As you may have noticed, it has been over 2 years since I last posted! Honestly, the time has flown by so fast that I really didn’t think it had been that long. But there is good reason! My team and I have been busy working on a new project. And given the current craziness surrounding the Coronavirus, I thought, now is a good time to sit down and post and let everyone know what we’ve been up to!
In 2013 I read an article, referenced here, about how Facebook identified a zero-day Java exploit on one of its engineer’s laptops by monitoring Internet traffic and that hackers were using it to communicate with their servers to steal data. Running an IT consulting and managed service firm, this article freaked me out. I thought, if this ever happened to one of my clients, how could they possibly be expected to detect and survive an attack like this? Facebook and its large dedicated data security team found a needle in a haystack. But this needle would not be hard for cyber criminals to place wherever they wanted and most organization would have no way of knowing about it.
A lot has changed since 2013, and there are tons of new cybersecurity products on the market. Many of them leveraging artificial intelligence to try and fill the gap identified in that 2013 article to help security teams find the needle in the haystack. But a critical problem still remains with all these products. What do you do if you get an alert! All cybersecurity product block the most egregious offenders, but things that are just not normal or look suspicious get flags and alerts. Someone must evaluate the alert, determine if the alert is suspicious and develop and action plan to mitigate the risk or compromise.
The truth was, we were doing the best we could and followed all the best practices for an IT consulting business, but we could not effectively protect our clients from evolving and real threats. We also did not have the resources to monitor and respond to changing risks. We needed help like most small and medium businesses.
And so we embarked on a 2 plus year journey learning, testing and training on all the latest security solutions. We trialled many platforms and actually put the slick marketing to the test. We developed a backend and an organization to drive and support these products. Today, Ihloom is protecting over 1,600 endpoints and over a 100 different organizations. We have identified and mitigated more than 5 serious cyber attacks in the last year saving our clients from real losses and business disruptions.
If you want to get your organization secure and compliant, Ihloom can help. What differentiates Ihoom are real, practical, vetted solutions and the knowledgeable staff and knowhow to get businesses secure. Putting a solution like this together takes time, hard work and experience and we’re proud of the outcome.
One thought on “Introducing Ihloom! (pronounced illume, as in illuminate)”
sounds great … will pass the word …