Featured posts from our MOXFIVE Technical Advisors with thoughts and stories to help minimize the business impact of cyber attacks.
 Airiam Podcast: Flight Plan for Ransomware Recovery
Airiam Podcast: Flight Plan for Ransomware RecoveryJim Aldridge joins our partners at Airiam on their podcast to discuss parallels he sees between flying a plane and successfully preparing for and responding to cybersecurity incidents.
 Enterprise Remediation Part 2: Strategies for Containing and Recovering
Enterprise Remediation Part 2: Strategies for Containing and RecoveringIn Part Two of our blog with CrowdStrike, we share proven strategies and techniques for effective large-scale remediation efforts.
 Enterprise Remediation Part 1: Five Tips for Preparing and Planning
Enterprise Remediation Part 1: Five Tips for Preparing and PlanningWhen an incident progresses to the point where enterprise remediation is required, the scope and scale of the response can be daunting. In this two-part series with CrowdStrike, we lay out a roadmap from planning to recovery.
 8 Mitigation Options to Help Reduce the Impact of a Ransomware Incident
8 Mitigation Options to Help Reduce the Impact of a Ransomware IncidentIn this blog, we look at 8 examples of best practices that can be implemented to provide for a more resilient architecture.
 Investigating Business Email Compromises
Investigating Business Email Compromises Business Email Compromises (BECs) continue to be the one of the top attack vectors, costing organizations over $2.3 billion in 2021. In this blog, we share priorities and key methodologies for investigating these attacks.
 Minimizing the Impact: Network Segmentation
Minimizing the Impact: Network SegmentationHost-based microsegmentation offers a wide range of advantages over legacy counterparts allowing organizations to apply segmentation at much deeper granularity including host, user, or application levels.
 Minimizing the Impact: Securing Active Directory
Minimizing the Impact: Securing Active Directory Gaining access to Active Directory is often a goal of threat actors during an intrusion. In this blog, we look at two key workstreams that add security layers making it more difficult for threat actors to achieve this goal.
 Incident Management Chronicles: Striking The Right Balance
Incident Management Chronicles: Striking The Right Balance Finding the right balance between containment, recovery and forensics workstreams is the key to faster and more effective incident response.
 Incident Management Chronicles: Recovery vs Forensics
Incident Management Chronicles: Recovery vs Forensics The lines between forensics and recovery can easily blur during incident response. Using an approach that delivers both in parallel helps minimize business interruption and get organizations back online more quickly.

MOXFIVE, CrowdStrike, and Baker Tilly outline three use cases where our intelligence-led process helped clients recover with speed and precision.

MOXFIVE provides the clarity and peace of mind needed for attack victims during the incident response process. Our platform approach enables victims of attacks to work with a Technical Advisor who provides the expertise and guidance needed in a time of crisis, and facilitates the delivery of all technical needs required, consistently and efficiently.
Learn More
With experience on the front lines responding to incidents daily, MOXFIVE Technical Advisors have the unique ability to connect the dots between business, information technology, and security objectives to help you quickly identify the gaps and build a more resilient environment.