PLANO, TX 75093

Author: admin


Guidelines for Strong Passwords

To celebrate #WorldPasswordDay, we’ve compiled guidelines for strong passwords, and for creating and saving your online passwords. The Danger of Weak Passwords A single weak password may be all it takes for hackers to gain access to sensitive company information and cause widespread damage. In fact, 80% of all data breaches occur due to weak and easily…
Read more

Purple Teaming CYBER-ON-CALL®

What is Purple Teaming and How it Helps Prevent Cyberattacks

In an increasingly interconnected world, cybersecurity has become a top priority for businesses. Ensuring the safety and privacy of sensitive data is crucial to maintaining the trust of customers, clients, and stakeholders. One way to do this is through the practice of purple teaming, a collaboration between the offense-oriented (red) and defense-oriented (blue) teams to…
Read more


CYBER-ON-CALL and Ericom Partner to Offer Ericom ZTEdge Zero Trust Solutions to
Secure Content for Film, VFX, and Broadcast Companies 

Partnership Delivers Isolation Solutions to Organizations in the MPA Trusted Partner Network (TPN) to Improve Productivity and Enable Compliance with Security Guidelines New York, NY and Plano, TX (February 16, 2023)   – Ericom Software, a leading provider of Zero Trust cloud cybersecurity solutions and developer of the ZTEdge™ SSE Platform, and CYBER-ON-CALL®,  the cybersecurity…
Read more


A Comprehensive Guide to Pentesting

Pentesting is essential for keeping businesses safe from cyberattacks. Organizations can identify vulnerabilities in their IT systems by simulating attacks from malicious hackers before attackers can exploit them.

KillNet DDoS attacks on US airports

Why the KillNet DDoS US Airport Attacks Are Important

Earlier this week, pro-Russian hacktivist group KillNet took responsibility for DDoS attacks on several US airports. The cyberattacks claimed by KillNet impacted the websites for Los Angeles International, Chicago O’Hare, and Hartsfield-Jackson International in Atlanta, among others. Further, on October 11, 2022, Hawaii DOHS indicated that a DDoS attack was focused on systems hosting the…
Read more

cybersecurity-themed novels

Summer Reads for Technology Fans

Hopefully, this summer, you will take some time to cool down with a good read. Whether relaxing poolside, on your favorite chair or in your local coffee shop, taking a break to recharge your brain with a novel or e-book can significantly increase your productivity at work and in your personal life. Herein, we list…
Read more


Seven Debunked Cybersecurity Myths

The term ‘cybersecurity’ has been tossed around lately. But although cybersecurity has been viewed as a saving grace for mobile devices, computers, etc., the topic is still cloaked in misconception. Things that might pop up when it comes to cybersecurity are: The idea of security Password strength Who cybersecurity threats target and affect If insurance…
Read more

Cybersecurity Risk Management White Paper

Cybersecurity Risk Management

Cybersecurity risk management is a framework that enables businesses to identify, quantify, respond to, and mitigate risks to their digital infrastructure and assets from external and internal threats. Identifying cybersecurity vulnerabilities and their potential impact is critical for businesses becoming increasingly digitized. Cybersecurity breaches can be damaging not only to an organization’s infrastructure but also…
Read more

CYBER-ON-CALL top cybersecurity threats

Top Cybersecurity Threats

It has never been more critical to understand and implement a cybersecurity strategy for your organization to protect against the top cybersecurity threats. Cyberattack accelerations cost companies over $20 billion in 2021 and are expected to rise to $42 billion in 2024. Global cybercrime damage is predicted to hit $10.5 trillion annually by 2025. A…
Read more