Caught in China’s Cyber Crosshairs: How Your Business Might Be Exposed
For mid-size British businesses, the cyber threat landscape has become a minefield in recent years. We have already reported on state-sponsored threats to private companies and public services. This...
View ArticleTransforming Communications: mhs homes’ Transition to Thrive’s Cloud-Hosted...
Download Now mhs homes, a leading housing association in the U.K., partnered with Thrive to upgrade from an on-premise telephony system to a Cloud-hosted SIP solution, seeking greater resilience,...
View ArticleG. Modiano Secures Global Operations with Thrive’s Advanced IT and Security...
Download Now G. Modiano, one of Europe’s largest wool manufacturers, needed to modernise its IT systems without disrupting daily operations. To help tackle this, they partnered with Thrive. Thrive...
View ArticleLearn how Thrive’s Proactive Cybersecurity Response Team Prevents Ransomware...
Ransomware has become a constant threat in today’s world of emerging technologies. Threat actors are increasingly using this attack method to cripple corporate infrastructures, extract large sums of...
View ArticleUK’s AI Ambitions: A Double-Edged Sword?
As the UK strives to establish itself as a global AI superpower, a robust cybersecurity stance is paramount. A recent Mission Critical report by Microsoft revealed that a mere 13% of companies are...
View ArticleHow Should CISOs Navigate the SEC Cybersecurity and Disclosure Rules?
Michael Gray, CTO, Thrive: While the Securities and Exchange Commission’s (SEC) Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure rules went into effect toward the end of...
View ArticleCybersecurity Awareness Month: Phishing
The main element behind successful phishing attacks is taking advantage of normal human behavior. This issue shows that just one mistake in the cyber equation can result in a major breach, and the...
View ArticleThrive Spotlight: Wendy Davis – Corporate Accounting Supervisor
Welcome back to another installment of our “Thrive Spotlight” blog series. Our featured employee is Wendy Davis, Corporate Accounting Supervisor. Wendy is responsible for month end closing and...
View ArticleDigital Divide: UK’s Cyber Security Stronger, but Are Businesses Still Fragile?
Should we relax? It’s official: Britain has made significant recent progress regarding its resilience against cyber-attacks. In the July King’s Speech, a new bill was outlined to further protect the...
View ArticleThrive Acquires Michigan-based Safety Net
Leading Global MSP/MSSP Establishes Midwest Presence Boston, MA, October 16, 2024 – Thrive, a global technology outsourcing provider for cybersecurity, Cloud, and IT managed services, today announced...
View ArticleE.R. Jahna Industries Improves Security Posture and IT Efficiency with...
Download Now E.R. Jahna Industries, a Florida-based sand mining company, needed to enhance its IT infrastructure and cybersecurity. With limited internal resources, it turned to Thrive for a...
View ArticleReduce Your Cyber Risk: How Autonomous Penetration Testing Can Help
Today, businesses face an increasing volume and sophistication of cyber attacks. To protect sensitive data and systems, organizations often rely on penetration testing to identify system weaknesses and...
View ArticleCybersecurity Awareness Month: Ransomware Attacks
Cybercriminal tactics continue to become more sophisticated, so it is also vital for healthcare organizations to prioritize continual improvement of cybersecurity measures to stay ahead of potential...
View ArticleThrive Spotlight: Ariel Amarante – Engineer, Security Deployment
Welcome back to another installment of our “Thrive Spotlight” blog series. Our featured employee is Ariel Amarante, Engineer, Security Deployment – Onboarding/ Pro Services. As a Security Deployment...
View ArticleEnhance Business Productivity and Ensure Peace of Mind with Gartner’s Hype...
Gartner’s Hype Cycle for Security Operations provides a strategic view of how various security technologies and practices evolve, mature, and are adopted by businesses. Leveraging this framework allows...
View ArticleThe SEC’s cybersecurity and disclosure rules: The questions compliance pros...
The U.S. Securities and Exchange Commission (SEC) Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure rules officially went into effect in December 2023.[1] Aimed at improving...
View ArticleSecure Your Healthcare Organization with Better Cyber Resilience
It’s time for healthcare organizations to reevaluate their cybersecurity posture and cyber resilience. Last month was Cybersecurity Awareness month which brings a timely reminder for healthcare...
View ArticleSteps Organizations Can Take to Improve Cyber Resilience
Organizations’ devices, data and digital security infrastructure are constantly under threat from bad actors. In 2023, more than 880,000 cybercrime complaints were recorded by the FBI, nearly 10% more...
View ArticleCombining Cybersecurity and IT Disaster Recovery Solutions to Safeguard...
Canadian businesses and organizations need cybersecurity solutions in place along with robust backup and disaster recovery capabilities to ensure they’re resilient and protected against all threats and...
View ArticleNortheast Investment Management Partners with Thrive to Enhance IT Resilience...
Download Now Northeast Investment Management, Inc. (NIM), a Boston-based investment firm managing nearly $3 billion in assets, partnered with Thrive to address its IT and cybersecurity needs....
View Article