Category: Uncategorized

  • Modern Phishing: A Hidden Threat in Plain Sight

    Modern Phishing: A Hidden Threat in Plain Sight While it may come as a surprise to some, phishing is still a lucrative business for cybercriminals. Phishing is defined as the fraudulent practice of sending emails pretending to be from reputable companies in order to reveal personal information.  In 2020 alone the FBI’s Internet Crime Report stated that phishing scams in the United… Read more

  • Hackers Exploit VPN to Deploy SUPERNOVA malware on SolarWinds Orion

    The U.S. Cybersecurity and Infrastructure Security Agency stated, “The threat actor connected to the entity’s network via a Pulse Secure virtual private network appliance, moved laterally to its SolarWinds Orion server, installed malware referred to by security researchers as SUPERNOVA, and collected credentials.” CISA reported that they uncovered the threat actor during an incident response… Read more

  • Cyber Security Best Practices

    Cyber Security Best Practices Many organizations struggle to keep their IT infrastructure secure and organized. One simple security measure that we at DefendEdge strongly recommend to all our clients is to implement cyber security “best practices”; these are industry-standard measures that make your environment much harder to compromise by any potential bad actor. These best… Read more

  • What’s your Insider Threat?

    What’s your insider Threat? What is Cyberwarfare? There is still widespread debate around the true definition of “cyberwarfare.’ Some experts define it as an “extension of policy by actions taken in cyberspace by state actors that constitute a serious threat to another state’s security.” Others in the field believe that cyberwarfare is the “use of… Read more

  • What does having a Small business mean to you?

    What does having a Small business mean to you? Small businesses are essential for fostering local economies, keeping money close to home, and supporting neighborhoods and communities. Most importantly, small business provides opportunities for fulfillment of the American Dream. The belief that anyone, regardless of where they were born or what class they were born… Read more

  • Network Security Infrastructure

    Network Security Infrastructure “Cybercrime is the greatest threat to every company in the world.” a quote by Ginni Rometty, IBM’s executive chairman, and previous CEO. So why do so many companies wait until they have been breached to implement any sort of security infrastructure? The answer is money. If you do not pay now you… Read more

  • Cyberwarfare: The Technology Attack

    Cyberwarfare: The Technology Attack What is Cyberwarfare? There is still widespread debate around the true definition of “cyberwarfare.’ Some experts define it as an “extension of policy by actions taken in cyberspace by state actors that constitute a serious threat to another state’s security.” Others in the field believe that cyberwarfare is the “use of… Read more

  • Do you have OPSEC?

    Do you have OPSEC? When organizations are finding ways to harden their networks and meet cybersecurity compliance standards, Operations Security or “OPSEC”is not a concern that always comes to mind. But this oversight can have disastrous consequences and spell financial ruin for your company. Organizations should consider OPSEC as their first layer of security. Our U.S.… Read more

  • What is Spyware?

    What is Spyware? What is Spyware? Spyware is generally considered to be any malicious software which collects information on users that might be considered sensitive. For example, passwords, phone numbers, credit card info, and social security numbers can all be targets of spyware. Here is a little history lesson. The first recorded use of the… Read more

  • What happens when your SIEM deployment has stalled?

    As we discussed in a previous blog post, there are several reasons why SIEM deployments fail. When choosing a new solution there are many things to keep in mind before you choose the right fit for your company. Unfortunately, many of us have run into situations where a SIEM solution was purchased and the deployment… Read more