Press Release - Cyber Advisors Positioned for Major Growth with Hiring of a Leading Technologist and Sales Innovator, Matt Kanaskie
When talking with IT leaders at our customers, a common theme is keeping up with IT Security. If you are a smaller business with less technology complexity, this can become even more difficult, as your resources to hire security specialized employees is little to none.
Topics: Security Breach
Taylor has a passion for Sci-Fi movies (particularly Star Wars and the Prequels). Taylor tries to make at least one Vikings game a year and plays his fair share of video games. Taylor says Joseph Gordan-Levitt would play him in a movie about his life due to him being able to somewhat pass as a nerd but still be an athlete and smart aleck. Taylor says if he had to pick only three apps to be on his smartphone it would be Youtube, Fantasy Football and Aubidle
Threat actors now use OneNote attachments in phishing emails that infect victims with remote access malware which can be used to install further malware, steal passwords, or even cryptocurrency wallets.
Topics: Security Breach
Company acquisition transactions can happen in many different ways. Whether you are a self-funded business looking to acquire, or you are a full blown equity firm looking to grow, acquisitions can be very risky.
SOC 2 (System and Organization Controls for Service Organizations) is essential on many levels. Cyber Advisors received its SOC 2 Type 1 certification in early 2021. In 2022, Cyber Advisors executed our SOC 2 Type 2. This audit was successful, and Cyber Advisors received compliance in Q2 2022.
Topics: Intel security threat, digital blind spot, compliance, Security Breach, SOC 2 Certification
In the battered security landscape, companies are doing all they can to transfer risk out of their organizations. One of the most common methods to transfer this risk is to acquire cyber Insurance. Since the 90's .com bubble, cyber Insurance has taken on many forms. Let's dive into the insurance topic in detail.
Topics: security, insurance, cyberinsurance
This month is another important month for Microsoft Patch Tuesday and subscribers of our Cyber Thursday blog, with 75 vulnerabilities reported, 8 of which are considered “Critical” (RCE or LPE) vulnerabilities.
Operational Technology (OT) has become a very common talking point around the Cyber Advisors office. For starters, let’s define OT.
OT is industrial level control systems that are typically outside of the IT realm. Some examples of OT are Energy Grids, video recording systems, security badges/fobs, elevators, fire sprinkler systems, and gas pipelines. Many of these systems are IoT based. Some are much more industrial based such as PLC controls for turning a switch on and off.
Topics: security, Fortinet, cybersecurity, Operational Technology, OT
“Effective listening is more than simply avoiding the bad habit of interrupting others while they are speaking or finishing their sentences. It's being content to listen to the entire thought of someone rather than waiting impatiently for your chance to respond.”
~ Richard Carlson, Author of “Don’t Sweat the Small Stuff”, MacMilian Publishing Company
Topics: Managed Services, security