The Infocyte Blog

Managed Detection and Response 101 [Video]

Cyberattacks are at an all-time high. Ransomware is all over the news, and killware is the next big fear. Hackers are growing more competent at detecting gaps and loopholes in corporate security systems. They can obtain access to secured files and data as technology advances, creating a serious cybersecurity concern. Cybercriminals target organizations with some…

Read More »
French headquarters of Microsoft

Microsoft 365: Should Your Organization be Worried About Microsoft 365 Vulnerabilities?

Microsoft 365 hails as the lifeblood of most American (and global) small-medium sized enterprises. Since the wake of the Covid-19 pandemic, cybercriminals and hackers have seemed to up their illegal game by targeting more organizations than ever witnessed before. This year alone, tens of thousands of organizations had the security of their Microsoft 365 systems…

Read More »

How an MSSP successfully fought off a major cyber attack

This post was last updated on November 19th, 2021 at 03:27 pmHere at Infocyte, we are helping our customers and partners respond to major attacks on almost a weekly basis. When I say attack, I don’t mean an antivirus notification about a bad file that a user inadvertently downloaded. The attacks I am talking about…

Read More »
A team of government agents executing ransomware protection methods

How Can State and Local Municipalities Protect Themselves from Ransomware?

This post was last updated on November 3rd, 2021 at 09:54 amThe extent of ransomware attacks among government entities was especially revealed when the world, particularly the US, was countering the pandemic. It’s now clear that cybercriminals might continue halting delivery of essential services unless state and local municipalities do something to end the ransomware…

Read More »
Detecting and Responding to Ransomware Attacks

Behind the Scenes: What Happens in a Ransomware Attack? [Video]

This post was last updated on September 27th, 2021 at 12:31 pmThe first step to protecting yourself from a ransomware attack is understanding what it actually is. The behaviors that constitute a threat might individually seem like perfectly normal activity, even to someone who knows what they are looking for. If we put ourselves in…

Read More »
mid-size business cybersecurity

Five MDR Service Principles to Reduce Risk in Mid-Sized Enterprises

This post was last updated on November 1st, 2021 at 04:04 pmIf you are responsible for IT security for an organization with less than 2,500 employees and the “core” Microsoft security, you might think that hackers have bigger fish to fry and won’t set their sites on you. That line of thinking is risky. As…

Read More »

Responding to Kaseya VSA Vulnerability & REvil Ransomware Attack

Infocyte Guide to Responding to Kaseya VSA Vulnerability & Ransomware Attack

Read More »
Ransomware

Dealing with DarkSide

This post was last updated on September 23rd, 2021 at 03:28 pmBrian Krebs recently reviewed more details about ‘DarkSide’ and this ransomware group’s role in shutting down the Colonial Pipeline. DarkSide is a group that packages and provides ransomware capabilities as a service. Other ransomware gangs and organizations pay a fee for DarkSide tools and…

Read More »

Infocyte Completes first 100 Microsoft 365 Security and Compliance Assessments

This post was last updated on November 12th, 2021 at 04:41 pmOrganizations Struggle with Proper Microsoft 365 Configuration with 28% Average Compliance Score (less than 50% of our target) Microsoft 365 (aka Office or O365 or MS 365) is the most popular SaaS productivity and back-office platform in the market today. The MS 365 platform…

Read More »
Infocyte + Check Point

On-Demand: Demystifying Behavioral Detection

This post was last updated on August 10th, 2021 at 05:54 pmWatch Replay -> Feeling overwhelmed by MITRE ATT&CK and behavior based detection? You’re not alone. Behavioral analytics or behavior based analysis has often been viewed as an advanced undertaking for cybersecurity’s elite. Adding to its complexity is the unnecessary pursuit of “full” MITRE ATT&CK…

Read More »