Blog

MSSP pic

Is it time to move your cyber operations to an MSSP?

In these challenging times with low levels of skilled cyber experts and with hackers getting faster and smarter – how are we going to outsmart cyber crime? We believe that there are four main advantages to making the move to an MSSP. Committing to a monthly service instead of purchasing hardware, software, and implementation services…

industry-3087393_1920

Automation and Orchestration; The paradigm shift transforming Cybersecurity Managed Services

There are many challenges in cybersecurity today, not least of which is lack of specialized manpower to fulfil key roles within the cybersecurity discipline. Some new developments within this field, include automation and orchestration, that is shifting the way that cybersecurity teams are operating on a day-to-day basis. Whereas before there were so many broken-down…

DSC_3086

When is it Right to Setup a Security Operations Center?

WSetting up a well-functioning security SOC brings many processes together. Building the delicate balance across people, processes, and technology has to be weaved together, and precision is a key and foundational element. The risks involved with anything related to IT security are rising progressively and business across the global divide are seeking the best way…

workplace

Employees are your Workplace Ambassadors for Cyber Security

Research is constantly shows statistics with high percentages of breaches – up to 38% due to employees. Sometimes malicious, but most of the times not. But employee negligence is one of the highest threats to any organization. Cybersecurity safety in the workplace is rising in importance if only due to the impact it can have…

cd protect

CyberDome: Protecting Your Business

In today’s business and commercial climate Cyber Security activity is at its peak, particularly with regards to online transactions, massive customer databases and mobile banking. The sheer scale of this type of activity makes it nearly impossible not to fall prey to the routine cyber-attacks that have become all too common in 2018.   This…

defense e mail

What is the best Defense for E Mail Attacks? #phishing

It is rarely malicious employees who are the sole source of insider threats. It is often well intentioned ones that inadvertently help perpetrators by providing them with a way to get into your system. Attackers use phishing techniques, such as spam e-mails in order to find out information about employees, receive their credentials or infect your…

Subscribe to Cyberdome's Newsletter

Get industry insider updates delivered to your inbox

Subscribe