Logically logo
THREAT FACTOR - A Cybersecurity Mystery

Can You Solve the Mystery?

A $5 million ransom. Stolen customer data. Hacked POS devices. What caused
the breach at Shutter Pro? Hear each team member’s story in the CTO’s high-stakes investigation and see if you can decipher how the threat actor got in.
EPISODE 1: "Quite Possibly the World Day of My Life" | Available Now!
EPISODE 2: "The Price of Urgency" | Launches Aug 15
EPISODE 3: "The Rush to Publish" | NOW LIVE
EPISODE 4: "A Jetlagged Security Slip" | NOW LIVE
EPISODE 5: "One Store's Point-of-Peril" | Launches Sept 17
EPISODE 6: "IT's Surprise Security Struggle" | Live Now
THE BIG REVEAL  |  AVAILABLE NOW

Shutter Pro Hacker
Exposes His Tactics

The Shutter Pro IT team uncovered a dark web post from the hacker detailing exactly how he took down their company. Read his firsthand account and learn how to avoid a similar fate.
FIND OUT

Don’t Let It Happen to You

Want to learn how to protect your organization from Shutter Pro’s fate? Logically experts break down each episode and share strategies for stronger resilience.
VIEW WEBINAR