Free Cybersecurity Resources

Filter

Unified Endpoint Management Enters the Mainstream

August 9, 2022
Unified Endpoint Management Enters the Mainstream Once upon a time, there was anti-virus. Then anti-spam, adware, malware protection, ransomware protection, mobile device protection, and on and on. As new threats…

Flaws, Bugs, Zero Days, and Breaches: Welcome to the New Normal

August 8, 2022
Flaws, Bugs, Zero Days, and Breaches: Welcome to the New Normal Endless bad news typically results in people becoming inured to it. The recent media 24-7 death counts on COVID-19…

Mobility Linked to Surge in Cybercrime

August 5, 2022
Mobility Linked to Surge in Cybercrime An endpoint ecosystem study by Mobile Mentor found a direct correlation between the rise in mobility and a recent surge in cybercrime. With the…

Passwords Will Get Hacked: Be Ready

August 2, 2022
Passwords Will Get Hacked: Be Ready May 5th of 2022 was celebrated as World Password Day. News stories were everywhere about how to improve password security, the best ways to…

Case Study: How Organizations Can Affordably Gain Security Technology and Expertise

August 1, 2022
Case Study: How Organizations Can Affordably Gain Security Technology and Expertise Faced with a shocking increase in security threats – a 500% increase in cybercrime in the last two years,…

Business Email Compromise Attacks on the Rise

May 14, 2022
Business Email Compromise Attacks on the Rise Increased BEC Attacks Business Email Compromise (BEC) breaches are turning into the go-to strategy for cybercriminals. The FBI’s Internet Crime Complaint Center (IC3)…

Who Is Securing Our Systems?

May 13, 2022
Who Is Securing Our Systems? The Question of Security With compute environments being so distributed and so cloud oriented, confusion is inevitable, particularly on the security side. Within organizations, applications…

Gartner Predicts the Future of Endpoint Security

May 13, 2022
Gartner Predicts the Future of Endpoint Security What's Coming for Endpoint Security? Gartner recently completed an in-depth review of the entire endpoint security landscape. The analyst firm delved into every…

Ransomware Continues to Wreak Havoc

May 13, 2022
Ransomware Continues to Wreak Havoc The Rise of Ransomware Ransomware has been in the headlines for a couple of years now. One day, stories will be written that explain how…

How Cloud Anarchy Leads to Insecurity

May 4, 2022
How Cloud Anarchy Leads to Insecurity The Issue of "Overclouding" The scope of some cities in Asia boggles the mind. There are places in China you never heard of that…

Top 4 Cybersecurity Trends for 2022

April 19, 2022
Top 4 Cybersecurity Trends for 2021 Top Four Cybersecurity Trends for 2022   There are a great many influences at work in the cybersecurity sector, and many security trends impacting organizations.…

Why IT Security Must Become More Automated

September 23, 2021
Why IT Security Must Become More Automated The Case for IT Automation There was a time when manual security and manual IT tasks were workable. But that day passed a…

The List of Breaches Lengthens: McDonald’s, Volkswagen and Audi

July 4, 2021
The List of Breaches Lengthens: McDonald’s, Volkswagen and Audi High-Profile Corporate Breaches Making Headlines Hardly a day goes by, it seems, without another high-profile victim of hacking being exposed. The…

3 Ways to Greatly Reduce Cyber Risk

June 17, 2021
3 Ways to Greatly Reduce Cyber Risk Report Reveals the Rise of Ransomware and Importance of the Human Element The Verizon Data Breach Investigations Report is eagerly awaited each year.…

Top 5 Security Trends of 2021

June 12, 2021
Top 5 Security Trends of 2021 Top IT Security Trends of the Year Gartner recently released a list of the top security trends. How have these changed since COVID-19 hit?…

The Number of Ransomware Victims is Greatly Underreported

June 12, 2021
The Number of Ransomware Victims is Greatly Underreported Is the number of ransomware victims accurate? It seems hard to believe that ransomware numbers are underreported. After all, hardly a week…

Would Hamlet Pay a Ransom?

June 2, 2021
Would Hamlet Pay a Ransom?  Would Hamlet Pay a Ransom? Hamlet once pondered, “To be, or not to be. That is the question.” If the Prince of Denmark lived in…

How Syxsense Would Respond to the Florida Water Poisoning Attack

February 12, 2021
How Syxsense Would Respond to the Florida Water Poisoning Attack Hackers Attempt Poisoning in Florida Last week an unidentified attacker gained access to a water treatment plant's network and modified…

COVID-19 Causes Increase in Cyberattacks

June 26, 2020
COVID-19 Causes Increase in Cyberattacks Coronavirus is Leading to Growth in Cyber Attacks As the world continues to battle COVID-19, patching and securing endpoints has become a much bigger challenge…

The True Cost of DoS Attacks

May 8, 2020
The True Cost of DoS Attacks A Denial of Service (DoS) attack can seriously derail any business with a digital presence. These attacks are still prevalent in 2020 and the…

Why You Need to Manage Your Endpoints

March 4, 2020
Why You Need to Manage Your Endpoints Endpoint Management is More Critical than Ever Not every security or IT team has a confident endpoint management strategy. A recent survey of…

Endpoint Security vs. Antivirus

February 10, 2020
Antivirus Software is Nice, But It’s Not Enough for Full Endpoint Security As we previously pointed out in our “Endpoint Security 2020: What Your Need to Know” article: “Cyberattacks are…

Why Endpoint Detection and Response is Getting Harder in 2020

February 6, 2020
Why Endpoint Detection and Response is Getting Harder in 2020 The demand for endpoint detection and response solutions across the globe is currently quite strong, with no signs of slowdown…

How Deadly is Ransomware?

February 3, 2020
How Deadly is Ransomware and How Effective are the Protections Against It? Picture the following scenario for a moment: It's a seemingly typical day at the office for your business.…

Why Realtime Security is Crucial

February 27, 2019
Why Realtime Security is Crucial This article originally appeared on TechWormCyberattacks are rapidly growing as a global threat. With more complex and powerful attacks, actors are in a control of…

10 Ways To Protect Your Organization From Cyberattacks

February 19, 2019
10 Ways To Protect Your Organization From Cyberattacks This article originally appeared on ypo.org.Many CEOs don’t want to think about cybersecurity. That’s why you hire a chief technology officer (CTO)…

Ransomware Disrupts Massive Shipping Company

July 27, 2018
Cyberattack Causes Shipping Industry Disaster COSCO, one of the world’s largest shipping companies, has experienced a ransomware attack on their US network. Their Long Beach terminal reported that their website…