Cybersecurity, Threats and IoCs |
April 16, 2024
The “Left of Boom”
Boom, and just like that you are compromised. The “Left of Boom” is the timeframe beforehand, the preventative approach. While much of the industry attention has been on the ability...
Cybersecurity, News and Events |
February 23, 2024
Detecting Anomalous O365 Logins and Evasion Techniques
Summary Businesses across multiple industries, regardless of size, are at risk of being targeted with Microsoft 365 phishing campaigns. These campaigns trick users into visiting fake Microsoft login page where...
Case Study, Cybersecurity |
January 29, 2024
Case Study: Vertek’s USM Anywhere MDR Helps Larger Auto Dealership in the Northeast Improve Cybersecurity Posture
Challenges A larger auto dealership in the northeast faced a number of cybersecurity challenges, including: Lack of resources: The dealership did not have the in-house expertise or resources to manage...