Does a SIEM make sense for my MSP?
Every device on an MSP’s managed network provides insight into what’s happening on that network. This includes network routers, switches, printers, wireless devices to servers, endpoints, IoT devices...
View ArticleCyber News Rundown: Phishing Targets NHS Regulatory Commission
Spanish labor agency suffers ransomware attack Multiple systems were taken offline following a ransomware attack on the Spanish government labor agency SEPE, which has affected all 700 of their...
View ArticleIt’s Too Late for Threat Intelligence Vendors to Ignore IPv6
IPv6 has been a long time coming. Drafted by the Internet Engineering Task Force (ITEF) in 1998, it became an Internet Standard in 2017. Though the rollout of IPv6 addresses has proceeded at a glacial...
View ArticleWhy MSPs Need to Shift from Cybersecurity to Cyber Resilience
If your critical systems, website or customer data were suddenly inaccessible due to a cyberattack, how soon would you be able to get back up and running? That’s a question that should be on every...
View ArticleA Defense-in-Depth Approach Could Stop the Next Big Hack in its Tracks
Last year’s SolarWinds attack and its aftermath have provided numerous lessons concerning the dangers of IT supply chain attacks. Not all apply to every small and medium-sized business—most are...
View ArticleThis World Backup Day, Our Customers Do the Talking
“I solemnly swear to back up my important documents and precious memories on March 31st.” Are you taking the pledge this World Backup Day? Now in its tenth year, World Backup Day remains one of our...
View ArticleIs the Value of Bitcoin Tied to Ransomware Rates?
With investors currently bullish on Bitcoin, is its high value is driving cybercriminals to pursue crypto-generating forms of cybercrime like ransomware and illicit miners? At time of writing, the...
View ArticleWhy SMBs are Under Attack by Ransomware
Ransomware attacks generate big headlines when the targets are government entities, universities and healthcare organizations. But there’s one increasingly frequent target of ransomware attacks that...
View ArticleWe Finally Got Businesses to Talk About Their Run-ins With Ransomware. Here’s...
“It is a nightmare. Do all you can to prevent ransomware.” – A survey respondent Many businesses are hesitant to talk about their experiences with ransomware. It can be uncomfortable to cop being hit....
View ArticleWhat Real Security and Compliance Look like when Managing 5000+ Endpoints
In the United States, there are approximately 350,000 companies contracting for the Department of Defense. Each of these companies have to meet varying degrees of compliance and are now subject to the...
View ArticleWhat is Pen Testing and Should You Have a Company that Performs them on...
Pen testing is the art of attempting to breach an organization’s network, computers and systems to identify possible means of bypassing their defenses. It’s an “art” because there is no...
View ArticleHuman-centered Design in the New Webroot Management Console
At Webroot, we could go on and on about user experience (UX) design. The study of the way we interact with the tools we use has spawned entire industries, university programs and professions. A Google...
View ArticleRansomware, BEC and Phishing Still Top Concerns, per 2021 Threat Report
Although cybercriminal activity throughout 2020 was as innovative as ever, some of the most noteworthy threat activity we saw came from the old familiar players, namely ransomware, business email...
View ArticleHow Cryptocurrency and Cybercrime Trends Influence One Another
Typically, when cryptocurrency values change, one would expect to see changes in crypto-related cybercrime. In particular, trends in Bitcoin values tend to be the bellwether you can use to predict how...
View ArticleBuilding a Successful Customer Advocacy Program (Hint: It’s Not How You Think)
What’s better for getting your business’ name out there and boosting sales than having a killer business marketing plan with well-placed ads, zippy copy, and a slick design? The answer is: having a...
View ArticleWe explored the dangers of pirated sport streams so you don’t have to
Manchester City win the Carabao Cup Final, many illegal streamers lose The COVID pandemic has led to a surge in content consumption as people stayed home and turned to Netflix, Youtube and other...
View ArticleTargeted assets: The need for cyber resilient infrastructure
Aging infrastructure in the United States is not confined to crumbling roads and bridges. Recent events have shown that connected devices in our pipelines, water treatment facilities and power grids...
View ArticleHow MSPs can use Webroot Cyber Resilience Solutions to Get their Time Back
Although they didn’t always call themselves a managed service provider, that’s exactly what T-Consulting has been since its inception. According to Vera Tucci, founder and CEO of the Italy-based MSP,...
View ArticleAnother NFT explainer, with a bonus look at the data security implications
“What Bitcoin was to 2011, NFTs are to 2021.” That’s a claim from the highly respected “techno-geek” bible Ars Technica in it’s wonderful explainer on NFTs, or non-fungible tokens. Since...
View Article5 Tips to get Better Efficacy out of Your IT Security Stack
If you’re an admin, service provider, security executive, or are otherwise affiliated with the world of IT solutions, then you know that one of the biggest challenges to overcome is efficacy....
View Article