Author Archives: Maria Koblish

Thrive Awards 2021

Thrive takes pride in being able to provide excellent service to our clients. We strive to deliver the best client experience possible while mitigating cybersecurity crises, bolstering security postures, optimizing business performance and collaboration, and helping make IT more streamlined. To that end, we are pleased to announce that we have been formally recognized by our peers and industry insiders for a number of awards, including recognition for client service, company culture, growth, and accomplishments.

We see these awards not as one-time goals to reach, but as a standard to continually strive for.

Our 2021 awards include:

Global Infosec Awards 2022

Most Innovative in Managed Security Service Provider (MSSP)

Hot Company in Security Information Event Management (SIEM)


ongoing

CRN’s 2021 Managed Service Provider 500

Security 100 (MSSP)

The Managed Security 100 spotlights MSPs with cloud-based security services expertise.


ongoing

CRN’s Channel Chiefs

Eric Young featured as a 2021 CRN Channel Chief

CRN’s Channel Chiefs are recognized as “the executives who know how to create a partner program that delivers”


The 2021 Tech Elite 250

CRN’s list of the highest-achieving solution providers in vendor certifications.


CHANNELe2e’s Top 100 Vertical Market MSPs 2021

#7 Overall
#3 Financial Services

MSPs featured throughout the list and research leverage deep vertical market expertise to drive annual recurring revenues (ARR) in specific market segments.


CRN’s 2021 Women of the Channel

Stephanie Farrell featured as a 2021 Woman of the Channel

In 2021, CRN honored over 1000 women whose channel expertise and vision are deserving of recognition.


Channel Futures MSP 501

#58 Overall
#5 in New England
#1 in Massachusetts

The MSP 501 is the world’s first, largest and most comprehensive survey and ranking list in the IT channel.







CRN Fast Growth 150

Ranked #102

CRN‘s Fast Growth 150 ranks solution providers with gross annual sales of at least $1 million by their two-year growth rate.


CRN Solution Provider 500

Ranked #247

CRN‘s Solution Provider 500 ranks the top integrators, service providers and IT consultants in North America by services revenue.


Stevie Awards for Information Technology

Gold Winner

Best Technical Support Solution – Computer Technologies – The Thrive Platform


Boston Business Journal’s 2021 CFO of Year Award

Jay Adams, CFO, Thrive Named Honoree

Drawdown Awards 2021

Shortlisted: IT Provider: Managed Service Provider

BIG Stratus Awards for Cloud Computing

Top Cloud Security Service




Plan for the Worst – Achieve the Best

Look, nobody likes picturing the worst-case scenario that could befall their business—even doing so might feel a bit like memorizing a divorce attorney’s number as you write your wedding vows. However, failing to plan for the worst could very well lead to your business’ downfall. What does it take to properly plan and prepare for the possibility of a disaster, and the associated recovery you’ll have to undergo?

Begin By Establishing the Worst-Case Scenario

To begin, it is important to have an idea of what a disaster—any disaster—might look like for your business. Put some thought to it: what is the absolute worst thing that could realistically happen to your business? Might the office be flooded? Maybe some poor workmanship in the electricals sparks a fire, or the old, neglected building next door finally collapses and takes out part of your office, where you just so happened to keep your business’ servers?

Let’s amp up the trouble a bit and assume that whatever disaster struck (flood, fire, or falling building) left your office a total loss and, to make matters worse, took a key manager or other high-level employee with it. In addition to the personal loss, this would likely create some challenges for your business moving forward.

Whatever the Scale, You Need to Be Prepared to Deal with Disasters

Whether the loss is of a single spreadsheet or a key member of your business or your business’ physical location, you need to have the means to bounce back. For this, we always recommend that a business prepare a business continuity plan.

What is a Business Continuity Plan?

You should consider a business continuity plan to be your business’ saving grace in any disaster scenario. Its entire goal is to help ensure your company has a future, that you can resume operations if and when the chips are down.

To do so, your business continuity plan will need to cover a few different aspects of your company. There are your operational aspects, of course, including your technology and your other resources, as well as your human resources to consider.

All things considered, the baseline business continuity plan will cover:

  • Data required to facilitate operations
  • Technology needed to access that data
  • An office location or contingency plan for hosting operations
  • A chain of command in the event of a disaster
  • A strategy that is accessible to all employees involved in the restoration process

We Can Help You Get Started!

We’ll help you put together a strategy that will ensure that you can make it, regardless of the disaster your business faces, assisting you with the planning process and implementing the technology required to enact it. To get started, contact Thrive today!

Is Cloud Storage Secure?

We frequently encourage our clients to consider the cloud as a viable option for their data storage needs, be they someplace to store a copy of their data backup or even their primary storage option. Sometimes though, our clients are hesitant to adopt cloud technology. We frequently get asked – is cloud storage secure? This is an important question to answer, because more and more of our data is going to end up in the cloud as technology continues to advance.

Unfortunately, this can be a difficult question to give a straightforward answer to. Why? Because different cloud providers will offer different levels of security, so the answer we can give you will depend entirely on what provider you use.

Cloud Storage Security Depends on the Cloud Provider

Cutting a long story short, it really is as simple as that. There are plenty of means that your cloud provider has to help ensure the security of your stored data on their infrastructure—because that’s all the cloud really is: an infrastructure that you can use remotely instead of using your own. In this case, you’re simply using someone else’s server to store your data.

Due to this, your data’s security is wholly dependent on the protections that the provider has (or has not) put in place.

Ideally, your provider will have made sure that your data is protected by a variety of safeguards, including encryption, access controls, redundancy, and cloud monitoring, with these features tested regularly to ensure that your data is properly secured. Any quality provider will be doing so to the best of their ability, with their servers locked down and guarded behind their own security features and personnel.

Data Also Needs to Be Available

Of course, data that your business can’t access is (for all intents and purposes) data that doesn’t exist, so you need to be sure that your cloud storage provider can also ensure that you have access to everything you’ve entrusted to them.

There are numerous reasons why this may not be the case, ranging from user error, mechanical failure, or local disaster leading to a service disruption on the provider’s end to a successful cyberattack upon the provider.

However, Most Cloud Security Issues Originate from the Client’s Side

The unfortunate truth is that it is much more likely that any security issues you experience with a reputable cloud storage provider will likely come from an issue present on your end. There are a lot of examples as to how this can happen, including:

  • The use of shadow IT, in the form of one of your users also storing data on another, unapproved service or platform
  • Files being inappropriately shared
  • Insufficient passwords being used to protect access to cloud resources
  • Accidental data deletion by a user
  • Insecure and unauthorized devices being used to access cloud resources

Is cloud storage secure? In short, the cloud is very secure —the problem is usually the person using it and how it was set up. This makes it critical to your company’s successful and secure use of the cloud that your users understand how to appropriately utilize the cloud in a way that maintains security while also allowing them to be productive.

That’s where we can help. Contact us today to learn more about how we can help secure your operations, including your use of the cloud.

Thrive’s 2021 Year in Review

2021 was a very exciting year for Thrive and not just because it was an especially busy year for protecting against cyber threats. With many businesses settling into an extended remote work scenario, organizations began to think seriously about the long-term security plans for their remote workforces and their increasingly exposed assets. According to a study by Fortinet, ransomware attacks alone increased by 10.7x last year. Consistent with this and other demonstrated increases in attacks, Thrive’s own 2021 year-end report indicates a paralleled rise in attacks and increased cybersecurity action as a result.

Thrive’s Year in Review

In 2021, Thrive grew its presence and global protection reach. In the past year, we:

  •   Onboarded over 100 new customers
  •   Grew NextGen security by over 450%
  •   Protected over 60,000 endpoints
Security Statistics

Increased security threats were felt on a global scale. Here is what we saw at Thrive:

  •   900 security incidents (investigations) per month
  •   30% increase in investigations month-over-month
  •   Overall 30% rise in investigations
Top 3 Investigation Types for 2021:
  1.   Intrusion Prevention
  2.   Intrusion Detection
  3.   Client VPN-related alerts

Thrive ended the year with over 1,200 customers across the US and the UK. With the increased number of high-profile cyber attacks that occurred in 2021, more attention than ever is being focused on risk mitigation and damage remediation to preserve businesses’ customer confidence and public image.

Building a cyber readiness plan that adheres to best practices can be difficult. Thrive’s managed cybersecurity solutions are deployed on its industry-leading cybersecurity platform for comprehensive support that empowers Thrive’s CISSP-certified experts to not only identify problems, but also solve them.

With an Active Remediation approach, Thrive’s security experts are empowered with the access, know-how, and trust to directly mitigate and remediate issues, keeping critical business systems and staff operational. Contact us to help you in 2022.

Preparing for the Next Wave of Cyberthreats

The past couple of years have been difficult for businesses, regardless of if they are large organizations or small businesses. Likewise, cybersecurity has been a challenge. The best technology providers should always be preparing for the next wave of cyberthreats, because bad actors are always coming up with new and nefarious ways to access your sensitive information. Let’s take a look at what 2022 could pose for cybersecurity, especially considering recent trends.

Prediction: Attacks Will Shift in Method and Severity

The increase in remote and hybrid work has been great for companies that are able to support these kinds of operations, but there are certain tradeoffs, including security.

Remote Work Has Increased the Attack Surface

Working remotely can do wonders to protect the health and safety of your employees, but it does increase the opportunity for them to fall victim to hacking attacks. Their home networks are likely nowhere near as secure as your in-house network is, so you’ll have to encourage your users to stay alert and remain vigilant, especially while out of the office. All it takes is one unsecured smart device to create a problem for your organization.

Hackers Will Do Their Homework

You can also expect hackers to seek out new vulnerabilities that coincide with where their victims are located and which devices/solutions they are using. There is always a risk when using a new software solution, especially when new patches and updates could potentially bring with them new vulnerabilities in the form of a zero-day attack. Attackers are always trying to use new and developing technologies to their advantage, too, such is the case with deepfake technology.

Prediction: Attacks Will Change Their Targets

It’s expected that breaches will target different types of victims over the next year, and that the largest breaches will target the cryptocurrency space. Even so, we would be surprised to see this shift creating even less of a danger for businesses, so you’ll still want to protect yourself whenever possible.

Prediction: Attacks Will Still Rely on Familiar Methods

Many vulnerabilities stem from failing to update systems in an appropriate manner, so it’s of critical importance that these vulnerabilities are patched as soon as possible, especially in the business technology sector.

Attacks On End Users Will Continue

It’s safe to say that phishing and other cyberthreats are not going anywhere, placing the end user in a precarious position. This is especially true if people continue to work from home without a concerted effort to increase cybersecurity awareness. You must take measures to increase awareness of the risks of working remotely and of the threats that are found online.

We might want to say that the future is bright for security, but you can never count on it being too bright. What you can count on, however, is that Thrive will be there to help you out each step of the way. To learn more about how we can help you protect your business, contact us today. 

Ransomware is (Still) A Major Threat Facing Businesses: How Do You Stop It?

You’d think that cybercriminals would use ransomware to target high-profile businesses with loads of money to extort, but this is not always the case. Even a small business can fall victim to these particularly devastating attacks. So, what is ransomware? Ransomware is a threat, and just like other threats out there, it has continued to evolve and adjust its approaches based on the current cybersecurity climate. So what are some of the latest developments in ransomware?

In No Uncertain Terms, Ransomware Has Grown More Dangerous

In order to be effective, cybercriminals capitalize on the challenges that small and medium-sized businesses face every day. For example:

  • Cybercriminals frequently rely on deception in the form of phishing. Using phishing attacks, a cybercriminal bypasses the protections a business has in place by taking advantage of their employees in order to gain access to the business’ network.
  • A lack of communication between departments makes issues even greater. A lack of communications between a business’ departments can exacerbate the risks to be seen from cybercriminals.
  • Smaller businesses don’t always have the resources needed to prepare their team members. Unlike corporations, SMBs likely don’t have a dedicated budget for cybersecurity training, and almost certainly can’t afford the salary of a dedicated security professional on-staff.

The question remains, how can we stop ransomware? To know how to stop it, it’s crucial to understand the actors. Ransomware attacks are increasing and businesses need a plan to fortify their defenses and protect their information.

What is Ransomware as a Service (RaaS)?

Recent ransomware attacks will clearly show that cybercrime is a legitimate business model. Ransomware as a Service (RaaS) involves selling or renting ransomware to buyers, called affiliates. RaaS can be credited as one of the primary reasons for the rapid proliferation of ransomware attacks, as it has made it easier for a variety of threat actors — even those who have little technical knowledge — to deploy ransomware against targets. It provides hackers and criminals with the means to pull off ransomware attacks with ease. With these types of services being so accessible, it’s no wonder that ransomware is a major cause for concern for business and IT leaders. More and more, businesses are putting together teams of developers and commission-based structures for these services to ensure these attacks won’t affect their operations.

How Does Automation Make Ransomware More Effective?

The power of AI and automated processes has allowed many businesses to streamline certain processes, unfortunately, the same can also be said for cybercriminals. Automation has made it so they no longer manually attack individual targets, instead opting to leverage automation for widespread attacks with minimal effort. The extortion part of ransomware has also been completely automated, as evidenced by Avaddon, a ransomware variant that proudly displays a list of companies that have been infected right on its Dark Web listing, as well as flaunting a countdown to when the data will become publicized.

Ransomware Attacks and Layered Extortion

Ransomware attacks often target the same individuals or companies more than once, sometimes charging the victims even more or forcing them to pay up with a threat of the data being leaked if they do not do so. Unfortunately for businesses, this approach is more advanced than it has been in the past. Here is a snapshot of what the extortion process looks like:

  • The victimized business is instructed to pay for their access to their encrypted data to be restored.
  • Hackers release the data they’ve stolen if the ransom isn’t paid.
  • Denial of Service attacks are used to take down a victim’s website.
  • The cybercriminals responsible reach out to the targeted business’ customers, partners, employees, and the media to inform them of the hack.

These tactics have made it hard to say no to ransomware and have drastically improved the success odds for an attack to be launched.

You Need to Be Ready to Resist Ransomware

Ransomware can be devastating if you let it create problems for your business, so don’t take any risks with it. Make sure that you are working with cybersecurity professionals who can help you take the fight back. Thrive’s expansive suite of security tools helps your business stay on top of the next incoming attack. To learn more about your security and how to keep it from becoming a problem for your business, contact Thrive today.

Time to Get Rid of the IT Department? Not Exactly.

“IT departments are for a bygone era and are ill-suited to the demands of a digital-first world.”

Joe Peppard makes some compelling arguments in his article “It’s Time to Get Rid of the IT Department” in The Wall Street Journal. His primary suggestion throughout the piece is to decentralize IT and embed technology experts within business units because the traditional siloing of IT hinders its ability to add business value. But in the move to align with the new reality that “the business is the technology and the technology is the business”, companies still need centrally managed IT support to make sure their infrastructure is performing and secure.

Creating Common Threads
Although IT has in the past functioned on its own island of intelligence, this obsolete model no longer functions in today’s dynamic business environment.

Now, business problems more often than not require a technology-based solution. If a company’s brightest technologists are either siloed or too busy with mundane tasks like employee onboarding, password resets, or software patching, they’re not available to help where they are most needed. Having a common thread of technology expertise in every department to alleviate some of those tasks can power the elusive digital transformation many are striving for.

What Happens Without Centralized IT
Distributing an IT department to the four corners of the enterprise could leave a very big gap in service, which Peppard does acknowledge. There needs to be someone making the company-wide decisions and enforcing corporate policies, so there are not a dozen IT fiefdoms with their own management, support, and security challenges.

If one team manages tasks and tickets using Zendesk while another uses HubSpot or Excel, collaboration time and efficiency are lost by cross-referencing databases or trying to merge data. On top of functionality headaches, the organization is most likely paying for two different solutions for the same problem. Imagine differing security protocols across departments – you would not want one group implementing one vendor’s multi-factor authentication solution while the next group picks their favorite MFA provider. There needs to be someone taking a 10,000-foot view of the entire company’s IT and cyber security needs.

Filling the Void
The question becomes, how does an organization both place its technical know-how directly into business units and support a functional IT infrastructure when it is more than likely short-staffed and lacking critical skills?

The managed services approach enables companies to shift away from the traditional centralized IT organization that services the entire company. By going above and beyond what most internal IT teams can deliver in terms of 24/7/365 monitoring and support, multi-vendor expertise, and strategic thinking from virtual CIOs and CISOs, MSPs such as Thrive hold the key to a successful, secure digital transformation for organizations of all levels of technical ability.

Empowering IT to Drive Transformation
Today’s IT teams are not only reactive; they are critically proactive. They can bring some much-needed problem-solving muscle across the organization, but they just need to be unleashed from the monotony of routine IT tasks.

Not everyone has the capacity to dedicate heads in their organization to manage IT internally and drive digital transformation. Regardless of where your IT lives, they must exist to help move your organization forward. Whether your team needs a little extra support or you’d like to migrate those responsibilities fully remote, Thrive’s Managed IT Solutions or vCISO service are here to help you stay up-to-date and protected. All while you do what you do best – serve your customers.

The True Cost of Cybersecurity Attacks

Cyber attacks are one of the fastest spreading crimes in the digital world, costing more than $6 trillion in 2021, and making it the third-largest economic system just behind the United States and China. In the U.S., the most popular targets of cyber attacks are small businesses, individuals, and healthcare facilities, with each attack leading to consequences beyond immediate monetary loss.

Small businesses are often found to be easier targets of cyber attacks because they often don’t have the security and fortification that larger enterprises do. Small businesses also may believe that it’s too expensive for them to become properly protected. No matter the size of the business, cybersecurity is not only necessary but can be affordable.

The loss of an individual’s data can lead to identity theft, credit fraud, ransom threats, and other unsavory actions. For businesses, this can be disastrous for the company’s brand and reputation. Once the attack is discovered, fixing it is not always as simple as canceling a few credit cards. Complete remediation of the problem is not an instant process. It takes time and resources to identify and fix all the collateral damage caused by the theft.

Healthcare facilities are a particularly vulnerable target. With attacks on healthcare facilities can come the loss of important records, malware issues with vital medical equipment, and the breach of patient privacy. Hospitals are especially susceptible to attacks, and more specifically ransomware threats, because the targeted data can literally be life saving.

No matter what the size of your enterprise, Thrive can walk you through what your business’ best options for cybersecurity are, and can help identify options for your consideration.

Who Helps with Recovery?

Insurance is the easiest, quickest way to mitigate losses from a cyber attack. Insurance against cyber attacks should be a priority, no matter the size of the business. From Fortune 500 enterprises to your local corner store, cyber insurance for a business is tantamount to fire insurance on a home. If you have insurance, you can both recoup your losses while also gaining insights from forensic services. Thrive helps support business continuity after the attack. Working in tandem with the insurance company, not only will we help identify the perpetrator, we will also help ensure your business operations continue. Thrive can help you to choose the proper security installations for your IT platform, taking into account your business and its specialized needs. We make sure any security software you currently utilize is either updated or replaced with something more effective and efficient.

How Does Thrive Help Deter Cyber Attacks?

As you may have read in our multi-part series on the Return to the Office, COVID-19 and the mass migration to working remotely from home has caused the need to adapt the cybersecurity companies utilize on a daily basis. No longer should we as businesses fortifying only one major network at the office; now we must take into account all of the different digital environments and security risks they impart upon us while employees are working from their homes, coffee shops, and other places external to the enterprise.

For employees working from home, we suggest using end-to-end protection and anti-virus software; even simple security is better than no security. We also encourage inter-business Security Awareness Training; a service Thrive provides to our clients. We will teach you what to look for in terms of suspicious activity and aid in the management of your security platform. It is also important to expect that one day you WILL be attacked. This is not to cause paranoia, but to cultivate an alert mindset when it comes to the continued protection of your network and data.

A Security-First Mindset

At its core, IT security awareness and safe practices start at the top. Leaders within your company should be sure to lead by example and communicate the importance of IT security. Creating shared “rules” to follow and raising awareness of how attacks can be initiated is a great start, along with strategies such as frequent password updates and locked screen savers.

Thrive offers multiple security options, from hands-on training to complete supervision of IT software. To learn more about what we can do for you, contact us today.

Cyber Security Predictions for 2022

Normally, I am not a fan of year-end predictions, but as of late I have found them to be a good way to reflect upon what we have seen in terms of cyber security and what I expect to see for the future. As a CISO, I always want to make sure we have the correct people, processes, and technology in place to prepare for upcoming issues. These are some of the cyber security trends I see continuing and some of the emerging areas we are going to be watching in 2022.

Ransomware Attacks
These have only gotten worse, and we do not see them letting up anytime soon. They are an easy way to make money for criminals, and the risk of getting caught is fairly low. Law enforcement is starting to crack down on the more egregious attacks (think Colonial Pipeline), but that will only shift the criminals’ approach from one large attack to attacking multiple mid-size and small companies. The response from law enforcement is not as strong, and the payout is still pretty good.

Spear Phishing/Whale Phishing
We continue to see targeted attacks against specific people within companies. Typically, they want someone who has access to money. For example, if someone in accounts payable gets their email compromised, they will have their emails downloaded and their address book copied. The attackers will then try to convince vendors to route the money to a new bank, oftentimes successfully. They will also review the address book to see if they can spam someone in the address book to get their email compromised. This is what is currently happening, and many times they stop there. We expect to see an increase in ransomware on the users that have been compromised as the threat actors already have a foothold.

Flashy Attacks, but Fewer
We still expect to see flashy attacks that garner news headlines, but we expect those to be fewer. The organized criminals don’t benefit as much, as law enforcement focuses on those attacks. Criminal enterprises are more profitable when they go after easy targets and avoid legal issues.

Holidays and Weekends
Holidays and weekends have always been a good time to gain access to a company or an email system. We expect this to only increase. By Friday afternoon, most workers are checking out for the weekend, which gives an attacker two to three days in someone’s account if they can get in.

Network Appliances are “Hot”
It started this year, and we expect it more next year. Stand-alone network devices such as routers, firewalls, switches, etc. are not updated as often as servers and we are seeing more targeted attacks against them. Businesses don’t want to incur the downtime associated with updating them, and many internal IT engineers prefer not to update firmware on these devices due to the perceived risk.

Attackers Will Continue to Exploit the Pandemic
With people continuing to work from home, attackers will continue to try to exploit the situation. We expect criminals will continue trying to get new hires to buy gift cards. Oftentimes, new hires will get a fake email pretending to be the CEO asking to buy gift cards or other things. Since it isn’t as easy as leaning over to the next office or cubical to ask if this is normal, people will tend to just do as their “CEO” has asked – without asking questions. Also, since users are working from home, they might surf websites they normally wouldn’t in the office, thus opening up their work computer to malicious downloads, which in turn opens the organization up to ransomware.

The above cyber security predictions shouldn’t be a surprise to most who have watched what has been happening. These trends have been building, and the good news is there are a lot of things that a company can do to help protect themselves. A next-generation anti-virus solution can definitely help out on the ransomware front. A good spam filtering solution will help with email. Partnering with a trusted firm for 24/7 security monitoring is critical. As night and weekend attacks increase, you don’t want to be vulnerable during the times most attacks are happening. Also partnering with a firm that will update your appliances – so you have one less thing on your IT plate – will help keep your organization safer.

Thrive provides businesses with the tools to mitigate cyber attacks and protect valuable data in the event of a breach. MFA and cyber security incident response plans are useful and important, but they are just a few of the many tools available to bolster your organization’s security posture. Contact our experts today to discuss a plan to fully protect your most important assets.

Why Is Microsoft Warning Users About Password Spraying?

As modern warfare has evolved, so too has cyberwarfare. There is always a war occurring in cyberspace, where hackers attempt to outdo security researchers. One such example of hackers—often sponsored by government agencies—attempting to engage in cyberwarfare can be seen in the United States and Israeli technology sectors, which have become the target of password spraying.

What is Password Spraying?

Password spraying involves hacking into multiple accounts by spamming commonly used passwords. Think of passwords that include birthdays, names, or even the word “password,” itself. A good password strategy will require users to create passwords that meet a high standard of difficulty to guess, including special characters or needing to be a certain length for example. But, considering how frequently people still use common passwords, as well as variations of those passwords, one can imagine how effective this tactic can be!

In the scenario outlined above, Microsoft has issued a warning that about 250 Microsoft Office 365 customers in the defense technology sectors have been targeted by password spraying tactics. Microsoft calls this group DEV-343, with the DEV in the name representing the fact that the attacks are, at this time, not sponsored by state actors. This group is thought to originate from Iran.

Less than 20 of the targets were actually compromised, but it’s still shocking to see high-profile targets opting for commonly used passwords. Microsoft has also reported that organizations that use multi-factor authentication are at less risk than those that don’t. As reported by Microsoft, security professionals should be wary of suspicious connections enabled by Tor networks: “DEV-0343 conducts extensive password sprays emulating a Firefox browser and using IPs hosted on a Tor proxy network. They are most active between Sunday and Thursday between 7:30 AM and 8:30 PM Iran Time (04:00:00 and 17:00:00 UTC) with significant drop-offs in activity before 7:30 AM and after 8:30 PM Iran Time. They typically target dozens to hundreds of accounts within an organization, depending on the size, and enumerate each account from dozens to thousands of times. On average, between 150 and 1,000+ unique Tor proxy IP addresses are used in attacks against each organization.”

Cybersecurity Strategy is Key

Your business should always be prepared to take a look at traffic on its network—especially if the activity is suspicious in some way, like during off-times when nobody has any reason to be accessing your infrastructure. Passwords are only one part of a cybersecurity strategy, though, and you should be implementing security solutions like multi-factor authentication whenever possible.

Thrive can help your business keep itself secure from threats of all kinds. To learn more, contact us today.