New Podcast Features Avertium CEO

Episode 3 of Ackermann Marketing and PR’s new “Sweet Tea and Strategy” podcast features Avertium CEO Jeff Schmidt discussing the state of cybersecurity, emerging trends, and the future. Listen to the episode or read the transcript below: Tommy Smith:  Welcome to Sweet Tea and Strategy podcast, produced by Ackermann Marketing and PR. We’re speaking with business […]

The Future of Managed Security Services

Cybersecurity is moving at the speed of light. Threats and technology change on a regular basis. This makes it hard to determine the best course of action. This article explores the future of managed security services to help you decide if outsourcing your 24×7 security operations is right for your organization. What are Managed Security […]

Changing State of Consumer Privacy

Consumer Privacy Laws With data breaches on the rise, many new data protection regulations have been enacted. The European Union’s (EU) General Data Protection Regulation (GDPR) is the first and most well-known of these. This opened a floodgate of action in the US. Several new or bolstered laws have gone into effect in the United […]

Crimeware-as-a-Service Explained

In our field our customers often express disbelief in how brazen cyber criminals can be. As a “sign of the times” entrepreneurial bad actors have started commoditizing their offering in what is called crimeware-as-a-service. This article explores this disturbing trend and its implications. What is Crimeware-as-a-Service? With the introduction of cloud computing the phrase “as-a-service” has become […]

In-house SOC or MSSP

With every study and high-profile data breach publicized, it becomes more apparent that companies need to make protecting their systems more diligently. This leads to the question of whether an organization should go with an in-house SOC or MSSP (managed security service provider). In this article we will discuss considerations for each. Is My Organization […]

Implementing Defense in the Cloud

Many companies assume their cloud vendor is responsible for and has adequate tools, policies and procedures in place for protecting the data with which they are entrusted. While this is true to some extent, consumer data protection laws such as GDPR hold the owner of the data responsible if the cloud service is compromised. “Using […]

Hacking Humans: The Social Engineering Threat

One of the most effective methods for breaking through a company’s cyber defenses is social engineering hacking. Let’s take a closer look at this common cybersecurity threat. Public Perception of Social Engineering When most people think of cyberattacks and the social engineering threat, they picture a scene from an action movie in which a teenage computer whiz […]

Why Sharing Credentials is Dangerous and How to Stop It

In many cases, credential sharing for a computer or software doesn’t seem like that big of a deal. If you’re in a hurry or out of the office, sharing credentials can allow someone else to give you a hand by performing a simple task or checking something for you. If the other person has the […]