Blog

  • All
  • Company
  • Industry
  • News
  • Partners
2022 Holiday Scams to Watch Out For

As we quickly approach the holidays, there are many tactics scammers use to fool unsuspecting online shoppers and holiday enthusiasts. Many of us get excited about the “too good to be true” deals we find during Black Friday or how great we feel donating to charity - but while we’re completing our holiday checklists from the comfort of our homes, scammers are hard at work. Each year, consumers become more aware...

Read More
Effective Patch Management Tools for Your Organization

Welcome back to the blog for our final Cyber Security Awareness Month blog! Today we are focusing on the importance of patching and remediation. This key security step can prevent the majority of breaches and save organizations from an unfortunate, and costly, attack. A study by Ponemon shows that over 60% of breaches are due to unpatched, known vulnerabilities and many of the victims were unaware that their organizations were...

Read More
The Evolution from Password Managers to Privileged Access Management. Which is right for you?

Welcome back to the last week of Cyber Security Awareness Month with Secure Sense! Today, we want to take a deeper dive into password management with partner Delinea to discuss Privileged Access Management, how PAM has evolved in the past few years, and the benefits of using PAM in your organization.  In recent years the need for improved Identity and Access Management (IAM) has been growing. Businesses are enabling policies and technologies to...

Read More
5 key ways to support your digital transformation to the cloud

by: Mike Contasti-Issac As we continue the discussion around cyber security awareness, we shift our focus to a popular topic, cloud security, digital transformation, and the challenges organizations may face while transitioning to cloud-based applications. Today, we’re identifying 5 points for organizations to focus on to successfully, and securely, migrate to the cloud. The only constant in the world of technology is change, and perhaps the biggest technological change that has occurred...

Read More
Optimize your security performance and streamline complex controls with Cymulate

The acceleration of digital transformation is paralleled by a rise in cyber risks. As the average breach cost also continues to rise – reaching $4.4 million this year, according to the latest IBM Cost of a Data Breach report, a 2.6% increase from last year, and a 13% leap since 2020 – the importance of optimizing cybersecurity to maximize the impact of invested resources is crucial. The US government's Cyber Defense Agency...

Read More
CIO approved practices to keep your passwords strong and data secure

In today’s edition of Cyber Security Awareness month, we’re discussing password management and why it’s vital to install a password manager on your browser. As we discussed in the blog last week, cyber security training should include password training – having a unique, complex password for every account is incredibly important to reduce the risks of losing data in a breach. Today we will review password hygiene and our top three...

Read More
A Secure Sense Competitive Advantage
A Secure Sense Competitive Advantage

Welcome back to the Cyber Security Month blog! In last week’s blog, we talked about the importance and value of an MSSP, what sets Secure Sense apart from other MSSP’s and how Secure Sense can help your business. Today, we want to continue the conversation around the competitive advantage of working with Secure Sense and what sets us apart in the world of managed security.

In addition to our dedicated customer success teams and our 24×7 SOC (read more in the previous blog here) Secure Sense’s white glove service stands out in many other ways. Continue reading to find out the secret keyphrase, and our competitive advantage.

Expert engineers/analysts

Our experienced technical team comes from diverse technical backgrounds, representing a wealth of security knowledge. They play an integral role in everything we do at Secure Sense; from evaluating partners to developing services, allowing us to focus entirely on the best products and the highest training certificates.

Our engineers, architects, and analysts are required to ensure they are up-to-date on technical training. In addition to solution technical training, our technical team has focused on training in the following areas:

  • Communication for clearer and more accurate ticket updates​
  • Troubleshooting skillsets have led to fewer escalations internally, and ultimately shorter times to remediate​
  • Critical analysis skills which have measurably improved our ticket responses in providing higher quality responses to tickets.

This training has had a measurable increase in the quality of our services, as well as time to remediate and reduce escalations.

Our SOC has many teams that work with our expert analysts to ensure you receive the most from your service. In addition to our security analyst team, Secure Sense has four other technical teams: the reporting team, the threat intel team, the automation team, and the purple team.​

Automation team:

The Secure Sense automation team reviews customer requests, as well as potential customer controls, and ties those controls in with our managed services for automated systems mitigation, stopping threats in their tracks.​

The team is also responsible for:

  • Automated SIEM log analysis, tied into our Threat intelligence team to streamline the ingestion of IOCs into our managed services.
  • Implementing our vendor vulnerability review and remediation systems allows us to reduce our critical vulnerability remediation windows and provide improved visibility into coverage and reporting.
  • Delivering smart-responses from our SIEM solution, and implementation of Reporting team recommendations and improvements.​
  • Automating reporting and alerting directly into our ServiceNOW portal, providing short response times to customer alerts

Reporting team:

Secure Sense has created a dedicated reporting team to streamline and bring more meaningful data to our customers on a regular basis. This team not only builds custom reports, but also analyzes how our customers are using our services, identifying any particular improvements that we could be making to the services, and providing recommendations to the rest of the managed service teams.​

Our reporting team also builds datasets and analyses based on our customer tickets, as well as managed service systems, to identify new use cases and patterns that we can leverage to improve services internally.​

Threat intel team:

Our internal Threat Intel team reviews various events that have occurred and identifies the relevant TTPs. They provide this intelligence to our purple team which will operationalize it.​

The Secure Sense threat intel team focuses on both systematic collection of IOCs and analysis thereof, as well as individual TTPs that are used to identify new and emerging threats. ​The team looks at those tools, Techniques and procedures that threats are using in the market, and identifies how they could be leveraged against our existing customer base, along with better enhancing our services to detect those TTPs when in use.​​

Purple team:​

Secure Sense’s Purple team reflects the blend of both defensive or blue team skillsets, along with offensive or red team skillsets. The team takes tools, techniques and procedures identified by the threat intel team, analyses our customer’s environments and identifies if we can detect them. ​ With customer collaboration, the Purple team can provide execution packages where we can simulate specific components of a threat, and then validate that we have visibility into that TTP being run in a customer environment.

Professional services

Secure Sense’s implementation and support experts are experienced in a wide variety of Professional Services engagements with specialized tactical teams within our extended technical bench, focused on specific technologies and or products.

In most cases, Professional Services are project-based services that require a skilled engineer or architect for a one-time project or short-term change in your organization; or a senior consultant to provide a wide range of risk advisory services. Project teams will also typically address any ongoing support or maintenance after the initial project is complete.

Our cybersecurity consultant team and senior architects hold a broad range of top industry certifications and credentials, along with many years of experience in the industry. Our methodologies for common engagement types have been developed and refined to reflect the most up-to-date best practices and to scale to projects of any size, including global enterprise enablement.

A few of the engagements we commonly offer include:

  • Cybersecurity Architecture Assessment and Design
  • Solution Implementation Services
  • Health Checks
  • Penetration Testing
  • Vulnerability Assessments
  • Threat and Risk Assessment
  • Enablement & Training
  • Ongoing Support

Secure Sense focuses on continual training and certification among our technical ranks in order to provide the most knowledgeable technical support.

Security training

Secure Sense offers security training and can assist in helping your organization to create its cyber security training program. From general employee awareness training to specific security training for your IT and security staff, Secure Sense can help your organization combat the threats they face on a daily basis. Our team is able to offer:

  • Engaging user awareness training for end-users
  • Technology training for security solutions and products
  • Security Analyst training
  • Threat hunting training
  • Threat simulations to give your internal security teams practice in using internal tools
  • Tabletop exercise development and execution to simulate incidents and incident response

Your Key word is “Purple Team”

Don’t forget! Take this keyword and head to our LinkedIn page here to comment on it for your chance to win one of many prizes this month!

As always, if you’re interested in learning more about Secure Sense’s competitive advantage or any of our services, don’t hesitate to reach out to us at 866-999-7506 or sales@securesense.ca!

Importance of Security Awareness Training

Welcome back to week 1 of cyber security awareness month with Secure Sense! Cyber Security Awareness month makes for a great time to review your cyber security policies with your organization and ensure that your staff are well versed in their training.  In 2021, 82% of security breaches occurred through social engineering tactics, leaving human error to be the most common cause of breaches. We can combat this by properly training our employees...

Read More
The Value of a Secure Sense MSSP

Happy October, AKA Cyber Security Awareness Month for anyone in the #InfoSec world! Throughout the month of October, the Secure Sense team will be taking turns on the blog, sharing our top tips, tricks and best cyber security practices all with the ultimate goal of improving your security posture. Today, we will be revisiting the value of a MSSP (Managed Service Provider!) and how Secure Sense managed services can benefit your...

Read More
How Cloudflare Security does Zero Trust

Throughout Cloudflare One week, we provided playbooks on how to replace your legacy appliances with Zero Trust services. Using our own products is part of our team’s culture, and we want to share our experiences when we implemented Zero Trust. Our journey was similar to many of our customers. Not only did we want better security solutions, but the tools we were using made our work more difficult than it needed...

Read More
Five Questions to Ask Before Choosing an MDR Solution

As the name implies, Managed Detection and Response (MDR) is a cybersecurity service providing detection and response capabilities that minimize the impact of an incident. But what does that mean? We’ll dig into the topic and share questions you should ask your service provider. MDR is a combination of technology and services. The technology provides a range of protection, detection, and response capabilities. The Managed piece consists of technology and services: ...

Read More
Detecting and Mitigating NTLM Relay Attacks Targeting Microsoft Domain Controllers

Adversaries often exploit legacy protocols like Windows NTLM that unfortunately remain widely deployed despite known vulnerabilities. Previous CrowdStrike blog posts have covered critical vulnerabilities in NTLM that allow remote code execution and other NTLM attacks where attackers could exploit vulnerabilities to bypass MIC (Message Integrity Code) protection, session signing and EPA (Enhanced Protection for Authentication). The PetitPotam vulnerability, combined with AD-CS relay, is one of the recent severe NTLM relay variations the CrowdStrike Identity Protection research team have seen, which indicates its...

Read More
The Impact Continuous Security Validation has on Security Operations and Incident Response

For organizations that have limited internal resources and security staff, their focus is primarily on attack prevention. The set of automated security validation rules needs to be simple to use and deploy. At a minimum, the security control validation must be automated and provide prescriptive mitigation roadmaps to optimize security control resiliency, as well as threat intelligence operationalization. For more mature organizations with greater security resources and infrastructure, the benefit of...

Read More
Prevention is the Cure: How to Resolve Incidents Before They Occur

Why we need a new approach to endpoint management  By: Michael Martins, VP Partnerships, Tanium Global organizations are spending more money than ever on cybersecurity. The latest estimate put this outlay at an average annual sum of $5.3 million, up 250% since 2019. Yet, at the same time, 85 percent of Canadian companies experienced at least one cyberattack in 2021. And some ransomware groups are making hundreds of millions by exploiting...

Read More
New Research from Delinea Reveals Cloud Automation is Critical to Future-Proofing Cybersecurity

Written by: Brad Shewmake The cybersecurity landscape is rapidly changing as companies transition from the pandemic and assess their changing security needs.     As a new Delinea report explains, businesses need to shift their focus from merely surviving to embracing new security strategies that enable them to thrive in today’s unpredictable world. Security leaders need to take an honest look at the security challenges they’re up against—and future-proof their solutions to protect against today’s sophisticated and evolving...

Read More
How to Implement a Zero-Trust Security Strategy

By Peter Newton | August 25, 2021 Zero-trust operates on the premise that there are constant threats both outside and inside the network. It also assumes that every attempt to access the network or an application is a threat. In other words, zero-trust is a network security philosophy that states no one inside or outside the network should be trusted until their identity has been thoroughly verified. These assumptions underlie the strategy of network administrators,...

Read More
Similarities And Differences Between XDR And SIEM

by: Andrew Hollister, Forbes Councils Member Sr. Director of Labs and Advisor to the CSO at LogRhythm The technology industry in general — and cybersecurity in particular — is awash with jargon, abbreviations and acronyms. One of the acronyms currently gaining traction is XDR (extended detection and response). On the face of it, XDR appears to have very similar aims to a security information and event management (SIEM) platform, so let's take a look at...

Read More
De-Risking Microsoft 365 Against Attacks and Downtime

A new survey shows enterprise CISOs want more security systems and services that fortify Microsoft 365 to protect valuable data and business continuity.   by Thom Bailey Companies have a lot riding on Microsoft 365 — not just email, collaboration, and productivity applications but the valuable business data produced by the workers who use all those apps. This investment in M365 has only increased with the growth of remote work, elevating...

Read More
Camp Secure Sense is back!

It is with great excitement we are welcoming back an industry loved event, Camp Secure Sense! Camp is a central hub for cyber security individuals to learn about cutting edge technologies, discover our services and network among like-minded professionals. Readapt and Defend: Navigating the new security landscape. After a challenging two years of managing security in an unprecedented time, we are turning the focus on how to protect and defend in the...

Read More
More Orgs Suffered Successful Phishing Attacks in 2021 Than in 2020

Enterprise organizations appear to be falling even further behind in their battle against phishing threats despite heightened awareness of the problem and efforts to curb it. A new study shows that in 2021 more organizations experienced at least one successful email-based phishing attack than the year before. There were also more opportunistic and targeted phishing attacks last year compared with 2020, as well as phishing attacks involving ransomware and business email compromise...

Read More