All rights reserved
|
Made with
by
Jason Pittock

I am interested in
SolCyber DPM++

I am interested in
SolCyber XDR++™

I am interested in
SolCyber MDR++™

I am interested in
SolCyber Extended Coverage™

I am interested in
SolCyber Foundational Coverage™

I am interested in a
Free Demo

1949