Category: Webroot Blog

Nastiest Malware 2024

Steam the Webinar on demand HERE As we look back on the cybersecurity landscape of 2024, it’s clear that the world of digital threats continues to evolve at an alarming pace in parallel with AI. This year has seen ransomware groups adapt…

10 steps to safeguarding your privacy online

The more devices, digital apps and online accounts you use, the more efficient and convenient your life becomes. But all that ease of use comes with a price. Your devices are constantly collecting your personal data to fine-tune your user…

8 Tips to protect your devices from malware attacks

Unfortunately, when your devices are infected with a virus, it’s not as easy as a little bed rest for them to recover, and the damage can be long-lasting. A cyberattack can compromise your computers, phones and tablets, and open the…

The state of generative AI in 2024

As generative AI usage becomes more widespread, two-thirds of respondents expressed concern about AI systems collecting their data. The post The state of generative AI in 2024 appeared first on Webroot Blog. This article has been indexed from Webroot Blog…

AI and deepfakes: How to be AI-savvy

From the apps on our smartphones to chatbot assistant services, artificial intelligence (AI) is transforming our lives in both big and small ways. But as exciting as AI can be, it’s also important to understand its potential risks. October is…

What you need to know: The biggest cyber threats in 2024

In today’s world, both small businesses and everyday consumers face a growing number of cyber threats. From ransomware attacks to phishing scams, hackers are becoming more sophisticated. OpenText’s 2024 Threat Hunter Perspective sheds light on what’s coming next and how…

Announcing new EDR capabilities for Webroot Endpoint Protection

Introducing key EDR functionality In today’s rapidly evolving cyber landscape, staying ahead of threats requires not just robust defenses, but also smart, efficient tools that empower defenders without overburdening them. Webroot™ by OpenText™ recognizes the vital role that endpoint detection…

AI in Education: Balancing Innovation with Security

Artificial intelligence (AI) and chatbots like ChatGPT are transforming the way educators and students approach education. It’s not just college students leveraging AI to get ahead; high school and even grade school students are using AI resources for their projects…

7 Tips on Keeping Your Data Private When Using AI

In recognition of its profound impact, July 16 is celebrated as Artificial Intelligence (AI) Appreciation Day. AI is one of the defining technologies of our era, and its adoption is skyrocketing. People are using AI tools like OpenAI’s ChatGPT and…

Key Insights from the OpenText 2024 Threat Perspective

As we navigate through 2024, the cyber threat landscape continues to evolve, bringing new challenges for both businesses and individual consumers. The latest OpenText Threat Report provides insight into these changes, offering vital insights that help us prepare and protect…

5 ways to strengthen healthcare cybersecurity

Ransomware attacks are targeting healthcare organizations more frequently. The number of costly cyberattacks on US hospitals has doubled. So how do you prevent these attacks? Keep reading to learn five ways you can strengthen security at your organization. But first,…

The Marvels and Challenges of AI

Let’s delve into the fascinating world of Artificial intelligence (AI), unpacking its concepts, implications, and real-world applications. Brace yourself for an extended journey through the marvels and challenges of artificial intelligence. Part 1: Unleashing marvels in our digital lives Generative…

7 Cyber Safety Tips to Outsmart Scammers

Welcome to the wild west of the digital world where cyber scammers lurk around every pixelated corner. Cybercrime isn’t just a futuristic Hollywood plotline, it’s a real threat that targets everyone—from wide-eyed kids to seasoned adults and wise grandparents. And…

Tax Season Alert: Common scams and cracked software

OpenText is committed to providing you with the latest intelligence and tips to safeguard your digital life, especially during high-risk periods like tax season. Our threat analysts are constantly monitor the ebb and flow of various threats. One trend that…

Uncover the nastiest malware of 2023

Our annual analysis of the most notorious malware has arrived. As always, it covers the trends, malware groups, and tips for how to protect yourself and your organization. This post covers highlights of our analysis, including the rise of ransomware…

How Easy is Email Encryption? You’d Be Surprised.

When it comes to keeping sensitive data safe, email encryption is a necessity. But it doesn’t have to be a necessary evil. Too many employees and IT experts have experienced the pain of trying to use a needlessly complicated email…

Educating girls on how to be their own cyber hero

No matter how old you are, it is important to learn how to stay safe online! According to a study conducted by Learning Innovation, more than 93% of students have access to smartphones and laptops. Cyber threats show no sign…

The 5 most important rules for online shopping

The end of year holidays mark the busiest time of the year for online shoppers. We’re all rushing around trying to find the right gift that doesn’t break the budget. Throw in family time and stress can get out of…

How to stop social engineering tactics

With social engineering now the #1 cause of cyberattacks, it’s imperative for you to learn how to stop social engineering attacks against your business. Your first step in stopping them is to learn what they are and how they work.…

Can your business stop social engineering attacks?

Social engineering attacks like phishing, baiting and scareware have skyrocketed to take the top spot as the #1 cause of cybersecurity breaches. So what makes social engineering so effective? When cybercriminals use social engineering tactics, they prey on our natural…

Cyber threats in gaming—and 3 tips for staying safe

This article has been indexed from Webroot Blog The popularity of online gaming surged during the COVID-19 pandemic—and so did cyberattacks against gamers. If you’re the parent of a gamer, or if you’re a gamer yourself, it’s important to learn…

Social engineering: Cybercrime meets human hacking

This article has been indexed from Webroot Blog According to the latest ISACA State of Security 2021 report, social engineering is the leading cause of compromises experienced by organizations. Findings from the Verizon 2021 Data Breach Investigations Report also point…

Threating hunting: Your best defense against unknown threats

This article has been indexed from Webroot Blog Threat actors are becoming more sophisticated, agile and relentless in their pursuit of stealing personal information for financial gain. Rapid and evolving shifts in the threat landscape require the knowledge and solutions…

Report: Phishing Attacks Sustain Historic Highs

This article has been indexed from Webroot Blog Phishing attacks sustain historic highs In their latest report, IDG and the pros behind Carbonite + Webroot spoke with 300 global IT professionals to learn the current state of phishing. We learned…

The Benefits of Using a VPN on Your Home Network

This article has been indexed from Webroot Blog If you’ve considered using a virtual private network (VPN) at all, it’s likely to establish a secure connection while working remotely or to connect to public networks. But privacy enthusiasts appreciate the…

Pro tips for backing up large datasets

This article has been indexed from Webroot Blog Successfully recovering from disruption or disaster is one of an IT administrator’s most critical duties. Whether it’s restoring servers or rescuing lost data, failure to complete a successful recovery can spell doom…

MSP to MSSP: Mature your security stack

This article has been indexed from Webroot Blog Managed service providers (MSPs) deliver critical operational support for businesses around the world. As third-party providers of remote management, MSPs are typically contracted by small and medium-sized businesses (SMBs), government agencies and…

Making the case for MDR: An ally in an unfriendly landscape

This article has been indexed from Webroot Blog Vulnerability reigns supreme On Oct. 26, we co-hosted a live virtual event, Blackpoint ReCON, with partner Blackpoint Cyber. The event brought together industry experts and IT professionals to discuss how security professionals…

Shining a light on the dark web

This article has been indexed from Webroot Blog Discover how cybercriminals find their targets on the dark web: For the average internet user, the dark web is something you only hear about in news broadcasts talking about the latest cyberattacks.…

Shining a light on the dark web

This article has been indexed from Webroot Blog Discover how cybercriminals find their targets on the dark web: For the average internet user, the dark web is something you only hear about in news broadcasts talking about the latest cyberattacks.…

Ransom hits main street

This article has been indexed from Webroot Blog Cybercriminals have made headlines by forcing Fortune 500 companies to pay million-dollar ransom payments to retrieve their data and unlock their systems. But despite the headlines, most ransomware targets families as well…

The Rise of Ransomware

This article has been indexed from Webroot Blog Ransomware attacks dominate news coverage of the cybersecurity industry. And it’s no wonder – with million-dollar payouts, infrastructure attacks and international manhunts, ransomware makes for exciting headlines. But its recent domination of…

Ransomware Series: Video 2

This article has been indexed from Webroot Blog The Rise of Ransomware Ransomware attacks dominate news coverage of the cybersecurity industry. And it’s no wonder – with million-dollar payouts, infrastructure attacks and international manhunts, ransomware makes for exciting headlines. But…

The 6 Nastiest Malware of 2021

This article has been indexed from Webroot Blog Malware leaps from the darkness to envelop our lives in a cloak of stolen information, lost data and worse. But to know your enemy is to defeat your enemy. So we peered…

What a difference a year makes, or does it?

This article has been indexed from Webroot Blog 2020 was a year of immense change. One thing is for certain – the world collectively witnessed the increase of digital interconnectivity. We began even more to rely on the internet as…

Supply chain attacks are closing in on MSPs

This article has been indexed from Webroot Blog If you attended Black Hat this year, you couldn’t avoid the topic of supply chain attacks. From keynotes to vendor messaging to booth presentations, they were a ubiquitous topic in Las Vegas…

Podcast: How to build a cyber resilient business

This article has been indexed from Webroot Blog Cyber resilience refers to a business’s ability to mitigate damage to its systems, processes and even its reputation. It’s based on the principle that, in the real (and really connected) world, adverse…

Podcast: Can we fix IoT security?

This article has been indexed from Webroot Blog For many U.S. workers the switch to remote work is a permanent one. That means more high-stakes work is being conducted on self-configured home networks. For others, home networks are simply hosting…

Your password is too predictable

This article has been indexed from Webroot Blog Password predictability is one of the most significant challenges to overall online security. Well aware of this trend, hackers often seek to exploit what they assume are the weak passwords of the…

Oh no! A client failed a pen test. Now what?

This article has been indexed from Webroot Blog In a previous post, we talked a bit about what pen testing is and how to use the organizations that provide them to your benefit. But, what about when one of them…

An Inside Look at Cybercrime-as-a-Service

This article has been indexed from Webroot Blog You’ve likely heard of software-as-a-service (SaaS), infrastructure-as-a-service (IaaS), and numerous other “as-a-service” platforms that help support the modern business world. What you may not know is that cybercriminals often use the same…