Author: Kyle Fiehler

When the Institute for Security & Technology’s Ransomware Task Force published its report on combatting ransomware this spring, the Colonial Pipeline, JBS meatpacking and Kaseya VSA attacks were still around the corner. Nevertheless, the report took the danger presented by ransomware to both businesses and global security for granted. Already in 2020, according to the […]

The post NIST’s ransomware guidelines look a lot like cyber resilience appeared first on Webroot Blog.

Read More NIST’s ransomware guidelines look a lot like cyber resilience

If you attended Black Hat this year, you couldn’t avoid the topic of supply chain attacks. From keynotes to vendor messaging to booth presentations, they were a ubiquitous topic in Las Vegas this year. Supply chain attacks are cyberattacks targeting an upstream vendor for the ultimate purpose of compromising one or more of its customers. […]

The post Supply chain attacks are closing in on MSPs appeared first on Webroot Blog.

Read More Supply chain attacks are closing in on MSPs

The issue at the heart of ransomware insurance will be familiar to most parents of young children: rewarding bad behavior only invites more of the same, so it’s generally not a good idea. But critics of the ransomware insurance industry argue that’s exactly what the practice does. Ransomware insurance has by now long been suspected […]

The post It’s time to ask: Is ransomware insurance bad for cybersecurity? appeared first on Webroot Blog.

Read More It’s time to ask: Is ransomware insurance bad for cybersecurity?

In March of 2020 schools throughout the United Kingdom closed their doors to try to stem the spread of the coronavirus. In addition to disruptions to the lives of students and their families, the pandemic put unprecedented pressure on IT departments across the UK and wider world. Notoriously strapped for resources, many schools’ IT departments […]

The post As workforces migrate from offices, workflows migrate to the cloud appeared first on Webroot Blog.

Read More As workforces migrate from offices, workflows migrate to the cloud

Webroot put forward another strong performance in its latest round of independent third-party testing, besting all competitors and taking home the highest overall score. In taking the highest score in the category for 2021, Webroot beat out competitors including BitDefender™, McAfee® and ESET® endpoint security solutions. In the report, the company conducted objective testing of […]

The post Webroot top performer among security products in PassMark® Software testing appeared first on Webroot Blog.

Read More Webroot top performer among security products in PassMark® Software testing

At Carbonite + Webroot, we’re always preaching about the importance of layering security solutions. Because here’s the truth: data’s always at risk. Whether from cybercriminals, everyday mishaps or mother nature, businesses can put up all the defenses they want but disaster only has to successfully strike once. The global pandemic means more work is being […]

The post Redundancy for resilience: The importance of layered protection in the cloud appeared first on Webroot Blog.

Read More Redundancy for resilience: The importance of layered protection in the cloud

It’s not just that they’re making headlines more often. Ransomware rates really are rising. Given the recent spate of high-profile attacks, it’s worth remembering the difference between standard backup and high-availability replication. Our research suggests that the costs of ransomware for businesses can amount to much more than an extortion payment. They include lost hours […]

The post What’s the difference between high availability and backup again? appeared first on Webroot Blog.

Read More What’s the difference between high availability and backup again?

“What Bitcoin was to 2011, NFTs are to 2021.” That’s a claim from the highly respected “techno-geek” bible Ars Technica in it’s wonderful explainer on NFTs, or non-fungible tokens. Since cryptocurrencies were, are and will continue to be impactful technologies, surely NFTs are a topic worth exploring. They exploded into public consciousness this year as […]

The post Another NFT explainer, with a bonus look at the data security implications appeared first on Webroot Blog.

Read More Another NFT explainer, with a bonus look at the data security implications

“It is a nightmare. Do all you can to prevent ransomware.” – A survey respondent Many businesses are hesitant to talk about their experiences with ransomware. It can be uncomfortable to cop being hit. Whether it’s shame at not doing more to prevent it, the risk of additional bad publicity from discussing it or some other […]

The post We Finally Got Businesses to Talk About Their Run-ins With Ransomware. Here’s What They Said. appeared first on Webroot Blog.

Read More We Finally Got Businesses to Talk About Their Run-ins With Ransomware. Here’s What They Said.

With investors currently bullish on Bitcoin, is its high value driving cybercriminals to pursue crypto-generating forms of cybercrime like ransomware and illicit miners? At time of writing, the value of one Bitcoin is north of $58 thousand. Famously volatile, a crash is widely expected to accompany the current bubble, perhaps before the end of 2021. […]

The post Is the Value of Bitcoin Tied to Ransomware Rates? appeared first on Webroot Blog.

Read More Is the Value of Bitcoin Tied to Ransomware Rates?

Last year’s SolarWinds attack and its aftermath have provided numerous lessons concerning the dangers of IT supply chain attacks. Not all apply to every small and medium-sized business—most are unlikely to be targeted by highly trained state-backed hackers with virtually limitless funding—but some will be. We learned, for instance, that even IT pros could use […]

The post A Defense-in-Depth Approach Could Stop the Next Big Hack in its Tracks appeared first on Webroot Blog.

Read More A Defense-in-Depth Approach Could Stop the Next Big Hack in its Tracks

For most small businesses, the chances of falling prey to a long-term covert surveillance operation by well-resourced, likely state-backed actors are slim. To recap, that is what the evidence suggests happened in the SolarWinds compromise discovered last December. Many believe the company’s Orion update was used to conduct cyber espionage for months prior to being […]

The post Reducing the Time to Discovery: How to Determine if You Have Been Hacked appeared first on Webroot Blog.

Read More Reducing the Time to Discovery: How to Determine if You Have Been Hacked

We’ve been doing our homework, and two things seem to be true about cybersecurity awareness training simultaneously: It can be very effective at protecting businesses from one of the most common security threats they face (the majority, according to the Ponemon Institute). Namely, phishing. MSPs, often the single most reliable source of cybersecurity for small […]

The post Four Roadblocks to Increasing Employee Security Through User Training appeared first on Webroot Blog.

Read More Four Roadblocks to Increasing Employee Security Through User Training