Your browser is out of date.

You are currently using Internet Explorer 7/8/9, which is not supported by our site. For the best experience, please use one of the latest browsers.

866.430.2595
Request a Consultation
banner

Subscribe to our blog for the latest industry news. Subscribe

As Energy Sector Modernizes, Water Facilities Mitigate New Risk
Oct 21, 2021 | Michael Oglesby, Executive Vice President of Services and Innovation

As Energy Sector Modernizes, Water Facilities Mitigate New Risk

On February 5, 2021, an unknown cyber attacker hacked into a water treatment facility in Florida, prompting…

Read More
6 Reasons Why Microsoft 365 Backup is Critical
Oct 14, 2021 | David Beiser, IT Engineer

6 Reasons Why Microsoft 365 Backup is Critical

Six critical reasons to protect your Microsoft 365 data with timely backups and TRUE digital support.

Read More
Rush to the Cloud is Driving Growth, and New Trends in Cybersecurity
Oct 07, 2021 | Heath Gieson, ‪VP Operations

Rush to the Cloud is Driving Growth, and New Trends in Cybersecurity

With so many companies having sped up their digital transformation processes, there’s no reason not to just lean into them full-tilt, and CFOs are at the front of this race. It would appear that to support growth through creative business models that are built to survive a pandemic (or whatever else comes our way), CFOs are continuing to increase investments into digital transformation initiatives that create new revenue streams.

Read More
How Much Damage Can be Done While You’re Still Investigating Alerts?
Sep 29, 2021

How Much Damage Can be Done While You’re Still Investigating Alerts?

Most organizations, especially in the tech and midmarket spaces, receive spending approval to buy security tools, but minimal budget for additional people to manage them. This is like rush hour at the grocery store with only 1 lane open. There are only so many transactions that can be processed that way. Ideally, some of those transactions could be automated, and for those that can’t, every aisle should be open. It’s the same for your security teams and alerts. No alert, or “transaction”, can be overlooked, but when your people get overwhelmed, some of them are bound to slip through, allowing attackers to fly under the radar. I want to examine an attack from both sides– the attacker, and the responder.

Read More
TRUE Ranks 90 in the World for 2021 Cybersecurity Award
Sep 23, 2021

TRUE Ranks 90 in the World for 2021 Cybersecurity Award

We are proud to announce that True Digital Security has climbed in global rankings from 100th to 90th in MSSP Alert’s annual analysis. With more nominations than ever before, this year's applicants spanned 26 countries and were ranked by 3 key criteria: size of in-house cyber-expert teams, quality of cybersecurity offerings, and overall annual program revenue, profitability, and growth. While TRUE is pleased to have risen in such an elite list, we are most thankful for what that growth means to our clients.

Read More
ROI Matters: Fuel Your Organization’s Growth with a Mature Cybersecurity Program
Sep 16, 2021 | Jerald Dawkins, PhD, TRUE Co-founder

ROI Matters: Fuel Your Organization’s Growth with a Mature Cybersecurity Program

Cybersecurity maturity impacts your revenue. Learn how to foster revenue growth with mature security protocols.

Read More
Microsoft Defender Advanced Threat Protection - Remediation and Exceptions
Sep 09, 2021 | Will Gray, IT Engineer

Microsoft Defender Advanced Threat Protection - Remediation and Exceptions

As recently as 3 years ago, it Microsoft’s security options were helpful, but sometimes challenging for IT professionals to navigate. With licensing updates and some simplification, as well as marked improvements to capabilities, it’s definitely time to give the Microsoft security suite another look. Specifically, their latest iteration of Defender Endpoint and Security has undergone a major overhaul with its built-in, cloud powered Advanced Threat Protection.

Read More
Don’t Leave Holes in Your Safety Net: 3 Steps to Strengthen Your Business Continuity Plan
Sep 01, 2021 | Scott Williamson, VP of Information Services

Don’t Leave Holes in Your Safety Net: 3 Steps to Strengthen Your Business Continuity Plan

Disruption of mission critical applications would mean delayed service delivery, lost productivity, lost profits, and a lot of other headaches you don’t want. That’s exactly why you are probably already doing backups and have a BCDR plan in place. The question is not whether or not you have solutions. Of course you do. The question is, have you done everything necessary to ensure those plans and solutions won’t fail you in your moment of need? 

Read More
The Hafnium Hits Keep Coming: Some Microsoft Exchange Servers Still Vulnerable
Aug 26, 2021 | Kerry McQuarrie, Senior Incident Response Engineer

The Hafnium Hits Keep Coming: Some Microsoft Exchange Servers Still Vulnerable

Earlier this year, the cybercartel that calls itself “Hafnium” leveled an attack exploiting vulnerabilities in Microsoft Exchange servers. Patches were released by Microsoft. Remediation steps were published. Known incidents were remediated. If everyone knew about and had access to information on identifying and fixing the problem, we should be looking at a closed case, right? On August 13, just as most people thought we were well past the Hafnium attack, a new related exploit was publicly identified by third parties as a potential vector for malicious PowerShell-related commands. The result? LockFile ransomware is being deployed to many organizations’ systems, and the question we are asking is, Why didn’t you update your servers? Of course, updating a complex system is never that simple, but this remains the central issue.

Read More
Responding to Ransomware Series Part IV: What We’re Doing Isn’t Working
Aug 19, 2021 | Jerald Dawkins, PhD, TRUE Co-founder

Responding to Ransomware Series Part IV: What We’re Doing Isn’t Working

It seems that ransomware attacks have skyrocketed amid the pandemic, likely due to increased use of remote work and increased attack surface, combined with new corporate-style models for ransomware cybercartels. While this trend has certainly affected a number of verticals, healthcare seems to have been hit particularly hard, with hospital resources accessible online.

Read More

Get Started with True Digital Security

Request a Consultation