Blogs

Blog Image

Ransomware: Be a Victor, Not a Victim.

Ransomware attacks are not only becoming more sophisticated, but also more frequent. In May of this year alone, we have seen multiple successful ransomware attacks against high-value targets, such as:

Blog Image

Azure Sentinel: Notifications of New Detection Rules

The CRITICALSTART Cybersecurity Consulting Services for Microsoft Security team is dedicated to helping you maximize the value of your cybersecurity investment. With that in mind, we will be posting periodic blog updates to keep you informed of the latest developments affecting your Microsoft Security solutions.

Blog Image

Women in Cybersecurity: Meredith Dishman

Meredith Dishman, Director of Distribution Channels for CRITICALSTART, believes in a powerful, yet simple philosophy that can strengthen the relationship with channel partners. It’s the kind of idea that should be the starting point of all collaborations, but one that can often be lacking in today’s business community.

Blog Image

Secure the Cloud—All Hands on Deck

The cloud is storming. There has been intense surge of cloud adoption in businesses throughout every vertical over the past year, but I believe this astonishing trend is only the beginning. I feel that a massive, measured adoption of the cloud will continue, but—perhaps even more shockingly—without the security planning, controls, tools, and skillsets that would be considered standard when protecting a traditional technology infrastructure.

Blog Image

Women in Cybersecurity: Katy Lietzau

Katy Lietzau, Director of Channel for the Central Region at CRITICALSTART, believes in the power of a good conversation within the partner community.

Blog Image

MOBILESOC: You’ll Take this Threat Alert to Go.

Smoked brisket, poached eggs, sliced tomatoes, and sourdough toast—it’s the brunch you’ve been waiting for all week. It’s weekend perfection…right up to the moment when you’re notified that your business — the one you’re charged to protect — is under cyber-attack.

At this point, your day can take one of two directions.

Blog Image

Zero-day Targeting Exchange Servers: Steps to Evaluate the Risk to Your Organization

By: Charlie Smith & Travis Farral

A zero-day has been announced targeting Exchange Servers. If you are running on-premises Exchange Servers within your environment, public facing or in a hybrid configuration, stop what you are doing, finish reading this article, and patch your Exchange Servers immediately! 

Blog Image

The Top Three Issues Robbing You Of SIEM ROI

Upon inception, the function of the Security Information and Event Management (SIEM) was to aggregate log data collected from a variety of sources across an organization. With the data centralized, the next generation of the SIEM leveraged detection logic, or rules, to generate alerts under given conditions.

Blog Image

Earning Your Business is Good. Earning Your Trust is Better.

The impact a company culture has on delivering value 

Company culture might feel like a touchy-feely, softer side of a business. Not necessarily something that business leaders would prioritize with regards to competitive advantage or gross margin. However, as a CEO, I have come to find that the most important decisions I make are around the type of culture we have in the company, how we compete, and how we win.  

Blog Image

Formidable Style

{"theme_css":"ui-lightness","theme_name":"UI Lightness","center_form":"","form_width":"100%","form_align":"left","direction":"ltr","fieldset":"0px","fieldset_color":"000000","fieldset_padding":"0 0 15px 0","fieldset_bg_color":"","title_size":"40px","title_color":"444444","title_margin_top":"10px","title_margin_bottom":"60px","form_desc_size":"14px","form_desc_color":"666666","form_desc_margin_top":"10px","form_desc_margin_bottom":"25px","form_desc_padding":"0px","font":"\"Lucida Grande\",\"Lucida Sans Unicode\",Tahoma,sans-serif","font_size":"15px","label_color":"3f4b5b","weight":"normal","pos
Blog Image

Navigate Aftermath of SolarWinds Attack With On-Demand Resources

The SolarWinds cybersecurity breach, also known as Sunburst, has made global headlines for its duration, impact, and high-profile targets. After going undetected for months, the news in December 2020 of the nation–state attack was the holiday surprise no one wanted. 

CRITICALSTART takes a closer look at the SolarWinds breach through two January information sessions, both available on demand: