Skip to content


proactive cybersecurity best practices

5 Cybersecurity Best Practices for Mid-Market Businesses

July 19, 2019

According to RSM US Middle Market Business Index survey, 15% of mid-market businesses have suffered a data breach in 2019. The report also reveals a considerable jump from 5% in 2015. And while cybersecurity breaches in large companies such as Facebook or Marriott still capture the international news headlines, mid-market businesses are quickly becoming the…

Read More »
check point incident responder

A Day in the Life of a Check Point Incident Responder

July 10, 2019

This blog is a first-hand account from a Check Point Software Incident Responder, outlining a cyber attack which occurred in January of 2019. First signs of an attack The call came in first thing in the morning. One of our clients, Linden Bulk Transportation, was under attack. Linden provides bulk and intermodal transport across North…

Read More »
managed detection and response mdr provider

Should You Outsource Your Managed Security Services to an MDR Provider?

June 25, 2019

At the end of 2018, IndustryWeek published some eye-opening statistics… During 2018, we have seen a 350% increase in ransomware attacks, a 250% increase in spoofing or business email compromise (BEC) attacks and a 70% increase in spear-phishing attacks in companies overall. Further, the average cost of a cyber-data breach has risen from $4.9 million…

Read More »
open source software vulnerabilities

7 Risks Posed by Open-Source Software and How to Defend Yourself

June 18, 2019

What is Open-source Software? Many businesses and products, 90% by some estimates, use at least one open-source component—even if they aren’t aware of it. Open-source software is software whose code is available for public inspection, modification, and enhancement. Typically, this software is created through community collaboration and is maintained and updated on a volunteer basis.…

Read More »
infocyte hunt mdr platform updates

New Features: Email Alerts, In-app Chat Support, and More

June 7, 2019

We continually strive to update and develop new features for Infocyte HUNT based on customer and partner feedback, as well as the changes in the threat landscape. Here is a brief breakdown of some changes we’ve implemented this quarter. Key New Features In-app Chat SupportThe Help button now opens a chat support window, connecting you…

Read More »
phishing cyber attacks

Cybersecurity 101: Intro to the Top 10 Common Types of Cyber Security Attacks

May 1, 2019

Cyber attacks are increasingly common nowadays, and according to the Cisco Annual Cybersecurity Report, attackers can launch campaigns without human intervention with the advent of network-based ransomware worms. The number of security events increased in number and in complexity. A cyber attack is when an individual or an organization deliberately and maliciously attempts to breach…

Read More »
risk management process planning

Eliminating Uncertainty in your Cybersecurity Strategy Through Risk Management Planning

April 24, 2019

In this guest post from Reciprocity Labs we discuss the importance of having a comprehensive strategy when it comes to cybersecurity. It begins early in your risk planning processes by identifying where your vulnerabilities and liabilities are in your infrastructure and continues for the length of your company’s life through regular auditing and implementation of…

Read More »
2018 healthcare data breaches report

5 Takeaways From Reviewing 2018’s Healthcare Data Breaches

March 19, 2019

In 2018, the U.S. Healthcare Industry Remained a Hot Target for Data Breaches. Last year alone, over 15 million patient records were affected with an average of one data breach occurring every 24 hours in the healthcare industry. It goes without saying that hackers and cyber attackers are finding ways around/through/past security defenses—exploiting vulnerabilities and…

Read More »
hidden cyber attacks

Hunting, Detecting, and Responding to Hidden Threats Using FSA

March 12, 2019

A Brief History of Forensic State Analysis Prior to starting Infocyte, our co-founders, Chris Gerritz and Russ Morris, created the first enterprise-scoped threat hunting team for the entire U.S. Department of Defense. Their teams were responsible for hunting, detecting, and responding to highly sophisticated attacks across an 800,000-node network. With virtually unlimited resources and access…

Read More »
root cause analysis tools activity trace

Root Cause Analysis: Finding Patient Zero During a Cyber Security Incident

February 21, 2019

Our New Root Cause Analysis Tool is Designed to Help IR Teams Trace the Source of Suspicious Activity In Q1, we released new tools to assist cybersecurity incident responders. One of those new features is a root cause analysis tool, is designed to help IR teams trace the source of suspicious activity or identified threats…

Read More »