<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">

BLOG

vshape_NewWhite

Infogressive Blog

Combining the Power of NGAV and EDR

Traditional antivirus simply isn’t enough to fight the advanced, targeted attacks being deployed today.

How do you fight back? What solutions do you need to prevent the dramatic loss that can rampage through your company?

It’s time to fight back with the next generation of antivirus technology.

 

Posted on April 09, 2019

Continuous Monitoring: Proactive Security

What’s your plan if an attack makes it past your defenses?

While there are many tools and technologies that fight to keep attackers out, it’s just as important to have a plan if those fail.

Posted on April 02, 2019

The Five Stages of Vulnerability Management

What sounds better? Proactively fighting potential threats or scrambling to pick up the pieces after an attacker has successfully made their way onto your system?

As threats continue to become more complex and targeted, it’s more important than ever to focus your efforts to minimize the risk before it’s too late. Vulnerability management is one way to do that.

 

Posted on March 26, 2019

Lateral Movement: Legitimate Activity or Real Threat

A good disguise can go a long way.

Concealing your real identity and priorities can get you far, especially in cybersecurity. 

When an attacker is disguised as a legitimate user, it’s harder to detect their presence, often until it’s too late. This is most evident during the cyberattack stage of lateral movement. To fight an attack at this stage, it’s important to know the objectives of...

Posted on March 19, 2019

Fileless Malware: How to Protect Against This Rising Attacker Trend

The threat landscape is changing.

Fileless malware is a phrase that is rapidly picking up popularity in the cybersecurity industry. In fact, 77% of successful cyberattacks in 2017 utilized some form of fileless malware. So you’ve probably heard of it, and you know you should be scared of it… but what is fileless malware?

 

Posted on March 12, 2019

Network Visibility: What Can't You See?

Every network has its weaknesses.

But do you know what they are and the impact they have on your network security? With the large amount of data on systems and advances in attack sophistication, it’s more important than ever to have a complete picture of what’s going on in your network.

 

Posted on March 05, 2019

Advanced Persistent Threat: Challenge Accepted

The battle of cybersecurity is constantly advancing.

As hackers move to more complex, focused efforts, their strategies have changed and the threat has increased.

One of these strategies, advanced persistent threats (APT), is a customized, focused attack that is difficult to detect and nearly impossible to prevent. So how do companies of all sizes protect their networks and keep their customer...

Posted on February 26, 2019

What is EDR & How Can it Protect You?

What’s your game plan if prevention fails? 

As attack techniques continue to advance, it’s crucial to have a plan in place. Last year, 77% of successful attacks used fileless attack techniques, something even the best antivirus solution can’t track or prevent.

Posted on February 19, 2019

Your Game Plan to Disrupt the Cyberattack Lifecycle

Cyberattacks don’t happen overnight.

They take weeks, even months of planning, research, and deliberate actions. At each stage, from the preparation to the finished attack, there’s great potential to detect the malicious activity and break down the entire operation.

Posted on February 12, 2019

The Complete Guide to EDR

As the intelligence of hackers continues to grow, so does the technology built to protect against even their best attacks.

Technology like Endpoint Detection & Response (EDR) can be invaluable to businesses or managed service providers (MSPs), but with such a powerful tool, there are many questions that need to be answered to understand how it works, what it protects against, and the benefits...

Posted on February 08, 2019

Families are Targets, Too: 5 Home Cybersecurity Tips

It’s not just big businesses that are at risk of being hacked or cyber-attacked.

It may seem scary to let your kids go online after you hear that, but don’t throw all the computers away and live off-the-grid just yet. Try implementing these five cybersecurity practices in your home to give your family some peace-of-mind online:

Posted on October 24, 2018

A Security Engineer's Guide to EDR

Over the last 2 years, our team has been researching a number of platforms, frameworks, trainings, and various definitions of Endpoint Detection & Response (EDR) technology. And of course, the newest hot buzzword in cybersecurity: “Threat Hunting.”  After all this research, we have a team put together and have partnered with a platform we believe in, allowing us to be able to offer this...

Posted on October 23, 2018

5 Easy Ways to Improve Your Cybersecurity at Work

 

It’s true, some of the smallest improvements can really be game changers — especially in cybersecurity.

Whether you know it or not, cyber criminals see you, the end user, as an easy target. But don’t worry, you don’t need the newest security technology to protect yourself from some of the most common threats. Follow these easy tips to eliminate many of the everyday security threats...

Posted on October 15, 2018

MSP vs Hacker: Penetration Test Demo

We all know that security is hard… for an MSP, it’s even more difficult.

In addition to balancing the everyday security risks that every business faces, MSP’s also have to focus on their customers’ networks. A lot of times, customer networks take precedence and MSP’s in-house security falls short.

Posted on October 03, 2018

10 Mistakes that Will Get You Hacked

Sometimes, it's the little things that make a big difference.

This is especially true for cybersecurity. Here are 10 common mistakes made in office settings that leave people vulnerable to cyber attacks, presented by Security Engineer, Will Tipton:

Posted on September 06, 2018

TOP ARTICLES:

QUESTIONS?