The Infocyte Blog

How an MSSP successfully fought off a major cyber attack

This post was last updated on November 19th, 2021 at 03:27 pmHere at Infocyte, we are helping our customers and partners respond to major attacks on almost a weekly basis. When I say attack, I don’t mean an antivirus notification about a bad file that a user inadvertently downloaded. The attacks I am talking about…

Read More »
A team of government agents executing ransomware protection methods

How Can State and Local Municipalities Protect Themselves from Ransomware?

This post was last updated on November 3rd, 2021 at 09:54 amThe extent of ransomware attacks among government entities was especially revealed when the world, particularly the US, was countering the pandemic. It’s now clear that cybercriminals might continue halting delivery of essential services unless state and local municipalities do something to end the ransomware…

Read More »
mid-size business cybersecurity

Five MDR Service Principles to Reduce Risk in Mid-Sized Enterprises

This post was last updated on November 1st, 2021 at 04:04 pmIf you are responsible for IT security for an organization with less than 2,500 employees and the “core” Microsoft security, you might think that hackers have bigger fish to fry and won’t set their sites on you. That line of thinking is risky. As…

Read More »
protecting remote employees

Remote Work Cybersecurity: Protecting Employee Devices and Remote Access Environments

This post was last updated on August 27th, 2021 at 12:03 pmThe COVID-19 Pandemic has led to a surge in remote and hybrid work environments. While working from home has been a safety measure to protect our team’s health, hackers are using this opportunity to step up their activity. Remote work cybersecurity is even more…

Read More »
endpoint detection and response mssps

8 Key Capabilities Managed Security Service Providers Need from their Endpoint Detection and Response Platform

This post was last updated on August 18th, 2021 at 05:52 pmEndpoint devices represent a significant attack surface for most enterprises. Many businesses don’t have the resources or the expertise to thoroughly monitor their own endpoints and to promptly respond as needed when threats are detected. Their logical course of action is to outsource the…

Read More »
edr software security tools

10 Considerations Before Buying an Endpoint Detection and Response (EDR) Security Solution – Part 2

This post was last updated on October 21st, 2021 at 02:14 pmIn part one of our blog about considerations before purchasing an endpoint detection and response (EDR) security tools or solution, we outlined four key factors: Agent vs. agentless monitoring What EDR systems can’t monitor Running an EDR in your cloud Integrating EDRs with other…

Read More »
endpoint detection response edr security

10 Considerations Before Buying an Endpoint Detection and Response (EDR) Security Solution – Part 1

This post was last updated on October 21st, 2021 at 02:14 pmThis is part one of a two-part blog series exploring important considerations when purchasing an endpoint detection and response (EDR) security solution or EDR tool for your organization. Increasingly, enterprise organizations consider EDR security solutions to be a critical component to help ensure overall…

Read More »
proactive cybersecurity best practices

6 Best Practices for Business Cybersecurity [October 2021 Update]

This post was last updated on October 6th, 2021 at 12:29 pmWhen we first published this article in July of 2019, the RSM US Middle Market Business Index survey reported that 15% of mid-market businesses had suffered a data breach that year. This was already a considerable jump from 5% in 2015, and the trend…

Read More »