Impact Group: Blog

What is the difference between EDR, XDR and MDR and why does it matter to your security?

By George Bakalov | Feb 20, 2024

Acronyms and jargon often infiltrate our daily lives, initially emerging as practical shortcuts but eventually transforming into daunting entities that can leave non-technical people feeling overwhelmed. Worry not, as a non-technical explanation is on the horizon, shedding light on the…

Read More

The Basics of Incident Response for SMBs

By George Bakalov | Jan 23, 2023

Incident response is a critical component of any organization’s cybersecurity strategy. It is the process of identifying, containing, and mitigating the impact of a security incident. This process is essential for small and medium-sized organizations (SMBs) as they are just…

Read More

Six Best Practices for Cybersecurity

By George Bakalov | Jun 7, 2022

From casual users to C-Suite executives the risk of getting hacked has grown exponentially in the last two years. Cyberattacks are an increasing concern especially among business leaders. The frequency and sophistication of these attacks has increased in recent years…

Read More

Cloud Migration – Demystifying the Shared Responsibility Model

By George Bakalov | Apr 15, 2022

It’s common knowledge that cloud service providers follow a shared responsibility model, which means that when migrating applications, data, containers, and workloads to the cloud, your security team has some responsibility for security. However, many IT leaders share in confidence…

Read More

The Russia-Ukraine Conflict: Cybersecurity Implications for US Organizations and Institutions

By George Bakalov | Mar 15, 2022

The cybersecurity community has been monitoring the conflict between Russia and the Ukraine with great level of concern. Both Russia and the Ukraine are known as countries of origin many threat actors call home. In this advisory we will focus…

Read More

Three Practical Steps to Launch Your Vendor Risk Management Program

By George Bakalov | Mar 8, 2022

Who can forget Target Corporation’s massive security breach in 2013? However, did you know that the attack started when Fazio Mechanical, a small heating and air conditioning company in Pennsylvania that worked with Target, got its own vulnerability exploited via…

Read More