Quantcast
Channel: Webroot Blog
Browsing all 1150 articles
Browse latest View live

Why MSPs Should Expect No-Conflict Endpoint Security

Reading Time: ~ 3 min. “Antivirus programs use techniques to stop viruses that are very “virus-like” in and of themselves, and in most cases if you try to run two antivirus programs, or full security...

View Article


Cyber News Rundown: Data Dash

Reading Time: ~ 2 min. DoorDash Data Breach Nearly five months after a breach, DoorDash has just now discovered that unauthorized access to sensitive customer information has taken place. Among the...

View Article


5 Key Benchmarks for Choosing Efficient Endpoint Security

Reading Time: ~ 3 min. First and foremost, endpoint protection must be effective. Short of that, MSPs won’t succeed in protecting their clients and, more than likely, won’t remain in business for very...

View Article

Online Gaming Risks and Kids: What to Know and How to Protect Them

Reading Time: ~ 4 min. Online games aren’t new. Consumers have been playing them since as early as 1960. However, the market is evolving—games that used to require the computing power of dedicated...

View Article

Cyber News Rundown: E-Scooters Vulnerable

Reading Time: ~ 2 min. E-Scooter Security Vulnerability A security researcher recently found an API vulnerability within the software of Voi e-scooters that allowed him to add over $100,000 in ride...

View Article


Cookies, Pixels, and Other Ways Advertisers are Tracking You Online

Reading Time: ~ 3 min. In May of 2018, the General Data Protection Regulation (GDPR) came into effect in the EU. Seemingly overnight, websites everywhere started throwing pop-ups to inform us about...

View Article

Cyber News Rundown: Cryptomining WAV Files

Reading Time: ~ 2 min. Cryptominers Found in Audio Files Researchers have recently found that both cryptominers and backdoors are being deployed within WAV audio files on targeted systems. Using...

View Article

Securing Your Business First: Learn How ADR Can Help

Reading Time: ~ 3 min. Entrepreneur Jim Rohn once said, “Time is more valuable than money. You can get more money, but you cannot get more time.” I think anyone involved in running a business can...

View Article


Why Healthcare Organizations are Easy Targets for Cybercrime

Reading Time: ~ 3 min. Certain types of cybercrime targets always make headlines. In this two-part series, we’ll get into a pretty serious one: your health, and why hackers are targeting the healthcare...

View Article


Cyber News Rundown: MedusaLocker Ransomware

Reading Time: ~ 2 min. MedusaLocker Ransomware Spotted Worldwide While it’s still unclear how MedusaLocker is spreading, the victims have been confirmed around the world in just the last month. By...

View Article

Healthcare Cyber Threats That Should Keep You up at Night

Reading Time: ~ 4 min. In my previous blog post, Why Healthcare Organizations are Easy Targets for Cybercrime, I discussed various reasons that hospitals and healthcare organizations make desirable and...

View Article

The Truth about Phishing & the Psychology of Why We Click

Reading Time: ~ 5 min. “Phishing” may have been a relatively obscure term, but pretty much everyone has heard of it by now. In fact, recent statistics indicate a high likelihood that you—or someone you...

View Article

Cyber News Rundown: Bed, Bath, & Beyond Data Breach

Reading Time: ~ 2 min. Bed, Bath, & Beyond Data Breach An official announcement made earlier this week acknowledged illicit access to customer data used in online accounts for Bed, Bath, &...

View Article


Cyber News Rundown: Nikkei BEC Scam

Reading Time: ~ 2 min. BEC Scam Takes Millions from Nikkei America Officials for Nikkei are working to identify the perpetrators of a recent business email compromise (BEC) scam that took roughly $29...

View Article

Shoring Up Your Network and Security Policies: Least Privilege Models

Reading Time: ~ 3 min. Why do so many businesses allow unfettered access to their networks? You’d be shocked by how often it happens. The truth is: your employees don’t need unrestricted access to all...

View Article


Cyber News Rundown: Orvis Password Leak

Reading Time: ~ 2 min. Orvis Internal Credentials Leaked A database containing login credentials for numerous internal systems belonging to Orvis, one of America’s oldest retailers, was found to be...

View Article

5 Tips for Feeling Your Best in Your Home Office

Reading Time: ~ 4 min. With major advancements in communication technology, many employees and entrepreneurs are opting to work from home at least some of the time. In fact, according to CNBC, 70...

View Article


Cyber News Rundown: Shade Ransomware Most Distributed Variant

Reading Time: ~ 2 min. Shade Ransomware Takes Crown as Most Distributed Variant Over the course of 2019, one ransomware variant, known as Shade, has taken over 50 percent of market share for ransomware...

View Article

Simplified Two-factor Authentication for Webroot

Reading Time: ~ 1 min. Webroot has evolved its secure login offering from a secondary security code to a full two-factor authentication (2FA) solution for both business and home users. Webroot’s 2FA...

View Article

What You Need to Know about Cyberbullying

Reading Time: ~ 2 min. Have you noticed a decrease in your child’s happiness or an increase in their anxiety? Cyberbullying might be the cause to these behavioral changes. Bullying is no longer...

View Article
Browsing all 1150 articles
Browse latest View live