Ransomware Series: Video 2
The Rise of Ransomware Ransomware attacks dominate news coverage of the cybersecurity industry. And it’s no wonder – with million-dollar payouts, infrastructure attacks and international manhunts,...
View ArticleSurvey: How well do IT pros know AI and machine learning?
What do the terms artificial intelligence and machine learning mean to you? If what comes to mind initially involves robot butlers or rogue computer programs, you’re not alone. Even IT pros at large...
View ArticleNIST and No-notice: Finding the Goldilocks zone for phishing simulation...
Earlier this year, the National Institute for Standards and Technology (NIST) published updated recommendations for phishing simulations in security awareness training programs. We discussed it on our...
View ArticleResilience lies with security: Securing remote access for your business
Remote access has helped us become more interconnected than ever before. In the United States alone, two months into the pandemic, approximately 35% of the workforce was teleworking. The growth of...
View Article3 reasons even Chromebook™ devices benefit from added security
Google Chromebook devices could rightly be called a game-changer for education. These low-cost laptops are within financial reach for far more families than their more expensive competitors, a fact...
View ArticleRansom hits main street
Cybercriminals have made headlines by forcing Fortune 500 companies to pay million-dollar ransom payments to retrieve their data and unlock their systems. But despite the headlines, most ransomware...
View ArticleShining a light on the dark web
Discover how cybercriminals find their targets on the dark web: For the average internet user, the dark web is something you only hear about in news broadcasts talking about the latest cyberattacks....
View ArticleMaking the case for MDR: An ally in an unfriendly landscape
Vulnerability reigns supreme On Oct. 26, we co-hosted a live virtual event, Blackpoint ReCON, with partner Blackpoint Cyber. The event brought together industry experts and IT professionals to discuss...
View Article‘Tis the season for protecting your devices with Webroot antivirus
As the holiday season draws near, shoppers are eagerly searching for gifts online. Unfortunately, this time of year brings as much cybercrime as it does holiday cheer. Especially during the holidays,...
View ArticleMSP to MSSP: Mature your security stack
Managed service providers (MSPs) deliver critical operational support for businesses around the world. As third-party providers of remote management, MSPs are typically contracted by small and...
View ArticleSeason’s cheatings: Online scams against the elderly to watch out for
Each year, as online shopping ramps up in the weeks before the holidays, so do online scams targeting the elderly. This season – in many ways unprecedented – is no different in this regard. In fact,...
View Article2022: The threat landscape is paved with faster and more complex attacks with...
2020 may have been the year of establishing remote connectivity and addressing the cybersecurity skills gap, but 2021 presented security experts, government officials and businesses with a series of...
View ArticleSecurity awareness training: An educational asset you can’t be without
The onset of COVID-19 accelerated growth of the digital nomad. No longer just for bloggers and influencers, the global workforce is increasingly becoming more highly connected and widely dispersed. As...
View ArticleData Privacy Week 2022: The Security Awareness Canary in the Coalmine
Whether you’re shopping for the latest tech gadgets or checking your work email, your online presence is susceptible to malicious threats. No industry or sector is immune. Even in the early days of...
View ArticleThe Benefits of Using a VPN on Your Home Network
If you’ve considered using a virtual private network (VPN) at all, it’s likely to establish a secure connection while working remotely or to connect to public networks. But privacy enthusiasts...
View ArticleReport: Phishing Attacks Sustain Historic Highs
Phishing attacks sustain historic highs In their latest report, IDG and the pros behind Carbonite + Webroot spoke with 300 global IT professionals to learn the current state of phishing. We learned...
View ArticleThreating hunting: Your best defense against unknown threats
Threat actors are becoming more sophisticated, agile and relentless in their pursuit of stealing personal information for financial gain. Rapid and evolving shifts in the threat landscape require the...
View Article3 Reasons We Forget Small & Midsized Businesses are Major Targets for Ransomware
The ransomware attacks that make headlines and steer conversations among cybersecurity professionals usually involve major ransoms, huge corporations and notorious hacking groups. Kia Motors,...
View ArticleConsidering cloning? Combat data bloat with file transfers instead.
If you own a computer that seems to have slowed to a crawl, you may be thinking about replacing it. But what about all the files on your old dinosaur? You may be thinking about transferring them to an...
View ArticleSocial engineering: Cybercrime meets human hacking
According to the latest ISACA State of Security 2021 report, social engineering is the leading cause of compromises experienced by organizations. Findings from the Verizon 2021 Data Breach...
View Article