Business + Partners

At Carbonite + Webroot, we’re always preaching about the importance of layering security solutions. Because here’s the truth: data’s always at risk. Whether from cybercriminals, everyday mishaps or mother nature, businesses can put up all the defenses they want but disaster only has to successfully strike once. The global pandemic means more work is being […]

The post Redundancy for resilience: The importance of layered protection in the cloud appeared first on Webroot Blog.

Read More Redundancy for resilience: The importance of layered protection in the cloud

It’s not just that they’re making headlines more often. Ransomware rates really are rising. Given the recent spate of high-profile attacks, it’s worth remembering the difference between standard backup and high-availability replication. Our research suggests that the costs of ransomware for businesses can amount to much more than an extortion payment. They include lost hours […]

The post What’s the difference between high availability and backup again? appeared first on Webroot Blog.

Read More What’s the difference between high availability and backup again?

It’s not just that they’re making headlines more often. Ransomware rates really are rising. Given the recent spate of high-profile attacks, it’s worth remembering the difference between standard backup and high-availability replication. Our research suggests that the costs of ransomware for businesses can amount to much more than an extortion payment. They include lost hours […]

The post What’s the difference between high availability and backup again? appeared first on Webroot Blog.

Read More What’s the difference between high availability and backup again?

Cybersecurity analysts are charting both a rise in ransomware incidents and in amounts cybercriminals are demanding from businesses to restore their data. That’s bad news in itself, but what’s often overlooked are the additional ways – beyond payments victims may or may not choose to make– victims pay for these attacks. Our latest threat report […]

The post 4 ways ransomware can cost your business (in addition to extortion) appeared first on Webroot Blog.

Read More 4 ways ransomware can cost your business (in addition to extortion)

Cyber resilience refers to a business’s ability to mitigate damage to its systems, processes and even its reputation. It’s based on the principle that, in the real (and really connected) world, adverse events occur. This could be in the form of a user enabling a breach by providing sensitive information during a phishing attack, through […]

The post Podcast: How to build a cyber resilient business appeared first on Webroot Blog.

Read More Podcast: How to build a cyber resilient business

For many U.S. workers the switch to remote work is a permanent one. That means more high-stakes work is being conducted on self-configured home networks. For others, home networks are simply hosting more devices as smart doorbells, thermostats and refrigerators now connect to the internet. Security experts warn that while the internet of things (IoT) […]

The post Podcast: Can we fix IoT security? appeared first on Webroot Blog.

Read More Podcast: Can we fix IoT security?

Introduction It’s important for a business to be prepared with an exercised business continuity and disaster recovery (BC/DR) plan plan before its hit with ransomware so that it can resume operations as quickly as possible. Key steps and solutions should be followed to prepare and respond to cyber threats or attacks against your organization. It […]

The post An MSP and SMB guide to disaster preparation, recovery and remediation appeared first on Webroot Blog.

Read More An MSP and SMB guide to disaster preparation, recovery and remediation

In a previous post, we talked a bit about what pen testing is and how to use the organizations that provide them to your benefit. But, what about when one of them hands a client a failing grade? Consider this, you’re an MSP and you get a letter or email from one of your customers […]

The post Oh no! A client failed a pen test. Now what? appeared first on Webroot Blog.

Read More Oh no! A client failed a pen test. Now what?

You’ve likely heard of software-as-a-service (SaaS), infrastructure-as-a-service (IaaS), and numerous other “as-a-service” platforms that help support the modern business world. What you may not know is that cybercriminals often use the same business concepts and service models in their own organizations as regular, non-criminal enterprises; i.e., the same practices the majority of their intended victims […]

The post An Inside Look at Cybercrime-as-a-Service appeared first on Webroot Blog.

Read More An Inside Look at Cybercrime-as-a-Service

The global pandemic that began to send us packing from our offices in March of last year upended our established way of working overnight. We’re still feeling the effects. Many office workers have yet to return to the office in the volumes they worked in pre-pandemic. For MSPs, that makes up a good portion of […]

The post Podcast: Cyber resilience in a remote work world appeared first on Webroot Blog.

Read More Podcast: Cyber resilience in a remote work world

If you’re an admin, service provider, security executive, or are otherwise affiliated with the world of IT solutions, then you know that one of the biggest challenges to overcome is efficacy. Especially in terms of cybersecurity, efficacy is something of an amorphous term; everyone wants it to be better, but what exactly does that mean? […]

The post 5 Tips to get Better Efficacy out of Your IT Security Stack appeared first on Webroot Blog.

Read More 5 Tips to get Better Efficacy out of Your IT Security Stack

Typically, when cryptocurrency values change, one would expect to see changes in crypto-related cybercrime. In particular, trends in Bitcoin values tend to be the bellwether you can use to predict how other currencies’ values will shift, and there are usually corresponding shifts in crypto-based crime, such as ransomware, though it’s not necessarily the kind of […]

The post How Cryptocurrency and Cybercrime Trends Influence One Another appeared first on Webroot Blog.

Read More How Cryptocurrency and Cybercrime Trends Influence One Another

At Webroot, we could go on and on about user experience (UX) design. The study of the way we interact with the tools we use has spawned entire industries, university programs and professions. A Google Scholar search of the term returns over 300 thousand results. Feng Shui, Leonardo Davinci and Walt Disney are all described […]

The post Human-centered Design in the New Webroot Management Console appeared first on Webroot Blog.

Read More Human-centered Design in the New Webroot Management Console

In the United States, there are approximately 350,000 companies contracting for the Department of Defense. Each of these companies have to meet varying degrees of compliance and are now subject to the Cybersecurity Maturity Model Certification (CMMC). Effectively, CMMC means that before a DoD contractor can execute on their contract, they have to receive an […]

The post What Real Security and Compliance Look like when Managing 5000+ Endpoints appeared first on Webroot Blog.

Read More What Real Security and Compliance Look like when Managing 5000+ Endpoints

“It is a nightmare. Do all you can to prevent ransomware.” – A survey respondent Many businesses are hesitant to talk about their experiences with ransomware. It can be uncomfortable to cop being hit. Whether it’s shame at not doing more to prevent it, the risk of additional bad publicity from discussing it or some other […]

The post We Finally Got Businesses to Talk About Their Run-ins With Ransomware. Here’s What They Said. appeared first on Webroot Blog.

Read More We Finally Got Businesses to Talk About Their Run-ins With Ransomware. Here’s What They Said.

Ransomware attacks generate big headlines when the targets are government entities, universities and healthcare organizations. But there’s one increasingly frequent target of ransomware attacks that tends to slip under the radar. Small and midsize businesses (SMBs) have become bigger financial targets for hackers. As Webroot Senior Threat Researcher Kelvin Murray points out in a recent […]

The post Why SMBs are Under Attack by Ransomware appeared first on Webroot Blog.

Read More Why SMBs are Under Attack by Ransomware

“I solemnly swear to back up my important documents and precious memories on March 31st.” Are you taking the pledge this World Backup Day? Now in its tenth year, World Backup Day remains one of our favorite reminders of the risks of not backing up the data we hold dear. According to the World Backup […]

The post This World Backup Day, Our Customers Do the Talking appeared first on Webroot Blog.

Read More This World Backup Day, Our Customers Do the Talking

Last year’s SolarWinds attack and its aftermath have provided numerous lessons concerning the dangers of IT supply chain attacks. Not all apply to every small and medium-sized business—most are unlikely to be targeted by highly trained state-backed hackers with virtually limitless funding—but some will be. We learned, for instance, that even IT pros could use […]

The post A Defense-in-Depth Approach Could Stop the Next Big Hack in its Tracks appeared first on Webroot Blog.

Read More A Defense-in-Depth Approach Could Stop the Next Big Hack in its Tracks

For most small businesses, the chances of falling prey to a long-term covert surveillance operation by well-resourced, likely state-backed actors are slim. To recap, that is what the evidence suggests happened in the SolarWinds compromise discovered last December. Many believe the company’s Orion update was used to conduct cyber espionage for months prior to being […]

The post Reducing the Time to Discovery: How to Determine if You Have Been Hacked appeared first on Webroot Blog.

Read More Reducing the Time to Discovery: How to Determine if You Have Been Hacked

Buzzwords and acronyms abound in the MSP industry, an unfortunate byproduct of marketing years in the making. Cybersecurity is a hot watercooler topic at any business. Well, now probably more likely a virtual happy hour than a watercooler, but nevertheless cybersecurity remains top-of-mind. To sleep at night, MSPs feel they must enhance or expand their […]

The post Fools Rush in: 5 Things MSPs Should Know Before Adopting EDR appeared first on Webroot Blog.

Read More Fools Rush in: 5 Things MSPs Should Know Before Adopting EDR

Most people would categorically agree that increased privacy online is a good thing. But in practice, questions of privacy online are a bit more complex. In recent months, you’ve likely heard about DNS over HTTPS, also known as DNS 2.0 and DoH, which is a method that uses the HTTPS protocol to encrypt DNS requests, […]

The post The NSA Wants Businesses to Use DoH. Here’s What You Need to Know. appeared first on Webroot Blog.

Read More The NSA Wants Businesses to Use DoH. Here’s What You Need to Know.

In today’s rapidly evolving cybersecurity landscape, the battle for privacy and security is relentless. Cybercriminals are masters at using technology and psychology to exploit basic human trust and compromise businesses of all sizes. What’s more, they often hide in plain sight, using both covert and overt tactics to cause disruption, steal money and data, and […]

The post Hacker Personas Explained: Know Your Enemy and Protect Your Business appeared first on Webroot Blog.

Read More Hacker Personas Explained: Know Your Enemy and Protect Your Business

While we can all rejoice that 2020 is over, cybersecurity experts agree we haven’t seen the last of the pandemic-related rise in cyberattacks. Throughout the last year, we’ve seen huge spikes in phishing, malicious domains, malware and more, and we don’t expect that to slow down. As employees around the world continue to work from […]

The post How IT Will Prevail in the 2021 Cyber-Demic appeared first on Webroot Blog.

Read More How IT Will Prevail in the 2021 Cyber-Demic

The supply chain attack that Trojanized a SolarWinds update to infect and spy on the IT management platform’s customer base continues to be analyzed. Early reports have called the methods highly sophisticated and the actors highly trained. We do know that IP addresses, a command and control server and a malicious product update file were […]

The post Essential Threat Intelligence: Importance of Fundamentals in Identifying IOCs appeared first on Webroot Blog.

Read More Essential Threat Intelligence: Importance of Fundamentals in Identifying IOCs

We’ve been doing our homework, and two things seem to be true about cybersecurity awareness training simultaneously: It can be very effective at protecting businesses from one of the most common security threats they face (the majority, according to the Ponemon Institute). Namely, phishing. MSPs, often the single most reliable source of cybersecurity for small […]

The post Four Roadblocks to Increasing Employee Security Through User Training appeared first on Webroot Blog.

Read More Four Roadblocks to Increasing Employee Security Through User Training

Today, the average enterprise uses over 2000 cloud applications and services, and we expect this number will continue to grow as more businesses realize the efficiency, flexibility and collaboration benefits these services bring. But the use of cloud-based applications also comes with a few caveats; for example, the apps themselves may pose potential security vulnerabilities, […]

The post How to Stop Shadow IT, Manage Access and Ensure Security with Cloud Applications appeared first on Webroot Blog.

Read More How to Stop Shadow IT, Manage Access and Ensure Security with Cloud Applications

Security awareness training is one of the most straightforward ways to improve a business’ overall resilience against cyberattacks. That is, when you get it just right. Thanks to the disruptions to “normal” work routines that COVID-19 has brought, launching a company-wide training program to teach end users how to avoid phishing scams and online risks […]

The post How to Build Successful Security Awareness Training Programs in 2021 and Beyond appeared first on Webroot Blog.

Read More How to Build Successful Security Awareness Training Programs in 2021 and Beyond