Researchers with threat intelligence company KELA have recently analyzed 48 active threads on underground (dark web) marketplaces made by threat actors looking to buy access to organizations’ systems, assets and networks, and have found that at l…Read More Researchers pinpoint ransomware gangs’ ideal enterprise victims
The issue at the heart of ransomware insurance will be familiar to most parents of young children: rewarding bad behavior only invites more of the same, so it’s generally not a good idea. But critics of the ransomware insurance industry argue that’s exactly what the practice does. Ransomware insurance has by now long been suspected […]
The post It’s time to ask: Is ransomware insurance bad for cybersecurity? appeared first on Webroot Blog.Read More It’s time to ask: Is ransomware insurance bad for cybersecurity?
In March of 2020 schools throughout the United Kingdom closed their doors to try to stem the spread of the coronavirus. In addition to disruptions to the lives of students and their families, the pandemic put unprecedented pressure on IT departments across the UK and wider world. Notoriously strapped for resources, many schools’ IT departments […]
The post As workforces migrate from offices, workflows migrate to the cloud appeared first on Webroot Blog.Read More As workforces migrate from offices, workflows migrate to the cloud
At Carbonite + Webroot, we’re always preaching about the importance of layering security solutions. Because here’s the truth: data’s always at risk. Whether from cybercriminals, everyday mishaps or mother nature, businesses can put up all the defenses they want but disaster only has to successfully strike once. The global pandemic means more work is being […]
The post Redundancy for resilience: The importance of layered protection in the cloud appeared first on Webroot Blog.Read More Redundancy for resilience: The importance of layered protection in the cloud
It’s not just that they’re making headlines more often. Ransomware rates really are rising. Given the recent spate of high-profile attacks, it’s worth remembering the difference between standard backup and high-availability replication. Our research suggests that the costs of ransomware for businesses can amount to much more than an extortion payment. They include lost hours […]
The post What’s the difference between high availability and backup again? appeared first on Webroot Blog.Read More What’s the difference between high availability and backup again?
The head of a website that offers free cybersecurity resources tells a virtual conference what SMBs need to do to improve their maturityRead More Advice for SMBs: Focus on cybersecurity basics
Almost a decade ago, ransomware started becoming a prominent consumer problem, locking computers and threatening users with fines and jail time for supposedly downloading unlicensed software or child pornography. Not long after that cyber criminals swi…Read More Sophos XDR: Threat hunting through the entire security ecosystem
What’s better for getting your business’ name out there and boosting sales than having a killer business marketing plan with well-placed ads, zippy copy, and a slick design? The answer is: having a group of dedicated real-world customers who use their own platforms to advocate for your business and its offerings. Thanks to social media, […]
The post Building a Successful Customer Advocacy Program (Hint: It’s Not How You Think) appeared first on Webroot Blog.Read More Building a Successful Customer Advocacy Program (Hint: It’s Not How You Think)
Cybersecurity is not a One-Stop-ShopBoris Johnson announced the Government’s roadmap to lift Coronavirus restrictions for both businesses and the general public earlier in February, and since then, this has provided a glimmer of hope for many across th…Read More Cybersecurity Is Not A One-Stop-Shop
“It is a nightmare. Do all you can to prevent ransomware.” – A survey respondent Many businesses are hesitant to talk about their experiences with ransomware. It can be uncomfortable to cop being hit. Whether it’s shame at not doing more to prevent it, the risk of additional bad publicity from discussing it or some other […]
The post We Finally Got Businesses to Talk About Their Run-ins With Ransomware. Here’s What They Said. appeared first on Webroot Blog.Read More We Finally Got Businesses to Talk About Their Run-ins With Ransomware. Here’s What They Said.
Ransomware attacks generate big headlines when the targets are government entities, universities and healthcare organizations. But there’s one increasingly frequent target of ransomware attacks that tends to slip under the radar. Small and midsize businesses (SMBs) have become bigger financial targets for hackers. As Webroot Senior Threat Researcher Kelvin Murray points out in a recent […]Read More Why SMBs are Under Attack by Ransomware
For most small businesses, the chances of falling prey to a long-term covert surveillance operation by well-resourced, likely state-backed actors are slim. To recap, that is what the evidence suggests happened in the SolarWinds compromise discovered last December. Many believe the company’s Orion update was used to conduct cyber espionage for months prior to being […]
The post Reducing the Time to Discovery: How to Determine if You Have Been Hacked appeared first on Webroot Blog.Read More Reducing the Time to Discovery: How to Determine if You Have Been Hacked
While we can all rejoice that 2020 is over, cybersecurity experts agree we haven’t seen the last of the pandemic-related rise in cyberattacks. Throughout the last year, we’ve seen huge spikes in phishing, malicious domains, malware and more, and we don’t expect that to slow down. As employees around the world continue to work from […]Read More How IT Will Prevail in the 2021 Cyber-Demic