Blog

Enterprise Cybersecurity Solutions Knowledge Base

Inside the Dish Network Ransomware Attack: Lessons Learned and Cybersecurity Best Practices

On February 23, 2023, the Dish network experienced a ransomware attack resulting in widespread..

Ricardo Panez
Ricardo Panez
July 21, 2023

How to Respond to a Vertical Specific Attack: Protecting Your Industry

Responding to an vertical-specific attack can be daunting for any company. Knowing how best to..

Ricardo Panez
Ricardo Panez
March 1, 2023

SOAR Orchestration: All You Need to Know

SOAR (Security Orchestration, Automation, and Response) refers to a collection of software..

Nilton Gonzalez
Nilton Gonzalez
January 25, 2023

Five Metrics to Increase the ROI of Penetration Testing

Cybercrime is projected to cost the world $10.5 trillion annually by 2025. How much will your..

Jose Bormey
Jose Bormey
August 11, 2021

How Much Would A Ransomware Attack Cost For Your Company?

Is your organization prepared for a ransomware attack? In 2020 alone, ransomware attacks surged by..

Jose Bormey
Jose Bormey
July 15, 2021

What is MTTD & MTTR and How MTTD & MTTR Can Define Your S.O.C

Two questions always come up whether your organization has its own internal Security Operations..

Jose Bormey
Jose Bormey
April 22, 2021

Properly Securing Secure Socket Shell (SSH)

Secure Socket Shell (SSH), or Secure Shell, or as most people call it, is a network protocol that..

Phillip Tarrant
Phillip Tarrant
March 23, 2021

What We Know: SolarWinds Attack (+Lessons To Be Learned) I Compuquip

As the story continues to unfold and we come to understand more about what really occurred at..

Phillip Tarrant
Phillip Tarrant
February 18, 2021

Docker Forensics: Don't Overlook Misconfigurations.

D ocker is already popular, and with the explosive growth of Kubernetes, it's not going anywhere..

Phillip Tarrant
Phillip Tarrant
February 10, 2021

What is a Penetration Test and How Does it Work?

Cybersecurity companies offer a wide range of services to their customers to prevent the majority..

Eric Dosal
Eric Dosal
July 14, 2020

contact us

Protect your business with our cybersecurity solutions

Elevate your cybersecurity efforts now to prevent costly breaches. Let’s discuss next steps. Complete this form so our IT security professionals can get in touch with you.

Compuquip uses the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.

What are you looking for?