Buonasera Group logo with abstract geometric hexagonal icon in purple
  • Home
  • About
  • Solutions
  • Resources
  • Contact us
Contact us
Contact us

Articles& Resources

Is Poor Domain Reputation Wasting Your Marketing Budget?

Is Poor Domain Reputation Wasting Your Marketing Budget?

Is Poor Domain Reputation Wasting Your Marketing Budget?

New Texas Law For SMBs - Texas Cybersecurity Safe Harbor (SB 2610)

New Texas Law For SMBs - Texas Cybersecurity Safe Harbor (SB 2610)

The Double-Edged Sword: How AI is Fueling Business Email Compromise and Cyber Incidents

The Double-Edged Sword: How AI is Fueling Business Email Compromise and Cyber Incidents

Understanding Increased Cyber Risks from Nation-State Actors

Understanding Increased Cyber Risks from Nation-State Actors

CMMC Advisory Appointment

CMMC Advisory Appointment

Latest posts

Is Poor Domain Reputation Wasting Your Marketing Budget?

Is Poor Domain Reputation Wasting Your Marketing Budget?

Is Poor Domain Reputation Wasting Your Marketing Budget?

Articles
Sep 12, 2025
New Texas Law For SMBs - Texas Cybersecurity Safe Harbor (SB 2610)

New Texas Law For SMBs - Texas Cybersecurity Safe Harbor (SB 2610)

A new Texas law, Senate Bill 2610, known as the Texas Cybersecurity Safe Harbor Law, is bringing new liability protections to SMBs.

News
Jul 25, 2025
The Double-Edged Sword: How AI is Fueling Business Email Compromise and Cyber Incidents

The Double-Edged Sword: How AI is Fueling Business Email Compromise and Cyber Incidents

AI is creating unprecedented opportunities for Business Email Compromise (BEC) and other devastating cyber incidents.

Articles
Sep 11, 2025
Understanding Increased Cyber Risks from Nation-State Actors

Understanding Increased Cyber Risks from Nation-State Actors

We are entering a period of significantly elevated cybersecurity risk, particularly from nation-state actors.

Articles
Aug 6, 2025
CMMC Advisory Appointment

CMMC Advisory Appointment

Austin Buonasera President of Buonasera Group appointed to CMMC Professionals Advisory Team

News
Aug 6, 2025

Cyber Fact

Lateral movement is a key attacker tactic: Over half (62.2%) of what threat actors do after gaining initial access is trying to move deeper into a network.

Source

Cyber Fact

Most AI/ML transactions are being blocked by businesses: Enterprises are blocking 59.9% of all AI/ML transactions, indicating concerns about AI data security and governance.

Source

Cyber Fact

Customer personal data is the most targeted type: Personally identifiable information (PII) belonging to customers was the most frequently stolen or compromised data type, at 53% of breaches.

Source

Cyber Fact

Unpatched systems are a major weakness: Exploiting known vulnerabilities in software or systems was the initial way attackers got in for 20% of breaches, a 34% increase from the previous year.

Source

Cyber Fact

Deepfakes are making impersonation much harder to detect: Realistic voice and video forgeries increase the difficulty of spotting fraudulent activities.

Source

Cyber Fact

Monitor database logins closely: Enabling logging and monitoring of failed login attempts can help detect brute-force attacks on your databases.

Source

Cyber Fact

Financial and Insurance sectors attract espionage: While often targeted for money, spying motives in this sector increased from 5% to 12% this year.

Source

Cyber Fact

Most consumer phishing targets online brands: Over half (54%) of consumer-focused phishing campaigns imitated online software and service brands.

Source

Cyber Fact

Web application vulnerabilities are a key entry point: Attackers frequently exploit security weaknesses in web applications to gain initial access.

Source

Cyber Fact

Supply chain attacks are a growing vector: Compromises involving third-party vendors and the supply chain have become the second most common attack vector, surpassing compromised credentials.

Source

Cyber Fact

Retail attacks are shifting targets: While payment card data was traditionally targeted, attackers are now going after other types of data in retail breaches, likely because payment data is better protected.

Source

Cyber Fact

Overprivileged accounts are a significant cloud risk: Nearly half (46.4%) of detected cloud security alerts were due to service accounts having more access permissions than necessary.

Source

Cyber Fact

Faster breach resolution leads to lower costs: Breaches that were identified and contained in under 200 days cost less ($3.87 million) than those that took longer ($5.01 million).

Source

Cyber Fact

"Low and slow" business email compromise (BEC) attacks are hard to detect: These involve subtle, infrequent email and file access to avoid triggering security alarms.

Source

Cyber Fact

Personal data is the most frequently compromised type: This trend has been consistent over the years.

Source

Cyber Fact

Data leak sites are a growing extortion tool: Attackers are increasingly publishing stolen victim data on public data leak sites (DLS) to pressure organizations into paying ransoms.

Source

Cyber Fact

ChatGPT is both popular and often blocked: It's the most used AI application by transaction volume (45.2%) but also the most frequently blocked by organizations.

Source

Cyber Fact

Accidentally exposed secrets stay exposed for a long time: Sensitive information (like passwords or API keys) leaked to public places, such as GitHub, took an average of 94 days to fix.

Source

Cyber Fact

Healthcare breaches take longer to resolve: These breaches took an average of 279 days to identify and contain, more than five weeks longer than the global average.

Source

Cyber Fact

Basic security settings can drastically reduce compromises: Microsoft tenants that use "security defaults" (which enable MFA by default) experienced 80% fewer compromises than those that did not.

Source

Cyber Fact

Small and medium businesses are major ransomware targets: For SMBs, ransomware incidents accounted for a significant 88% of all breaches.

Source

Cyber Fact

Many ransomware groups use existing tools: Instead of creating their own ransomware, many groups rely on custom versions of third-party ransomware families.

Source

Cyber Fact

Humans are consistently involved in breaches: Approximately 60% of all data breaches had a human element contributing to them, such as an employee clicking a malicious link.

Source

Cyber Fact

Most breaches are from external attackers: 85% of breaches originate from outside the organization, while 15% are caused by internal actors.

Source

Cyber Fact

Social engineering remains a common attack method: Attacks that trick people into revealing information or taking action, like phishing, were involved in 17% of breaches.

Source
Contact usBrowse solutions

Company
  • About
  • Careers
  • Resources

Solutions
  • Consulting Services
  • Managed Services (MSP)
  • Managed Security Services (MSSP)

Subscribe to our newsletter
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Copyright © 2025 Buonasera Group. 9JAH1.

Colossians 3:23

(800) 515-4980

