7 common Cloud Configuration mistakes to avoid & how to remediate these

When it comes to online security, the cloud has emerged as one of the main backbones of modern business operations. Its scalability, flexibility, and cost-efficiency have made it an indispensable asset for organisations of all sizes. However, while the cloud offers numerous advantages, it also presents a myriad of security challenges, particularly when it comes[…] Read

Published by Kieran Oates, Cybaverse

5 SaaS security best practices to keep your Web Apps

Picture a world where you no longer need to buy, install, or maintain software on your computer. Instead, you can access powerful applications instantly, from anywhere with an internet connection.   Welcome to the world of Software as a Service, or SaaS. We’re going to explore the benefits of SaaS and how it has revolutionised[…] Read

Published by Courtney Grice, Cybaverse

The Hole In Your Cyber-Insurance Policy That Could Result In Your Claim Being Denied

You’ve all heard the stats – small businesses are the #1 target for cybercriminals because they’re easy targets, with a recent article in Security Magazine reporting that nearly two-thirds (63%) of small businesses have experienced a cyber-attack and 58% an actual breach. But what many still don’t understand (or simply don’t appreciate) is how much a cyber-attack[…] Read

Published by Kayvan Yazdi, TruAdvantage

How MSPs Can Provide a Solid Disaster Recovery Plan

When a company fails victim to a ransomware attack and call on their managed service provider, they expect a solution that will quickly restore order to their business. However, not all MSPs are ready to step up and provide a calming response. MSPs should play a crucial role in ensuring affordable disaster recovery solutions for[…] Read

Published by Jordi Vilanova, Cloudtango

The quest to get rid of passwords

With average total cost of a data breach continuing its way up year over year, the Big Tech companies are focusing on privacy, data protection and information security policies implemented by default. While businesses are looking to add new security layers and protect against all risks associated with a breach.In a joint effort to make[…] Read

Published by Helena Vorschepoth, Cloudtango

Best Defense? Good Cloud Offense

Ever since cybersecurity began in the 70s, the focus was always building a good defense as part of the main strategy. The problem with conventional security has traditionally been its reactive nature to security, such as patching software, finding and fixing system vulnerabilities and other type of responsive actions to protect the infrastructure. As years[…] Read

Published by Jordi Vilanova, Cloudtango

AiTM phishing bypasses multi-factor authentication

Microsoft has recently published details of a massive phishing attack that targeted more than 10,000 organizations. The worrying details about this particular attack is how it manages to bypass 2-factor authentication by using adversary-in-the-middle (AiTM) phishing sites to steal passwords and session data. The malicious actors used adversary-in-the-middle (AiTM) phishing sites to steal passwords and[…] Read

Published by Jordi Vilanova, Cloudtango

Is the Public Cloud Secure?

For as many years as the public cloud has been around, so has been the debate over whether or not it’s secure. When AWS launched in 2006 and Azure shortly thereafter in 2008, the public cloud was considered uncharted territory. IT professionals didn’t know whether to trust it or be weary. This was much like[…] Read

Published by Otto Aulicino, WatServ

Managed IT Services: Is It Time For A Secure Alternative?

Managed IT Services: Is It Time For A More Automated, Secure Alternative? Technology has made businesses more competitive than before. This is because businesses have moved to a digital realm where they can connect to customers, place and respond to orders, and even communicate with stakeholders from one place. While the benefits of technology are[…] Read

Published by Carla Kaine, Kaine Mathrick Tech (KMT)

Log4j: Vulnerability Diagram

Great diagram of the vulnerability and how to prevent it on each of the stages. Full article here.

Published by Jordi Vilanova, Cloudtango