Resources2019-04-11T20:55:57+00:00

Leverage the knowledge of our security experts to protect your business from threats with Soteria’s Cyber Security Tips.

Our library of free cyber security tips provides firms of all sizes with actionable advice to improve their security policies, procedures, and training. View our full collection of posts below, browse by topic, or search for a specific tip.

Looking for a specific cyber security tip? Ask a hacker!

At Soteria, our mission is to make security resources accessible to businesses of every size. For this reason, our security team is dedicated to answering your business security questions. Email our team with your security policy, training, or procedures inquiries. If your submission is selected by our team, we will respond with a post containing actionable advice for your business.

Pay Up

By |Categories: IT Security Policy Development|

It’s happened, computer screens are filled with demands, data is encrypted and inaccessible, systems are disrupted, your backups were not protected (see our “Backup Plan” blog post) and you’re experiencing the panic of ransomware. What [...]

Comments Off on Pay Up

The Backup Plan

By |Categories: IT Security Policy Development|

"Do we have backups?" It is one of the first questions during any ransomware incident. It seems like an easy question. “Of course we have backups, we’ve even tested it and fall back on [...]

Comments Off on The Backup Plan

Lexico vs Ransomware

By |Categories: DART|

Lexico vs. Ransomware Soteria recently has received urgent incident response requests from clients who had been hit with ryuk, banta, and, phobos ransomware. One of these clients had several systems already in the [...]

Comments Off on Lexico vs Ransomware

Detectors as Code

By |Categories: DART|

The Challenge of Detector Management Security operations and monitoring teams face a variety of challenges: the rapid evolution of adversarial tradecraft, poor detector documentation, lack of detector version control, poor detection methodology, lack [...]

Comments Off on Detectors as Code