Hack Space Con ‘24
This weekend, Jonathan Burstein had the pleasure of representing Vertek at Hack Space Con at Kennedy Space Center in...
Read MoreThe “Left of Boom”
Boom, and just like that you are compromised. The “Left of Boom” is the timeframe beforehand, the preventative approach....
Read MoreDetecting Anomalous O365 Logins and Evasion Techniques
Summary Businesses across multiple industries, regardless of size, are at risk of being targeted with Microsoft 365 phishing campaigns....
Read MoreCase Study: Vertek’s USM Anywhere MDR Helps Larger Auto Dealership in the Northeast Improve Cybersecurity Posture
Challenges A larger auto dealership in the northeast faced a number of cybersecurity challenges, including: Lack of resources: The...
Read MoreSome Cybersecurity Laws and Regulations you may have to comply with
When it comes to your business, there are a lot of laws and regulations that you may have to...
Read MoreThe Top Cybersecurity Predictions for 2024
In 2024, companies will lose an estimated 10.5 trillion dollars due to cyberattacks. This could be daunting to small...
Read MoreHow to Detect and Prevent Ransomware Attacks
Every second there are 19 ransomware attacks attempted and the average recovery cost from an attack is 4,620,000. This...
Read MoreVertek Fully Managed Halcyon + FlexMDR
The state of ransomware threat actor groups is constantly evolving, but there are a few trends that have emerged in...
Read More