Buonasera Group logo with abstract geometric hexagonal icon in purple
  • Home
  • About
  • Solutions
  • Resources
  • Contact us
Contact us
Contact us

Articles& Resources

Is Poor Domain Reputation Wasting Your Marketing Budget?

Is Poor Domain Reputation Wasting Your Marketing Budget?

Is Poor Domain Reputation Wasting Your Marketing Budget?

New Texas Law For SMBs - Texas Cybersecurity Safe Harbor (SB 2610)

New Texas Law For SMBs - Texas Cybersecurity Safe Harbor (SB 2610)

The Double-Edged Sword: How AI is Fueling Business Email Compromise and Cyber Incidents

The Double-Edged Sword: How AI is Fueling Business Email Compromise and Cyber Incidents

Understanding Increased Cyber Risks from Nation-State Actors

Understanding Increased Cyber Risks from Nation-State Actors

CMMC Advisory Appointment

CMMC Advisory Appointment

Latest posts

Is Poor Domain Reputation Wasting Your Marketing Budget?

Is Poor Domain Reputation Wasting Your Marketing Budget?

Is Poor Domain Reputation Wasting Your Marketing Budget?

Articles
Sep 12, 2025
New Texas Law For SMBs - Texas Cybersecurity Safe Harbor (SB 2610)

New Texas Law For SMBs - Texas Cybersecurity Safe Harbor (SB 2610)

A new Texas law, Senate Bill 2610, known as the Texas Cybersecurity Safe Harbor Law, is bringing new liability protections to SMBs.

News
Jul 25, 2025
The Double-Edged Sword: How AI is Fueling Business Email Compromise and Cyber Incidents

The Double-Edged Sword: How AI is Fueling Business Email Compromise and Cyber Incidents

AI is creating unprecedented opportunities for Business Email Compromise (BEC) and other devastating cyber incidents.

Articles
Sep 11, 2025
Understanding Increased Cyber Risks from Nation-State Actors

Understanding Increased Cyber Risks from Nation-State Actors

We are entering a period of significantly elevated cybersecurity risk, particularly from nation-state actors.

Articles
Aug 6, 2025
CMMC Advisory Appointment

CMMC Advisory Appointment

Austin Buonasera President of Buonasera Group appointed to CMMC Professionals Advisory Team

News
Aug 6, 2025

Cyber Fact

Web application vulnerabilities are a key entry point: Attackers frequently exploit security weaknesses in web applications to gain initial access.

Source

Cyber Fact

"Low and slow" business email compromise (BEC) attacks are hard to detect: These involve subtle, infrequent email and file access to avoid triggering security alarms.

Source

Cyber Fact

Patching takes time, leaving you vulnerable: Only about 54% of edge device vulnerabilities were fully fixed within a year, taking a median of 32 days, which can be too slow against active threats.

Source

Cyber Fact

Faster breach resolution leads to lower costs: Breaches that were identified and contained in under 200 days cost less ($3.87 million) than those that took longer ($5.01 million).

Source

Cyber Fact

Think like an attacker to defend better: Security professionals should adopt an attacker's perspective, understanding how they connect vulnerabilities, rather than just looking at isolated issues.

Source

Cyber Fact

Financial and Insurance sectors attract espionage: While often targeted for money, spying motives in this sector increased from 5% to 12% this year.

Source

Cyber Fact

Magecart website infections can be brief but impactful: The average time a website remains infected with Magecart malware is less than 30 days.

Source

Cyber Fact

The Oil & Gas sector saw a massive surge in ransomware attacks: Attacks on this sector spiked over 900% year-over-year, likely due to increased automation and outdated security practices.

Source

Cyber Fact

Overprivileged accounts are a significant cloud risk: Nearly half (46.4%) of detected cloud security alerts were due to service accounts having more access permissions than necessary.

Source

Cyber Fact

Key investment areas post-breach are threat detection, data security, and incident response planning: For organizations planning to increase security spending, these are the top three areas of focus.

Source

Cyber Fact

Breaches across multiple environments are common and costly: 30% of all breaches involved data stored across various environments (public cloud, private cloud, on-premises), costing an average of $5.05 million.

Source

Cyber Fact

Vishing (voice phishing) attacks are increasing: Attackers can now mimic voices with just seconds of recorded audio, fueling a surge in convincing voice-based phishing attempts.

Source

Cyber Fact

Attackers use legitimate services for phishing: They leverage trusted platforms like SaaS email, developer tools, and cloud storage to make phishing attempts appear legitimate and bypass detection.

Source

Cyber Fact

A Mastercard survey of more than 5,000 small and medium-sized business owners across four continents revealed that 46% have experienced a cyberattack on their current business, and nearly one in five that suffered an attack then filed for bankruptcy or closed their business.

Source

Cyber Fact

Your business partners increase your risk: Data breaches involving a third-party (like a vendor or service provider) doubled from 15% last year to 30% this year, showing how interconnected your security is with theirs.

Source

Cyber Fact

Customer personal data is the most targeted type: Personally identifiable information (PII) belonging to customers was the most frequently stolen or compromised data type, at 53% of breaches.

Source

Cyber Fact

Ransomware severely impacts healthcare: 389 healthcare institutions in the US were hit by ransomware in FY 2024, leading to significant disruptions in medical operations.

Source

Cyber Fact

The median ransomware payment in the US is substantial: It was $1.91 million last year.

Source

Cyber Fact

Quicker detection helps reduce damage: For breaches that weren't immediately disclosed by attackers, the average "dwell time" (how long attackers were in the system) improved to 24 days in 2025 from 30 days in 2023.

Source

Cyber Fact

Securing remote access points is crucial: Vulnerabilities in VPNs (Virtual Private Networks) and other "edge" devices (systems exposed to the internet) increased almost eight-fold as a target for exploitation.

Source

Cyber Fact

Regulatory fines are common after breaches: 32% of data breaches resulted in fines, with nearly half of those (48%) being over $100,000.

Source

Cyber Fact

Educational institutions face a huge increase in phishing: Attacks targeting schools and universities surged by 224% in 2024, often during busy periods like the start of the school year.

Source

Cyber Fact

A good incident response plan and backups are crucial: Having a well-rehearsed incident response plan and regularly practicing data recovery from backups will significantly improve outcomes if you experience a major attack.

Source

Cyber Fact

Humans are consistently involved in breaches: Approximately 60% of all data breaches had a human element contributing to them, such as an employee clicking a malicious link.

Source

Cyber Fact

Basic web application attacks are still a significant threat: These straightforward attacks targeting websites made up 12% of breaches.

Source
Contact usBrowse solutions

Company
  • About
  • Careers
  • Resources

Solutions
  • Consulting Services
  • Managed Services (MSP)
  • Managed Security Services (MSSP)

Subscribe to our newsletter
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Copyright © 2025 Buonasera Group. 9JAH1.

Colossians 3:23

(800) 515-4980

