Normal view

Received before yesterday

ITDR Best Practices: How to Detect, Prevent, and Contain Critical Identity Threats

27 November 2025 at 11:28

Key takeaways: ITDR monitors identity-based threats that traditional security tools miss, like hackers logging in with stolen credentials Effective ITDR requires integration with privileged access management and automated responses tailored to your specific environment Consolidating threat detection into a single dashboard dramatically improves response times and reduces the cost of managing multiple security tools Your […]

The post ITDR Best Practices: How to Detect, Prevent, and Contain Critical Identity Threats appeared first on Heimdal Security Blog.

When Buyers Discount MSPs With One Big Customer

27 November 2025 at 07:22

Your biggest customer loves you. Three years together. They trust you, pay on time, and refer others. From where you sit, that’s loyalty. From where a buyer sits, that’s a $$$ discount on your exit. This perception gap kills more MSP deals than bad financials. Sam Levy saw it constantly when he led tech mergers […]

The post When Buyers Discount MSPs With One Big Customer appeared first on Heimdal Security Blog.

Tool Sprawl Taxes Your Business More Than You Think

25 November 2025 at 06:55

Ross Brouse has a name for what he sees every day. The Frankenstack. “The lack of operational simplicity comes from piling on tools, building that Frankenstack, as I call it,” says Brouse, President and COO of Continuous Networks, an MSP serving healthcare clients. He’s watched it happen over and over. MSPs go to a conference, […]

The post Tool Sprawl Taxes Your Business More Than You Think appeared first on Heimdal Security Blog.

What is Managed ITDR? Key Definitions, Features, and Benefits

4 November 2025 at 10:50

Key takeaways: MITDR explained: Managed ITDR combines identity threat detection with expert-led response. Why it matters: Get better protection and lower costs without building a full in-house team. What to look for: Prioritize behavioral monitoring, real-time response, and expert oversight You’ve got the ITDR solution. That’s a good step towards effective account and identity-based threat […]

The post What is Managed ITDR? Key Definitions, Features, and Benefits appeared first on Heimdal Security Blog.

Agent Fatigue Is Real and Your Security Stack Is to Blame

28 October 2025 at 08:08

Your senior analyst stares at alert number 47. It’s not even lunch. Another “suspicious login detected.” They switch to the third dashboard of the morning, cross-reference the user activity, and confirm what they already knew. Bob from accounting is working late again. Meanwhile, three dashboards over, actual lateral movement is happening on a client’s network. […]

The post Agent Fatigue Is Real and Your Security Stack Is to Blame appeared first on Heimdal Security Blog.

Heimdal 5.0.0 RC: RDP Protection, Ransomware Detection, and OS Deployment

15 October 2025 at 12:01

Version 5.0.0 adds three major features for MSPs. a module that controls RDP access an improved ransomware detection engine a simpler way to deploy Windows over the network. Remote Access Protection (RAP): Block Unauthorized RDP Attempts RDP brute-force attacks remain a top breach vector, so we built a new module that monitors and filters Remote […]

The post Heimdal 5.0.0 RC: RDP Protection, Ransomware Detection, and OS Deployment appeared first on Heimdal Security Blog.

Follow the Money Blueprint For MSP Success (With Dave Sobel)

26 September 2025 at 12:31

“If I was starting an MSP today, I am not sure I would start an MSP.” Now that’s a way to grab your attention when opening a podcast. Coming from Dave Sobel, someone who’s been an MSP owner, vendor executive, and now runs The Business of Tech podcast – that’s not a throwaway comment. Dave […]

The post Follow the Money Blueprint For MSP Success (With Dave Sobel) appeared first on Heimdal Security Blog.

From Incident Response to Storytelling With Adam Pilton

10 September 2025 at 12:34

It’s time to meet the man behind our weekly Threat Brief. Adam spends hours researching the latest threats to find and share solutions with you, and I had the pleasure of sitting down with him for this week’s episode. His 15 years investigating cybercrime as a police officer taught him lessons that directly apply to […]

The post From Incident Response to Storytelling With Adam Pilton appeared first on Heimdal Security Blog.

Active Threats + The Business Model Shift For MSPs

27 August 2025 at 13:01

I sat down with Luis Giraldo from ScalePad — an 18-year MSP veteran who’s now helping other MSPs scale — and he dropped some truth bombs that you should hear. He says that 32% of MSPs are losing money. The ones thriving aren’t just better at managing firewalls. They’ve fundamentally changed how they think about […]

The post Active Threats + The Business Model Shift For MSPs appeared first on Heimdal Security Blog.

Cyber Essentials Explained – And How Heimdal Helps You Pass and Stay Compliant

12 September 2025 at 08:41

Cyber Essentials (CE) is the UK government‑backed baseline for stopping common, internet‑originating attacks. It comes in two levels – Cyber Essentials (self‑assessment, board sign‑off) and Cyber Essentials Plus (the same controls, plus independent testing) – and certification renews annually. In a government‑commissioned study, 99% of internet‑originating vulnerabilities were mitigated when CE controls were in place, […]

The post Cyber Essentials Explained – And How Heimdal Helps You Pass and Stay Compliant appeared first on Heimdal Security Blog.

Top 10 Cybersecurity Companies in Europe

2 September 2025 at 13:34

Over the last 10-15 years, the cybersecurity scene has gotten increasingly complex, as organizations adopt new technology and hackers evolve more innovative ways to target them. At the same time, data protection and compliance have become much more stringent across the world. Nowhere is this more true than in Europe. Today’s organizations have an ever-increasing […]

The post Top 10 Cybersecurity Companies in Europe appeared first on Heimdal Security Blog.

Password breach statistics in 2025

2 September 2025 at 11:04

At Heimdal we’re constantly monitoring the latest industry alerts, media reports, academic research and government data to keep track of password breaches. It’s a crucial part of our work, and means we can advise our customers on emerging threats.  To help you get up to speed, we’ve compiled this collection of some of the most […]

The post Password breach statistics in 2025 appeared first on Heimdal Security Blog.

UK Cybersecurity Statistics for 2025

2 September 2025 at 10:43

As Dame Margeret Beckett, a member of the House of Lords recently put it: “The UK has the dubious distinction of being one of the world’s most cyber-attacked nations”. Calculating exactly how many cyber attacks there are per country is extremely difficult (not least because many attacks go unnoticed). But reliable cybersecurity sources estimate the […]

The post UK Cybersecurity Statistics for 2025 appeared first on Heimdal Security Blog.

Heimdal Investigation: European Organizations Hit by PDF Editor Malware Campaign

29 August 2025 at 11:48

A Heimdal investigation has revealed that the TamperedChef malware, disguised as free productivity software, has infected endpoints across multiple European organizations. The campaign used advanced obfuscation techniques to evade traditional detection. Heimdal’s Discovery Heimdal Security’s Managed Extended Detection and Response (MXDR) team found TamperedChef infections in 0.03% of its European customer base. The number may […]

The post Heimdal Investigation: European Organizations Hit by PDF Editor Malware Campaign appeared first on Heimdal Security Blog.

Should MSPs Stop Chasing Leads and Start Solving Problems?

12 August 2025 at 13:29

What I learned from listening to an engineer who spent six years burning money before discovering the truth about MSP sales. “I was afraid of sales. I was afraid of rejection. I was afraid of someone saying no to me. But that slippery slope led to complete failure.” Michael Bakaic laughing about it now, but […]

The post Should MSPs Stop Chasing Leads and Start Solving Problems? appeared first on Heimdal Security Blog.

Attack Surface Management: Why MSPs Don’t Need Another Tool

13 August 2025 at 11:10

MSPs are being told they need dedicated attack surface management solutions when what they really need is better visibility from the tools they already have. The security industry keeps introducing new categories of tools that promise to solve visibility problems. Attack Surface Management is the latest. But for most MSPs, adding another specialized platform creates […]

The post Attack Surface Management: Why MSPs Don’t Need Another Tool appeared first on Heimdal Security Blog.

Complete Protection Guide for Cybersecurity in Energy and Utilities

7 August 2025 at 05:23

In May 2023, hackers struck 22 Danish energy companies simultaneously. The coordinated attack breached Denmark’s critical infrastructure in just days, potentially linked to Russia’s Sandworm group. Attackers exploited firewall vulnerabilities with surgical precision, forcing energy companies to disconnect from the national grid and operate in emergency “island mode.” This attack reveals how cyber threats have […]

The post Complete Protection Guide for Cybersecurity in Energy and Utilities appeared first on Heimdal Security Blog.

The MSP Who Paid His Client’s Ransom and Tripled His Business

6 August 2025 at 12:47

Most MSPs will tell you their worst nightmare is getting a call that a client has been breached. Dan Di Pisa lived that nightmare and then did something extraordinary. He paid his client’s $30,000 ransom demand out of his own pocket. The result? He tripled Fusion Cyber Group’s revenue in two to three years without […]

The post The MSP Who Paid His Client’s Ransom and Tripled His Business appeared first on Heimdal Security Blog.

Your Protection Guide For Cybersecurity in Manufacturing

6 August 2025 at 11:48

Cybersecurity in manufacturing businesses is unique. The sector faces several challenges that other industries don’t have to contend with. And the impacts of any disruption are unusually high.  What is more, manufacturers are increasingly finding themselves in the crosshairs of cybercriminals. In 2024, there was a 71% increase in attacks targeting the sector.  In this […]

The post Your Protection Guide For Cybersecurity in Manufacturing appeared first on Heimdal Security Blog.

Your Protection Guide for Cybersecurity in Retail and Ecommerce

6 August 2025 at 08:33

It’s surely the biggest fear of any e-commerce site manager. You try logging into your CRM, CMS or inventory management system one morning, only to be greeted by a ransomware note:  “Your system has been locked. Pay into this crypto wallet to release your data”.  Ecommerce and retail businesses face a range of unique threats […]

The post Your Protection Guide for Cybersecurity in Retail and Ecommerce appeared first on Heimdal Security Blog.

Attack Surface Management Software: Top 10 Vendors

6 August 2025 at 07:48

Key Takeaways: What is attack surface management? Why is attack surface management important? What are the best ASM vendors? Over the last few years, attack surface management (ASM) has become an increasingly common category within cybersecurity. The term describes a set of tools that help organizations to identify their IT assets and the vulnerabilities associated […]

The post Attack Surface Management Software: Top 10 Vendors appeared first on Heimdal Security Blog.

❌