Author: Kyle Fiehler

“It is a nightmare. Do all you can to prevent ransomware.” – A survey respondent Many businesses are hesitant to talk about their experiences with ransomware. It can be uncomfortable to cop being hit. Whether it’s shame at not doing more to prevent it, the risk of additional bad publicity from discussing it or some other […]

The post We Finally Got Businesses to Talk About Their Run-ins With Ransomware. Here’s What They Said. appeared first on Webroot Blog.

Read More We Finally Got Businesses to Talk About Their Run-ins With Ransomware. Here’s What They Said.

With investors currently bullish on Bitcoin, is its high value driving cybercriminals to pursue crypto-generating forms of cybercrime like ransomware and illicit miners? At time of writing, the value of one Bitcoin is north of $58 thousand. Famously volatile, a crash is widely expected to accompany the current bubble, perhaps before the end of 2021. […]

The post Is the Value of Bitcoin Tied to Ransomware Rates? appeared first on Webroot Blog.

Read More Is the Value of Bitcoin Tied to Ransomware Rates?

Last year’s SolarWinds attack and its aftermath have provided numerous lessons concerning the dangers of IT supply chain attacks. Not all apply to every small and medium-sized business—most are unlikely to be targeted by highly trained state-backed hackers with virtually limitless funding—but some will be. We learned, for instance, that even IT pros could use […]

The post A Defense-in-Depth Approach Could Stop the Next Big Hack in its Tracks appeared first on Webroot Blog.

Read More A Defense-in-Depth Approach Could Stop the Next Big Hack in its Tracks

For most small businesses, the chances of falling prey to a long-term covert surveillance operation by well-resourced, likely state-backed actors are slim. To recap, that is what the evidence suggests happened in the SolarWinds compromise discovered last December. Many believe the company’s Orion update was used to conduct cyber espionage for months prior to being […]

The post Reducing the Time to Discovery: How to Determine if You Have Been Hacked appeared first on Webroot Blog.

Read More Reducing the Time to Discovery: How to Determine if You Have Been Hacked

We’ve been doing our homework, and two things seem to be true about cybersecurity awareness training simultaneously: It can be very effective at protecting businesses from one of the most common security threats they face (the majority, according to the Ponemon Institute). Namely, phishing. MSPs, often the single most reliable source of cybersecurity for small […]

The post Four Roadblocks to Increasing Employee Security Through User Training appeared first on Webroot Blog.

Read More Four Roadblocks to Increasing Employee Security Through User Training