incident response platform dashboards

Infocyte Release Notes, August 2019: Dashboards

August 9, 2019

As an incident responder, security analyst, and/or Infocyte partner delivering managed detection and response (MDR) services, you’re constantly tasked with deciding what to do right now. Additionally, you need to know how what you’re doing has impacted your environment(s) over time. Infocyte’s newly released (and continuously evolving) dashboards will help cyber security teams answer two…

Read More »
infocyte mid-market threat and incident response cyber report

Mid-market Threat and Incident Response Report: Our Methodology

August 2, 2019

Last month, we released our inaugural Mid-market Threat and IR Report on the types of threats we’re finding in customer- and partner-led threat assessments and incident response investigations. One of the most interesting and controversial data points is the enormous amount of dwell time for malware and unauthorized access: over two years — well in…

Read More »
infocyte mdr default blog image

Infocyte Release Notes July 2019

July 31, 2019

Webhook Support and Integration Infocyte has released a new capability within our managed detection and response platform, allowing customers to create custom hooks into any number of third-party systems through a Webhook integration. This feature allows customers and partners to send Infocyte Alerts to any defined destination that supports push capabilities. Some examples of how…

Read More »
proactive cybersecurity best practices

5 Cybersecurity Best Practices for Mid-Market Businesses

July 19, 2019

According to RSM US Middle Market Business Index survey, 15% of mid-market businesses have suffered a data breach in 2019. The report also reveals a considerable jump from 5% in 2015. And while cybersecurity breaches in large companies such as Facebook or Marriott still capture the international news headlines, mid-market businesses are quickly becoming the…

Read More »
check point incident responder

A Day in the Life of a Check Point Incident Responder

July 10, 2019

This blog is a first-hand account from a Check Point Software Incident Responder, outlining a cyber attack which occurred in January of 2019. First signs of an attack The call came in first thing in the morning. One of our clients, Linden Bulk Transportation, was under attack. Linden provides bulk and intermodal transport across North…

Read More »
managed detection and response mdr provider

Should You Outsource Your Managed Security Services to an MDR Provider?

June 25, 2019

At the end of 2018, IndustryWeek published some eye-opening statistics… During 2018, we have seen a 350% increase in ransomware attacks, a 250% increase in spoofing or business email compromise (BEC) attacks and a 70% increase in spear-phishing attacks in companies overall. Further, the average cost of a cyber-data breach has risen from $4.9 million…

Read More »
open source software vulnerabilities

7 Risks Posed by Open-Source Software and How to Defend Yourself

June 18, 2019

What is Open-source Software? Many businesses and products, 90% by some estimates, use at least one open-source component—even if they aren’t aware of it. Open-source software is software whose code is available for public inspection, modification, and enhancement. Typically, this software is created through community collaboration and is maintained and updated on a volunteer basis.…

Read More »
infocyte hunt mdr platform updates

New Features: Email Alerts, In-app Chat Support, and More

June 7, 2019

We continually strive to update and develop new features for Infocyte HUNT based on customer and partner feedback, as well as the changes in the threat landscape. Here is a brief breakdown of some changes we’ve implemented this quarter. Key New Features In-app Chat SupportThe Help button now opens a chat support window, connecting you…

Read More »
managed detection and response platform

Infocyte’s Automation and Managed Detection and Response (MDR) Security Services Ease the Need for Skilled Cybersecurity Experts

May 9, 2019

The cybersecurity job shortage is well documented. In a recent survey of IT decision makers by the Center for Strategic and International Studies, 82% of employers report experiencing a shortage of cybersecurity skills. Sadly, 71% believe this talent gap causes direct and measurable damage to the organizations. Read the full Cybersecurity Workforce Gap report, here.…

Read More »
phishing cyber attacks

Cybersecurity 101: Intro to the Top 10 Common Types of Cyber Security Attacks

May 1, 2019

Cyber attacks are increasingly common nowadays, and according to the Cisco Annual Cybersecurity Report, attackers can launch campaigns without human intervention with the advent of network-based ransomware worms. The number of security events increased in number and in complexity. A cyber attack is when an individual or an organization deliberately and maliciously attempts to breach…

Read More »