Blog

Securing Macs from Surging Cyber Attacks

Securing Macs from Surging Cyber Attacks

macOS security has seen some dramatic shifts recently. And not for the better. As macOS soars in popularity among users and businesses worldwide, it’s becoming a bigger target for cybercriminals. macOS is climbing the ranks fast, on pace to become the most popular operating system by 2030. But with greater popularity comes greater risk. If you use macOS, you’re now up against a barrage of ransomware, spyware, and other nasty tactics. Hackers are working overtime to bring down your defenses, and they’re crafting macOS-specific threats to do so. Put simply, your Mac isn’t the impenetrable device it once was.  But…
Read More
The Smart Buyer’s Guide to SIEM 

The Smart Buyer’s Guide to SIEM 

Ready to demystify SIEM? Welcome. If you’re reading this, you’re probably curious about Security Information and Event Management (SIEM). Maybe you’ve got a question or two you’ve been hesitant to ask. No problem. We know SIEM can be an intimidating topic, but we’re here to let you know it doesn’t have to be. In this guide, we’ll dive deep into the hows, whats, and whys of SIEM, all in straightforward, comprehensible language. By the end, you’ll have a better understanding of this critical technology and the know-how to select the right solution for your organization.
Read More
Solving the SIEM Problem 

Solving the SIEM Problem 

Every day, we’re bombarded by massive amounts of information. From daily news and stocks, to the latest box scores, keeping up with it all is a full-time job. Your IT infrastructure is no different. Millions of logs circulate through your IT systems, including firewall data, system logs, and endpoint events to name a few. Security Information and Event Management, or SIEM for short, was designed to make sense of it all. Centralizing logs is at the heart of what SIEM was meant to do. But does just having a SIEM and organizing your data help if there’s still too much…
Read More
Surviving Cybersecurity Scares: Fighting Fear with Awareness

Surviving Cybersecurity Scares: Fighting Fear with Awareness

Horrifying hacks, terrifying tradecraft, and cybersecurity scares loom in the darkness—but there’s no reason to fright. Come sit with us around the digital campfire and learn how you can give cyber threats a good fight. Join our Security Operation Center (SOC) Tactical Responders, Anton Ovrutsky and Dray Agha, as they walk you through real-world cybersecurity horror stories and give you the insights needed to defend yourself. Don’t miss out on this spooky session. Save your seat today to: Explore threat actor tactics: Gain insights into the latest cybercriminal strategies and techniques. Gain actionable insights: Hear tips and tricks that you…
Read More
Decoding Compliance and Cyber Insurance: From Mandates to Clarity

Decoding Compliance and Cyber Insurance: From Mandates to Clarity

Let’s face it, our data and privacy are under siege, and it’s a challenge we all need to face together. Regulations have taken the form of compliance frameworks to address risk. Further, the rise of cyber insurance has gone from just-in-case protection to necessary. Come join us as we gain a better understanding of compliance mandates, dive into cyber insurance requirements, and how we’ll assist you in turning regulatory challenges into a competitive advantage. In this webinar, Huntress explores: How we got to these regulations: Get a deeper understanding of the risk exposure we face every day Why do we…
Read More
They Want Credentials, Control, and Chaos. Let’s Shut it Down!

They Want Credentials, Control, and Chaos. Let’s Shut it Down!

Cybercriminals don’t wait for permission. They sneak in, move fast, and aim for maximum damage. But so do we. In this session, we break down the real-world attacks our Security Operations Center (SOC) stopped before they could take businesses down. Here’s a taste: Credential Theft in Telecom: An attacker quietly lurked for weeks, gathering credentials and mapping the Active Directory. Cobalt Strike in Healthcare: A bad actor bypassed MFA in a New Jersey orthopedic network, pivoted with RDP, and prepped a Cobalt Strike beacon to phone home. Brute-Force RDP in Food Wholesale: Attackers hammered their way into an RDP server,…
Read More
Help has Arrived: Unlock the Full Power of Microsoft Security

Help has Arrived: Unlock the Full Power of Microsoft Security

When it comes to security, Microsoft is a great ally to have in your corner. But without the right team and expertise, you might not be using its full potential. That’s where we step in. Join us for an insightful webinar to learn how our Managed Endpoint Detection & Response (EDR) and Identity Threat Detection & Response (ITDR) solutions are breathing new life into Microsoft security for organizations. You’ll see how Huntress, now a Verified SMB solution provider within the Microsoft Intelligent Security Association (MISA), integrates seamlessly with your Microsoft security tools to bring an extra layer of real-world, 24/7…
Read More
An Insiders Guide to EDR

An Insiders Guide to EDR

Are you in the market for an EDR solution? Have you thought about having it managed by an MDR provider? Are all of these abbreviations very confusing? We don’t blame you—in the world of cybersecurity, there are way too many terms you’re expected to know without much explanation. In this session, learn about the pros and cons of different EDR and MDR solutions for those without a ton of technical experience. This advice is for anyone looking for a new EDR or MDR, but is made specifically for non-experts, so you can make the best choice for your organization whether…
Read More
The True Cost of a Cyberattack

The True Cost of a Cyberattack

Cyberattacks suck, for many reasons. But there’s one that businesses often forget – a cyberattack's financial toll goes far beyond the initial hit. Businesses could spend $250,000 (or more) to fully recover from a cyberattack. You don’t want to shell out that kind of cash. And we don’t want you to either. Try Huntress for free and deploy in minutes to start fighting threats. This eBook exposes the hidden costs of a cyberattack, and it shares what you can do to avoid becoming another statistic. You’ll learn: What gaps you might have in your security strategy Why those gaps could…
Read More
10 Endpoint Security Tips You Should Know

10 Endpoint Security Tips You Should Know

Did you know that 70% of successful breaches start at the endpoint? Endpoints—like computers, laptops, and mobile devices—are prime targets for cybercriminals. You need to be ready to defend them against attacks. In this eBook, we've curated the top 10 must-know endpoint security tips that every IT and security professional should have in their arsenal. Discover key insights like: How to identify vulnerable entry points Where to strengthen your security protocols and processes The value an EDR solution can bring ​​Download your copy today and learn how you can elevate your endpoint security.
Read More