Thought Leadership

Microsoft Requiring Authentication Upgrades by Q4

July 1, 2022

Microsoft announced recently that they will begin shutting down their Basic Authentication services on October 1, 2022 forcing customers into the superior protection of Modern Authentication.  GadellNet has been working with our clients to migrate to Modern Authentication since mid-2021 in an effort to maximize cybersecurity protection and minimize costs. Why Switch to Modern Authentication? Modern Authentication uses O Auth access tokens with a limited lifetime.  These [...]

Cybersecurity Best Practices: Changing MFA Processes

May 3, 2022

Data breaches can be devastating to an organization. They can come out of nowhere and leave your organization completely exposed. With approximately 50% of small businesses experiencing a cyberattack every year, it is imperative that your organization keep up to date on cybersecurity best practices to protect itself. What is SMS Multi-Factor Authentication (MFA)? MFA (Multi-Factor Authentication) is one of the simplest and most effective ways to curb cyber attacks. Think of it as [...]

Diving into Ransomware Trends

March 30, 2022

Each year, Datto, a global provider of security and cloud-based software solutions, surveys 1,000 Managed Service Providers (MSPs) on the state of ransomware from the perspective of the IT channel and the small and medium business (SMB) clients it serves. We’ve compiled some of the key takeaways from the Global State of the Channel Ransomware Report and interpreted what it might mean for your organization. What is Top-of-Mind for IT Experts Though the cybersecurity lands [...]

Cybersecurity Hygiene

March 23, 2022

What is cybersecurity Hygiene? Cybersecurity hygiene is defined as the day-to-day practice of maintaining the basic health and security of software and hardware assets, according to Graylog. With current world events developing quickly, keeping up with this daily practice is incredibly important. Put simply, cybersecurity is more important today than ever before. Being proactive is one of the best things you can do for your cybersecurity hygiene. Below are a few ways you can be proac [...]

Endpoint Protection Evolution: improving your cybersecurity

February 7, 2022

The cybercrimes landscape has changed drastically over the last few years with bad actors getting far more aggressive.  Recent attacks have proven that no industry – hospitals, schools, manufacturers, government – is safe.  However, as cyberattacks have increased, so have advances in cybersecurity defenses.  EDR, or Endpoint Detection and Response technology, has had a significant impact in protecting organizations.  What is EDR and does your organization need [...]

Why we increased our internal cybersecurity controls to serve our clients

January 3, 2022

On November 20, 2021, GadellNet completed its SOC 2 Type 1 Attestation and we announced it publicly in early December. Obtaining this certification was a months-long process with widescale participation across our entire organization. We’re proud to share more with you about how this hard-earned honor will impact your business. As many of you know, utilizing a Managed Service Provider (MSP) is an efficient and affordable way for small and medium-sized businesses to optimize technology f [...]

The Evolving Landscape of Cyber Liability Insurance

September 21, 2021

Cyber liability insurance provides businesses with a combination of coverage options to protect their organization in case of data breaches and other cybersecurity issues. Coverage has become an important consideration for most small- to medium-sized businesses as cybercrime rates have increased exponentially in this segment. According to NPR, there were 7 ransomware attacks every hour in the United States in 2020, a number that is expected to increa [...]

Password Security: First Line of Defense

August 31, 2021

In 2019, 23.2 million victims worldwide used “123456” as their password, according to Security Magazine*. Making a few small changes to your passwords can go a long way to help keep your data and identity secured. Recycled passwords, uncomplicated passwords, and real words could be opening you and your company up for a security breach.  Don’t Recycle Passwords According to a survey by Google**, 66% of Americans use the same password across [...]

Cyber Threat Hunting: Tricks and Tools You Need

June 23, 2020

A lot of cybersecurity processes are reactive. Indicators of Compromise (IOCs), for instance, interpret clues that could lead an organization to uncover threatening activity that is already in progress or has already compromised a system. This and other types of security monitoring are important for a holistic cybersecurity plan, but threat hunting is a different approach. What is Cyber Threat Hunting? Cyber threat hunting is when IT professionals proactively look for weaknesses that could allo [...]

Indicators of Compromise (IOCs): Definition and Examples

March 9, 2020

Cybersecurity is an important part of your business strategy; there’s no doubt about that. With so many terms surrounding the ins and outs of cybersecurity, it can be hard to keep track and stay well informed. Indicators of Compromise: What is an IOC Used for? Indicators are activities that lead IT professionals to believe a cybersecurity threat or breach could be on the way or in progress or compromised. More specifically, IOCs are breadcrumbs that can lead an organization to uncover threate [...]