Blog

Blog

Blog

StratoZen Creates Guide for MSPs to Help DIB Suppliers Prepare for CMMC Compliance

Click here to download the guide. On January 1, 2020, the United States Department of Defense (DoD) released their Cybersecurity Maturity Model Certification (CMMC) requirements. CMMC is a new unified standard for companies in the defense industrial base (DIB) supply chain who are required to protect the confidentiality of federal contract information (FCI) and controlled unclassified information (CUI).
Posted in Blogs, Educational Resources, Resource Guide | Comments Off on StratoZen Creates Guide for MSPs to Help DIB Suppliers Prepare for CMMC Compliance

Using SOAR to Maximize SOC Analyst Efficiency While Minimizing Fatigue and Burnout

“Today, cyber security operations do not suffer from a ‘Big Data’ problem but rather a ‘Data Analysis’ problem.” – SANS Institute Security Operation Center (SOC) analysts are getting stretched thin and hitting efficiency roadblocks, especially as they gather and analyze alarm data from multiple platforms.
Posted in Blogs, Home Page | Comments Off on Using SOAR to Maximize SOC Analyst Efficiency While Minimizing Fatigue and Burnout

StratoZen’s Co-Founder Discusses the Benefits of SIEM-as-a-Service

Security information event management (SIEM) software is a suite of solutions that facilitate the collection, oversight, and analysis of log data from multiple computer systems across distributed IT systems. SIEM software’s main purpose is to identify threats and report suspicious activity.
Posted in Blogs, Home Page, SIEM and SOC | Comments Off on StratoZen’s Co-Founder Discusses the Benefits of SIEM-as-a-Service

CIS Controls: What are They and Why are They Important?

The Center for Internet Security (CIS) critical security controls (initially developed by the SANS Institute and known as SANS Critical Controls) are a list of recommended high-priority and highly effective defensive actions. These actions are the starting point for any business, enterprise, and company looking to improve their cybersecurity, and are viewed as “must-do, do-first” actions.
Posted in Blogs, Home Page | Tagged | Comments Off on CIS Controls: What are They and Why are They Important?

Watch our Recorded Interview with a MSP Discussing the Impact of COVID-19 on Service Providers and Customers

  As part of StratoZen’s effort to support the MSP community during these challenging times, we hosted a live interview with one of our MSP partners. In this interview, moderated by Eric Gravett, CRO of StratoZen, Don Baham, President of Kraft Technology Group and Chris Gebhardt, VP of Operations of StratoZen, discussed the impacts of the COVID-19 pandemic on both businesses and customers.
Posted in Blogs, Home Page | Tagged | Comments Off on Watch our Recorded Interview with a MSP Discussing the Impact of COVID-19 on Service Providers and Customers

Coronavirus Cyber Threats Resource Page

To aid organizations in communicating common and emerging threats to users, we are providing a list of example threats that we’re watching specific to the COVID-19 outbreak.
Posted in Blogs, Home Page | Comments Off on Coronavirus Cyber Threats Resource Page

Top Six Cybersecurity Recommendations While Transitioning to a Remote Workforce

As many companies around the country begin work-from-home policies, we’re seeing an increase in the number of cybersecurity attacks aimed at end users and end user systems. We know that many IT operations teams – both in-house enterprise teams and Service Providers – are scrambling to implement the technical capabilities and processes to enable a remote workforce.
Posted in Blogs, Home Page | Comments Off on Top Six Cybersecurity Recommendations While Transitioning to a Remote Workforce
cybersecurity companies

The Process of Implementing SOAR: Deployment and Technology

My last post, entitled “What is SOAR and why is it important”, illustrated why SOAR is needed in the industry alongside faster maturation. If you didn’t catch that one, I’d suggest reading it first for context.  With that post as the backdrop, I will now focus on how we can solve the two main issues with traditional SIEM and SOC: response time and expertise, both of which SOAR promises to solve. 
Posted in Blogs, Home Page, SIEM and SOC | Comments Off on The Process of Implementing SOAR: Deployment and Technology

What is SOAR and Why is it Important?

Security Orchestration, Automation and Response (SOAR) has been getting a lot of attention recently. I thought it would be good to take a moment and discuss what it is and why it is important to the industry.  SOAR Security Definition Gartner was the first to formally define SOAR: “SOAR refers to technologies that enable organizations to collect inputs monitored by the security operations team.
Posted in Blogs, Home Page, News, Resource Featured Post | Tagged | Comments Off on What is SOAR and Why is it Important?
MFA

Is MFA Enough? No, It is Not

Anyone in the cybersecurity field will tell you that enabling Multi-Factor Authentication is the single most important service to prevent nefarious account take-overs. While this information is true, it is also artificially imputed that with MFA enabled, password security is reduced. 
Posted in Blogs, Home Page, Resource Featured Post | Tagged , | Comments Off on Is MFA Enough? No, It is Not