Technical Support: 412-349-6678 | Incident Response

Blog & Latest News

Microsoft 365 exchange migration

Pros and Cons of Microsoft 365 Migration

When you add remote users to your organization for the first time, you'll likely experience IT infrastructure strain. Meanwhile, "moving to the cloud" has become a fashionable trend that promises to deliver cost savings, improved uptime, and additional features. Will it truly help, though? That depends upon your needs, your...
3 key indicators of an attack in progress

3 Key Indicators of an Attack in Progress

To limit damage from cyber security attacks we must quickly detect them. In practice, three key indicators suggest an attack in progress: Bad login attempts, bad domains, and bad actor activity. Bad Login Attempts Many attacks begin with credential stuffing or similar attacks against Remote Desktop Protocol (RDP), Virtual Private...
Network Segmentation - laptop use

Network Segmentation: 3 Key Reasons to Create Smaller Segments

When setting up a network, it's tempting to put all users onto a single network and forget about it. Why? Well, at least initially, it saves time and money. And, as offices grow, desks shift, and employees change roles, that single network makes accommodating those changes easy. Legacy networks tend to...
credential stuffing - woman working on a laptop

Credential Stuffing is a Problem, and Here’s Why

Credential Stuffing 101 Maybe you've experienced it. It's very likely that you've, at least, heard about it. Cybercriminals are taking over online accounts and organizational systems at a rapid pace. So, why is that happening? Simply put: Hackers are credential stuffing. Credential stuffing is a subset of brute-force password attacks....
Person using phone and looking at photos on social media - pr cybersecurity breaches

How to Avoid The Dreaded PR Security Breach

Avoid the PR Security Breach We all want to promote our teams and our organizations. After all, the free publicity generated by public relations (PR) can help with building our reputations & brands, and complement our marketing efforts. Unfortunately, publicity can directly undermine security. Casual publicity shots and press releases can reveal...