Webroot’s 2015 SMB Threat Report: An Analysis
Reading Time: ~3 min.Recently, Webroot published 2015 SMB Threat Report: Are organizations completely ready to stop cyberattacks?, which included the results from a survey of 700 SMB decision makers...
View ArticleTop Security Predictions for 2016
Reading Time: ~2 min.As 2015 comes to an end, we all look back at the huge list of big-name data breaches that occured, from passwords revealed to full on dating identities. It was not a pretty year...
View ArticleThreat Insights and Trends from the 2016 Threat Brief
Reading Time: ~4 min.Intro from the 2016 Threat Brief: “2015 was yet another record year for cybercrime, during which more malware, malicious IPs, websites, and mobile apps were discovered than in any...
View ArticleHackers: Fact vs. Fiction
Reading Time: ~ 3 min. Have you ever watched a movie and seen a character doing something you know how to do, and thought to yourself, “jeez, that’s totally wrong. Couldn’t they have done a little...
View ArticleThe Truth about Hackers, in Black and White (and Grey)
Reading Time: ~ 4 min. Did you know there are three primary types of hacker—white hats, black hats, and grey hats—and that there are subcategories within each one? Despite what you may have heard, not...
View ArticlePay Attention to the Hacker Behind the Hoodie
Reading Time: ~ 3 min. There’s a pretty common misconception among small businesses and medium-sized businesses (SMBs) that hackers only target large organizations. Unfortunately, this belief couldn’t...
View ArticleTargeted assets: The need for cyber resilient infrastructure
Aging infrastructure in the United States is not confined to crumbling roads and bridges. Recent events have shown that connected devices in our pipelines, water treatment facilities and power grids...
View ArticleData Privacy Week 2022: The Security Awareness Canary in the Coalmine
Whether you’re shopping for the latest tech gadgets or checking your work email, your online presence is susceptible to malicious threats. No industry or sector is immune. Even in the early days of...
View ArticleSoaring ransomware payments, consistent infections, deceptive URLs and more...
Cyber threats are becoming increasingly difficult to detect. Cybercriminals are also becoming experts in deception. What does this mean for your business? How can you keep your family members safe...
View ArticleBrightCloud® Threat Report Mid-Year Update: Reinvention is the Name of the Game
When was the last time you secretly smiled when ransomware gangs had their bitcoin stolen, their malware servers shut down, or were forced to disband? We hang on to these infrequent victories because...
View Article
More Pages to Explore .....