Category: Cybersecurity

RC-Blog-What-is-Breach-Detection
March 05, 2024

What Is Breach Detection?

Imagine living in a world where keeping your personal and business information safe is as crucial as locking your doors at night. This is the reality of our modern, connected lives. Breach detection plays a hero’s role in this scenario, acting as a vigilant guard against unseen cyberthreats. It’s like having a digital watchdog that […]

Read More
Business Email Compromise - FBI Remediation Guidance
September 16, 2020

Business Email Compromise – FBI Remediation Guidance

On April 6, 2020, the FBI issued Alert # I-040620-PSA, announcing that cyber criminals conduct business email compromises through exploitation of cloud-based email systems, costing US businesses more than $2 billion.

Read More
Cyber Cases from the SOC - Fileless Malware Kovter
September 11, 2020

Cyber Cases from the SOC – Fileless Malware Kovter

Cyber Cases from the SOC is an executive blog series describing real security incident investigations conducted and reported by the RocketCyber SOC analyst team for MSP customers managing SMB networks.

Read More
What is a SOC & 5 Benefits why you need one
September 09, 2020

What is a SOC & 5 Benefits why you need one

A Security Operation Center (SOC) as a command center made up of skilled security personnel, processes and technologies to continuously monitor for malicious activity while preventing, detecting and responding to cyber incidents.

Read More
Cyber Cases from the SOC - Squiblydoo Attack
June 27, 2020

Cyber Cases from the SOC – Squiblydoo Attack

Cyber Cases from the SOC is an executive blog series describing real security incident investigations conducted and reported by the RocketCyber SOC analyst team for MSP customers managing SMB networks.

Read More
Windows Event Log Triaging
June 14, 2020

Windows Event Log Triaging

Security & SOC analysts are frequently tasked with the triaging of event log data. This article serves as a reference point for those in need of investigating failed logon attempts, a.k.a. Windows Event Log ID 4625. Given the numerous opportunities for logging on to computers these days, determining the cause can be challenging to both IT generalists and security teams.

Read More
SOC-as-a-Service implementing Defense-in-Depth
May 04, 2020

SOC-as-a-Service implementing Defense-in-Depth

Throughout the MSP industry the acronyms of layered security, layered defense, security stack is commonly used and refer to the practice of using numerous technologies for the protection of business assets.

Read More
Threat Detection: IOC vs. IOA
January 15, 2020

Threat Detection: IOC vs. IOA

Today we are starting an educational series on threat detection, intelligence and monitoring for Managed Service Providers (MSPs) and Security Operation Centers (SOCs)

Read More
Cryptocurrency Miner Concerns for SMB Owners
January 14, 2020

Cryptocurrency Miner Concerns for SMB Owners

The threat of unauthorized cryptocurrency mining presents cybersecurity concerns for small business owners. While the value of cryptocurrency exchange rates fluctuates in a volatile market, attackers are leveraging SMB computers, browsers and networks to steal their processing power to mine cryptocurrencies.

Read More

Why Wait to Improve your Security Offerings?

Get started with RocketCyber's Managed SOC offering help to help protect your end users and enhance your security offering.

REQUEST A DEMO