A Message from CEO Emil Sayegh on Ntirety’s Top 20 MSSP Global Ranking

Congratulations to the Ntirety team, our partners, and our customers for helping Ntirety place as a Top 20 global MSSP!

Today, Ntirety put out a press release to announce our placement as 20th in the top 250 MSSPs globally: linked here. This award is based on a broad industry survey, and rewards Nitrety for our business growth, ecosystem partnerships, quality of services and superior talent.

2022 has been a year of record growth and innovation for Ntirety.
Our public accomplishments, accolades, and milestones include:

  • Key customer wins with 100% increase in MSSP clients annually.
  • Broadening of Ntirety’s channel program, by adding every major TSB, and hundreds of more sub-agents.
  • The launch of Ntirety’s unique CaaS service, offering both a consulting strategy and implementation of a continuous compliance process on behalf of customers.
  • The launch of Ntirety’s vCISO Service, which removes the guesswork from security, implementing best practices, creating a prioritized roadmap, and developing and executing a comprehensive security program.
  • Winning three global InfoSec awards in the following categories: Next Gen Cloud Security; Editor’s Choice Cybersecurity Service Provider of the Year; and Editor’s Choice Cybersecurity Services.

I could not be prouder of this team. Our top 20 global ranking is a testament to all the hard work, and to our unique approach to comprehensive cybersecurity, setting us apart from point product security providers. It is also a testament to our company growth, industry/thought leadership, and customer focus.

There has never been a better time to be a part of this amazing Ntirety mission, in securing the world against the bad guys!

This post by Ntirety CEO Emil Sayegh originally appeared on LinkedIn.

Dark Web Of Cybersecurity Concerns Rising With Gig Economy

The dark web has made a black market gig economy where cybercriminals thrive, and the targets are unsuspecting people, corporations and governments alike. Ntirety CEO Emil Sayegh makes the case for how a comprehensive security posture can mitigate risks and keep organizations from being caught off guard.


Dark Web Of Cybersecurity Concerns Rising With Gig Economy

Economic conditions combined with opportunity and technological advancements have set the foundation for the gig economy. Freelance, temporary, and flexible jobs are a noticeable component of our modern economy and so, employer names like Upwork, Uber, Lyft, Fiverr, and many others are as common as traditional jobs now. In technology specifically, we always had freelance developers as well.

Those same economic factors, however, have created a little-known gig-economy for technological skills that include cyber hacking and cybercrime.

Amongst our modern technological landscape, cybersecurity skills are in demand, and we are suffering from a real cybersecurity talent drought with a forecast of 3.5 million cybersecurity jobs unfilled by 2025. The technology employment market is faced with a continual need for personnel and skills to fill its operational needs. Cybersecurity professionals could find themselves fully or fractionally employed in many situations at many organizations. Some of that employment includes what is called “white hat” or ethical hacking – hackers that exploit, test, and report on vulnerabilities of an organization. With the right mix of cybersecurity and continued vigilance, organizations can leverage these kinds of services towards continually improving their cybersecurity posture.

The Underground: Cybercriminal Buyers and Sellers

On the dark web however, any semblance of ethical boundaries goes completely out the window. The dark web is a thriving, active underground network of information exchange that is in no way static and isn’t indexed by search engines, or visible to the casual users. Cybercriminal activities are often traced back to these dark web origins and much of the activity takes place in an underground marketplace that is built around cybercriminal mischief. Much like the gig economy itself, factors such as inflation, world events, social unrest, and opportunity are pushing skilled and opportunistic actors into this market.

The Wild West of Buyers and Sellers

This global cyber underground marketplace features unique wares and services and is driven by buyers and sellers of all types. You won’t find physical buildings, walls, or phone numbers to call. On any given day, you will find open conversations about targets, tactics, and conversations about cyber hacking expertise. Both buyers and sellers need to beware. Buyers need to beware that they are dealing with criminals, and sellers need to beware because the dark web is also frequented by undercover law enforcement and foreign intelligence agencies. Payments are made with trades of information, hacking tools, and difficult to track cryptocurrency. It is about as open as it can be and untraceable as can be, which makes it very attractive for upstarts, would-be buyers, and those looking to make some cash.

A Dark, Dark Market

Dark market operations have grown to become a central component for many upstart international cyber threat operations. Hack wares are becoming more proactive in nature than ever, bolstering a market that is destined to boom in terms of products and services sold, and products and services bought.

Available black hat services available on the dark web include:

  • Hack a website – Looking to buy a hack of a site or web services? This might set you back a couple of hundred US dollars. Need those admin credentials or data? Double that amount.
  • Target a phone or computer – Looking to get to a specific computer or smartphone? A little phishing, payloaded files, or even ransomware will get the job done. Available for any platform.
  • Target a person – This attack incurs perhaps the most effort and prices vary accordingly. However, you can buy a whole lot of trouble for the target of your choice. Services rendered can result in legal problems, reputation problems, or financial compromise for said victim. A recent example of this type of targeting, is the latest rumored high profile compromise alleged to be a hack by underground 4chan users into the iCloud account of Hunter Biden.
  • Records manipulation – Need something changed? Social engineering and technological compromise could be your ticket. Official school transcripts, address verification, and any number of records can be changed as requested.
  • Email hacks – There are many ways to get into your average email account, meaning you can buy this service along with the choice of quietly spying on an account, simple access, or creating copies of all the data inside of a mailbox’s contents. The infamous hack in 2016 of then presidential candidate Hillary Clinton’s emails may have cost her the presidency.
  • DDoS attacks – A Distributed Denial-of-Service (DDoS) attack is a type of cyber-attack in which hackers render a network of computers unavailable to the users by flooding the targeted system with requests. You can typically choose to pay for targeted DDoS attacks in one-hour time increments, for as long as you want. Countless options abound as you can just name your target, begin and end dates, and level of attack bandwidth.
  • Social attacks – You can buy a hijack of a targeted social account for the right price. Hackers have been doing this one for years, with high-profile hacks against major corporations on properties like Twitter, Facebook, and more.

Cyberweapons for Sale

You can also buy, trade, and sell data – including military-made cyberweapons that are available on the dark web. In fact, the market was already going in this direction when the United Arab Emirates was exposed targeting human rights activist Ahmed Mansoor in 2016. The virtually impossible-to-detect iPhone spyware tool they used was called Pegasus, made by an Israeli group known as the NSO Group. The Pegasus spyware is classified as a weapon by Israel and any export of the technology must be approved by the government. It is only approved to be sold to governments, and not private enterprises but invariably falls in the wrong hands. Reports of this spyware potentially implicated it in a number of attacks across the world targeting human rights activists and journalists such as murdered Saudi dissident Jamal Khashoggi. Pegasus is the iOS variant for Apple devices while the Android variant is called “Chrysaor.” It is similar in nature to the original Trojan viruses that were used to spy on computers, except this spreads via text messages and targets mobile devices. Back in 2014, a group known as Hacking Team, based out of Italy, was also found selling specific spyware to other country’s intelligence agencies. Each of these incidents involved hackers for hire, custom tools, and nation-state entities.

The Unprepared Will Fall

With illicit activities on the rise, an inevitable logical outcome is that many more unprepared organizations will face cyber disasters. In the face of yet another growing threat condition, the case for comprehensive security systems only become stronger by the day. Continuous monitoring, detection, and recovery are components of the comprehensive security solution where so many organizations will fall short.

We cannot stop this scary underground surge, but with a comprehensive security posture, we can wield the tools to detect, mitigate, slow down, and even stop these attacks in their tracks.

This article was originally published in Forbes, please follow me on LinkedIn.  

New Product Release Implements Daily Username Change

Partners, Customers, and Team Ntirety,  

As you saw in the news, cyberthreats are up 800%.  Given this crazy upward trend we are seeing in cyberattacks, Ntirety as the global leader in Comprehensive Cybersecurity Solutions, is launching a new innovative Identity and Access Management (IAM) security product that will defeat all these pesky hackers.  This is a cornerstone of our Comprehensive Security Solution.    


  1. All Employees, Customers,  and Partners Must Use This New Product By Noon:   

This new product will not only be for our customers, but also for all Ntirety employees and partners. To access any of our tools, we will all be adopting first beginning today at noon (no exceptions).  

This new IAM product requires our employees, partners and customers to change their current user names every day, while also simultaneously changing their passwords every day. Your username, just like your password, must be an assortment of numbers and letters with no reference to your previous name.  


2. Learn to Love Your DUN: 

Furthermore, based on our CISO’s recommendations, while addressing each other in written communication, you cannot refer to other employees or customers by their real names anymore.  You have to refer to them by their Daily User Name (DUN).  Today as an example you have to refer to me not as Emil, or Emil Sayegh, but by my DUN “%KDApril1_22!”.  Tomorrow, it will be something different.  Everyone will have to download an Ntirety IAM RosettaStone App, that will give you the DUN of the person you are trying to communicate with. 


3. This is for your own good.    

While we know this may be inconvenient to some, but Cyber threats have unfortunately taken too drastic of a turn and we have to resort to these drastic measures to keep our employees and customers safe. This is for your own good.   The internet and social media have made so much of our lives public that cybercriminals can more easily figure out how to extract personal information from what we are posting especially when our user names are a simple combination of our first and last name. This new IAM product will help to protect our identities and prevent potential data theft.  We are in direct talks with Social Media companies for them to also adopt this technology.  We believe it will help in the global discourse. 


Please do not hesitate to reach out to your Ntirety team members with any questions you may have.   






PSA from Team Ntirety:  This blog was intended to be an April Fools joke but serves as a reminder to keep an eye out for social engineering scams. Communication or emails that come from higher-ups with edicts, giving you little time to react, that are plausible but out of character are typical tools for Social Engineering scams.  Make sure to educate and train your teams to be cautious when taking in new information and clicking unfamiliar links. If something seems too good to be true it very likely is, and it is better to use caution than suffer the consequences of data theft.

The Imminent Death And Rebirth Of Cyber Insurance

For insurance companies, it is important to predict all possible outcomes within their realm of protective services. This is not the path cyber insurance has followed, making it somewhat unreliable.  The following piece, The Imminent Death and Rebirth Of Cyber Insurance, from Ntirety CEO Emil Sayegh was originally published in Forbes. 

 We wake up every day to a pattern of record ransoms being paid as well as record increases in cyber-insurance cost. The Bloomington School District in Illinois published its cyber-insurance renewal costs and reported a whopping 334% increase in premiums. Faced with challenges, it is common knowledge that businesses must continually evolve due to circumstances such as opportunity, missions, and risks. The cyber insurance industry is no different. In this climate of record ransoms and cyber incidents, these challenges are creating a shift in insurance market conditions signaling that cyber insurance will fade towards demise as we know it. While this seems like a bad thing, there is a silver lining in all this. 

 Mounting Ransom Costs 

We are living in the greatest period of data vulnerability in history. There are risks everywhere, all of which carry significant financial burdens including ransomware, downtime, compliance fines, and data loss. The global pandemic opened opportunities for threat actors to escalate their attacks and seize, causing dramatic increases in ransomware attacks alone. Amid the shifting security haze of 2020, the consumer GPS company Garmin paid a significant $10 million in ransom and the tales of ever-increasing ransoms go on. While the average cost of a data breach now hovers around $4.24 million, organizations routinely find their insurance only covers about 40 percent of the costs incurred due to a cyber incident.  

 The Trend was Not a Friend  

Cyber insurance is built on the careful analysis and management of risks in a present-day environment. It is unimaginable to think of a scenario where the cyber insurance industry is not challenged by the rising challenges and costs of cyber-crime now. Reported cyber losses continually reach into figures in the billions of dollars. Each month is a record now. Meanwhile, the historical loss data continues to shift according to changes and escalation of risks. There is a palpable element of unpredictability that does not work well for the cyber insurance market and those looking for coverage.  

One can reasonably wonder how the cyber insurance industry got this wrong. How did they miss this trend? After all, insurance relies on heavy predictive analytics based on historical data. Sadly, in this case, the historical trend was far from predictive. The calculus was based on historical patterns of small-time hackers or lone wolves looking to get a quick hack of a hit. However, in the last two years, all of this has changed at such a pace, that the cyber insurance industry was caught ill-prepared. What is now driving the acceleration of costs, attack volume, and social engineering are nation-state threat groups. These new hacker groups are incredibly well organized. Organizations of cybercriminals from around the world who are demonstrably sponsored or ignored by their respective governments. What this means is that in addition to financial gain to sustain their operations, the disruption of the target’s operations is also their constant and perhaps primary goal. Attacks on infrastructure, military, and business entities have been continually associated with outside countries, such as the SolarWinds attack discovered in 2020.  

One way of looking at this tells the tale of a dying industry, slammed by rising challenges and costs and a lack of interest to back cyber liabilities. For example, it is easy to draw a line between ransomware-related claims and capacity throughout the industry. As it stands, just a small sample of losses within the industry could quickly wipe out the premiums collected well ahead of time. This is classified as unbearable risk within the pool and in insurance terms, losses are not acceptable.  

 Indemnification and Comprehensive Security to the Rescue 

In addition to the array of risks, one must now consider whether the state of cyber insurance constitutes an additional risk to the organization. The stakes are high and legal conditions abound. New coverage and rising renewal rates are a major concern. Premiums are rising by 10 to 20 fold, and that is if a renewal is even available. Enterprises are left exposed, or have to pay exorbitant premiums. The answer lies in going back to the fundamentals of minimizing heavy reliance on cyber insurance through a comprehensive security framework. Comprehensive security frameworks provide better security outcomes and a better posture for the insured. Furthermore, enterprises can leverage the indemnification provided by their cybersecurity provider in lieu of getting their own cyber insurance coverage. However, in order to do that, organizations need to embrace a comprehensive security approach. There is no wiggle room on that. 

Comprehensive security approaches can manifest through full spectrum security programs that provide protection, recovery, and assurance services that minimize risks. 

  • Protecting data means protecting data everywhere, all the time— including the perimeter, malware detection, finding threats, ensuring encryption and access. 
  • The benefits of recovery include virtualized and ready-access redundancy/restoration of systems that are available in any type of disaster including a breach. 
  • Building out an assurance program means life cycle assessments of security, compliance, logging, and the integrity of compliance within a given environment. 

In a challenging threat and cyber-insurance environment, comprehensive security augments risk aversion and minimizes reliance on more stringent insurance scenarios. 

 A New Dawn for Cyber Insurance 

Cyber insurance has and will adapt to these conditions, and we will see this evolution include demands for improved cyber-hygiene and exclusions that will shield insurance companies from providing coverage when the insured fails to maintain high security standards. We see that in the home insurance industry when security alarms actually reduce the premiums. Similarly, the cyber insurance industry, while nascent, will mature. It has just emerged from two years of nightmare losses and a risk climate that was hard for them to anticipate. You can expect specific adaptations ahead and an emphasis towards better education and improved cybersecurity practices. The rebirth of cyber insurance is in the cards, but it will be in combination with proper, responsible security planning and comprehensive security strategy. 


Check out this piece, originally published in Forbes, here and follow me on LinkedIn

A Valentine’s Day Message from Emil Sayegh

To our Partners, Customers, and Team Ntirety, 

 I wanted to wish all of you a happy Valentine’s Day!  

 Valentine’s Day, also called Saint Valentine’s Day or the Feast of Saint Valentine, is celebrated annually on February 14.  Valentine’s Day originated when St. Valentine healed the blindness of his jailer’s daughter in an act of selfless love. While Valentine’s Day is not a public holiday,  it has been celebrated since the 8th century, and Valentine’s Day has become a day that we celebrate with all the people we cherish and love in our lives.  I feel it is appropriate to celebrate this day with the people we spend 5 days a week with, and numerous hours every day as well as our beloved customers and partners that we support. 

 To all of the Ntirety teams around the world, I want to wish you all a Valentine’s Day full of joy and happiness.  Thank you for all you do every day, and for showing dedication to your job and to our customers.  To our customers and our partners, thank you for your loyalty and love.   I encourage all of you to show our customers the “love” today by living our values and customer pledge, and by making them smile with excellent customer service (as you always strive to do). If appropriate, consider wishing them a happy Valentine’s Day, too while delivering a WOW! experience. 

 Special thanks to all of you that are working this evening and night shift today in your local time zones instead of being with loved ones celebrating, and to those that are traveling on business today instead of being with your loved ones and families.  Your sacrifice and hard work is a clear display of love for our customers, and your fellow employees. 

 Happy Valentine’s Day! 

2022 Cyber Realities

While 2022 holds promise for a better future through advancements in technology, new cyber risks will come along with it. We must move forward with a positive mindset, while not forgetting past mistakes. Originally published in Forbes2022 Cyber Realities builds on Ntirety CEO Emil Sayegh’s Predicting What 2022 Holds For Cybersecurity piece published prior.

Looking to the Future

In addition, to my top ten predictions posted on January 6th, here are a few more: 

  1. Ransomware Will Continue to Evolve

Ransomware, which is malware that encrypts a user’s data and demands a ransom payment to unlock it, is one of the most rapidly evolving cyber threats. Ransomware attacks continue to cost businesses billions, a trend that is expected to continue and attacks that ask for larger ransom amounts. This is a market, and incentive will drive innovations and evolution in an already rapidly changing and challenging arena of cat and mouse.  

  1. Blockchain Technology Will Be Used for More Security, Finally

Blockchain technology is often associated with cryptocurrencies like Bitcoin, but it can actually be used for so much more. Companies are already using blockchain to secure business data, improve cybersecurity, and protect user privacy. In 2022, many businesses will have moved their operations to the cloud – instead of having physical servers on-site – making protections from cyberattacks a priority. Blockchain technology can help to secure these cloud-based operations by creating a tamper-proof record of all transactions.  

  1. Employees Will Be a Major Source of Cybersecurity Threats

Employees are often the weakest link in a company’s cybersecurity defenses. They can be tricked into opening emails that contain malware, clicking on links that lead to phishing scams, and using unsecured Wi-Fi networks. In 2022, businesses will need to focus more on employee training and awareness to protect themselves from these types of attacks.   

As cyberattacks become more sophisticated, businesses will also look to AI, machine learning, and monitoring services to help them detect and respond to these insider-based threats.  

  1. Will the Password Become Obsolete?

Even though new technologies that can replace passwords are emerging, they won’t be very popular by 2022. These technologies include fingerprint scanners, eye scanners, and facial recognition. They are not very user-friendly and can be easily hacked.   

As a result, 2022 will still see the use of passwords for the foreseeable future. However, organizations should start to move away from using passwords and towards using two-factor authentication. Two-factor authentication is a more secure way of logging in that requires users to input a password as well as a randomly generated code that is sent to their mobile device. This will make it much more difficult for hackers to gain access to your account. It’s a step in the right direction as passwords are extremely fallible. 

  1. Governments Will Finally Realize How Much They’ve Lost Due to Lax Cybersecurity

State and regional governments have been slow to adopt new security measures because they have been underestimating the power of cybercrime. They think that their current policies are enough to protect them from attacks. But as more and more breaches happen, it becomes clear that this is not the case. In 2022, governments will finally realize how much they’ve lost due to lax cybersecurity and they will start to take action. They will allocate more resources to improving their security infrastructure and they will also work with businesses to ensure better protection of their data. 

  1. The use of AI for Cybersecurity Purposes Will Increase Exponentially

As mentioned earlier, the use of AI is going to increase exponentially in the next few years. This will be especially true for cybersecurity purposes. Cybersecurity companies will escalate the use of AI-based tools to detect and prevent cyberattacks. These tools will be able to analyze data at a much faster pace than humans and they will also be able to identify new threats that wouldn’t have been seen before. 

Looking forward to 2022, we must fully incorporate and reflect on the key cybersecurity events of the year behind us. There are valuable lessons, a bit of dirty laundry to clean still, and a challenge that should always be at the forefront of our operations. 


Check out this piece, originally published in Forbes, here and follow me on LinkedIn. 

Predicting What 2022 Holds for Cybersecurity

2021 was a fascinating and somewhat terrifying year for cybersecurity, as all our fears regarding cyber-threats have come true in one way or another.

2021 was also tricky, as many organizations have been slow to adapt to the new security climate. Predictions aside, complacency is not an option if you plan to survive and thrive in 2022. Rest assured, the future of cybersecurity is bright, but it will come with its own set of challenges. We look forward into the future because the sooner we can start adapting strategy, policies, and technologies, the better off everyone will be in the long run. Predictions can be both exciting and terrifying at the same time, so please put on your seat belt and helmets.  

The Cybersecurity Talent Drought Will Get Much Worse  

The cybersecurity talent shortage that affects the industry is only going to get worse. At one point in 2021, there were 500,000 unfilled cybersecurity jobs in the U.S. That’s a figure that is likely to increase due to the continued growth of ransomware, data breaches, and other cyberattacks.  

Faced with this challenge, businesses will find it increasingly difficult to protect their networks and data. Services and specific technology partnerships will continue help fill and protect that which is sacred, but further help may be on the way from an unlikely place: artificial intelligence (Al). Al has the potential to detect malware on networks before it is spotted by employees. Along with machine learning, these technologies can better analyze vast quantities of data more quickly than humans, detecting sneaky issues such as phishing attacks, privilege escalations, data exfiltration, and insider threats.  

Supply Chain Cyberattacks Will Be Commoditized  

In recent years, we have seen a significant increase in the number of cyberattacks targeting software supply chains. These attacks are particularly effective because they can take down an organization’s entire software supply chain and services, resulting in massive business disruptions.  

Unfortunately, we can expect these attacks to become even more common in 2022. Cybercriminals will realize that these supply chain attacks are an effective way to cause maximum disruption, and once inside the trusted gates, the hardest part of the hack job is already handled. These groups will commoditize these attacks as a result. We can expect this commoditization to lower the bar for entry by encouraging less­ skilled attackers to conduct software supply chain attacks.  

The Death and Rebirth of Cyber Insurance  

Faced with a costly environment of escalating risks, the cyber insurance industry has seen many challenges in the past year and the premiums for coverage have skyrocketed. Even though many businesses are required to carry cyber insurance, these conditions are leading to companies no longer purchasing extensive policies. This market squeeze will certainly affect the cyber insurance industry itself.  

We are going to see this happen, but we will also see a resurgence of cyber insurance as companies become more aware of the risks associated with data breaches and standardize on what it takes to attain coverage. Cyber-lnsurance without Comprehensive Security, will become a non-starter.  

Combined with a growing awareness of the risks associated with data breaches and cyber incidents, the market for cyber-insurance is starting to mature, and premiums will become prohibitively more expensive for companies that don’t have a sound security strategy.  

More Smart Devices, More Risk  

It’s inevitable -The Internet of Things is a continually growing trend that will bring about more cyberthreats. In 2022, we can expect to see even more cyberattacks due to the increased number of loT devices. The proliferation of these often minimally protected devices increases the threat vectors through everyday devices. Hackers can attack through many vulnerable devices such as security cameras, smart TVs and DVRs in your home or workplace.  

The Mirai Botnet was one such attack which took down several high-profile websites with a denial­ of-service (DDoS) attack. This botnet was made up of millions of hijacked loT devices and attackers will always be looking for the maximum bang for their hacking buck.  

Cyberattacks Will Cost Lives  

The world is no stranger to the amount of damage hackers can cause. We have seen attacks on hospitals, transportation systems and even schools leaving hospitals paralyzed, cities without electricity and students’ grades showing up as Fs. However, what many people have a hard time imagining are the effects of a hacker setting their sights on critical infrastructure like power plants or dams.  

Threats will become all too real when an upcoming attack results in disruption and death. It’s not a pretty picture, but the actions of world leaders have indicated that cybersecurity is the front line in a global cyberwar and casualties are just a logical hop away.  

SHTF Events Will Put Disaster Recovery into the Forefront Again  

Expect the unexpected. Seldom have three words carried so much weight. An improbable but all too real SHTF scenario is out there waiting in some company’s destiny, but it doesn’t have to go the way of painful recovery. You can’t plan for everything, but you should plan for anything.  

From cyber incidents to weather disruptions, to natural disasters of every type, major events will drive a resurging focus on enterprise disaster recovery (DR) in the year ahead. The cost of not thoroughly protecting these systems is higher than ever and the events experienced in the last year are the beginnings of a wake-up call for both businesses and governments around the world. The need to protect critical infrastructure and data is now at the forefront of every boardroom conversation and government policy.  

Machine Learning/Al Tools Continue Changing the Game for Cybersecurity  

Machine learning (ML) and artificial intelligence (Al) have already started to revolutionize cybersecurity, and their impact is only going to grow in 2022. These tools are making it possible for organizations to detect and respond to threats much more quickly and effectively than ever before. Security professionals can identify potential attacks more quickly than ever before with Al-powered dashboards. Meanwhile, machine learning tools can be used to detect ransomware in an image file before it’s opened on a computer.  

Cybersecurity teams will use ML and Al to automate the detection of attacks, understand the impact of a breach, and reduce fraud.  

More Cyber Criminals In the Slammer  

Law enforcement agencies have stepped up their efforts to catch cyber criminals. While the biggest headlines seem to show that the perpetrators are never caught, many successful investigations have been resulting in prosecution. This increased trend is going to continue as law enforcement officials become even better at identifying and apprehending cybercriminals. That’s good news for businesses and consumers alike, as cybercriminals will have a reduced ability to operate with impunity.  

Tables Will Turn: Cyber Crime Will Hit International Companies In China and Russia  

A recent major cybersecurity report found that four in five large international companies have been targeted by cybercrime in China and Russia. The sad part that 40% of companies that loose data or have a data breach, end up going out of business due to the cost and reputational damage. These companies have fallen victim to a wide variety of attacks, including malware, ransomware, and phishing.  

As it turns out, nobody is immune to cyber threats and you shouldn’t do business with criminals. Foreign nations have been dancing a perilous line of espionage and state-sponsorship of attacks on adversarial and strategic targets. The tables are going to turn on them at some point.  

Quantum Computing to Make a Debut  

This one has been building up for a while now, but this should finally be the year that quantum computing debuts in the cybersecurity world. We are talking about actual quantum computing, not the marketing type of quantum-like features.  

The breakthrough will be small at first but expect to see products that can take advantage of the peculiar properties of quantum mechanics to do things like factor large numbers very quickly or break current cryptography within a few years. This could also present a serious challenge to today’s security protocols and necessitate a wholesale rethinking of how we protect our data.  

Quite a Vear Ahead  

There’s a sense of foreboding in cybersecurity, especially when everything seems to be as safe as possible. Cybercriminals thrive on this false sense of security and subsequent complacency to do their worst. We must always be on guard, prepared for the worst. Cybercrime is rampant and the threats don’t discriminate. This year alone, four in five large international companies have been targeted by cybercriminals – meaning that nobody’s immune to the risk of a breach. Fortunately, there are ways we can protect ourselves against these risks: strong cybersecurity protections like firewalls, anti-virus software and intrusion detection systems; training for employees so they know how to avoid becoming victims themselves; and understanding what brings on data breaches. The best approach is to not only adopt a comprehensive security approach to every level of the IT stack, but also include all business processes in that approach.  

Happy Holidays – A Message from Ntirety CEO Emil Sayegh

To Our Partners, Customers, and Team Ntirety, 

 The holiday season is here, and I’d like to sincerely wish you all Happy Holidays, Merry Christmas, and a Happy New Year.  May your heart & home be filled with peace & joy this holiday season.  I hope you all have a successful and healthy 2022 ahead of you.    

 I want to also take a moment to reflect gratefully on the past year—all of this year’s achievements wouldn’t have been possible without the hard work of our employees and collaboration of our partners. What we accomplished this year is something truly special and everyone should be proud of their contribution to securing our customers and making the cyber-world a safer place. 

 It is in this spirit of joy and peace that I say thank you for such a good year and encourage us to all look ahead at the amazing opportunities in the New Year! Please celebrate this joyous time with your family and friends.   

 Have a wonderful and blessed holiday with peace, love, and blessings to you and your family in 2022! 

Happy Thanksgiving – A Message from Ntirety CEO Emil Sayegh

Thanksgiving has always been one of my favorite holidays. What is not to like? Good food, good time with family, cool weather, and college football. Also, there is no pressure associated with exchanging gifts. Although Black Friday is around the corner, I prefer to not partake in it, and I always let the glow that comes from the Thanksgiving Holiday permeate the whole weekend. 

Thanksgiving marks a time to show appreciation to all those that have helped us and made our lives a bit easier. While this holiday is traditionally celebrated in North America, the message of giving thanks and reflecting on the past year’s accomplishments is important in many more cultures around the world. It is always important to and take a step back to look at the joys in everyday life. First and foremost, I would like to thank the customers, partners, and employees of Ntirety for the amazing success we had in this past year despite the pandemic and all the turbulence that came with it. I personally am thankful for our partners and customers who have enabled us to continue to grow. Thanks to them, and our amazing team, we will only continue to reach new heights and remain as the premier Comprehensive Security Services provider. 

I hope that each of you get to spend the entire Thanksgiving weekend surrounded by family and friends, taking a well-deserved break. For our customers, partners, and members of the Ntirety team that are working this weekend, I am grateful for your dedication and drive. I extend a huge thanks to you for being there for all of us to enable us to take a break. During this Thanksgiving season, certainly thank your friends and family who are special to you, as well as others that may not be as close. Kindness and gratitude start one step at a time. Let’s spread the love and gratitude around.  

I am thankful for all of you!  

Happy Thanksgiving.

Thank You to Veterans Everywhere – A Remembrance Day and Veterans Day Message from Ntirety CEO Emil Sayegh

November 11 is Remembrance Day in Canada and Veterans Day in the U.S.  Please join me in thanking all veterans everywhere for their service—an act of generosity that we can never repay.  To all those who have served, I would like to humbly express my deepest gratitude for your service.

Every November 11th, we celebrate both Veterans Day and Remembrance Day and in the USA and Canada to commemorate the end of WW1 in 1918. On the 11th hour of the 11th day of the 11th month, in 1918, the brutal fighting stopped in the First World War, but not after 15 Million people died in that brutal war, 6 million of them being Allied soldiers.   That day is known as Armistice Day, and still celebrated by all the Ally nations that fought and won the first World War. On November 11, 1919, Armistice Day was commemorated for the first time in the U.S. with President Wilson proclaiming that the day should be “filled with solemn pride in the heroism of those who died in the country’s service and with gratitude for the victory.” A similar action was taken by the Canadian Parliament sometime later.  Although the U.S. and Canada fought on the winning side, celebration of victory was replaced by solemn commemoration, and a sense that the countries owed a collective national debt to the ordinary soldiers who had lost their lives in battle.  Therefore, now every November 11th, we celebrate both Veterans Day and Remembrance Day and in the USA and Canada respectfully.


A special thanks to all of our partners, customers, and employees who are veterans, and to all veterans in both the U.S. and Canada who have sacrificed so much.  We honor you today, and every day.


Have a blessed day.