cyber | \ˈsī-bər\ | of, relating to, or involving computers or computer networks

security | \si-ˈkyu̇r-ə-tē\ | the quality or state of being secure

cyber + security = measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack

Cybersecurity 101

Crime is the result of means and motive combined with the catalyst of opportunity.

How does this translate to the cyber environment? The digital black market has created “means” by making malicious toolsets readily available to those with little traditional hacking and programming experience.  While there is no shortage of rationale, “motive” in the cyber world is mostly rooted in the prospect of financial gain. Finally, weaknesses in your network provide the “opportunity” for criminals to take what you won’t willingly hand over.

By this point, you’re likely weighing your risks. Many businesses feel as if they aren’t a juicy target in comparison to government organizations, financial institutions, corporations with a massive revenue stream, etc. Simply put, networks of all shapes and sizes have something to offer. Ransomware has become a favorite money-making tool of organized crime. How long could your business continue to operate normally without access to your computer systems? Your network could even become compromised and used as a platform for launching illicit attacks against other organizations without your knowledge.

Case studies:

3 fun facts:

  • 77% of SMB owners say their company is safe from cyber threats
  • 36% of all cyberattacks are aimed at SMB.
  • 60% of SMB will close within 6 months of a cyberattack.

[primary motives]

  • Financial.
  • Espionage.
  • Recreation.
  • Political/economic.

[secondary motives]

  • Platform to aid in attack.
  • Free resources.


  • Social engineering.
  • Malware (ransomware).
  • Hacking tradecraft.
  • Denial of Service.
  • Breach of physical security.
  • Environmental.

[Vulnerabilities or weaknesses]

  • Oblivious humans. The weakest link.
  • Insecure device configuration.
  • Insecure use of credentials.
  • Lack of effective antivirus.
  • Outdated applications.
  • Ineffective access control.
  • Lack of insight into activity.

Here at PSOL, our Cyber Division is led by a Security Architect and Engineer with over 10 years of experience working within military and Fortune 500 environments focused on mitigating threats to computers and networks in many countries around the world. Our IT systems and network support engineers and administrators are available to assist in deploying countermeasures, monitoring for security alerts, and remediating vulnerabilities.

Our approach to cybersecurity has been materialized into the PSOL Cybersecurity Platform and was developed using industry best-practices – Center for Internet Security CIS Top 20 Critical Security Controls (previously known as the SANS Top 20 Critical Security Controls) and NIST Cybersecurity Framework – as a foundation. Our goal is to prioritize proven security best practices in support of your business objectives by tailoring our Cybersecurity Platform to your unique needs and environment.

Since threat tactics and techniques used in the wild evolve at a blistering pace, so does the facilitation of our approach. Backing the PSOL Cybersecurity Platform is a suite of powerful and sophisticated tools designed to enable us (humans) to leverage machine learning and intelligence feeds among other technological benefits to efficiently and effectively provide our services. These tools are the same as those used to secure networks owned by Fortune 500 companies, government networks, and even IndyCar race teams.

PSOL Cybersecurity Platform

[this is what we do]

  • Risk assessment.
  • Endpoint protection.
  • Perimeter defense.
  • Monitoring and incident response.
  • Vulnerability scanning and assessment.
  • Remediation.
  • Digital forensics.
  • Social engineering and security awareness.
  • Policies and procedures.