Industry Insights

Study: Backdoors Found on 73% of Compromised Websites

Posted by Susan Sison on Jul 24, 2017 9:20:07 AM

No such thing as 'too small to hack,' according to research from SMB security provider SiteLock.
Read More

Outsmarting the Next Ransomware with Advanced Threat Protections

Posted by Susan Sison on Jul 22, 2017 10:30:13 AM

Ransomware has recently reasserted itself into the public eye in a big way. The May cyberattack carried out by the malware WannaCry was one of the worst ransomware attacks ever, affecting over 300,000 computers operating MS Windows around the world. Unfortunately, the attack has once again demonstrated that far too many organizations do not have an effective security protocol in place, or do not take it seriously until after disaster strikes. In this case, the Microsoft vulnerability exploited by ...
Read More

How Security Pros Can Help Protect Patients from Medical Data Theft

Posted by Susan Sison on Jul 19, 2017 4:30:04 PM

The healthcare industry has been slow to address the dangers of hacking, and breaches are on the rise. Security pros must be more proactive in keeping people safe.
Read More

Threat Actors Continue Abusing Google Docs and Other Cloud Services to Deliver Malware

Posted by Susan Sison on Jul 19, 2017 2:30:14 PM

A key part of phishing threat actors' mission is to create email narratives and leverage malware delivery techniques that reduce the likelihood of detection. By combining compelling social engineering with seemingly benign content, threat actors hope to bypass technical controls and to convince their human victims of a phishing email's legitimacy. One method with a long history of use is the abuse of Google Docs file sharing URLs to deliver malware content to victims. Because Google Docs and other ...
Read More

Exploiting the Human Factor - Proofpoint Releases Human Factor 2017 Report

Posted by Susan Sison on Jul 19, 2017 2:25:16 PM

Proofpoint researchers look ahead at the changing threat landscape and the increasing tendency for threat actors to target people rather than chase the latest exploits.
Read More

Achieve your Security Dreams with Hosted Security Services

Posted by Susan Sison on Jul 12, 2017 9:04:00 AM

Today’s network security environment is more complex than ever. To truly protect your business assets against advanced threats – including never before seen “Day Zero” attacks – you need sophisticated security using the latest technology.

Download Whitepaper Outsourcing SaaS

Read More

Topics: Managed Services, SaaS, Outsourced Security

There's No Silver Bullet For Phishing

Posted by Susan Sison on Jul 5, 2017 9:37:58 AM

Despite the emphasis on phishing awareness, employees are still falling for this widely-used social engineering tactic. While teaching good cyber hygiene is still a core component of a well-rounded cybersecurity strategy, it’s no silver bullet.

Read More

Topics: Malware, Cyber Security, Phishing, cyber strategy

Connected UTM: Enterprise-Class Security for SMBs

Posted by Susan Sison on Jun 30, 2017 11:50:35 AM

No company is too small to be targeted for a cyber attack. According to the National Small Business Association, 42 percent of its members reported being the victim of a cyber attack, and when they do suffer an attack, 60 percent of small businesses will close their doors within six months, according to US National Cyber Security Alliance.

Read More

Topics: cybercrime, security for SMB, cyber attacks, unified threat management

Healthcare Providers Cyber Security: Risk Assessment - How does your organization measure your risk?

Posted by Gabe Dahlstrom on Jun 29, 2017 8:28:00 AM

Until recently, performing a structured network risk assessment may well have been the last thing on the minds of most healthcare providers. IT services were planned and scheduled based on the essentials – and what could be performed with zero disruption to essential care operations.

Now, the world has changed. Ransomware attacks are consistently growing in size, scope, and sophistication. These attacks can cause healthcare operations to slam to a halt in a matter of just a few minutes. Restoring services can easily cost millions of dollars.

Read More

Topics: Cyber Security, Healthcare Security, Risk Assessment

Your Firewall is the First Line of Defense

Posted by Susan Sison on Jun 21, 2017 8:25:00 AM

IT security threats are growing by the day, and enterprises of all sizes need firewall management services they can rely on. Selecting a trusted security partner to lead your firewall is the fastest way to get peace of mind so you can focus on what your business does best.

Read More

Topics: SaaS, Outsourced Security, firewall management services

Subscribe to Email Updates

Lists by Topic

see all