“It is a nightmare. Do all you can to prevent ransomware.” – A survey respondent Many businesses are hesitant to talk about their experiences with ransomware. It can be uncomfortable to cop being hit. Whether it’s shame at not doing more to prevent it, the risk of additional bad publicity from discussing it or some other […]
The post We Finally Got Businesses to Talk About Their Run-ins With Ransomware. Here’s What They Said. appeared first on Webroot Blog.
Read More We Finally Got Businesses to Talk About Their Run-ins With Ransomware. Here’s What They Said.
Ransomware attacks generate big headlines when the targets are government entities, universities and healthcare organizations. But there’s one increasingly frequent target of ransomware attacks that tends to slip under the radar. Small and midsize businesses (SMBs) have become bigger financial targets for hackers. As Webroot Senior Threat Researcher Kelvin Murray points out in a recent […]
The post Why SMBs are Under Attack by Ransomware appeared first on Webroot Blog.
Read More Why SMBs are Under Attack by Ransomware
A little over a decade ago, John Kindervag outlined the Zero Trust security model. As a VP and Principal Analyst on the Security and Risk Team at Forrester Research, he spent years doing primary research and the result was a new model of trust, a new a…
Read More Zero Trust creator talks about implementation, misconceptions, strategy
With an unexpected year of massive change behind us, many organizations have now an extensive remote workforce, new technologies in use, and digital transformation under way across the board. While this has introduced many opportunities for SMBs, it ha…
Read More 5 key cybersecurity risks in 2021, and how to address them now
There is no doubt that the COVID-19 pandemic has caused radical changes in our personal and working lives. The sudden and massive surge of employees working from home and the anticipated long-term popularity of the option is also forcing CIOs and CISOs…
Read More With data volumes and velocity multiplying, how do you choose the right data security solution?
Microsoft has released Exchange On-Premises Mitigation Tool (EOMT), which quickly performs the initial steps for mitigating the ProxyLogon flaw (CVE-2021-26855) on any Exchange server and attempts to remediate found compromises. “This tool is not…
Read More Microsoft releases one-click Exchange On-Premises Mitigation Tool
Despite the rising ransomware numbers and the numerous related headlines, many small and medium-sized businesses (SMBs) still don’t consider themselves at risk from cyberattacks. Nothing could be further from the truth. Smaller organizations are a prime target, and ransomware authors have only upped the ante in their methods to ensure they get paid. For example, […]
The post 3 Ransomware Myths Businesses Need to Stop Believing ASAP appeared first on Webroot Blog.
Read More 3 Ransomware Myths Businesses Need to Stop Believing ASAP
One of the reasons why there’s so much cybercrime is because there are so many ways for cybercriminals to exploit vulnerabilities and circumvent even the best defenses. You may be surprised to find that one of the biggest vulnerabilities is users. Many successful attacks could actually be prevented if users just knew what to look […]
The post Who’s Hacking You? appeared first on Webroot Blog.
Read More Who’s Hacking You?
Women entrepreneurs have a history of being underfunded and that remains to be a core issue, says Sarah Steele, senior director of small business products at Visa Canada. This often leaves a majority of motivated, entrepreneurial women with no choice b…
Read More Canadian women entrepreneurs getting access to IFundWomen program from Visa Canada
For most small businesses, the chances of falling prey to a long-term covert surveillance operation by well-resourced, likely state-backed actors are slim. To recap, that is what the evidence suggests happened in the SolarWinds compromise discovered last December. Many believe the company’s Orion update was used to conduct cyber espionage for months prior to being […]
The post Reducing the Time to Discovery: How to Determine if You Have Been Hacked appeared first on Webroot Blog.
Read More Reducing the Time to Discovery: How to Determine if You Have Been Hacked
While we can all rejoice that 2020 is over, cybersecurity experts agree we haven’t seen the last of the pandemic-related rise in cyberattacks. Throughout the last year, we’ve seen huge spikes in phishing, malicious domains, malware and more, and we don’t expect that to slow down. As employees around the world continue to work from […]
The post How IT Will Prevail in the 2021 Cyber-Demic appeared first on Webroot Blog.
Read More How IT Will Prevail in the 2021 Cyber-Demic