The Role SOC Services Play in Your Cybersecurity Posture

When the security community talks about an organization’s cybersecurity posture, they are talking about the ability to withstand attacks. In other words,…

Essential Protections: Endpoint, Wi-Fi and Data Security

During National Cybersecurity Awareness Month, we’re focusing on “back to basics” security. Here’s the third of our posts related to this year’s theme:…

Passwords, Passphrases and More: Back to Basic Security (NCSAM)

Since October is National Cybersecurity Awareness Month, let’s take a look at some of the security measures that are still often overlooked. As we…

Eight Steps to Mobile Device Security: NCSAM—Own IT

October is National Cybersecurity Awareness Month — a time when all of us in the cybersecurity industry work together to remind everyone about key…

Take My Computer, Please: How Remote Desktop Protocol (RDP) Can Endanger Law Firms

A system running Remote Desktop Protocol (RDP) is, for all purposes, an open invitation for cybercriminals. This protocol underlies Remote Desktop…

Wire Transfer Hijack: New Social Engineering Technique Targets Law Firms

Here at SOCBOX, we recently witnessed a new avenue for targeting law practices via social engineering. The cybercriminals would have made off with a nice…

Why is Cybersecurity Important for Small Businesses?

For every step forward in the cybersecurity industry, a network of cybercriminals is adapting their strategies and tech to keep up. How can a small…

FSA is Now SOCBOX! Why the Rebrand?

Freedom Security Alliance is now SOCBOX! The last several years have helped us clearly identify our strengths, and with that understanding came the need…

Outsourcing Cybersecurity vs. Hiring Internally—What’s Right For Your Business?

Cybercrime is growing at an unprecedented rate, but unfortunately, only a small number of companies can afford an internal security team that has the…