What We Do
How we do it
Oct 19, 2021
Hackers Infect Employees of Law Firms, Manufacturing Companies, and Financial Services Orgs. with Increasingly Pervasive Infostealer, SolarMarker
SolarMarker Infects 5X More Corporate Victims Using Over a Million Poisoned WordPress Pages Key Takeaways eSentire has observed a fivefold increase in SolarMarker infections. Prior to September, eSentire’s Threat Response Unit (TRU) detected and shut down one infection per week. Beginning in September, TRU averaged the detection and shutdown of five per week. SolarMarker is a…
Read More
View all Advisories →
About Us
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 1000+ organizations in 70+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
Read about how we got here
Leadership Work at eSentire
Oct 12, 2021
eSentire Launches MDR with Microsoft Azure Sentinel Extending Response Capabilities Across Entire Microsoft Security Ecosystem
Waterloo, ON – Oct. 12, 2021 -- eSentire, recognized globally as the Authority in Managed Detection and Response (MDR), today announced the expansion of its award-winning MDR services with Microsoft Azure Sentinel, as part of its integration with the complete Microsoft 365 Defender and Azure Defender product suites supporting Microsoft SIEM, endpoint, identity, email and cloud security services.…
Read More
Our award-winning partner program offers financial rewards, sales and marketing tools and personalized training. Accelerate your business and grow your revenue by offering our world-class Managed Detection and Response (MDR) services.
Learn about our Partner Program
Apply today to partner with the Authority in Managed Detection and Response.
Login to the Partner Portal for resources and content for current partners.
Blog — Sep 08, 2017

Natural disasters threaten more than just physical security

Natural disasters aren’t wholly dedicated to any single season. Tornadoes can occur at any time, but generally occur from March through to June. Fire season generally runs from October to January. Earthquakes can occur at any time. The Atlantic hurricane season usually lasts half the year (between June and November), where we presently are once again. Depending where you live, these natural disasters may not directly affect you (or may be less likely than other locales), but it’s certainly a good time to consider how your business would react in the case of a natural disaster. Do you have a plan in place? Has that plan been communicated to all employees at your company? Hopefully the answer to both those questions is “yes.” Either way though, we’re here to talk about a few less obvious aspects of cybersecurity preparedness. Besides a Disaster Recovery/Business Continuity Plan (DR/BCP) and associated physical security concerns (which is of the utmost importance), we’ve highlighted some things to consider.

Your evacuation plan

If you have a BCP, hopefully you’ve an evacuation plan. It’s important to know exactly if and how business will carry on in the event of an evacuation (or emergency in general). Do all your employees have VPN access? If so, is the expectation that all employees will go home and continue working? Do you have sufficient hardware and licenses? What if the roads are closed – where do your employees go?

Another important consideration is communication. How will employees be updated throughout the disaster? Is there a central point of contact within the company that all internal and external communications should be directed?

In addition to communication, there needs to be an overall understanding among all employees about the impact of a natural disaster on business. Your employees should know what to do and what to expect before disaster strikes.

Acronyms that matter in the event of an emergency

In case DR/BCP weren’t enough, there are a few more acronyms you should be familiar with. Each of these refers to an amount of time in which the firm can determine sufficient “downtime” for different systems within the firm.

Recovery Point Objective (RPO) - the point in time in the past to which you will recover. For example, if the RPO is one hour, backups must be made at least once per hour. In this situation, the most data you would worry about losing is anything from the last hour.

Recovery Time Objective (RTO) - the point in time in the future at which you will be up and running again.

Interruption Window - the maximum time allowed for restoration of critical systems so that its business goals are not negatively affected.

Maximum Tolerable Period of Disruption (MTPOD) - the maximum amount of time that a company’s key products or services can be unavailable or undeliverable after a disruption before its impact is deemed unacceptable.

For each critical system, the CTO should have a well-defined (and accepted) value of RPO, RTO, and MTPOD.


Emergency situations are naturally very chaotic. This can mean an increase in the likelihood of sensitive data being accidentally leaked. Amid confusion, employees are unlikely to place high priority on information security, yet these are precisely the moments cybercriminals may choose to test your cybersecurity defenses in creative and relevant ways. Here’s three things to watch out for online during a natural disaster:

1) Phishing scams disguised as charitable donations

Cybercriminals have been known to take advantage of compassionate people who want to help in a time of need. If a website is asking you to provide credit card information, make sure that it’s a valid site and organization.

2) Photos or videos that claim to be “just released” or “exclusive”

A photo or video that claims to be “never before seen” may actually lead you to click on a malicious link. This goes the same for websites offering exclusive information about the disaster. Always look for signs that the link you’re about to click on is legitimate, and remember that if something is truly worth seeing, you’ll probably be able to find it on a site you know is reputable. Cybercriminals will also take advantage of trending topics to spread malware, so remember that just because a post has “#hurricane,” it doesn’t mean that it’s safe to click.

3) Posts or messages from “friends” on social networks

Cybercriminals can hack into accounts and send fraudulent messages to everyone in the victim’s list of contacts. Remember, just because the messages seem somewhat tailored to the recipient, it doesn’t mean they won’t contain malicious links or files. If you’re ever unsure, contact your friend directly to confirm they sent the message through a different means of communication.

Lean on your security provider

There’s a lot to worry about during a natural disaster, and trying to think of everything may feel impossible. Fortunately, your security provider can help you. For example, during Hurricane Sandy in 2012, eSentire saw an increase in a certain amount of inbound attacks against clients across the Northeast USA. After investigating, we identified these attacks as fraudulent and alerted our clients to the possible danger.

With eSentire, each client has a sensor, and our Security Operations Center (SOC) is alerted when a client’s sensor becomes unreachable. If this happens, we immediately escalate the situation to confirm what is causing the sensor outage and reach out to the client to alert them. From there we can help the client with their escalation and emergencies procedures to ensure no data is lost in the event of a natural disaster.

Learn more

These situations are difficult and responding to them can be stressful. With Managed Detection and Response service, our SOC can be a great resource to monitor operations when you can’t. We’ve got your back. Let us know what we can do to help.

Eldon Sprickerhoff
Eldon Sprickerhoff Founder and Chief Innovation Officer

In founding eSentire, Eldon Sprickerhoff responded to the incipient yet rapidly growing demand for a more proactive approach to preventing and investigating information security breaches. Now with over twenty years of tactical experience, he is acknowledged as a subject matter expert in information security analysis.