Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
Cybersecurity Basics: A Chat With Syncro
Published:
October 25, 2022

Cybersecurity Basics: A Chat With Syncro

By:
Team Huntress
Share icon
Glitch effectGlitch effectGlitch effect

It’s unpleasant but true—all businesses, no matter their size, are susceptible to the same kinds of cybersecurity threats that we see hitting enterprise organizations.

Cybersecurity for small to mid-sized businesses (SMBs) can be a confusing space, which is why we recently sat down with Ian Alexander of Syncro to clear the air and talk shop about all things cybersecurity for SMBs. We also learned what managed service providers (MSPs) can do to protect themselves and their clients now and in the future. 

You can catch that webinar here, but for all our reading junkies, here’s a taste of what went down during this lively chat between Huntress’s Henry Washburn and Syncro’s Ian Alexander.

Breaking Down Cybersecurity Terminology

EDR, XDR, MDP…with all the three-letter acronyms floating around, which ones really matter and which actually mean something? 

When it comes to explaining these terms, Henry likes to look at them in a Venn-diagram-esque manner, starting with AV and NGAV. 

AV is the acronym for antivirus, and Henry says in its most basic form, AV can identify a known good and a known bad. That worked 15 years ago, but it made the fundamental mistake of assuming you’ll never be compromised.

You have to assume compromise; your walls can only be so thick. Inevitably, somebody will do something and get in.

This brings us to NGAV and EDR, which are essentially the same thing. NGAV is next-generation antivirus and EDR is the acronym for endpoint detection and response. So, EDR is Next Generation Antivirus, also referred to as NGAV. 

Then there's XDR, extended endpoint detection. XDR essentially adds layers to your existing EDR. Henry said this is where it gets muddy because he's seen EDR offered as XDR and XDR offered as XDR+. 

Makes total sense, right? (Just kidding.)

This led Ian and Henry to discuss which tools MSPs should have in their security stack and how to use the ones they already have.

Cybersecurity Stacks for MSPs

While there are certainly base-level tools all MSPs should have in their security stack, it really depends on the needs of each individual MSP. 

Henry shared how he tends to place more focus on addressing the cybersecurity framework (in this case, the NIST framework). NIST is comprised of five pillars: identify, protect, detect, respond and recover. He recommends following this framework over adding a bunch of tools you don't necessarily need or use. 

This way, MSPs can identify how the tools they already have can be used to fulfill the framework without additional tool creep. Henry pointed out that this also allows you to see in some cases that, yes, you may need an additional tool to answer some of these questions, but also how you can work with what you have. 

As an MSP, to make sure you're providing a tuned offering is to understand how the tools you already use allow you to answer some of those requirements under identify, protect, detect, respond and recover.

Henry explained that as you work through the NIST framework, it becomes less tool-based and more people-based. So, while having an EDR is important, watching and understanding what is being delivered is equally important. 

If you don't know how to use a tool, or what’s being delivered, what's the point of even having the tool in the first place?

Check out the entire webinar to hear Henry’s other recommendations for MSPs.

Key Takeaways

In Henry's eyes, it all boils down to two things:

  • Maintain an incident response plan
  • Make sure someone is watching and understanding alerts.

Henry offered some insight into the basics MSPs need to get up and running with an incident response: protect your logs, make and check your backups and make sure you're involving the right people in these conversations. He also explained that testing is one of the best things to do because you can go back in and assess the gaps. 

We also talked about practical incident response planning in another Huntress webinar. We’ll leave that here for those who are interested.

Ian and Henry wrapped up the webinar with a pretty juicy question about what vendors should be doing when reporting on detections and breaches. So, make sure to go check out the full webinar to hear Henry’s candid answer about what he believes cybersecurity vendors could do better when reporting on incidents!

Categories
Business Growth
Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

See Huntress in action

Our platform combines a suite of powerful managed detection and response tools for endpoints and Microsoft 365 identities, science-backed security awareness training, and the expertise of our 24/7 Security Operations Center (SOC).

Book a Demo
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • 3 Hot Takes and Tips for Cybersecurity Awareness Month 2023

    In the spirit of Cybersecurity Awareness Month, use these cybersecurity tips to take your security hygiene and cyber knowledge up a notch.
  • What Should A Modern Cybersecurity Stack Look Like?

    In this blog, we dive into the critical layers that make up a solid cybersecurity stack and provide tips for getting buy-in from decision makers.
  • Breaking Down the NIST Cybersecurity Framework

    A comprehensive guide to the NIST cybersecurity framework, its five main functions and how you can use the NIST framework to improve your cybersecurity posture.
  • Balancing the Scales of Cybersecurity and Insurance

    As the importance of cybersecurity insurance grows, we examine how insurance policies have influenced cybersecurity stacks and visa versa.
  • Recap: Navigating the NIST Cybersecurity Framework

    If you follow the NIST cybersecurity framework, you'll ensure that your money is spent on the right areas to build an effective defense strategy.
  • How Huntress Can Complement – Not Complicate – Your Security Stack

    Learn why Huntress is built to complement—not complicate—our partners’ daily operations and deliver on our mission to secure the 99%.
  • Cybersecurity Insurance Perspective on Ransomware

    Explore the impact of ransomware on cybersecurity insurance. Learn how insurance providers are adapting and what organizations need to know to stay protected.
  • Hot Takes and Cyber Predictions for 2022

    What cybersecurity trends will we see in this new year? In this blog, we share some hot takes and predictions for 2022.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy