What’s with Operational Technology?

Posted by Dan Sanderson on Oct 19, 2021 9:06:10 AM

Operational Technology (OT) has become a very common talking point around the Cyber Advisors office. For starters, let’s define OT.

OT is industrial level control systems that are typically outside of the IT realm. Some examples of OT are Energy Grids, video recording systems, security badges/fobs, elevators, fire sprinkler systems, and gas pipelines. Many of these systems are IoT based. Some are much more industrial based such as PLC controls for turning a switch on and off.

Read More

Topics: security, Fortinet, cybersecurity, Operational Technology, OT

Automated Protection for Vulnerable Exchange Servers

Posted by Kate Drankoff on Sep 29, 2021 12:06:42 PM

The new Exchange Server component, aptly named Microsoft Exchange Emergency Mitigation (EM) service, builds on Microsoft's Exchange On-premises Mitigation Tool (EOMT) released in March to help customers minimize the attack surface exposed by the ProxyLogon bugs.

Read More

Topics: security

vCenter Server File Upload Vulnerability

Posted by Kate Drankoff on Sep 29, 2021 9:00:28 AM

A vulnerability has been identified in the VMware vCenter Server product that could allow a threat actor to execute malicious code. The vulnerability exists in the Analytics service and can be attacked by an unauthenticated user via port 443. There are both patches and temporary workarounds available by VMware. This vulnerability can be exploited regardless of current configuration settings.

This vulnerability exists in:

  • VMware vCenter 6.7x/7.0x
  • VMware Cloud Foundation 3.x/4.x, which bundles vCenter
Read More

Topics: security

Why Do We Need to Do So Many Chrome Updates!?!

Posted by Kate Drankoff on Sep 16, 2021 10:38:00 AM

On Monday, September 13th Google released security updates for the Chrome web browser to address a total of 11 security issues, two of which are zero-days actively being exploited in the wild. Chrome users are advised to update to the latest version (93.0.4577.82 or later) for Windows, Mac, and Linux by heading to Settings > Help > 'About Google Chrome' to mitigate the risk associated with the flaws. 

Read More

Topics: security, cybersecurity, Google Chrome

Getting Started on the Road to Security

Posted by Kate Drankoff on Jul 27, 2021 8:49:58 AM

Security threats are constant and it's hard to know where to start when it comes to protecting your organization. Taking the first step in the journey of security can be very overwhelming, but our team of security experts are here to help. No matter the size of the organization, we recommend starting with a Threat Assessment followed by a Business Impact Analysis.

Threat Assessment: The first step is engaging our team of security experts to perform a self-assessment survey to understand where your organization currently stands. Our team works with you to conduct a solid inventory of your business and understand key assets to operations. This process evaluates and verifies perceived threats and assesses their likelihood. After the initial assessment, our team reviews the severity of the threats and creates a plan to address the underlying vulnerabilities. Our team works with your organization to prioritize based on impact, cost and likelihood.

Business Impact Analysis: If you had all the money in the world, you could have a lot of security tools in your pocket and the resources to manage them - Unfortunately, in the real world, you have a limited budget and need to prioritize. This is where having a solid Business Impact Analysis (BIA) comes into play.

Read More

Topics: security, Threat Assessment, Business Impact Analysis

Humans of Cyber: Mark Blanco, Project Manager

Posted by Kate Drankoff on Jul 26, 2021 10:16:54 AM

Mark Blanco joined the Cyber Advisors team as a Project Manager in March 2020, just days into the pandemic when work and life changed drastically. 

 

Mark worked hard to streamline many internal processes on the Project Team. His work has allowed the Project Team to be more efficient and create a better client experience. He also works closely with the Cyber Advisors Security Team where he has been an integral component to the growth and success of the department.

Read More

Topics: Managed Services, security, Managed IT, MSP

Nuggets of Advice From the Two Successful Leaders: What Are You Doing Podcast

Posted by Kate Drankoff on Jul 26, 2021 9:29:39 AM

Cyber Advisors co-founders, Shane Vinup and Igor Bogachev, were recently featured on the What are YOU Doing? podcast hosted by Michael Beach. Both Shane and Igor are honored to be a part of such an incredible series. 

 

Michael Beach Coaching and Consulting  prepares clients and their teams to become strong and courageous leaders. Michael's podcast is a series featuring thought leaders who are investing in the next generation of leadership for their organization. These thought leaders are developing the emerging leaders who will take their organization to the next level and the level after that.

 

Listen to the podcast: Direct Download URL or Permalink URL 

Read More

Topics: Managed Services, security, Managed IT, MSP, Leadership, podcast

Cyber Center: Cyber Advisors Dispatch Services & Technical Academy

Posted by Kate Drankoff on Jul 22, 2021 12:17:21 PM

Joe Moline is joined by Brandon Kuehn, the Cyber Advisors Project Coordinator. Cyber Advisors is headquartered in Maple Grove, MN and proudly serves clients all over the United States, many who have locations across serval states. Our dispatch capabilities enable clients to rely on a superior quality of service no matter where they are located. With a network of trusted techs, Cyber Advisors is able to reelevate stress from clients, oversee services and provide technical expertise no matter where the job is located.

Read More

Topics: Managed Services, security, Managed IT, MSP

Top Ranking IT Solutions Company

Posted by Shane Vinup on Jun 11, 2021 12:47:45 PM

Cyber Advisors has been named by CRN on the 2021 Solution Provider (SP) 500 List. The Channel Co. puts together this annual CRN list to recognize and rank the top IT channel partner organizations in North America by service revenue. The SP 500 list is widely acknowledged as the industry standard for identifying the highest-performing technology integrators, strategic service providers, and IT consultants.

Read More

Topics: security, CRN, Channel Co, security 100, Solution Provider List

Colonial Pipeline Breach: Country’s Largest Fuel Pipeline Breach

Posted by Kate Drankoff on May 25, 2021 10:42:27 AM

The country’s largest fuel pipeline was breached resulting in shutting down operations for multiple days. An estimated 100 gigabytes of data were stolen which was used for ransomware. The total effect has yet to be calculated but a surge in gasoline price was in effect in the eastern seaboard after operations were shut down. The FBI confirmed that a threat actor group in Russia identified as Darkside was behind the ransomware.

Read More

Topics: security, cybersecurity, Colonial pipeline

About this blog

Welcome to the Cyber Advisors Blog.  Please take a moment to read through our content.  If you would like more information on any of these topics, simply reach out to us via contact information below.  If you find our content valuable, please subscribe.  

 

 
 
Would you like to hear from us? Click Below!
Learn More

Subscribe Here!

Recent Posts

Posts by Tag

See all