How Can MSP’s Address Vulnerabilities?

FAQ – How Can MSP’s Address Vulnerabilities?

Jonathan "Sauce" Marinaro from Celerium Cyber Defense discusses how MSPs can address zero-day vulnerabilities. https://youtube.com/watch?v=7Gk5T6Z8g8w

Read more
Cybersecurity-Importance-and-Functionality

FAQ – What Is Cyber Security? Why Is It Important & How Does It Work?

What Is Cybersecurity? The practice of safeguarding computers, networks, software applications, critical systems, and data from any malicious threat actors is known as cybersecurity. It is a businesses responsibility to…

Read more
Ransomware-As-A-Service

FAQ – What is Ransomware As A Service?

Ransomware as a Service (RaaS) is a business model used by cybercriminals that mimics the structure of legitimate software-as-a-service (SaaS). In RaaS, ransomware creators sell or lease their malicious software…

Read more
Vendor-Security-Best-Practices

Vendors Staying Secure Is Key To Preventing Future Data Breaches – Vendor Security Best Practices

It is important that the right steps are taken to prevent a breach from taking place. Sadly there are alot of weak links in the cyber security infrastructure that increases…

Read more
What Is The Difference Between Linux RPM & DEB Packages?

FAQ – What Is The Difference Between Linux RPM & DEB Packages?

Debian (DEB) and Red Hat Package Manager (RPM) are the two most commonly used package formats for Linux distributions. Both formats are used for package management, there are also differences…

Read more
Vendor-Security

Vendors Staying Secure Is Key To Preventing Future Data Breaches – Vendor Security

It is important that the right steps are taken to prevent a breach from taking place. Sadly there are alot of weak links in the cyber security infrastructure that increases…

Read more
Electronic Signatures

The Good And The Bad Of Electronic Signatures

Electronic Signatures have been in use for years. the Covid pandemic and the shift to a remote working model brought them into more mainstream use. In this post we will…

Read more
Highest-Levels-Of-Cyber-Attacks

Education & Research Sector Sees Highest Levels Of Cyber Attacks

With the education and research sectors being the early adopters of digital platforms for delivery of course material and conducting exams, digital transformation has been an on going process for…

Read more
Exfiltrated-In-Hack

All Of Okta’s Client Data Exfiltrated In Hack

Okta has admitted that it has greatly messed up when investigating last month's hack. It failed to pick up that 99% of its data had been exfiltrated by threat actors.…

Read more
Okta 2fa

Okta Hacked Again As a 2FA Company Fails To Enforce 2FA

Okta is back in the headlines, this time due to not implementing 2FA for employee accounts. 2FA is something that is a crucial must have today and for all accounts…

Read more