Cyber Defense Advisors

Year: 2022

4 Data Security Best Practices You Should Know

There are numerous strategies to lessen the possibility and effects of a cyberattack, but doing so takes careful planning and targeted action.

Cyber News

Lessons From the GitHub Cybersecurity Breach

This Tech Tip outlines three steps security teams should take to protect information stored in Salesforce.

Cyber News

Microsoft Rolls Out Passwordless Sign-on for Azure Virtual Desktop

Azure says cloud-native single sign-on with a passwordless option is most-requested new AVD feature in the product’s history.

Cyber News

FBI Helping Australian Authorities Investigate Massive Optus Data Breach: Reports

Initial reports suggest a basic security error allowed the attacker to access the company’s live customer database via an unauthenticated API.

Cyber News

Amid Sweeping Change, Cyber Defenders Face Escalating Visibility — and Pressure

Why cyber teams are now front and center for business enablement within organizations, and the significant challenges they face.

Cyber News

Lazarus Lures Aspiring Crypto Pros With Fake Exchange Job Postings

Previously observed using fake Coinbase jobs, the North Korea-sponsored APT has expanded into using Crypo.com gigs as cover to distribute malware.

Cyber News

Hybrid Workers Are Dispersed: Is Your Data Secure? Are You Wasting Money?

Customer Scenario: Hybrid Workers When the pandemic first hit, one Boston-based company immediately sent its 1,000 employees’ home to work remotely. Over the next 18 months, the advantages were hard to ignore. Productivity remained high, worker morale was up, and the company still achieved strong business results. Today, that company has decided to adopt a […]

Cyber Thoughts

Cyber Threat Security is Everyone’s Responsibility

As a small to mid-sized business you know it’s more important than ever before to protect yourself from a cyberthreat. One way to do that is to provide ongoing cybersecurity awareness training and education to your employees and adopt cybersecurity practices as part of your company culture. It’s no longer just your IT and security […]

Cyber Thoughts

Why you need disaster recovery!

Are you confused about disaster recovery terms like RTOs (Recovery Time Objectives) and RPOs (Recovery Point Objectives)? Not clear about failover and failback? Wondering about the advantages of continuous data protection over snapshots? You’ve come to the right place. We can work with you to plan the right DR solution for our business. One that […]

Cyber Thoughts