Buonasera Group logo with abstract geometric hexagonal icon in purple
  • Home
  • About
  • Solutions
  • Resources
  • Contact us
Contact us
Contact us

Articles& Resources

Is Poor Domain Reputation Wasting Your Marketing Budget?

Is Poor Domain Reputation Wasting Your Marketing Budget?

Is Poor Domain Reputation Wasting Your Marketing Budget?

New Texas Law For SMBs - Texas Cybersecurity Safe Harbor (SB 2610)

New Texas Law For SMBs - Texas Cybersecurity Safe Harbor (SB 2610)

The Double-Edged Sword: How AI is Fueling Business Email Compromise and Cyber Incidents

The Double-Edged Sword: How AI is Fueling Business Email Compromise and Cyber Incidents

Understanding Increased Cyber Risks from Nation-State Actors

Understanding Increased Cyber Risks from Nation-State Actors

CMMC Advisory Appointment

CMMC Advisory Appointment

Latest posts

Is Poor Domain Reputation Wasting Your Marketing Budget?

Is Poor Domain Reputation Wasting Your Marketing Budget?

Is Poor Domain Reputation Wasting Your Marketing Budget?

Articles
Sep 12, 2025
New Texas Law For SMBs - Texas Cybersecurity Safe Harbor (SB 2610)

New Texas Law For SMBs - Texas Cybersecurity Safe Harbor (SB 2610)

A new Texas law, Senate Bill 2610, known as the Texas Cybersecurity Safe Harbor Law, is bringing new liability protections to SMBs.

News
Jul 25, 2025
The Double-Edged Sword: How AI is Fueling Business Email Compromise and Cyber Incidents

The Double-Edged Sword: How AI is Fueling Business Email Compromise and Cyber Incidents

AI is creating unprecedented opportunities for Business Email Compromise (BEC) and other devastating cyber incidents.

Articles
Sep 11, 2025
Understanding Increased Cyber Risks from Nation-State Actors

Understanding Increased Cyber Risks from Nation-State Actors

We are entering a period of significantly elevated cybersecurity risk, particularly from nation-state actors.

Articles
Aug 6, 2025
CMMC Advisory Appointment

CMMC Advisory Appointment

Austin Buonasera President of Buonasera Group appointed to CMMC Professionals Advisory Team

News
Aug 6, 2025

Cyber Fact

Healthcare is behind in securing AI tools: Despite handling large amounts of sensitive health data, Healthcare organizations blocked only 10.8% of AI transactions, indicating slower adoption of protective measures.

Source

Cyber Fact

Patching takes time, leaving you vulnerable: Only about 54% of edge device vulnerabilities were fully fixed within a year, taking a median of 32 days, which can be too slow against active threats.

Source

Cyber Fact

Overprivileged accounts are a significant cloud risk: Nearly half (46.4%) of detected cloud security alerts were due to service accounts having more access permissions than necessary.

Source

Cyber Fact

Financial and Insurance sectors attract espionage: While often targeted for money, spying motives in this sector increased from 5% to 12% this year.

Source

Cyber Fact

Ransomware continues to be a widespread problem: It's growing as a common type of data breach.

Source

Cyber Fact

System intrusion (hacking + malware) is the most frequent breach type: This category, which often includes ransomware, accounted for 53% of all breaches in 2025.

Source

Cyber Fact

Most consumer phishing targets online brands: Over half (54%) of consumer-focused phishing campaigns imitated online software and service brands.

Source

Cyber Fact

AI can create fake résumés to place insiders: Threat actors use "résumé swarming" to generate thousands of fake but highly qualified candidate résumés, aiming to get malicious insiders hired.

Source

Cyber Fact

Employee use of AI tools can leak sensitive data: 15% of employees accessed Generative AI (GenAI) systems on company devices, potentially exposing confidential business information.

Source

Cyber Fact

The median ransomware payment in the US is substantial: It was $1.91 million last year.

Source

Cyber Fact

Human error and IT failures contribute to nearly half of breaches: These preventable issues are responsible for 26% and 23% of breaches, respectively.

Source

Cyber Fact

Manufacturing is facing a significant increase in espionage: 20% of manufacturing breaches this year were motivated by spying, up from 3% last year.

Source

Cyber Fact

Securing remote access points is crucial: Vulnerabilities in VPNs (Virtual Private Networks) and other "edge" devices (systems exposed to the internet) increased almost eight-fold as a target for exploitation.

Source

Cyber Fact

Fully recovering from a breach is a long process: Only 26% of organizations reported being fully recovered from a data breach within 150 days.

Source

Cyber Fact

Most AI/ML transactions are being blocked by businesses: Enterprises are blocking 59.9% of all AI/ML transactions, indicating concerns about AI data security and governance.

Source

Cyber Fact

AI can free up security staff time: AI solutions can save security teams at least 20 hours per person per week by accelerating the triage of requests.

Source

Cyber Fact

Customer personal data is the most targeted type: Personally identifiable information (PII) belonging to customers was the most frequently stolen or compromised data type, at 53% of breaches.

Source

Cyber Fact

Insider misuse contributes to breaches: Employees abusing their granted access or privileges accounted for 6% of breaches.

Source

Cyber Fact

Healthcare is a top target for cyberattacks: It remains a favorite for attackers, with "System Intrusion" (including ransomware) being the leading cause of breaches.

Source

Cyber Fact

Detection and escalation costs for breaches are decreasing: These specific costs dropped by nearly 10% to an average of $1.47 million.

Source

Cyber Fact

Microsoft tracks a massive number of cyber threats: Microsoft Threat Intelligence monitors over 1,500 unique threat groups, including hundreds of nation-state, cybercrime, and influence operation groups.

Source

Cyber Fact

Espionage-driven breaches are increasing: Breaches where the motive was spying grew by 163% in the last year.

Source

Cyber Fact

Deepfake technology is becoming extremely realistic: New AI models can generate hyper-realistic human videos from a single photo, making impersonation attempts much harder to detect.

Source

Cyber Fact

Regularly review user access and watch for leaked credentials: These steps, along with strong password policies and multi-factor authentication, are essential to prevent credentials from being stolen and used.

Source

Cyber Fact

Shadow AI incidents add to breach costs: They contributed an additional $200,000 to the average global breach cost, likely due to longer detection and containment times.

Source
Contact usBrowse solutions

Company
  • About
  • Careers
  • Resources

Solutions
  • Consulting Services
  • Managed Services (MSP)
  • Managed Security Services (MSSP)

Subscribe to our newsletter
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Copyright © 2025 Buonasera Group. 9JAH1.

Colossians 3:23

(800) 515-4980

