-
RMM Tools – Efficient for Businesses, Efficient for Threat Actors
IT teams are drowning in endpoints: 45% of organizations manage between 100 to 1,000 endpoints, while 32% manage between 1,001 to 5,000, according to a recent benchmark survey. However, the lifeboats these teams have been clinging to, Remote Monitoring and Management (RMM) tools, which enable them to manage hundreds of endpoints seamlessly, troubleshoot issues remotely,…
-
Preventing Man-in-the-Middle Attacks by Safeguarding Your Network and Identifying Vulnerabilities
Have you ever received a package that appeared to have been opened before it reached you, and upon opening it, found that some items were missing? Have you used your credit card for a purchase, only to discover a week later that your statement showed several unauthorized charges? These scenarios are classic examples of unauthorized…
-
Are Backdoors Sitting in Your Environment?
Have you ever hidden a house key under a doormat or flowerpot on your porch for a trusted friend to use on occasion? Have you ever made a copy to give to one of your neighbors to use in emergency situations when you are out of town? Ever tape a key to your car underneath…
-
Today’s Cyber Challenge: Multi-Site Security With a Diverse Tech Stack
In today’s globalized economy, it’s easier than ever for businesses to operate in multiple locations, with many crossing borders to reach a broader customer base. While this can bring many benefits, it can also create significant challenges, particularly when managing IT and cybersecurity. As organizations increase their reach, they must work with service providers in…
-
Common Entry Points #4 – RDSH
If there is a weak point in your IT environment, it’s only a matter of time before a threat actor exploits it. So far, our series of “Common Entry Points” has scrutinized ITaaS (IT-as-a-Service), VPNs, and unpatched and obsolete OSS, all based on real incidents CYREBRO has dealt with. Now, we’ll look at another common…
-
Common Entry Points #2 – VPN
In our last Common Entry Points post, we discussed how ITaaS can be a major weak link, providing bad actors entry into an infrastructure. Another common but often overlooked entry point for attackers is a business’s virtual private network (VPN). Work from home and bring your own device (BYOD) policies have led to expanded attack…