The NuHarbor Notice
Breach of the Week: The First Death by Ransomware
Justin has returned to the podcast and this week we're covering what could be the first death to be directly linked to a ransomware attack. We talk about why hospitals are targets, how this could become far more complicated if it's found to be a nation state, and how...
The Secret Sauce Part 3
Kathie is one of the early members of NuHarbor and has been directly responsible for finding and curating the team that has grown into the company NuHarbor is today. Kathie joined the podcast today to talk about how NuHarbor has built a successful work culture, how...

Breach of the Week: Cyber Virus Meets Real Virus
We're continuing our exploration of the intersection of cyber and real world disasters and this week we have a report from Cynet about unrelenting attacks that have occurred since the beginning of the COVID-19 crisis and how criminals are using this real world...

Threat Hunting Basics – The Hunted Becomes the Hunter
What is Threat Hunting? Threat hunting is the process of proactively searching through environments and networks to detect and isolate advanced threats that were not discovered by traditional security solutions. Threat hunting assumes that the environment is already...

NuHarbor Security Announces NuHarbor Powered by Splunk + Tenable in Partnership with NACo
Colchester, VT – September 14, 2020: Premier cybersecurity services provider NuHarbor Security is teaming up with trusted partners and industry leaders, Splunk and Tenable, to deliver a turnkey managed security and vulnerability solution for the National Association...
Cybersecurity During Disasters
It's National Preparedness Month! Zack is going to tap into his previous life as an emergency manager to discuss the increasing intersection of disasters and cybersecurity. From identity theft and fraud to the increasing reliance on cybersecurity to how cybersecurity...

Cyber Threat Intelligence 101 – The Basics
What is Cyber Threat Intelligence? Cyber Threat intelligence is information that is used to identify and understand cyber threats to an organization. This intelligence is used to identify threats that could be a risk to an organization and make informed decisions to...

Breach of the Week: Election Security and Protecting Our Increasingly Digital Democracy Part II
We're back with the second half of our discussion on election security with Davis. This week we're talking about strategies and concepts that must be considered as part of a comprehensive security plan from physical security to ensuring people don't share bad...

The Secret Sauce – Part 2
We are back with our second episode exploring how NuHarbor Security began and what sets us apart from our peers. This week we're joined by Scott, NuHarbor's VP and guru of marketing and sales. Scott is another one of the OG crowd and has been with NuHarbor since the...

Breach of the Week: Election Security and Protecting Our Increasingly Digital Democracy Part I
We are just a couple of months away from the 2020 election and like many voters, we are discussing election security. This week we are joined again by Davis and we're talking about the threats to our election and how most people focus on the wrong thing when it comes...

The Secret Sauce – Part 1
The original group, or OG's as they're referred to around the office, have seen NuHarbor grow from a scrappy little company trying to break the mold to a quickly expanding cybersecurity firm punching above their numbers. What is it that motivated the original members...

CrowdStrike MDR – Detection Services (Part 1 of 4)
This is part 1 of a 4 part of CrowdStrike Managed Detection and Response (MDR) series. The very first thing you should know about managed detection and response (MDR) providers is that the best service can only exist with the best technology. What I mean by that, is...
Breach of the Week: How Much Is This Going To Cost Me?
This week Zack is solo and is discussing a new report out from IBM Security on the costs of data breaches. To put it bluntly, it's not cheap. However, the report shows that all is not lost and that organizations that have strong cybersecurity plans, software, and...

Taking Care of The Team Part II
We are back with Part II of our taking care of the team series. In this episode, Zack and Justin will address some of the challenges in keeping staff and what leaders can do to support their staff as well as how to build up team members so that someday they can take...

Breach of the Week: One Person’s Trash Is Another’s Treasure
On this week's breach, we're talking about a breach that took years to come to fruition. How many of us have sold, recycled, or tossed a used computer with the hard drive still in it? It happens countless times a day and we likely don't even think about the amount of...