FAQ

Vendor-Email-Compromise

FAQ – Vendor Email Compromise, What Is It?

References: https://ironscales.com/glossary/vendor-email-compromise Vendor Email Compromise - How Does It Work? VEC usually starts with a malicious threat actor that gains access to a vendors email account. This is usually done…

Read more
How Can MSP’s Address Vulnerabilities?

FAQ – How Can MSP’s Address Vulnerabilities?

Jonathan "Sauce" Marinaro from Celerium Cyber Defense discusses how MSPs can address zero-day vulnerabilities. https://youtube.com/watch?v=7Gk5T6Z8g8w

Read more
Cybersecurity-Importance-and-Functionality

FAQ – What Is Cyber Security? Why Is It Important & How Does It Work?

What Is Cybersecurity? The practice of safeguarding computers, networks, software applications, critical systems, and data from any malicious threat actors is known as cybersecurity. It is a businesses responsibility to…

Read more
Ransomware-As-A-Service

FAQ – What is Ransomware As A Service?

Ransomware as a Service (RaaS) is a business model used by cybercriminals that mimics the structure of legitimate software-as-a-service (SaaS). In RaaS, ransomware creators sell or lease their malicious software…

Read more
What Is The Difference Between Linux RPM & DEB Packages?

FAQ – What Is The Difference Between Linux RPM & DEB Packages?

Debian (DEB) and Red Hat Package Manager (RPM) are the two most commonly used package formats for Linux distributions. Both formats are used for package management, there are also differences…

Read more
What-Is-SOC-3

What Is SOC 3 Compliance In Terms Of Technology?

SOC 3, Service Organization Control 3, compliance in relation to technology is very similar and closely related to those principles in SOC 2 compliance. The difference is in how the…

Read more
What-Is-SOC-2

What Is SOC 2 Compliance In Terms Of Technology

Service Organization Control 2, known as SOC 2 for short, compliance in relation to technology has to do with how service organizations manage and secure customer data, in particular when…

Read more
What-Is-SOC-1

What Is SOC 1 In Terms Of Technology?

In terms technology and SOC 1 compliance, it refers to the adherence of a service organization's technology related and control processes to the auditing standards that are defined in the…

Read more
Data-Breach-Cost

2023 Cost Of A Data Breach​

The average cost of a data breach in 2021 was sitting at $4.24 million US dollars. In 2022 this increased by 2.6% to $4.35 million US dollars according to data…

Read more
2023-Data-Breach-Statistics-By-Industry

2023 Data Breach Statistics By Industry

The average cost of a data breach in 2021 was sitting at $4.24 million US dollars. In 2022 this increased by 2.6% to $4.35 million US dollars according to data…

Read more