Christmas is the time where we allow our imaginations to run wild, it’s the season of goodwill, high spirits and Christmas joy. However, cybercriminals don’t take holidays. We still have to be on our guard, and question what is real…
Category: Heimdal Security Blog
ITDR Best Practices: How to Detect, Prevent, and Contain Critical Identity Threats
Key takeaways: ITDR monitors identity-based threats that traditional security tools miss, like hackers logging in with stolen credentials Effective ITDR requires integration with privileged access management and automated responses tailored to your specific environment Consolidating threat detection into a single…
When Buyers Discount MSPs With One Big Customer
Your biggest customer loves you. Three years together. They trust you, pay on time, and refer others. From where you sit, that’s loyalty. From where a buyer sits, that’s a $$$ discount on your exit. This perception gap kills more…
You’re Not Technical? That Excuse Just Expired!
The world in which there are three groups of people, technical, not technical and those in between, is dead. AI just killed it, And if you’re a business leader still hiding behind “I’m not technical”, your time is up! Who…
Tool Sprawl Taxes Your Business More Than You Think
Ross Brouse has a name for what he sees every day. The Frankenstack. “The lack of operational simplicity comes from piling on tools, building that Frankenstack, as I call it,” says Brouse, President and COO of Continuous Networks, an MSP…
Heimdal 5.1.0 RC Dashboard: Smarter Automation, Stronger Compliance, and Smoother Control
The Heimdal 5.1.0 RC (Release Candidate) dashboard update is now live, bringing a powerful lineup of improvements designed to make IT management faster, safer, and more intuitive. From pre-built scripting and compliance dashboards to simpler agent management and refined privilege…
Can Generative AI Be Weaponized for Cyberattacks?
Generative AI has emerged as one of the most powerful technologies of our era. Capable of producing realistic text, images, voice, and even code, these systems are revolutionizing industries. But while they fuel innovation and productivity, they also introduce an…
What is Managed ITDR? Key Definitions, Features, and Benefits
Key takeaways: MITDR explained: Managed ITDR combines identity threat detection with expert-led response. Why it matters: Get better protection and lower costs without building a full in-house team. What to look for: Prioritize behavioral monitoring, real-time response, and expert oversight…
Nearly 40% of 2024 Ransomware Payouts May Have Gone to Russia, China & North Korea
Ransomware victims paid an estimated $813 million in 2024. Nearly 40 percent of that may have gone to actors in Russia, China and North Korea, according to new analysis from cybersecurity firm Heimdal. Heimdal used recent telemetry, infrastructure tracing and…
Digital Warfare and the New Geopolitical Frontline
This article follows our recent article on the source of cybercrime attacks – read it here – we’re now exploring the global, commercial, and political dimensions of digital warfare. Key takeaways $100 billion in global cyber damages annually – equivalent…
Retail cybersecurity statistics for 2025
Cyber attacks against retail businesses have made headlines in 2025. Read this retail cybersecurity statistics rundown to understand more. For cyber criminals, the retail sector makes for a very attractive target. Retail businesses hold vast troves of valuable customer details,…
Is Your Tech Stack Killing Profitability? The Silent Bug Crippling MSP Growth
Many MSPs want to grow, but internal complexity often holds them back. In this guest article, Portland, a Heimdal partner, breaks down how fragmented systems and unclear value messaging can quietly erode profits, compliance, and trust – and how to…
Cyber Insurance Statistics for 2025
More and more businesses are taking out cyber insurance in 2025. Read our statistics rundown to understand why. Investing in cyber insurance is a smart move. In case of a cyber attack, it can reduce the financial burden of a…
Cybersecurity Has a Motivation Problem
I’ve worked in cybersecurity long enough to see that our biggest challenge isn’t a technical one, it’s motivational. We can build the strongest firewalls, design the smartest detection systems, and run endless awareness campaigns, but none of it matters if…
Agent Fatigue Is Real and Your Security Stack Is to Blame
Your senior analyst stares at alert number 47. It’s not even lunch. Another “suspicious login detected.” They switch to the third dashboard of the morning, cross-reference the user activity, and confirm what they already knew. Bob from accounting is working…
Heimdal 5.0.0 RC: RDP Protection, Ransomware Detection, and OS Deployment
Version 5.0.0 adds three major features for MSPs. a module that controls RDP access an improved ransomware detection engine a simpler way to deploy Windows over the network. Remote Access Protection (RAP): Block Unauthorized RDP Attempts RDP brute-force attacks remain…
Where Ransomware Profits Go and How to Cut Them Off
This article serves as a wake-up call. Even limited cooperation between registry bodies and law enforcement could cripple ransomware networks and raise the cost for cybercriminals. Ransomware payments hit $813 million in 2024 and my expectation is that they will…
ITDR vs EDR: What are the Key Differences?
Key takeaways: What are the main differences between ITDR, EDR, and other security solutions? How does ITDR provide effective protection against identity-based threats? How to effectively detect and respond to attacks. If there’s one thing the cybersecurity community loves, it’s an…
What Is Identity Threat Detection and Response?
Key insights: What is identity threat detection and response (ITDR)? What are the differences and similarities between ITDR and EDR? What are the alternatives to ITDR? Identity Threat Detection and Response (ITDR) is a comparatively new term in the cybersecurity…
Small Business Cybersecurity Statistics in 2025
Small businesses are a big target for cyber criminals. Read our small business statistics rundown to get a true picture of how the sector is being affected in 2025. Until relatively recently, cybercrime wasn’t perceived as a major risk for…