Thought Leadership

New Year, New Enhancements for Multi-Factor Authentication

January 18, 2023

Third-party authentication apps, like Microsoft Authenticator, offer users a higher level of security than SMS or phone calls. But, as with all things cybersecurity-related,  the tools that protect us must continue to evolve to stay ahead of bad actors.  To bolster the security of push notifications, Microsoft announced new features to Authenticator’s two-factor authentication capabilities for mobile device users. Most notably among the updates, number matching and additi [...]

Does your cybersecurity defense need SIEM (Security Information and Event Management)

October 20, 2022

Bad actors are currently targeting small- to medium-sized businesses (SMBs) because they often find them less prepared to deal with a cyberattack. These organizations often take the position that “I’m too small to be a target.”  This false sense of security is precisely what makes them an attractive target. This mindset can cost your business both outright, in the case of a ransomware attack, and in downtime. In fact, according to IBM, the average cost of a data breach in [...]

Managing Your Technology Through End-of-Life

August 31, 2022

As with all things related to technology, change and evolution are inevitable.  End of Life (EOL) is part of a typical technology lifecycle and means an application, platform, or hardware will no longer be supported by its manufacturer. No more patching or security, no more updated versions. Choosing to continue to use an application, platform, or hardware once it has reached its end of life can result in compliance issues, increased operational costs, and, as mentioned above, security [...]

Solving the Cyber Insurance Puzzle

August 17, 2022

Partnering with a technology consultant can help your organization end up with the best protection. Cyber liability insurance is still a new landscape. And it’s changing a lot.  Right now, Multi-Factor Authentication (MFA) is the big thing.  Insurers are requiring it for coverage.  However, word on the street is that they are going to start requiring Endpoint Detection and Response (EDR) and Security Information and Event Management (SIEM) protection as early as 2023 [...]

Tips for Contractors Navigating New Federal Compliance Mandates (CMMC)

July 27, 2022

In this article you'll learn: What is CMMC and why is it important for contractors/subcontractors Provide definitions for technical acronyms associated with the CMMC process How GadellNet helps contractors navigate compliance  What comes next to gain CMMC compliance  Cybersecurity Maturity Model Certification, or CMMC, was released in January of 2020 by the Department of Defense (DoD). CMMC was created to properly secure data shared by the government to c [...]

Microsoft Requiring Authentication Upgrades by Q4

July 1, 2022

Microsoft announced recently that they will begin shutting down their Basic Authentication services on October 1, 2022 forcing customers into the superior protection of Modern Authentication.  GadellNet has been working with our clients to migrate to Modern Authentication since mid-2021 in an effort to maximize cybersecurity protection and minimize costs. Why Switch to Modern Authentication? Modern Authentication uses O Auth access tokens with a limited lifetime.  These [...]

Cybersecurity Best Practices: Changing MFA Processes

May 3, 2022

Data breaches can be devastating to an organization. They can come out of nowhere and leave your organization completely exposed. With approximately 50% of small businesses experiencing a cyberattack every year, it is imperative that your organization keep up to date on cybersecurity best practices to protect itself. What is SMS Multi-Factor Authentication (MFA)? MFA (Multi-Factor Authentication) is one of the simplest and most effective ways to curb cyber attacks. Think of it as [...]

Diving into Ransomware Trends

March 30, 2022

Each year, Datto, a global provider of security and cloud-based software solutions, surveys 1,000 Managed Service Providers (MSPs) on the state of ransomware from the perspective of the IT channel and the small and medium business (SMB) clients it serves. We’ve compiled some of the key takeaways from the Global State of the Channel Ransomware Report and interpreted what it might mean for your organization. What is Top-of-Mind for IT Experts Though the cybersecurity lands [...]

Cybersecurity Hygiene

March 23, 2022

What is cybersecurity Hygiene? Cybersecurity hygiene is defined as the day-to-day practice of maintaining the basic health and security of software and hardware assets, according to Graylog. With current world events developing quickly, keeping up with this daily practice is incredibly important. Put simply, cybersecurity is more important today than ever before. Being proactive is one of the best things you can do for your cybersecurity hygiene. Below are a few ways you can be proac [...]

Endpoint Protection Evolution: improving your cybersecurity

February 7, 2022

The cybercrimes landscape has changed drastically over the last few years with bad actors getting far more aggressive.  Recent attacks have proven that no industry – hospitals, schools, manufacturers, government – is safe.  However, as cyberattacks have increased, so have advances in cybersecurity defenses.  EDR, or Endpoint Detection and Response technology, has had a significant impact in protecting organizations.  What is EDR and does your organization need [...]