The eSentire Blog

Cybersecurity Strategy

3 M

Your New Year's cybersecurity resolutions

You know how the saying goes: “New year, new you.” Whether or not you apply that to your personal life, you should…

READ NOW →

Cybersecurity Strategy

6 M

Security first approach provides a significant advantage to law firms

The security industry all too often sells the next shiny object touted as the Holy Grail of security that protects…

READ NOW →

Managed Detection and Response

4 M

What's trending in cybersecurity: expectations for the new year

2017 has been a busy year for cybersecurity. Between massive data breaches including Verizon, Equifax, Sonic, Uber…

READ NOW →

Threat Intelligence

3 M

Distributed Denial of Service (DDoS) attack FAQs and important things to know

What is “DDoS”? DDoS, which stands for Distributed Denial of Service, is a type of cyberattack that attempts to…

READ NOW →

Cybersecurity Strategy

4 M

The "Internet of Things" era: cyber risks to be aware of

Setting the stageThe Internet of Things (IoT) is a rapidly expanding industry. In fact, it’s estimated that the…

READ NOW →

Threat Intelligence

2 M

Cyber threats: a holiday tradition

While shoppers are busy, so are opportunistic threat actors. The holiday season invariably includes great deals,…

READ NOW →

Threat Intelligence

3 M

Don't get run over by drive-by mining

Drive-by Mining is exploding in popularity, as it’s being adopted by both legitimate websites and criminal…

READ NOW →

Cybersecurity Strategy

5 M

Protect your network against IoT vulnerabilities with 4 simple steps

Many of the clients we work with find themselves concerned that the newest device they’ve read about could pose an…

READ NOW →

Attacks/Breaches

4 M

Paradise Papers lost: why this breach should concern legal and accounting firms

Milton's epic poem, Paradise Lost tells the biblical story of the fall of man: Satan’s temptation of Adam and Eve…

READ NOW →

Threat Intelligence

4 M

Whaling: phishing for bigger, more powerful targets

You’ve probably heard of phishing (and the damage its wreaking worldwide), but have you heard of whaling? In this…

READ NOW →

Cybersecurity Strategy

5 M

Digital literacy: why knowledge gaps are a growing cybersecurity concern

Digital literacy is an important term to understand for those who interact with the digital environment – aka,…

READ NOW →

Attacks/Breaches

3 M

Sonic Data breach: let it be a lesson

Sonic drive-in is one of the latest victims in a long line of recent cybersecurity breaches. The fast food…

READ NOW →
Page
of 47