-
Cybersecurity Awareness Month: Staying Secure in The Modern Digital World
At Netgain, we understand that cyber security is not just a catchphrase; it’s a fundamental pillar of our services as an IT-as-a-Service and managed service provider (MSP).
-
Security Principles Leading MSPs Are Following
As Netgain’s Chief Information Security Officer (CISO), I field ongoing questions regarding our security posture – not surprising given the growing intensity and frequency of cyberattacks. As a security-conscious organization,…
-
Cybersecurity Concerns Should Scare You Into Action
October is Cybersecurity Awareness Month and it’s no coincidence that Halloween shares the same month because both can be pretty scary. However, just like with Halloween’s haunted houses and dark…
-
A Day at MSSP Alert Live
Late last week, while working with my team on our continued search for a Next Gen Security Information and Event Management (SIEM), Security Orchestration, Automation, and Response (SOAR), and User…
-
A Primer on Vulnerability Management
You are a business that stores data on your organization’s network and wants to keep the network as secure as possible. Protecting your business assets has become a complex challenge…
-
2022 RSA Conference – 3 Key Takeaways
According to this article by CRN about this year’s RSA Security Conference, “cybersecurity is now in ‘fast-forward’ mode where attendees are almost in awe at the transformation of the industry…
-
Security Lesson #6: What Are Endpoints and How Do You Secure Them?
In our last post, we talked about application security and how the security measures at the application level prevent data or code within the application from being stolen or hijacked.…
-
Security Lesson #5: How to Think about Your Application Security Strategy
This is the latest post in our Security Lessons series. In my last two posts, I explained what data security is and outlined data security best practices. In this post,…
-
Top 5 Cybersecurity Trends in 2022: Pandemic-Level Ransomware, Talent Gap, Government Involvement, Threat Intel Availability, and more
It’s no secret that cybersecurity attacks and breaches have accelerated in recent years, but the growing impact and volume of such attacks has entered the public eye more aggressively than…
-
Advisory: Apache Log4j Vulnerability Log4j zero-day vulnerability AKA Log4Shell (CVE-2021-44228)
What is the Log4j vulnerability? On December 9, a remote code execution (RCE) vulnerability was identified in Java logging library Apache Log4j, which is a ubiquitous software component used throughout…
-
Security Lesson #4: Build Your Data Security Strategy on Best Practices
The data security layer is about protecting the data you have. It includes the different cybersecurity practices that you use to secure your data and prevent data breaches and misuse.…
-
Security Lesson #3: What Is Data Security (and Why It’s Important)
Data Security: Protecting sensitive data from unauthorized access In Security Lesson #1, we talked about the importance of a business impact analysis and the nine questions you need to ask…