Data Protection October 2, 2018 SMB Security Best Practices: Why Smaller Businesses Face Bigger Risks 4 min read - While massive data breaches typically hog all the cybersecurity headlines, SMB security is also at risk as cybercriminals go after easy targets with low IT budgets.
Endpoint September 25, 2018 Which Mobile Threats Do You Need to Prepare For? 2 min read - As the workforce has embraced digital transformation, the volume and frequency of mobile threats has skyrocketed. Which threats should your organization be worried about?
Endpoint September 19, 2018 How to Drive ROI and Improve Endpoint Security as a Managed Security Services Provider 2 min read - As an IT managed service provider (MSP), you can help clients save money by providing a high-value endpoint security service that closes the visibility gap.
Fraud Protection August 9, 2018 What Are the Seven Biggest Social Media Scams of 2018? 5 min read - Social media scams are an ever-evolving way for criminals to abuse the exponentially connected applications that are increasingly saturating users' everyday lives.
August 9, 2018 Fileless Malware CactusTorch Executes Harmful .NET Assemblies From Memory 2 min read - Security researchers observed CactusTorch, a fileless malware, using a .NET executable to run harmful .NET assemblies from memory.
Endpoint July 27, 2018 Managing Enterprise Security Risk on Vacation 3 min read - Enterprise data and devices require additional safeguarding wherever your employee takes them — especially on vacation. Some basic user education can greatly reduce security risk.
Advanced Threats July 17, 2018 Move Over, Ransomware: Why Cybercriminals Are Shifting Their Focus to Cryptojacking 4 min read - Instead of seeking financial gains with ransom demands, threat actors are now aiming to steal central processing unit (CPU) and graphics processing unit (GPU) resources to facilitate cryptojacking.
July 9, 2018 Does the Rise of Crypto-Mining Malware Mean the End of Ransomware? 3 min read - Despite an overall shift away from traditional ransomware in favor of crypto-mining malware, research shows that ransomware is still alive and well in the form of highly targeted attacks.
Artificial Intelligence June 29, 2018 The Cybercrime Landscape Is Evolving — Will Your Mobile Threat Defense Strategy Keep Up? 2 min read - As the workforce embraces mobility to increase productivity, organizations must adopt a more innovative, dynamic approach to mobile threat defense.
Endpoint June 25, 2018 It’s Time to Infuse AI Into Your Endpoint Security Strategy 3 min read - As the threat landscape evolves to target connected devices, artificial intelligence (AI) and machine learning will become increasingly crucial parts of any organization's endpoint security strategy.