TetherView Icon

Our Blog

Stay up-to-date with recent articles and posts.
May 31, 2022
SOC 2: The Security and Compliance Balancing Act

Everyone wants that SOC2 seal of approval for their business, thinking that it makes them more secure and marketable. In reality, the SOC2 for most organizations is a balancing act between security and compliance controls to make the organization FEEL and LOOK secure. Since organizations can dictate the scope of what the SOC2 audits, it […]

Read More
May 16, 2022
Virtual Desktops Make Windows PrintNightmare Less of a Nightmare

Calling the recent Windows PrintNightmare security vulnerability “bad” is a serious contender for understatement of the year. Every single device running Microsoft Windows – from laptops, desktops, and servers – was revealed to have a gaping security hole, one that hackers have been able to climb through for God knows how long and then poke […]

Read More
May 4, 2022
TetherView - Virtual Desktops are Replacing Laptops by Creating Highly Secure and Compliant Digital Workspaces

A virtual desktop is a desktop that can be accessed over the internet from practically anywhere and performs in the same way as a physical desktop when using a Virtual Desktop Infrastructure. Anyone can log on using a PC, Mac, laptop, iPad, Browser, or smartphone, broadening the range of devices and operating systems they can […]

Read More
April 25, 2022
Virtual Desktops - The Ultimate Solution for achieving IT Compliance

In the era of digital transformation, all businesses exist digitally and whether you like it or not, your business’s data lives everywhere. This presents many advantages, chief among them being increased flexibility and agility. But when it comes to compliance with government regulations such as NIST 800-171, many businesses find themselves at a loss. How […]

Read More
March 8, 2022
Paralysis by Analysis: When companies fail to act, cybercriminals win

The average time to detect and contain a data breach is 287 days (212 to detect, 75 to contain). That’s 287 days a cybercriminal is inside your network, wreaking havoc, stealing company information. On the other side of the coin, what’s the average time it takes for a company to make decisions about improving their […]

Read More
February 6, 2022
“Karakurt” Threat Group Exfiltrating Data for Extortion

Threat Update A recently discovered threat group called “Karakurt” has compromised small and medium-sized organizations by deploying ransomware dedicated to exfiltrating their sensitive data and extorting them for money with threats to publicly release said data. The “Karakurt” ransomware uniquely does not encrypt the data and lock down systems. Instead, it silently performs data exfiltration. […]

Read More
February 6, 2022
How to Make Your Office 365 Email More Secure

4 easy steps to enhance the security of your company’s email By Michael Abboud, CEO, TetherView Email remains the primary point of entry for hackers seeking to breach your organization’s network. But most small businesses simply do not have the resources to properly hire a dedicated email security specialist. If your business uses Microsoft Office 365, these four steps are easy to implement and can […]

Read More
February 6, 2022
Don’t Bring a Sword to a Gun Fight!

As companies continue to splurge on cybersecurity, hackers enjoy record levels of success.  There’s a famous scene in Raiders of the Lost Ark when Indiana Jones is battling his way through a crowded village in hostile territory. As Indy makes his way to safety, the sea of people parts and out of the crowd emerges a master swordsman dressed in all black from head to toe. To capture Indy’s attention and show off […]

Read More
February 6, 2022
Is Log4J even worse than you think? Probably…

The Log4J Shell is being called the worst security vulnerability in a decade. When you dig into the details…it’s actually even worse than it sounds.  By Michael Abboud, Chief Executive Officer, TetherView Since its discovery in early December, Log4J has known no shortage of headlines. If cyber risk had an annual award ceremony, this thing […]

Read More
February 6, 2022
Defensive weapon: TetherView’s security solutions focus on protecting data in work-from-home world

TetherView is featured this month in ROI-NJ. Check out the feature below and schedule a demo if you would like to know more about our products! (excerpt) TetherView touts that its Digital Bunker is compliant-ready enough for security-sensitive industries, including the financial sector, aerospace and defense industries. Those industries, in particular, benefit from having more […]

Read More
Copyright © TetherView 2014 - 2022. All rights reserved.
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram