Operations | Monitoring | ITSM | DevOps | Cloud

Cyberattacks

MSP Lawsuit Underscores Importance of Multi-Factor Authentication (MFA)

Sacramento, CA law firm Mastagni Holstedt has alleged that its MSP LanTech LLC failed to protect it from a ransomware attack that took down its systems. According to ChannelE2E, Mastagni Holstedt is also suing LanTech’s backup vendor Acronis, which has denied any responsibility for the ransomware attack. We’ll be watching to see how it all shakes out. In the meantime, let’s look at what happened and what we can take away from it. Hint: multi-factor authentication matters. A lot.

Safeguarding Smart Home Devices: A Comprehensive Guide to Cybersecurity for Ensuring Safety and Security

Smart home devices have revolutionized our lives, but with convenience comes risk. Have you ever wondered if your smart speakers, cameras, or thermostats could be vulnerable to cyber-attacks? Imagine the havoc a hacker could wreak by gaining unauthorized access. That's where this comprehensive cybersecurity guide comes in.

7 Most Common Types of Cyber Attacks: How to Spot and Prevent Them

There are many ways a malicious actor could get into your systems, and the list of threat vectors is increasing every day. Understanding the types of cyber threats you’re most likely to encounter puts you in a good position to build up your security practices against them. This article reviews the 7 most common cyber attacks and best practices you can implement today to strengthen your defenses.

Detecting Cryptojacking with Progress Flowmon

In the ever-evolving landscape of cybersecurity threats, cryptojacking has emerged as a stealthy and financially motivated attack method. In attacks of this type, cybercriminals hijack servers (or endpoint devices) to use the computing resources to “mine” cryptocurrencies. They get a financial benefit from this activity when they sell the newly minted currencies.

Understanding DDoS Attacks: Motivation and Impact

DDoS attacks disrupt services and damage reputations, with motivations ranging from political to personal. These attacks can also mask more severe security breaches, so early detection and mitigation are crucial. Learn how Kentik provides a solution by analyzing enriched NetFlow data to identify and mitigate DDoS threats.

The Cybersecurity Threat Landscape in 2024

Over the last few years, the number and severity of cyberattacks against organizations have significantly increased. These attacks come in various forms, including ransomware, distributed denial-of-service (DDoS), data breaches, insider threats and many more. Despite the best efforts of many cybersecurity professionals to minimize these threats, it appears there will be no decrease in the threat level in 2024.

4 Tips for Building Resilience Against Cyber Attacks

As the world becomes more digitized, people, companies, and institutions globally face a considerable threat in the form of cyber attacks. Decisive actions that can withstand cyber attacks must be undertaken to guard confidential information, systems, and networks. The following are crucial skills and operations to improve resilience on cybersecurity issues in ensuring the success of a company's strategy for risk management against cyber threats.

Warning Signs of Weak Cyber Security

We live in a world where cyber security is more important than ever. With data breaches becoming all too common, it's critical to understand the warning signs of weak cyber security so we can stay protected from potential hackers and their malicious activities. In this blog post, we will explore the top warning signs of a potentially vulnerable system that could be targeted by attackers and provide some tips on how to fortify your online defenses.

Okta evolving situation: Am I impacted?

Cybersecurity is never boring. In recent months, we’ve seen major cyberattacks on Las Vegas casinos and expanded SEC cybersecurity disclosure rules are top of mind. Is it any wonder we consistently recommend taking a proactive approach to secure your environment with a defense-in-depth strategy and appropriate monitoring? News outlets reported the recent compromise at the Identity and Authentication (IAM) firm, Okta.