We're reaching out this month with a simple but important message: let's connect. Our business is built on relationships, and in the world of cybersecurity, a strong partnership is the ultimate defense. When we reach out, it’s not to sell—it’s to advise. We believe an informed and aware client is a secure client.
As threats evolve, so do we. We wanted to make you aware that we see things on our end that may require a conversation. Even when a threat is contained, we believe awareness is a critical part of learning and resilience.
✓ Your engagement with us is key to the success of our partnership. Please take note when we send you an email - it's for a good reason and in your best interest.
Investing in Your Protection
To that end, we have invested considerably in enhancing our platform to protect you. Our new TDS Vx service includes enhanced monitoring and management of all your services, giving us deeper insight into your digital environment.
For example, our commitment to bringing you the best protection includes two more recent updates:
- Conditional Access Functionality: Our Device Protection solution, powered by WithSecure, can now block sign-ins from unmanaged devices or suspicious locations, adding a powerful layer of security for your accounts.
- Behavior-Based Detections: We can now spot suspicious activity by analyzing user behavior patterns driven by telemetry, allowing us to catch threats that traditional methods might miss.
- Increased Monitoring and Reporting: We are all about being proactive and preemptive, it's core to our approach. So, we're spending more time on monitoring the activity we see and embedding AI across our platform for analysis and reporting.
The Current Threat Landscape: Why This Matters Now
These enhancements are not just abstract features; they are direct responses to a rapidly changing threat landscape.
What We're Seeing in Real Time:
- Iran-based cyber operations have surged dramatically since Q1 2025, with attackers targeting high-net-worth individuals, family offices, and professional services firms. These aren't random attacks; they're calculated campaigns against high-value targets with liquid assets and complicated lives.
- We are also seeing a rise in Trojan-based threats. Recently, our systems have been detecting and trashing Trojan.TR/Crypt.XPACK variants found in email attachments. These Trojans are designed to steal sensitive data like passwords and banking details or to download further malware like ransomware. While our systems are neutralizing these threats, their presence underscores the sophisticated nature of attacks on the 'private client' sector in the U.S.
- The threat matrix extends beyond traditional cybercrime. AI-powered attack vectors are increasing parabolically, and quantum computing threats are on the horizon. We're operating in an environment where yesterday's security protocols become tomorrow's vulnerabilities.
Now more than ever, a personal attack can escalate into six-figure fallout. With AI-powered attacks launching every 39 seconds, proactive defense is essential. Our ControlOne CBR appliance (and the agent for mobile) is a key part of this defense, utilizing Secure Access Service Edge (SASE) technology to block threats before they ever reach your devices. This advanced cloud gateway technology is something we uniquely and proudly make available to our private clients for their homes and offices.
✓ Are you using the ControlOne solution, appliance and/or the agent? Do you have questions about how it works? If you are not familiar with it, contact us so you know how and why the zero-trust "private internet" approach is so effective today.