Author: Justine Kurtz

You’ve likely heard of software-as-a-service (SaaS), infrastructure-as-a-service (IaaS), and numerous other “as-a-service” platforms that help support the modern business world. What you may not know is that cybercriminals often use the same business concepts and service models in their own organizations as regular, non-criminal enterprises; i.e., the same practices the majority of their intended victims […]

The post An Inside Look at Cybercrime-as-a-Service appeared first on Webroot Blog.

Read More An Inside Look at Cybercrime-as-a-Service

If you’re an admin, service provider, security executive, or are otherwise affiliated with the world of IT solutions, then you know that one of the biggest challenges to overcome is efficacy. Especially in terms of cybersecurity, efficacy is something of an amorphous term; everyone wants it to be better, but what exactly does that mean? […]

The post 5 Tips to get Better Efficacy out of Your IT Security Stack appeared first on Webroot Blog.

Read More 5 Tips to get Better Efficacy out of Your IT Security Stack

Although they didn’t always call themselves a managed service provider, that’s exactly what T-Consulting has been since its inception. According to Vera Tucci, founder and CEO of the Italy-based MSP, it was her mission to give her clients more than a basic hardware/software bundle with a few hours of IT consultation. She knew her clients […]

The post How MSPs can use Webroot Cyber Resilience Solutions to Get their Time Back appeared first on Webroot Blog.

Read More How MSPs can use Webroot Cyber Resilience Solutions to Get their Time Back

What’s better for getting your business’ name out there and boosting sales than having a killer business marketing plan with well-placed ads, zippy copy, and a slick design? The answer is: having a group of dedicated real-world customers who use their own platforms to advocate for your business and its offerings. Thanks to social media, […]

The post Building a Successful Customer Advocacy Program (Hint: It’s Not How You Think) appeared first on Webroot Blog.

Read More Building a Successful Customer Advocacy Program (Hint: It’s Not How You Think)

Typically, when cryptocurrency values change, one would expect to see changes in crypto-related cybercrime. In particular, trends in Bitcoin values tend to be the bellwether you can use to predict how other currencies’ values will shift, and there are usually corresponding shifts in crypto-based crime, such as ransomware, though it’s not necessarily the kind of […]

The post How Cryptocurrency and Cybercrime Trends Influence One Another appeared first on Webroot Blog.

Read More How Cryptocurrency and Cybercrime Trends Influence One Another

Although cybercriminal activity throughout 2020 was as innovative as ever, some of the most noteworthy threat activity we saw came from the old familiar players, namely ransomware, business email compromise (BEC) and phishing. According to the 2021 Webroot BrightCloud® Threat Report, each of these threat types saw significant fluctuations as people all over the world […]

The post Ransomware, BEC and Phishing Still Top Concerns, per 2021 Threat Report appeared first on Webroot Blog.

Read More Ransomware, BEC and Phishing Still Top Concerns, per 2021 Threat Report

In the United States, there are approximately 350,000 companies contracting for the Department of Defense. Each of these companies have to meet varying degrees of compliance and are now subject to the Cybersecurity Maturity Model Certification (CMMC). Effectively, CMMC means that before a DoD contractor can execute on their contract, they have to receive an […]

The post What Real Security and Compliance Look like when Managing 5000+ Endpoints appeared first on Webroot Blog.

Read More What Real Security and Compliance Look like when Managing 5000+ Endpoints

While we can all rejoice that 2020 is over, cybersecurity experts agree we haven’t seen the last of the pandemic-related rise in cyberattacks. Throughout the last year, we’ve seen huge spikes in phishing, malicious domains, malware and more, and we don’t expect that to slow down. As employees around the world continue to work from […]

The post How IT Will Prevail in the 2021 Cyber-Demic appeared first on Webroot Blog.

Read More How IT Will Prevail in the 2021 Cyber-Demic

“It’s definitely dead,” says Tyler Moffitt, security analyst at Carbonite + Webroot, OpenText companies. “At least,” he amends, “for now.” Maze ransomware, which made our top 10 list for Nastiest Malware of 2020 (not to mention numerous headlines throughout the last year), was officially shut down in November of 2020. The ransomware group behind it […]

The post Maze Ransomware is Dead. Or is it? appeared first on Webroot Blog.

Read More Maze Ransomware is Dead. Or is it?

Security awareness training is one of the most straightforward ways to improve a business’ overall resilience against cyberattacks. That is, when you get it just right. Thanks to the disruptions to “normal” work routines that COVID-19 has brought, launching a company-wide training program to teach end users how to avoid phishing scams and online risks […]

The post How to Build Successful Security Awareness Training Programs in 2021 and Beyond appeared first on Webroot Blog.

Read More How to Build Successful Security Awareness Training Programs in 2021 and Beyond