Prevention is the Cure: How to Resolve Incidents Before They Occur

Why we need a new approach to endpoint management  By: Michael Martins, VP Partnerships, Tanium Global organizations are spending more money than ever on cybersecurity. The latest estimate put this outlay at an average annual sum of $5.3 million, up 250% since 2019. Yet, at the same time, 85 percent of Canadian companies experienced at least one cyberattack in 2021. And some ransomware groups are making hundreds of millions by exploiting...

Read More
New Research from Delinea Reveals Cloud Automation is Critical to Future-Proofing Cybersecurity

Written by: Brad Shewmake The cybersecurity landscape is rapidly changing as companies transition from the pandemic and assess their changing security needs.     As a new Delinea report explains, businesses need to shift their focus from merely surviving to embracing new security strategies that enable them to thrive in today’s unpredictable world. Security leaders need to take an honest look at the security challenges they’re up against—and future-proof their solutions to protect against today’s sophisticated and evolving...

Read More
How to Implement a Zero-Trust Security Strategy

By Peter Newton | August 25, 2021 Zero-trust operates on the premise that there are constant threats both outside and inside the network. It also assumes that every attempt to access the network or an application is a threat. In other words, zero-trust is a network security philosophy that states no one inside or outside the network should be trusted until their identity has been thoroughly verified. These assumptions underlie the strategy of network administrators,...

Read More
Similarities And Differences Between XDR And SIEM

by: Andrew Hollister, Forbes Councils Member Sr. Director of Labs and Advisor to the CSO at LogRhythm The technology industry in general — and cybersecurity in particular — is awash with jargon, abbreviations and acronyms. One of the acronyms currently gaining traction is XDR (extended detection and response). On the face of it, XDR appears to have very similar aims to a security information and event management (SIEM) platform, so let's take a look at...

Read More
De-Risking Microsoft 365 Against Attacks and Downtime

A new survey shows enterprise CISOs want more security systems and services that fortify Microsoft 365 to protect valuable data and business continuity.   by Thom Bailey Companies have a lot riding on Microsoft 365 — not just email, collaboration, and productivity applications but the valuable business data produced by the workers who use all those apps. This investment in M365 has only increased with the growth of remote work, elevating...

Read More
Camp Secure Sense is back!

It is with great excitement we are welcoming back an industry loved event, Camp Secure Sense! Camp is a central hub for cyber security individuals to learn about cutting edge technologies, discover our services and network among like-minded professionals. Readapt and Defend: Navigating the new security landscape. After a challenging two years of managing security in an unprecedented time, we are turning the focus on how to protect and defend in the...

Read More
SecurePATCHING Managed Service by Secure Sense

Unpatched systems are the most common technological factor in breaches and loss of productivity. Unfortunately, solutions to patch related risks are often themselves costly in terms of identifying and purchasing quality products, staffing and expertise. Almost two-thirds of breach victims report being breached due to unpatched, known vulnerabilities and many of these victims were unaware that their organizations were vulnerable in the first place. Over half of the impacted organizations rely...

Read More
Log4j: What is it and how can you identify it?

written by: Matthew Watkinson, CIO, Secure Sense Log4j CVE-2021-44228 Public Disclosure On Thursday December 9th, 2021, a Remote Code Execution (RCE) vulnerability was disclosed [CVE-2021-44228] affecting the Log4j library in versions between 2.0 and 2.14.1.  Log4j is a heavily utilized logging class used in the Java programming language. Because of the widespread use of the log4j library in various java applications, this vulnerability has had a significant impact in modern infrastructure and...

Read More
Security Technology: SD-WAN

Welcome to the last week of Cyber Security Awareness month! So far, we’ve really focused on being cyber aware in regards to current types of threats (phishing and ransomware for example) and the importance of training staff and being prepared for anything. Being “technology aware” is vitally important for today’s organizations as the threat landscape (and threat surfaces) evolve rapidly. Most organizations recognize a daunting number of best practices and security requirements,...

Read More
Ransomware Awareness & Response

Welcome back to Cyber Security Awareness Month with Secure Sense! Last week we discussed human error in cyber security and the importance of training your employees to avoid being a victim of a phishing scheme or social engineering attack. This week, we are reviewing ransomware – an attack that is often times a result of credentials stolen via phishing campaigns, or from malicious email links themselves. Ransomware attacks have hit...

Read More