TetherView Icon

Our Blog

Stay up-to-date with recent articles & posts.
April 25, 2022
Virtual Desktops - The Ultimate Solution for achieving IT Compliance

In the era of digital transformation, all businesses exist digitally and whether you like it or not, your business’s data lives everywhere. This presents many advantages, chief among them being increased flexibility and agility. But when it comes to compliance with government regulations such as NIST 800-171, many businesses find themselves at a loss. How […]

Read More
March 8, 2022
Paralysis by Analysis: When companies fail to act, cybercriminals win

The average time to detect and contain a data breach is 287 days (212 to detect, 75 to contain). That’s 287 days a cybercriminal is inside your network, wreaking havoc, stealing company information. On the other side of the coin, what’s the average time it takes for a company to make decisions about improving their […]

Read More
February 6, 2022
“Karakurt” Threat Group Exfiltrating Data for Extortion

Threat Update A recently discovered threat group called “Karakurt” has compromised small and medium-sized organizations by deploying ransomware dedicated to exfiltrating their sensitive data and extorting them for money with threats to publicly release said data. The “Karakurt” ransomware uniquely does not encrypt the data and lock down systems. Instead, it silently performs data exfiltration. […]

Read More
February 6, 2022
How to Make Your Office 365 Email More Secure

4 easy steps to enhance the security of your company’s email By Michael Abboud, CEO, TetherView Email remains the primary point of entry for hackers seeking to breach your organization’s network. But most small businesses simply do not have the resources to properly hire a dedicated email security specialist. If your business uses Microsoft Office 365, these four steps are easy to implement and can […]

Read More
February 6, 2022
Don’t Bring a Sword to a Gun Fight!

As companies continue to splurge on cybersecurity, hackers enjoy record levels of success.  There’s a famous scene in Raiders of the Lost Ark when Indiana Jones is battling his way through a crowded village in hostile territory. As Indy makes his way to safety, the sea of people parts and out of the crowd emerges a master swordsman dressed in all black from head to toe. To capture Indy’s attention and show off […]

Read More
February 6, 2022
Is Log4J even worse than you think? Probably…

The Log4J Shell is being called the worst security vulnerability in a decade. When you dig into the details…it’s actually even worse than it sounds.  By Michael Abboud, Chief Executive Officer, TetherView Since its discovery in early December, Log4J has known no shortage of headlines. If cyber risk had an annual award ceremony, this thing […]

Read More
February 6, 2022
Defensive weapon: TetherView’s security solutions focus on protecting data in work-from-home world

TetherView is featured this month in ROI-NJ. Check out the feature below and schedule a demo if you would like to know more about our products! (excerpt) TetherView touts that its Digital Bunker is compliant-ready enough for security-sensitive industries, including the financial sector, aerospace and defense industries. Those industries, in particular, benefit from having more […]

Read More
February 6, 2022
Centralizing Managed Detection and Response

Transcription Good afternoon and welcome to our webinar. Today we’re going to be discussing the importance of centralizing your IT environment and reducing your IT footprint to help manage detection and response both from insider threats and external threats. Welcome. My name is Mike Abboud on the founder and CEO of Tetherview. We are the […]

Read More
February 6, 2022
Digital Workspaces: A Successor To The Enterprise VPN?

“Remote work has been on everybody’s mind this past year. Whether you’re in upper management or an information worker near the bottom of the heap, the ongoing pandemic has impacted where and how you work. A virtual private network (VPN) solution is a common approach used by many companies for enabling employees to work from […]

Read More
February 6, 2022
The Verkada Hack Was Not A Hack

“With a single breach, those scenes — and glimpses from more than 149,000 security cameras — were suddenly revealed to hackers, who had used high-level log-in credentials to access and plunder Verkada’s vast camera network.” – Washington Post . Last week’s Verkada “hack” was not a hack. They left the key under the doormat for the […]

Read More
Copyright © TetherView 2014 - 2022. All rights reserved.
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram