Threat Protection Beyond the Endpoint with MDR Solutions and Services

Strengthen your SIEM + XDR defenses to protect against today's and tomorrow’s threats with Critical Start and Microsoft

Bringing together Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) tools and intelligence enhances threat protection across your digital estate.  When you combine Microsoft Sentinel with the Microsoft Defender Security suite it improves your ability to see attacks across the organization, secure end users and secure your multi-cloud infrastructure.

But you still need the people – the Microsoft expertise and proven methodologies – to derive true value for security outcomes. Don’t let the skills gap impede your ability to operate with maximum protection.  


Download Solutions Overview

Access the Right Expertise and Strategy for Integrated Threat Protection

  • Consolidate

    Consolidated visibility, across SIEM and XDR, of your Microsoft environment – all in one portal.

  • Protect

    Protection for advanced use cases including identity, email and cloud, with an all-in-one security approach that’s applied at every security layer.

  • Reduce Risk

    Reduce risk exposure with human-led monitoring, rapid investigation, continuous threat hunting and response.

  • Maturity

    Strengthen security maturity with an ongoing, strong partnership that helps you get the most out of your Microsoft Security investment.

  • Security Director

    Microsoft Sentinel, Microsoft Defender for Endpoint, and Microsoft 365 Defender user

    We have a pretty wide digital footprint with 6,000 employees and 42,000 students across 40 schools. With the expanding attack surface and increase in ransomware attacks, our small security team needed the expertise to maximize our Microsoft A5 Security. Critical Start has dramatically improved our security posture by helping us truly operationalize Microsoft Sentinel and Microsoft 365 Defender and by providing us 24x7x365 coverage to be able to investigate and respond to increasingly complex attacks across users, devices and our cloud apps.”

  • It seemed like other vendors would ignore what they considered a minor event, while CRITICALSTART takes the time to figure out what’s going on and respond.

  • It seemed like other vendors would ignore what they considered a minor event, while CRITICALSTART takes the time to figure out what’s going on and respond.

How Critical Start Helps You Realize Value from Microsoft Defender XDR

  • Dec 2024 Version

    Protect

    Protect everything, everywhere.

    Given the volume and complexities of identities, data, applications, devices, and infrastructure, it’s essential to learn how secure your organization is now and how to mitigate and protect against threats moving forward.

    • Develop a strategic plan customized for your organization’s priorities
    • Implementation and onboarding focused on applying Microsoft security best practices and high-fidelity threat detection
    • Continuous fine-tuning as new risks are identified
  • MDR platform

    Extend

    Extend your capabilities to quickly detect and respond to threats

    When minutes count, our Microsoft security experts can become and extension of your team and provide remediation and response actions to the threat as soon as it’s detected. 

    You’ll get:

    • 24x7x365 monitoring, investigation and resolution of all alerts and incidents
    • Management of out-of-the-box Indicators of Compromise (IOCs)
    • Freedom from intelligence overload
    • Visibility across your Microsoft security controls in one portal
  • MDR Security

    Mature

    Advance security maturity with a focus on continuous improvement

    With Critical Start, you have access to end-to-end solutions and services that move with you on your Defender journey, helping anticipate risk and strengthening your security posture.

    • Microsoft Security tools and CORR configured to eliminate false positives
    • Solutions for use cases like email phishing, brute force and stolen credential attacks, and attacks against cloud apps
    • Indicators of Compromise (IOCs) mapped to MITRE ATT&CK® Framework
    • Coverage of every alert and incident with 10-minute notification for Critical alerts and 60-minute or less Time to Detection (TTD) and Median Time to Resolution (MTTR) SLAs

Featured resources to learn how to optimize SIEM + XDR

  • XDR 101: What is Extended Detection and Response

    Blog

    Extended Detection and Response (XDR) is by far one of the hottest topics and trends in cybersecurity today. Learn what XDR is, why its important, and how it works with MDR services.

    Read Now

    View Resource

  • Ransomware Protection Guide

    eBook

    This guide outlines best practices on how to protect and defend against ransomware attacks leveraging the Microsoft Security stack.

    Read More

    View Resource

  • Beyond the Endpoint: Detect and Disrupt User Account Attacks

    Blog

    Learn about capabilities developed by Critical Start to extend Managed Detection and Response services to support Microsoft 365 Defender’s user account attacks and credential misuse detection alerts.

    Read More

    View Resource

  • Three Reasons Companies Fall Victim to Ransomware – and One Big Way the Game is Changing

    Blog

    What are the key reasons companies fall victim to ransomware? In this blog, we explore 3 main reasons and one thing about ransomware that might surprise you. 

    Read More

    View Resource

\/p>","margin":"default"}},{"type":"button","props":{"css":".el-item {\n font-weight: 500;\n}","grid_column_gap":"small","grid_row_gap":"small","margin":"default","text_align":"center","text_align_breakpoint":"m","text_align_fallback":"center"},"children":[{"type":"button_item","props":{"button_style":"default","content":"Download Solutions Overview","dialog_layout":"modal","dialog_offcanvas_flip":true,"icon_align":"left","link":"https:\/\/www.criticalstart.com\/wp-content\/uploads\/2022\/09\/CS_SolutionBrief_MDR_SIEM-XDR-2.pdf"}}]}]}]}],"name":"CS Services","modified":"2022-03-02T11:30:49.077Z"},{"type":"section","props":{"animation":"slide-left-medium","image_position":"center-center","padding":"small","padding_remove_bottom":false,"padding_remove_top":false,"style":"muted","title_breakpoint":"xl","title_position":"top-left","title_rotation":"left","vertical_align":"middle","width":"default"},"children":[{"type":"row","children":[{"type":"column","props":{"image_position":"center-center","position_sticky_breakpoint":"m"},"children":[{"type":"headline","props":{"content":"Access the Right Expertise and Strategy for Integrated Threat Protection","text_align":"center","title_color":"primary","title_element":"h2","title_style":"h2"}},{"type":"grid","props":{"content_align":false,"content_column_breakpoint":"m","filter_align":"left","filter_all":true,"filter_grid_breakpoint":"m","filter_grid_width":"auto","filter_position":"top","filter_style":"tab","grid_default":"1","grid_medium":"4","icon_width":80,"image_align":"top","image_grid_breakpoint":"m","image_grid_width":"1-2","image_svg_color":"emphasis","image_width":"150","item_animation":true,"lightbox_bg_close":true,"link_style":"default","link_text":"Read more","margin":"","meta_align":"below-title","meta_element":"div","meta_style":"text-meta","panel_padding":"small","parallax_easing":"1","show_content":true,"show_hover_image":true,"show_hover_video":true,"show_image":true,"show_link":true,"show_meta":true,"show_title":false,"show_video":true,"text_align":"center","title_align":"top","title_element":"h3","title_grid_breakpoint":"m","title_grid_width":"1-2","title_hover_style":"reset"},"children":[{"type":"grid_item","props":{"content":"

Consolidated visibility, across SIEM and XDR, \/strong>of your Microsoft environment \u2013 all in one portal.\/p>","icon":"","image":"wp-content\/uploads\/2022\/09\/CS_Icons_Investigate_lightblue-e1663633657665.png","title":"Consolidate"}},{"type":"grid_item","props":{"content":"

Protection for advanced use cases including identity, email and cloud, \/strong>with an all-in-one security approach that\u2019s applied at every security layer.\/p>","image":"wp-content\/uploads\/2022\/10\/CS_IR-Icons_Digital-Forensics-e1665160756809.png","title":"Protect"}},{"type":"grid_item","props":{"content":"

Reduce risk exposure\/strong> with human-led monitoring, rapid investigation, continuous threat hunting and response.\/p>","image":"wp-content\/uploads\/2022\/09\/CS_IR-Icons_Reports_orange-e1663634779461.png","title":"Reduce Risk"}},{"type":"grid_item","props":{"content":"

Strengthen security maturity\/strong> with an ongoing, strong partnership that helps you get the most out of your Microsoft Security investment.\/p>","image":"wp-content\/uploads\/2022\/06\/SOC-icon-red-1.png","title":"Maturity"}}]}]}]}],"name":"Insights"},{"type":"section","props":{"css":".el-section{background-color: rgba(0,150,214,0.07);}","image_position":"center-center","overlap":false,"style":"default","title_breakpoint":"xl","title_position":"top-left","title_rotation":"left","vertical_align":"middle","width":"default"},"children":[{"type":"row","children":[{"type":"column","props":{"image_position":"center-center","position_sticky_breakpoint":"m"},"children":[{"type":"slideshow","props":{"class":"testimonial-slider-link","content_margin":"remove","css":".el-image {\n display:none !important; \n}\n\n.el-element .el-item {\n \tdisplay: block !important;\n text-align: center;\n}\n\n.el-element .el-item img {\n max-width: 150px;\n height: auto;\n\n}\n\n.el-element .el-item .uk-position-cover {\n\twidth: 86.5% !important;\n text-align: left !important;\n padding-left: 10% !important;\n padding-right: 10% !important;\n justify-content:center;\n}\n\n.el-element .uk-position-medium {\n\tdisplay: none; \n}\n\n.el-element .uk-position-bottom-right {\n \tposition: relative !important; \n}\n\n.el-element .uk-flex-right {\n justify-content: center !important;\n}\n\n.el-element .el-nav {\n background:transparent;\n}\n\n.el-element .el-slidenav {\n display:block !important; \n top:50%;\n margin-top:-5px;\n}\n\n.el-element .uk-slidenav-next {\n right:-20px !important; \n}\n\n.el-element .uk-slidenav-previous {\n left:-20px !important; \n right:auto !important;\n}\n\n.el-link {\n margin-top:16px; \n}\n\n.el-link:before {\n background-image:url(data:image\/svg+xml;charset=UTF-8,%3Csvg%20width%3D%2223%22%20height%3D%2211%22%20viewBox%3D%220%200%2023%2011%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%0A%20%20%20%20%3Cpolyline%20fill%3D%22none%22%20stroke%3D%22%2300A4C6%22%20points%3D%2217%201%2022%205.5%2017%2010%20%22%20%2F%3E%0A%20%20%20%20%3Cline%20fill%3D%22none%22%20stroke%3D%22%2300A4C6%22%20x1%3D%220%22%20y1%3D%225.5%22%20x2%3D%2222.4%22%20y2%3D%225.5%22%20%2F%3E%0A%3C%2Fsvg%3E);\n background-size:contain;\n}","image_height":"80","image_width":"80","link_margin":"remove","link_style":"text","link_text":"Read more","margin":"default","meta_align":"below-content","meta_element":"div","meta_margin":"remove","meta_style":"text-meta","nav":"dotnav","nav_align":"center","nav_breakpoint":"","nav_position":"bottom-right","nav_position_margin":"","overlay_animation":"parallax","overlay_position":"center-left","show_content":true,"show_link":true,"show_meta":true,"show_thumbnail":true,"show_title":true,"slidenav":"top-right","slidenav_breakpoint":"","slidenav_margin":"medium","slidenav_outside_breakpoint":"xl","slideshow_animation":"fade","slideshow_autoplay":true,"slideshow_autoplay_interval":"11","slideshow_autoplay_pause":true,"slideshow_min_height":"200","text_align":"left","thumbnav_height":"75","thumbnav_svg_color":"emphasis","thumbnav_width":"100","title_element":"h3","title_font_family":"secondary","title_hover_style":"reset","title_style":"h2"},"children":[{"type":"slideshow_item","props":{"content":"

\n

We have a pretty wide digital footprint with 6,000 employees and 42,000 students across 40 schools. With the expanding attack surface and increase in ransomware attacks, our small security team needed the expertise to maximize our Microsoft A5 Security. Critical Start has dramatically improved our security posture by helping us truly operationalize Microsoft Sentinel and Microsoft 365 Defender and by providing us 24x7x365 coverage to be able to investigate and respond to increasingly complex attacks across users, devices and our cloud apps.\u201d\/em>\/p>\n\/blockquote>","image":"\/wp-content\/uploads\/2021\/06\/cs-testimonial-education.png","meta":"Microsoft Sentinel, Microsoft Defender for Endpoint, and Microsoft 365 Defender user","title":"Security Director"}},{"type":"slideshow_item","props":{"content":"

\n

It seemed like other vendors would ignore what they considered a minor event, while CRITICALSTART\/strong> takes the time to figure out what\u2019s going on and respond.\/p>\n\/blockquote>"}},{"type":"slideshow_item","props":{"content":"

\n

It seemed like other vendors would ignore what they considered a minor event, while CRITICALSTART\/strong> takes the time to figure out what\u2019s going on and respond.\/p>\n\/blockquote>"}}],"modified":"2022-08-31T15:06:37.650Z","name":"EDR Testimonial"}]}]}],"name":"QUote"},{"type":"section","props":{"image_position":"center-center","style":"default","title_breakpoint":"xl","title_position":"top-left","title_rotation":"left","vertical_align":"middle","width":"default"},"children":[{"type":"row","children":[{"type":"column","props":{"image_position":"center-center","position_sticky_breakpoint":"m"},"children":[{"type":"headline","props":{"content":"How Critical Start Helps You Realize Value from Microsoft Defender XDR","text_align":"center","title_element":"h2"}},{"type":"switcher","props":{"content_column_breakpoint":"m","image_align":"right","image_grid_breakpoint":"m","image_grid_width":"1-2","image_height":"600","image_svg_color":"emphasis","link_style":"default","link_text":"Read more","margin":"default","meta_align":"below-title","meta_color":"secondary","meta_element":"div","meta_style":"h3","nav":"subnav-pill","nav_align":"center","nav_grid_breakpoint":"m","nav_grid_width":"auto","nav_position":"top","show_content":true,"show_image":true,"show_label":true,"show_link":true,"show_meta":true,"show_thumbnail":true,"show_title":false,"switcher_animation":"fade","switcher_height":true,"thumbnav_height":"75","thumbnav_svg_color":"emphasis","thumbnav_width":"100","title_align":"top","title_element":"h3","title_grid_breakpoint":"m","title_grid_width":"1-2"},"children":[{"type":"switcher_item","props":{"content":"

Given the volume and complexities of identities, data, applications, devices, and infrastructure, it\u2019s essential to learn how secure your organization is now and how to mitigate and protect against threats moving forward.\/p>\n

    \n
  • Develop a strategic plan customized for your organization\u2019s priorities\/li>\n
  • Implementation and onboarding focused on applying Microsoft security best practices and high-fidelity threat detection\/li>\n
  • Continuous fine-tuning as new risks are identified\/li>\n\/ul>","image":"wp-content\/uploads\/2024\/01\/Microsoft-Services.png","image_alt":"Dec 2024 Version","meta":"Protect everything, everywhere.","title":"Protect"}},{"type":"switcher_item","props":{"content":"

    When minutes count, our Microsoft security experts can become and extension of your team and provide remediation and response actions to the threat as soon as it\u2019s detected.\u00a0\/p>\n

    You\u2019ll get:\/p>\n

      \n
    • 24x7x365 monitoring, investigation and resolution of all alerts and incidents\/li>\n
    • Management of out-of-the-box Indicators of Compromise (IOCs)\/li>\n
    • Freedom from intelligence overload\/li>\n
    • Visibility across your Microsoft security controls in one portal\/li>\n\/ul>","image":"wp-content\/uploads\/2023\/10\/Computer-screenshots_Front-1.png","image_alt":"MDR platform","meta":"Extend your capabilities to quickly detect and respond to threats","title":"Extend"}},{"type":"switcher_item","props":{"content":"

      With Critical Start, you have access to end-to-end solutions and services that move with you on your Defender journey, helping anticipate risk and strengthening your security posture.\/p>\n

        \n
      • Microsoft Security tools and CORR configured to eliminate false positives\/li>\n
      • Solutions for use cases like email phishing, brute force and stolen credential attacks, and attacks against cloud apps\/li>\n
      • Indicators of Compromise (IOCs) mapped to MITRE ATT&CK\u00ae Framework\/li>\n
      • Coverage of every alert and incident with 10-minute notification for Critical alerts and 60-minute or less Time to Detection (TTD) and Median Time to Resolution (MTTR) SLAs\/li>\n\/ul>","image":"wp-content\/uploads\/2022\/06\/shutterstock_720817345-e1663867165575.jpg","image_alt":"MDR Security","meta":"Advance security maturity with a focus on continuous improvement","title":"Mature"}}]},{"type":"image","props":{"image":"wp-content\/uploads\/2022\/12\/MISA-Verified-MXDR-solution-badge_RGB_Transparent.png","image_svg_color":"emphasis","image_width":"300","margin":"default","text_align":"center"}}]}]}]},{"type":"section","props":{"animation":"slide-right-medium","image_position":"center-center","padding":"small","padding_remove_bottom":false,"padding_remove_top":false,"status":"disabled","style":"primary","title_breakpoint":"xl","title_position":"top-left","title_rotation":"left","vertical_align":"middle","width":"default"},"children":[{"type":"row","props":{"class":"uk-flex-center","layout":"1-2,1-2"},"children":[{"type":"column","props":{"css":".el-column {\n flex-grow:0; \n}","image_position":"center-center","position_sticky_breakpoint":"m","vertical_align":"middle","width_medium":"1-2"},"children":[{"type":"headline","props":{"block_align_breakpoint":"s","block_align_fallback":"center","content":"

        Protect it all with SIEM + XDR\/h2>","margin":"default","maxwidth_breakpoint":"s","text_align":"left","text_align_breakpoint":"m","text_align_fallback":"center","title_element":"div"}},{"type":"text","props":{"column_breakpoint":"m","content":"

        Access to Microsoft E5\/AF\/F5 , gives you the most robust, effective security controls. With Microsoft Security Consulting workshops from Critical Start, we help you develop strategic plans customized for your organization to help you gain visibility and mitigate threats to your hybrid, multi-cloud environments using Microsoft Sentinel and the Microsoft Defender security suite.\/p>","margin":"default","text_align":"left","text_align_breakpoint":"m","text_align_fallback":"center"}},{"type":"button","props":{"grid_column_gap":"small","grid_row_gap":"small","margin":"default"},"children":[{"type":"button_item","props":{"button_style":"default","content":"SIEM Plus XDR Workshop","dialog_layout":"modal","dialog_offcanvas_flip":true,"icon_align":"left","link":"https:\/\/www.criticalstart.com\/wp-content\/uploads\/2022\/04\/Guide_MDR_Onboarding_Guide_Technical_03-22.pdf"}}]}]},{"type":"column","props":{"image_position":"center-center","position_sticky_breakpoint":"m","width_medium":"1-2"},"children":[{"type":"image","props":{"image":"wp-content\/uploads\/2022\/03\/shutterstock_1384937276-scaled.jpg","image_svg_color":"emphasis","margin":"default"}}]}]}],"modified":"2021-07-13T15:39:59.240Z","name":"Siem + XDR"},{"type":"section","props":{"animation":"slide-left-medium","class":"resource-slider-section","image_position":"center-center","style":"default","title_breakpoint":"xl","title_position":"top-left","title_rotation":"left","vertical_align":"middle","width":"default"},"children":[{"type":"row","children":[{"type":"column","props":{"image_position":"center-center","position_sticky_breakpoint":"m"},"children":[{"type":"headline","props":{"content":"Featured resources to learn how to optimize SIEM + XDR","margin":"medium","text_align":"left","title_element":"h2"}},{"type":"overlay-slider","props":{"attributes":"uk-height-match=\".el-item .uk-position-center > .uk-panel\"","class":"resource-slider","css":" .el-nav {\n background:#fff; \n width:auto;\n position:absolute;\n \n padding: 16px 16px;\n}\n\n.el-nav > * {\n padding-left:7px; \n}\n\n\n.el-slidenav {\n color:#fff;\n background:#0099D9;\n height:46px;\n width:51px;\n padding:0;\n display:flex;\n align-items:center;\n justify-content:center;\n}\n\n.el-slidenav:hover {\n background-color:#005A9B;\n}\n\n.el-slidenav svg {\n width:11px; \n}\n\n.el-title {\n font-weight:500;\n font-size:22px;\n}\n\n.el-item .uk-button {\n background-color:#0099D9; \n text-decoration:none;\n margin-top:10px;\n}\n\n.el-item .uk-button:hover {\n background-color:#005A9B;\n}\n\n.el-item .el-link:not(.slide-button) {\n position:absolute;\n top:0;\n right:0;\n width:45%;\n height:100%;\n margin-top:0;\n border-radius:0;\n background:none transparent;\n text-indent:-9999px;\n display:block;\n overflow:hidden;\n}\n\n.el-item .uk-panel {\n position:static \n}\n\n\n@media(min-width:900px) {\n .el-nav {\n \n top: 28vw;\n transform: translateY(-100%);\n right: 0;\n margin: 0 !important;\n bottom: auto;\n \n }\n \n .el-element .uk-slidenav-container {\n \tposition:absolute;\n top:30px;\n right:45%;\n transform:translateX(50%);\n\t}\n \n \n.el-element .uk-cover-container {\n align-items:flex-start; \n}\n\n.el-item {\n align-items:flex-start !important; \n}\n\n}\n\n@media(min-width:960px) {\n top: 27.2vw;\n}\n\n@media(min-width:1000px) {\n .el-nav {\n top: 27.2vw;\n transform: translateY(-100%);\n }\n}\n\n@media(min-width:1200px ) {\n \n .el-nav {\n top: 329px;\n }\n \n}\n\n@media(max-width:899px) {\n .el-nav {\n position:absolute;\n bottom:0;\n left:50%;\n transform:translateX(-50%);\n top:auto;\n }\n \n .el-slidenav {\n display:none !important; \n }\n .el-item .el-link:not(.slide-button) {\n bottom: 0;\n top:auto;\n right: 0;\n width: 100%;\n height: 256px;\n margin-top: 0;\n }\n}","link_style":"primary","link_text":"View Resource","margin":"default","meta_align":"above-title","meta_element":"div","meta_style":"text-meta","nav":"dotnav","nav_align":"center","nav_below":true,"nav_breakpoint":"","nav_position":"bottom-center","nav_position_margin":"medium","overlay_mode":"caption","overlay_padding":"none","overlay_position":"center","overlay_transition":"fade","show_content":true,"show_hover_image":true,"show_hover_video":true,"show_link":true,"show_meta":true,"show_title":true,"slidenav":"top-right","slidenav_breakpoint":"s","slidenav_margin":"","slidenav_outside_breakpoint":"xl","slider_autoplay":true,"slider_autoplay_interval":"10","slider_autoplay_pause":true,"slider_gap":"default","slider_width":"fixed","slider_width_default":"1-1","slider_width_medium":"1-1","text_align":"center","title_element":"h2","title_hover_style":"reset","title_margin":"small"},"children":[{"type":"overlay-slider_item","props":{"content":"

        Extended Detection and Response (XDR) is by far one of the hottest topics and trends in cybersecurity today. Learn what XDR is, why its important, and how it works with MDR services.\/p>\n

        Read Now\/a>\/p>","image":"wp-content\/uploads\/2022\/03\/CST2322-XDR-101-Blog-Social-Graphic-FINAL.jpg","link":"https:\/\/www.criticalstart.com\/xdr-101\/","meta":"Blog","text_color_hover":false,"title":"XDR 101: What is Extended Detection and Response"}},{"type":"overlay-slider_item","props":{"content":"

        This guide outlines best practices on how to protect and defend against ransomware attacks leveraging the Microsoft Security stack.\/p>\n

        Read More\/a>\/p>","image":"wp-content\/uploads\/2022\/10\/eBook-Three-Step-Guide-to-Materializing-the-Power-of-Microsoft-Security_Page_1.jpg","link":"https:\/\/www.criticalstart.com\/resources\/ransomware-protection-guide\/","meta":"eBook","text_color_hover":false,"title":"Ransomware Protection Guide"}},{"type":"overlay-slider_item","props":{"content":"

        Learn about capabilities developed by Critical Start to extend Managed Detection and Response services to support Microsoft 365 Defender\u2019s user account attacks and credential misuse detection alerts.\/p>\n

        Read More\/a>\/p>","image":"\/wp-content\/uploads\/2022\/04\/tinifiedshutterstock_1384937276-scaled-203f8825-min.jpg","link":"https:\/\/www.criticalstart.com\/beyond-the-endpoint-detect-and-disrupt-user-account-attacks\/","meta":"Blog","text_color_hover":false,"title":"Beyond the Endpoint: Detect and Disrupt User Account Attacks"}},{"type":"overlay-slider_item","props":{"content":"

        What are the key reasons companies fall victim to ransomware? In this blog, we explore 3 main reasons and one thing about ransomware that might surprise you.\u00a0\/span>\/p>\n

        Read More\/a>\/p>","image":"\/wp-content\/uploads\/2022\/04\/shutterstock_1016849572-scaled-e6652de8-min.jpg","link":"https:\/\/www.criticalstart.com\/three-reasons-companies-fall-victim-to-ransomware-and-one-big-way-the-game-is-changing\/","meta":"Blog","text_color_hover":false,"title":"Three Reasons Companies Fall Victim to Ransomware \u2013 and One Big Way the Game is Changing"}}],"modified":"2022-05-16T15:36:49.233Z","name":"Home Resource Flipper"}]}]}],"name":"Details"}],"version":"4.5.0-beta.6"} -->