Know Your Risks. Become Resilient.

Identify Gaps. Reduce Risks. Succeed.

With deep roots in incident response, security and IT operations, MOXFIVE helps our clients assess technology gaps – whether before, during or after an incident – to understand what’s needed to build more resilient business operations. 

Learn More

BUSINESS RESILIENCE


As business operations become more entwined with data and technology, businesses are becoming more dependent on their IT operations. To address the evolving business landscape, many organizations are realizing that not only do they need a more robust group of technical service providers – they also
need someone who can help manage and streamline the selection and implementation process.  

MOXFIVE can help. Our teams are on the front lines helping companies restore IT operations following ransomware attacks and other major incidents every day. This experience gives us the unique ability to connect the dots between business, information technology, and security objectives and helps us understand how to quickly identify gaps and build a more resilient business environment. 

FEATURED SOLUTIONS

Security should start with the basics.  We encourage organizations to start with these solutions to build the proper security foundation.

Multifactor Authentication

Multifactor Authentication

Implement MFA for email and remote access to mitigate unauthorized access to your environment.

Data Sheet

Active
Directory Hardening

Active
Directory Hardening

Implement best practices for Active Directory to mitigate the escalation of cyber incidents.

Data Sheet

Patch Management

Patch Management

Manage updates to devices and software throughout your environment to reduce your attack surface.

Privileged Access
Management

Privileged Access
Management

Minimize an attacker’s ability to operate in your network by strengthening security for privileged accounts.

Data Sheet

Network Segmentation

Network Segmentation

Strong network segmentation can help thwart a threat actor's ability to move laterally across the network.

Data Sheet
Experts predict there will be a ransomware
attack every 11 seconds
in 2021.
from Cybercrime Magazine

Advisory Services

IT & Security Strategy

Leverage MOXFIVE Technical Advisors to support the development and execution of IT and security initiatives.

Security Services

MOXFIVE Technical Advisors assist with developing a tailored security program to find the right security solutions for your organization.

Retainer Services

Establish an ongoing relationship with MOXFIVE Technical Advisors as your go to knowledge center on emerging trends and thought leadership to keep your organization moving forward on IT and Security initiatives.

Asset Management 

Track and assess IT inventory to optimize procurement decisions and incident response efforts.

Cloud Services

Develop and execute migration and/or optimization of cloud service provider solutions e.g. Amazon (AWS), Microsoft O365/Azure, Google Cloud.

Backup Infrastructure

Implement and manage robust backup solutions designed to minimize downtime.

Storage

Deploy and/or optimize data storage infrastructure. 

IT Infrastructure

Managed Services

IT Services

Deploy, manage, and support IT networks including critical systems, servers and workstations.

Security Services

Deploy and monitor security technology stack and MDR.

Security Awareness Training

Phishing exercises and modular education programs for staff.

Dark Web Monitoring

Ongoing monitoring for critical information, stolen credentials and threats targeting your organization. 

Multi-Factor Authentication

Protect unauthorized access with enhanced authentication.

MSSP/MDR

Deploy and monitor a security technology stack.

Endpoint Technology

Deploy endpoint protection, detection and response platforms.

Segmentation

Optimize security with network segmentation solutions. 

Assessments

Identify gaps and create roadmaps to build a more secure and resilient environment.

Security

RECENT BLOG POSTS

Playing Chess with the Adversary: Value in Security Controls

Security, like chess, relies on having a variety of strategies and tactics to use for countering your opponent. This blog offers a variety of options to consider when devising your own plans to outwit your adversaries.

Investigating Business Email Compromises

Business Email Compromises (BECs) continue to be the one of the top attack vectors, costing organizations over $2.3 billion in 2021. In this blog, we share priorities and key methodologies for investigating these attacks.

Minimizing the Impact: Network Segmentation

Host-based microsegmentation offers a wide range of advantages over legacy counterparts allowing organizations to apply segmentation at much deeper granularity including host, user, or application levels.

Logging to Enable Forensics

Logs are critical sources for forensics investigations. This blog looks at various log sources and the key takeaways to consider when building the retention strategy that's best for your organization.

Incident Managers: Bringing Order to Chaos

Our MOXFIVE Incident Managers are critical to every project we manage at MOXFIVE. Learn more about their role and how they enable everyone in the process to focus on what they do best.

Minimizing the Impact: Securing Active Directory

Gaining access to Active Directory is often a goal of threat actors during an intrusion. In this blog, we look at two key workstreams that add security layers making it more difficult for threat actors to achieve this goal.

The Continued Risk of Log4j

The worst of the Log4j fire drill might be behind us (for now), but the opportunity for new exploits still remains. Learn how a Software Bill of Materials (SBOM) and other best practices can help reduce future impacts and improve your overall security posture.

Improving Cybersecurity Resilience: Starting the Journey, Part 2

In Part 2 of our Improving Cybersecurity Resilience blogs, we cover five additional capabilities that round out the list of security basics that we believe all organizations should implement.

Minimizing the Impact: Multifactor Authentication

Credentials being stolen, reused, or even guessed often leads to an intrusion, or turns what could have been a small incident into an enterprise-wide issue. Multifactor Authentication (MFA) is a critical layer of protection to help minimize this risk.

Improving Cybersecurity Resilience: Starting the Journey, Part 1

MOXFIVE recommends these six capabilities as a starting point for improving resilience due to their outsize contribution to reducing risk and mitigating damage.

Regulations + Insurance: Shifting the Tide

Regulations abound and new ones are added all the time, but breaches still happen. Why? Because compliance frameworks are flawed and do not get into the technical weeds on effective implementation. There is an opportunity for the insurance industry to help drive things forward, especially for SMBs.

Minimizing the Impact: Local Administrator Password Solution

Enabling Local Administrator Password Solution (LAPS) can help greatly reduce the blast radius of a cyber-attack and is a quick and simple process for most environments.

Minimizing the Impact: How Cloud-Based Services Could Reduce the Stress of Recovery

Using cloud-based services can help not only lift the burden of day-to-day IT and security tasks, but they can also provide a significant benefit when dealing with a ransomware attack.

Incident Management Chronicles: Striking The Right Balance

Finding the right balance between containment, recovery and forensics workstreams is the key to faster and more effective incident response.

Incident Management Chronicles: Recovery vs Forensics

The lines between forensics and recovery can easily blur during incident response. Using an approach that delivers both in parallel helps minimize business interruption and get organizations back online more quickly.

How to Mature Threat Hunting Programs

Building threat hunting skills within your team can help prevent burnout, up-level skills and give your team a broader understanding of your security environment.

Incident Management as a Platform: Scaling Incident Response

Learn how MOXFIVE's platform-based approach to incident management drives increased efficacy and quicker resolution of complex challenges while also reducing costs and making life easier for all parties involved.

Ransomware Payment Bans are Bad Policy

This year’s Colonial Pipeline breach turned a spotlight on the debate over whether or not cyber ransoms should be paid by victims of these attacks. This blog examines why we think payment bans are bad policy.

Open-source Security Spotlight: pfSense

Open-source software is used in a wide variety of projects, including the recent Mars helicopter, Ingenuity! In this blog, we take a look at the open-source network security solution, pfSense, and the many ways it can be used.

Visibility in Incident Response: Don’t Chase Ghosts in Your IT Estate

To effectively respond to a cybersecurity incident, having complete visibility into all assets (endpoint devices, applications, user accounts) across your IT estate is a critical success factor for recovering quickly and minimizing business disruption.

Dispatch from the Front Line

In July 2019 we posted our inaugural blog and introduced our idea of how a Technical Advisor could help companies better manage the incident response process. Two years (and hundreds of incidents) later, we've learned many lessons that help our clients recover quickly and effectively.

Tabletops Improve Incident Response

Tabletops can help improve organizational awareness and streamline Incident Response efforts. Learn how they can help mature your security posture and develop your teams' skills.

Maximizing Red/Blue Team Effectiveness

Fusing the efforts of your red and blue teams by implementing a purple team approach enables analysts to cross-train, collaborate, and respond more effectively during an incident.

Recover, Then Upgrade - One Problem at a Time

Four questions to ask if you're considering adding an upgrade to an in-progress recovery effort.

Common Misconceptions of Business Recovery

Recovering from a cyber incident is a complicated and challenging process. Read our top 6 factors that can help determine whether the recovery process runs smoothly... or not.

When it Comes to Cybersecurity, Money Talks

Changes in the cyber insurance industry are driving a change in how organizations are investing in security.

In Times of Crisis: Focus, Plan, Ask for Help

Every pilot learns the mantra "Aviate. Navigate. Communicate." during their initial flight training. Easy to remember in a crisis and it helps remind the pilot of the order of priorities required to execute an optimal recovery.

Ransomware is a Mere Symptom, Extortion-Based Crime is the Disease

Has the rise of ransomware distracted us away from the true issue at hand? Encrypted files, corrupted applications, deleted backups, and ...

Assessing Risk in the Wake of SolarWinds Attack

Over the last couple of weeks, we have all watched the details surrounding the SolarWinds attack unfold. The full scope of the attack wil...

Targeted Containment — Less is More

Prioritize efforts, consolidate focus, succeed.

Ransomware Recovery Tales: Prepare for Battle

Does your organization have everything it needs to be prepared for a ransomware incident?

Ransomware Recovery Tales: The Battle of Netwalker

Threat actors can deploy, ransomware without the need to build or manage underlying infrastructure.

Assessing Risk: The “How” is Just as Important as the “What”

See how we assess an organization’s security risk and ability to prevent ransomware attacks.

Backups: Ahh! To Zzz 😴

Sleep Soundly with Good Backups!

Ransomware Recovery Tales: Protect the Kingdom

For every ransomware incident MOXFIVE has assisted with, the primary concern during recovery has been the health of the core infrastructure

The Key to Successful Business Recovery

MOXFIVE’s “Break Glass” Strategy to Recovering from a Ransomware Attack Ransomware events can be the worst experience for any person

Think Before you “Brick”

Over the last year, insurance carriers have looked for innovative ways to expand coverage. One such area is coverage around “bricking”. A...

Incident Response: Endpoint Agent All the Things?

Understanding the role of Endpoint Technology in Incident Response

The Next Phase in Cyber Insurance

Cyber claims have departed from lost laptops and basic malware claims and the industry is now realizing that it's less prepared to deal with

Let’s Talk.

Need help with a current incident or want to know more about MOXFIVE?
Complete the form below and our team will get back to you shortly.