Read the original article: Ransomware, BEC and Phishing Still Top Concerns, per 2021 Threat Report Although cybercriminal activity throughout 2020 was as innovative as ever, some of the most noteworthy threat activity we saw came from the old familiar players,…
Category: Webroot Blog
What is Pen Testing and Should You Have a Company that Performs them on Retainer?
Read the original article: What is Pen Testing and Should You Have a Company that Performs them on Retainer? Pen testing is the art of attempting to breach an organization’s network, computers and systems to identify possible means of bypassing…
Human-centered Design in the New Webroot Management Console
Read the original article: Human-centered Design in the New Webroot Management Console At Webroot, we could go on and on about user experience (UX) design. The study of the way we interact with the tools we use has spawned entire…
What Real Security and Compliance Look like when Managing 5000+ Endpoints
Read the original article: What Real Security and Compliance Look like when Managing 5000+ Endpoints In the United States, there are approximately 350,000 companies contracting for the Department of Defense. Each of these companies have to meet varying degrees of…
We Finally Got Businesses to Talk About Their Run-ins With Ransomware. Here’s What They Said.
Read the original article: We Finally Got Businesses to Talk About Their Run-ins With Ransomware. Here’s What They Said. “It is a nightmare. Do all you can to prevent ransomware.” – A survey respondent Many businesses are hesitant to talk about…
Why SMBs are Under Attack by Ransomware
Read the original article: Why SMBs are Under Attack by Ransomware Ransomware attacks generate big headlines when the targets are government entities, universities and healthcare organizations. But there’s one increasingly frequent target of ransomware attacks that tends to slip under…
Is the Value of Bitcoin Tied to Ransomware Rates?
Read the original article: Is the Value of Bitcoin Tied to Ransomware Rates? With investors currently bullish on Bitcoin, is its high value is driving cybercriminals to pursue crypto-generating forms of cybercrime like ransomware and illicit miners? At time of…
A Defense-in-Depth Approach Could Stop the Next Big Hack in its Tracks
Read the original article: A Defense-in-Depth Approach Could Stop the Next Big Hack in its Tracks Last year’s SolarWinds attack and its aftermath have provided numerous lessons concerning the dangers of IT supply chain attacks. Not all apply to every…
Why MSPs Need to Shift from Cybersecurity to Cyber Resilience
Read the original article: Why MSPs Need to Shift from Cybersecurity to Cyber Resilience If your critical systems, website or customer data were suddenly inaccessible due to a cyberattack, how soon would you be able to get back up and…
It’s Too Late for Threat Intelligence Vendors to Ignore IPv6
Read the original article: It’s Too Late for Threat Intelligence Vendors to Ignore IPv6 IPv6 has been a long time coming. Drafted by the Internet Engineering Task Force (ITEF) in 1998, it became an Internet Standard in 2017. Though the…
Cyber News Rundown: Phishing Targets NHS Regulatory Commission
Read the original article: Cyber News Rundown: Phishing Targets NHS Regulatory Commission Spanish labor agency suffers ransomware attack Multiple systems were taken offline following a ransomware attack on the Spanish government labor agency SEPE, which has affected all 700 of…
Does a SIEM make sense for my MSP?
Read the original article: Does a SIEM make sense for my MSP? Every device on an MSP’s managed network provides insight into what’s happening on that network. This includes network routers, switches, printers, wireless devices to servers, endpoints, IoT devices…
Who’s Hacking You?
Read the original article: Who’s Hacking You? One of the reasons why there’s so much cybercrime is because there are so many ways for cybercriminals to exploit vulnerabilities and circumvent even the best defenses. You may be surprised to find…
3 Ransomware Myths Businesses Need to Stop Believing ASAP
Read the original article: 3 Ransomware Myths Businesses Need to Stop Believing ASAP Despite the rising ransomware numbers and the numerous related headlines, many small and medium-sized businesses (SMBs) still don’t consider themselves at risk from cyberattacks. Nothing could be…
Reducing the Time to Discovery: How to Determine if You Have Been Hacked
Read the original article: Reducing the Time to Discovery: How to Determine if You Have Been Hacked For most small businesses, the chances of falling prey to a long-term covert surveillance operation by well-resourced, likely state-backed actors are slim. To…
The NSA Wants Businesses to Use DoH. Here’s What You Need to Know.
Read the original article: The NSA Wants Businesses to Use DoH. Here’s What You Need to Know. Most people would categorically agree that increased privacy online is a good thing. But in practice, questions of privacy online are a bit…
The NSA Wants Businesses to Use DoH. Here’s What You Need to Know.
Read the original article: The NSA Wants Businesses to Use DoH. Here’s What You Need to Know. Most people would categorically agree that increased privacy online is a good thing. But in practice, questions of privacy online are a bit…
Hacker Personas Explained: Know Your Enemy and Protect Your Business
Read the original article: Hacker Personas Explained: Know Your Enemy and Protect Your Business In today’s rapidly evolving cybersecurity landscape, the battle for privacy and security is relentless. Cybercriminals are masters at using technology and psychology to exploit basic human…
How IT Will Prevail in the 2021 Cyber-Demic
Read the original article: How IT Will Prevail in the 2021 Cyber-Demic While we can all rejoice that 2020 is over, cybersecurity experts agree we haven’t seen the last of the pandemic-related rise in cyberattacks. Throughout the last year, we’ve…
Essential Threat Intelligence: Importance of Fundamentals in Identifying IOCs
Read the original article: Essential Threat Intelligence: Importance of Fundamentals in Identifying IOCs The supply chain attack that Trojanized a SolarWinds update to infect and spy on the IT management platform’s customer base continues to be analyzed. Early reports have…
Four Roadblocks to Increasing Employee Security Through User Training
Read the original article: Four Roadblocks to Increasing Employee Security Through User Training We’ve been doing our homework, and two things seem to be true about cybersecurity awareness training simultaneously: It can be very effective at protecting businesses from one…
Cyber News Rundown: Dairy Farm Ransomware
Read the original article: Cyber News Rundown: Dairy Farm Ransomware Dairy farm group faces $30 million ransom The Dairy Farm Group, one of the largest retailers in Asia, has suffered a ransomware attack by the REvil group, which has demanded…
How to Stop Shadow IT, Manage Access and Ensure Security with Cloud Applications
Read the original article: How to Stop Shadow IT, Manage Access and Ensure Security with Cloud Applications Today, the average enterprise uses over 2000 cloud applications and services, and we expect this number will continue to grow as more businesses…
Cyber News Rundown: Cryptomining Malware Resurgent
Read the original article: Cyber News Rundown: Cryptomining Malware Resurgent Skyrocketing Bitcoin prices prompt resurgence in mining malware As the price of the cryptocurrency Bitcoin pushes record highs, there’s been a corresponding resurgence in cryptomining malware. Illicit miners had slipped…
Cyber News Rundown: Cryptomining Malware Resurgent
Read the original article: Cyber News Rundown: Cryptomining Malware Resurgent Skyrocketing Bitcoin prices prompt resurgence in mining malware As the price of the cryptocurrency Bitcoin pushes record highs, there’s been a corresponding resurgence in cryptomining malware. Illicit miners had slipped…
Employee Spotlight: The Human Faces Behind Artificial Intelligence
Read the original article: Employee Spotlight: The Human Faces Behind Artificial Intelligence Webroot BrightCloud® Threat Intelligence relies on the collective power of millions of devices working together. But what sometimes gets lost is the actual humans behind bringing this technology…
Cyber News Rundown: Gaming Industry in Crosshairs of Cybercriminals
Read the original article: Cyber News Rundown: Gaming Industry in Crosshairs of Cybercriminals Top gaming companies positioned to be next major cyberattack target After healthcare and higher education emerged as lucrative targets for cyberattacks in 2020, researchers have identified the…
Maze Ransomware is Dead. Or is it?
Read the original article: Maze Ransomware is Dead. Or is it? “It’s definitely dead,” says Tyler Moffitt, security analyst at Carbonite + Webroot, OpenText companies. “At least,” he amends, “for now.” Maze ransomware, which made our top 10 list for…
How to Build Successful Security Awareness Training Programs in 2021 and Beyond
Read the original article: How to Build Successful Security Awareness Training Programs in 2021 and Beyond Security awareness training is one of the most straightforward ways to improve a business’ overall resilience against cyberattacks. That is, when you get it…
Cyber News Rundown: Trickbot Spreads Via Subway Emails
Read the original article: Cyber News Rundown: Trickbot Spreads Via Subway Emails Trickbot spreading through Subway company emails Customers of Subway U.K. have been receiving confirmation emails for recent orders that instead contain malicious links for initiating Trickbot malware downloads.…
Remote Work is Here to Stay, and Other Cybersecurity Predictions for 2021
Read the original article: Remote Work is Here to Stay, and Other Cybersecurity Predictions for 2021 The cybersecurity industry and end-of-year predictions go together like Fall and football or champagne and the New Year. But on the heels of an…
Cyber News Rundown: Global Cybercrime Costs Surpass $1 Trillion
Read the original article: Cyber News Rundown: Global Cybercrime Costs Surpass $1 Trillion Cybercrime surpasses $1Trillion in global costs A recent study has put the global cost of cybercrime at over $1 trillion for 2020. This figure is up significantly…
Staying a Step Ahead of the Hack
Read the original article: Staying a Step Ahead of the Hack Hackers, never at a loss for creative deception, have engineered new tactics for exploiting the weakest links in the cybersecurity chain: ourselves! Social engineering and business email compromise (BEC)…
Cyber News Rundown: Biological Worries Over Malware Attacks
Read the original article: Cyber News Rundown: Biological Worries Over Malware Attacks Biological Worries Over Malware Attacks Researchers have recently unveiled the latest potential victim for malware authors: biological laboratories. By illicitly accessing these facilities, hackers may be able to…
Why Workers Aren’t Confident in their Companies’ Security (and What to Do About it)
Read the original article: Why Workers Aren’t Confident in their Companies’ Security (and What to Do About it) According to data from a recent report, only 60% of office workers worldwide believe their company is resilient against cyberattacks. Nearly one…
Small Businesses are Counting on Their MSPs this Small Business Saturday
Read the original article: Small Businesses are Counting on Their MSPs this Small Business Saturday This November 28 may be the most important Small Business Saturday since the occasion was founded by American Express in 2010. As early as July,…
Cyber News Rundown: REvil Ransomware Strikes
Read the original article: Cyber News Rundown: REvil Ransomware Strikes REvil Ransomware Strikes Hosting Provider In recent days the web hosting provider Managed.com has been working to recover from a ransomware attack targeting many of their core systems. While the…
6 Tips for a More Cyber-Secure Holiday Season
Read the original article: 6 Tips for a More Cyber-Secure Holiday Season In any other year, many of us would be gearing up for airline travel, big family dinners, cocktail hours or potlucks with friends, and much more. But with…
What’s the deal with security product testing anyway?
Read the original article: What’s the deal with security product testing anyway? It’s common for savvy online shoppers to check third-party reviews before making an online purchasing decision. That’s smart, but testing the efficacy of security software can be a…
Cyber News Rundown: Flood of Phony IRS Emails
Read the original article: Cyber News Rundown: Flood of Phony IRS Emails Phony IRS Emails Flooding Inboxes Upwards of 70,000 inboxes have been receiving spam claiming to be from the IRS threatening legal action for late or missing payments. Most…
Employee Spotlight: From Building Code to Building Teams
Read the original article: Employee Spotlight: From Building Code to Building Teams Webroot is a dynamic team of hard-working individuals with diverse backgrounds. One of those hard-working individuals is Ben Jackson, Senior Manager of Software Development, Engineering. Ben started off…
Getting to Know Cloudjacking and Cloud Mining Could Save Your Business
Read the original article: Getting to Know Cloudjacking and Cloud Mining Could Save Your Business A few years back, cryptojacking and cryptomining emerged as relatively low-effort ways to profit by hijacking another’s computing resources. Today, cloudjacking and cloud mining capitalize…
Cyber News Rundown: Maze Ransomware Shuts Down
Read the original article: Cyber News Rundown: Maze Ransomware Shuts Down Maze Ransomware Group Ends Operations A press release issued this week announced the end of the Maze ransomware group’s data theft operations. In the release, the Maze authors revealed…
The Importance of Mobile Security for Safe Browsing
Read the original article: The Importance of Mobile Security for Safe Browsing Mobile devices have become an indispensable part of our lives. By the time we’re teenagers, we’re already tethered to technology that lives in our pockets and connects us…
Employee Spotlight: Nurul Mohd-Reza, Customer Retention Specialist
Read the original article: Employee Spotlight: Nurul Mohd-Reza, Customer Retention Specialist Nurul Mohd-Reza knows how to empathize with the customers she serves. Her work with marginalized groups as a college student, she says, helped prepare her for when the pandemic…
The Nastiest Malware of 2020
Read the original article: The Nastiest Malware of 2020 For the third year running, we’ve examined the year’s biggest cyber threats and ranked them to determine which ones are the absolute worst. Somewhat unsurprisingly, phishing and RDP-related breaches remain the…
The Nastiest Malware of 2020
Read the original article: The Nastiest Malware of 2020 For the third year running, we’ve examined the year’s biggest cyber threats and ranked them to determine which ones are the absolute worst. Somewhat unsurprisingly, phishing and RDP-related breaches remain the…
What DoH Can Really Do
Read the original article: What DoH Can Really Do Fine-tuning privacy for any preference A DNS filtering service that accommodates DNS over HTTPS (DoH) can strengthen an organization’s ability to control network traffic and turn away threats. DoH can offer…
Cyber News Rundown: Child Smartwatch Backdoored
Read the original article: Cyber News Rundown: Child Smartwatch Backdoored Backdoor Found in Children’s Smartwatch Researchers have discovered that the X4, made by Norwegian smartwatch seller Xplora, contains a backdoor that could allow for information to be stolen. The X4…
Cyber News Rundown: COVID-related Attacks Target Canadian Companies
Read the original article: Cyber News Rundown: COVID-related Attacks Target Canadian Companies New Jersey Hospital Pays Massive Ransom Officials have decided to pay roughly $670,000 in ransom following a ransomware attack on the University Hospital in New Jersey. The hospital…
It’s Time to Talk Seriously About Deepfakes and Misinformation
Read the original article: It’s Time to Talk Seriously About Deepfakes and Misinformation Like many of the technologies we discuss on this blog—think phishing scams or chatbots—deepfakes aren’t necessarily new. They’re just getting a whole lot better. And that has…
It’s Time to Talk Seriously About Deepfakes and Misinformation
Read the original article: It’s Time to Talk Seriously About Deepfakes and Misinformation Like many of the technologies we discuss on this blog—think phishing scams or chatbots—deepfakes aren’t necessarily new. They’re just getting a whole lot better. And that has…
Cyber News Rundown: LokiBot Attacks Increase
Read the original article: Cyber News Rundown: LokiBot Attacks Increase DHS Announces Massive Increase in LokiBot Attacks By monitoring and tracking of cyberattacks over 2020, U.S. Department of Homeland Security (DHS) officials have uncovered a significant increase in cyberattacks being…
Cyber Resilience for Business Continuity
Read the original article: Cyber Resilience for Business Continuity “Ten years ago, you didn’t see state actors attacking [small businesses]. But it’s happening now,” warns George Anderson, product marketing director at Carbonite + Webroot, OpenText companies. Sadly, many of today’s…
MSP Insight: Netstar Shares Cyber Resilience Strategies for Remote Work
Read the original article: MSP Insight: Netstar Shares Cyber Resilience Strategies for Remote Work Guest blog by Mit Patel, Managing Director of London based IT Support company, Netstar. In this article, Webroot sits down with Mit Patel, Managing Director of…
Unexpected Side Effects: How COVID-19 Affected our Click Habits
Read the original article: Unexpected Side Effects: How COVID-19 Affected our Click Habits Phishing has been around for ages and continues to be one of the most common threats that businesses and home users face today. But it’s not like…
What you Should Know About Chatbots and Cybersecurity
Read the original article: What you Should Know About Chatbots and Cybersecurity People’s fears and fantasies about artificial intelligence predate even computers. Before the term was coined in 1956, computing pioneer Alan Turing was already speculating about whether machines could…
Cyber News Rundown: Magecart Massive Attack
Read the original article: Cyber News Rundown: Magecart Massive Attack Magecart Launches Largest E-commerce Attack to Date Roughly 2000 e-commerce sites were compromised in the latest Magecart campaign targeting an out-of-date version of Magento software. It’s believed an additional 95,000…
Key Considerations When Selecting a Web Classification Vendor
Read the original article: Key Considerations When Selecting a Web Classification Vendor Since launching our web classification service in 2006, we’ve seen tremendous interest in our threat and web classification services, along with an evolution of the types and sizes…
Celebrating Women in STEM for National Coding Week and IT Pro Day
Read the original article: Celebrating Women in STEM for National Coding Week and IT Pro Day Women of Webroot and Carbonite talk about what drew them to the field and their advice for others looking to break into STEM. The…
Cybersecurity Tips for a Happy National Video Games Day
Read the original article: Cybersecurity Tips for a Happy National Video Games Day This year more than others, for many of us, it’s gaming that’s gotten us through. Lockdowns, uncertainty, and some pretty darn good releases have kept our computers…
4 Ways MSPs Can Fine Tune Their Cybersecurity Go-To-Market Strategy
Read the original article: 4 Ways MSPs Can Fine Tune Their Cybersecurity Go-To-Market Strategy Today’s work-from-home environment has created an abundance of opportunities for offering new cybersecurity services in addition to your existing business. With cyberattacks increasing in frequency and…
Ransomware: The Bread and Butter of Cybercriminals
Read the original article: Ransomware: The Bread and Butter of Cybercriminals Substitute your digital space for your home and encryption for the safe and you have what’s known as ransomware. Ransomware is a type of malware. After the initial infection,…
Cyber News Rundown: Android Giveaway Fraud
Read the original article: Cyber News Rundown: Android Giveaway Fraud Thousands of Android Users fall Victim to Giveaway Fraud Upwards of 65,000 Android users were potentially compromised after installing a malicious app promising free giveaways. Over the year the scam…
10 Ways a Commercial DNS Filtering Service Improves Your Cyber Resilience
Read the original article: 10 Ways a Commercial DNS Filtering Service Improves Your Cyber Resilience If you’ve landed on this blog, then there’s a good chance you’re already aware that DNS is undergoing a major overhaul. DNS 2.0—aka encrypted DNS,…
Cyber News Rundown: Ransomware Targets Major Cruise Line
Read the original article: Cyber News Rundown: Ransomware Targets Major Cruise Line Ransomware Attack Targets Major Cruise Line Officials for Carnival Cruises have confirmed that a portion of their IT systems were encrypted following a cyberattack identified over the weekend.…
WFH for the Long Haul? These Tips Will Help You Create a Cyber Resilient Home Network
Read the original article: WFH for the Long Haul? These Tips Will Help You Create a Cyber Resilient Home Network Cyber resilience is being put to the test during the coronavirus pandemic. As more and more users work from home,…
WFH for the Long Haul? These Tips Will Help You Create a Cyber Resilient Home Network
Read the original article: WFH for the Long Haul? These Tips Will Help You Create a Cyber Resilient Home Network Cyber resilience is being put to the test during the coronavirus pandemic. As more and more users work from home,…
Cyber News Rundown: Ransomware Strikes Colorado Town
Read the original article: Cyber News Rundown: Ransomware Strikes Colorado Town Colorado Town Suffers Ransomware Attack The town of Lafayette, Colorado, fell victim to a ransomware attack last week without the capability to recover from the attack without paying a…
Cybersecurity and Back to (Virtual) School 2020: What You Need to Know
Read the original article: Cybersecurity and Back to (Virtual) School 2020: What You Need to Know Even though the 2020 Back to School season may look very different from those in years past, there are a few things that will…
Cybersecurity and Back to (Virtual) School 2020: What You Need to Know
Read the original article: Cybersecurity and Back to (Virtual) School 2020: What You Need to Know Even though the 2020 Back to School season may look very different from those in years past, there are a few things that will…
Company Culture and Cyber Resilience by the Numbers
Read the original article: Company Culture and Cyber Resilience by the Numbers There’s no doubt we’ve all had to change our work habits as a result of the global coronavirus pandemic. Companies have had to adapt rapidly to smooth the…
Cyber News Rundown: Twitter Hack Arrests
Read the original article: Cyber News Rundown: Twitter Hack Arrests Multiple Individuals Charged for Twitter Hack Three people were charged with last month’s Twitter hack, which generated over $100,000 in bitcoin by hijacking high-profile accounts. Of the 130 accounts used…
Hack, Crash, Storm, Spill: Pick Your Poison
Read the original article: Hack, Crash, Storm, Spill: Pick Your Poison Don’t expect cybercriminals to go easy during a hurricane. Quite the opposite, in fact. Just like they’ve used the coronavirus pandemic to launch COVID-related malware scams, hackers will capitalize…
Hack, Crash, Storm, Spill: Pick Your Poison
Read the original article: Hack, Crash, Storm, Spill: Pick Your Poison Don’t expect cybercriminals to go easy during a hurricane. Quite the opposite, in fact. Just like they’ve used the coronavirus pandemic to launch COVID-related malware scams, hackers will capitalize…
Cyber News Rundown: WasteLocker Ransomware
Read the original article: Cyber News Rundown: WasteLocker Ransomware Garmin Hit with WastedLocker Ransomware Nearly a week after the company announced they had suffered a system outage, Garmin has finally admitted to falling victim to a ransomware attack, likely from…
Bouncing Back from the Pandemic A Step-By-Step Guide for MSPs
Read the original article: Bouncing Back from the Pandemic A Step-By-Step Guide for MSPs To try to fight the isolation and uncertainty brought on by the COVID-19 outbreak, a few weeks ago we began what we’re referring to as “Office…
Cyber News Rundown: ATM Jackpotting Attacks Rise
Read the original article: Cyber News Rundown: ATM Jackpotting Attacks Rise ATM Jackpotting Attacks on the Rise ATM manufacturer Diebold Nixdorf has identified a malicious campaign that uses proprietary software to “jackpot” the machines. The attack requires malicious actors to…
The Changing Face of Phishing: How One of the Most Common Attacks is Evolving
Read the original article: The Changing Face of Phishing: How One of the Most Common Attacks is Evolving Most people are familiar with phishing attacks. After all, they’re one of the most common forms of data breach around. At their…
Cyber News Rundown: GoldenSpy
Read the original article: Cyber News Rundown: GoldenSpy Malware Discovered in Chinese Tax Software As part of an official Chinese tax initiative, researchers have found multiple backdoors into mandatory tax software installed on all Chinese business systems. The new malware…
Summer fitness: Let’s get digital
Read the original article: Summer fitness: Let’s get digital Summer is upon us. For some, summer is all about physical fitness. While exercise is essential to our overall well-being, we shouldn’t forget about our digital fitness, either. Just as our…
There Are Savings to be Had in Cybersecurity. Just Not Where You Might Think.
Read the original article: There Are Savings to be Had in Cybersecurity. Just Not Where You Might Think. Prior to the outbreak of the novel coronavirus, Webroot’s annual Threat Report highlighted a 640% increase in active phishing sites on the…
Cyber News Rundown: Ragnar Locker
Read the original article: Cyber News Rundown: Ragnar Locker Ragnar locker Attacks Portuguese Energy Producer It was recently confirmed that Energias de Portugal (EDP), one of the largest energy producers in the world, has fallen victim to the Ragnar Locker…
Evasive Scripts: What They Are, and What We’re Doing About Them
Read the original article: Evasive Scripts: What They Are, and What We’re Doing About Them “What’s an evasive attack? At a very basic level, it’s exactly what it sounds like; it’s a cyberattack that’s designed to hide from you,” says…
Evasive Scripts: What They Are, and What We’re Doing About Them
Read the original article: Evasive Scripts: What They Are, and What We’re Doing About Them “What’s an evasive attack? At a very basic level, it’s exactly what it sounds like; it’s a cyberattack that’s designed to hide from you,” says…
Cyber News Rundown: WastedLocker Shuts Down US News Sites
Read the original article: Cyber News Rundown: WastedLocker Shuts Down US News Sites WastedLocker Shuts Down US News Sites Over 30 news sites were compromised in the latest WastedLocker attack that affected many sites under a single parent company. Of…
5 ways to reduce risky habits online
Read the original article: 5 ways to reduce risky habits online After surveying more than 10,000 people in 50 states about their cybersecurity habits, we wound up with some pretty surprising results. Like the fact that tech experts demonstrate riskier…
DoH Is Here to Stay: Why Businesses Should Embrace It
Read the original article: DoH Is Here to Stay: Why Businesses Should Embrace It While the proliferation of encrypted DNS is being driven by consumer privacy, businesses will want to take notice. Encrypted DNS – also known as DNS over…
Old Habits vs. New Normal in the Time of Coronavirus
Read the original article: Old Habits vs. New Normal in the Time of Coronavirus It didn’t take long for COVID-19 to completely alter the way we work. Businesses that succeed in this rapidly changing environment will be the ones that…
Old habits vs. New Normal in the Time of Coronavirus
Read the original article: Old habits vs. New Normal in the Time of Coronavirus It didn’t take long for COVID-19 to completely alter the way we work. Businesses that succeed in this rapidly changing environment will be the ones that…
Why You Need More than Built-In Antivirus Protection
Read the original article: Why You Need More than Built-In Antivirus Protection Most major tech blogs have run some variation of the following headline in recent months: Is it worth paying for an antivirus solution anymore? The insinuation, of course,…
Cyber News Rundown: Knoxville Rocked by Ransomware
Read the original article: Cyber News Rundown: Knoxville Rocked by Ransomware Ransomware Knocks Out Knoxville, TN Knoxville, Tennessee officials have been working over the past week to secure systems and determine if any sensitive information was stolen after a ransomware…
We Need the Security Benefits of AI and Machine Learning Now More Than Ever
Read the original article: We Need the Security Benefits of AI and Machine Learning Now More Than Ever As these times stress the bottom lines of businesses and SMBs alike, many are looking to cut costs wherever possible. The problem…
We Need the Security Benefits of AI and Machine Learning Now More Than Ever
Read the original article: We Need the Security Benefits of AI and Machine Learning Now More Than Ever As these times stress the bottom lines of businesses and SMBs alike, many are looking to cut costs wherever possible. The problem…
Cyber News Rundown: Nintendo Accounts Breached
Read the original article: Cyber News Rundown: Nintendo Accounts Breached Nintendo Accounts Breached Stemming from a cyber-attack back in April, Nintendo has just announced that roughly 300,000 user accounts have been compromised, though most belong to systems that are now…
Your Data, Their Devices: Accounting for Cybersecurity for Personal Computers
Read the original article: Your Data, Their Devices: Accounting for Cybersecurity for Personal Computers Nestled within our chapter on malware in the 2020 Webroot Threat Report is a comparison of infection rates between business and personal devices. The finding that…
Your Data, Their Devices: Accounting for Cybersecurity for Personal Computers
Read the original article: Your Data, Their Devices: Accounting for Cybersecurity for Personal Computers Nestled within our chapter on malware in the 2020 Webroot Threat Report is a comparison of infection rates between business and personal devices. The finding that…
Cyber News Rundown: Trickbot Silently Targets Servers
Read the original article: Cyber News Rundown: Trickbot Silently Targets Servers TrickBot Silently Targets Servers Knowing that many domain controller servers are rarely shutdown or rebooted, the authors of TrickBot have made some changes to allow the infection to run…
Cyber News Rundown: Bank of America Breach Reveals PPP Info
Read the original article: Cyber News Rundown: Bank of America Breach Reveals PPP Info Bank of America Breach Reveals PPP Information After processing over 300,000 Paycheck Protection Program applications, Bank of America has revealed that a data breach occurred within…
Cyber News Rundown: Bank of America Breach Reveals PPP Info
Read the original article: Cyber News Rundown: Bank of America Breach Reveals PPP Info Bank of America Breach Reveals PPP Information After processing over 300,000 Paycheck Protection Program applications, Bank of America has revealed that a data breach occurred within…