Microsoft announced recently that they will begin shutting down their Basic Authentication services on October 1, 2022 forcing customers into the superior protection of Modern Authentication. GadellNet has been working with our clients to migrate to Modern Authentication since mid-2021 in an effort to maximize cybersecurity protection and minimize costs. Why Switch to Modern Authentication? Modern Authentication uses O Auth access tokens with a limited lifetime. These [...]
Data breaches can be devastating to an organization. They can come out of nowhere and leave your organization completely exposed. With approximately 50% of small businesses experiencing a cyberattack every year, it is imperative that your organization keep up to date on cybersecurity best practices to protect itself. What is SMS Multi-Factor Authentication (MFA)? MFA (Multi-Factor Authentication) is one of the simplest and most effective ways to curb cyber attacks. Think of it as [...]
Each year, Datto, a global provider of security and cloud-based software solutions, surveys 1,000 Managed Service Providers (MSPs) on the state of ransomware from the perspective of the IT channel and the small and medium business (SMB) clients it serves. We’ve compiled some of the key takeaways from the Global State of the Channel Ransomware Report and interpreted what it might mean for your organization. What is Top-of-Mind for IT Experts Though the cybersecurity lands [...]
What is cybersecurity Hygiene? Cybersecurity hygiene is defined as the day-to-day practice of maintaining the basic health and security of software and hardware assets, according to Graylog. With current world events developing quickly, keeping up with this daily practice is incredibly important. Put simply, cybersecurity is more important today than ever before. Being proactive is one of the best things you can do for your cybersecurity hygiene. Below are a few ways you can be proac [...]
The cybercrimes landscape has changed drastically over the last few years with bad actors getting far more aggressive. Recent attacks have proven that no industry – hospitals, schools, manufacturers, government – is safe. However, as cyberattacks have increased, so have advances in cybersecurity defenses. EDR, or Endpoint Detection and Response technology, has had a significant impact in protecting organizations. What is EDR and does your organization need [...]
On November 20, 2021, GadellNet completed its SOC 2 Type 1 Attestation and we announced it publicly in early December. Obtaining this certification was a months-long process with widescale participation across our entire organization. We’re proud to share more with you about how this hard-earned honor will impact your business. As many of you know, utilizing a Managed Service Provider (MSP) is an efficient and affordable way for small and medium-sized businesses to optimize technology f [...]
Cyber liability insurance provides businesses with a combination of coverage options to protect their organization in case of data breaches and other cybersecurity issues. Coverage has become an important consideration for most small- to medium-sized businesses as cybercrime rates have increased exponentially in this segment. According to NPR, there were 7 ransomware attacks every hour in the United States in 2020, a number that is expected to increa [...]
In 2019, 23.2 million victims worldwide used “123456” as their password, according to Security Magazine*. Making a few small changes to your passwords can go a long way to help keep your data and identity secured. Recycled passwords, uncomplicated passwords, and real words could be opening you and your company up for a security breach. Don’t Recycle Passwords According to a survey by Google**, 66% of Americans use the same password across [...]
A lot of cybersecurity processes are reactive. Indicators of Compromise (IOCs), for instance, interpret clues that could lead an organization to uncover threatening activity that is already in progress or has already compromised a system. This and other types of security monitoring are important for a holistic cybersecurity plan, but threat hunting is a different approach. What is Cyber Threat Hunting? Cyber threat hunting is when IT professionals proactively look for weaknesses that could allo [...]
Cybersecurity is an important part of your business strategy; there’s no doubt about that. With so many terms surrounding the ins and outs of cybersecurity, it can be hard to keep track and stay well informed. Indicators of Compromise: What is an IOC Used for? Indicators are activities that lead IT professionals to believe a cybersecurity threat or breach could be on the way or in progress or compromised. More specifically, IOCs are breadcrumbs that can lead an organization to uncover threate [...]