Spear phishing 101: what you need to know
We look at the threat of spear phishing, why it’s such a problem, and what organizations can do to lessen the chance of a successful attack.
What to do when you discover a data breach
You’ve discovered that your organization has been breached. Now what? Learn which steps to take in the immediate aftermath to limit the damage and preserve your company’s reputation.
Businesses: It’s time to implement an anti-phishing plan
If your organization doesn’t have an anti-phishing plan in place, it’s time to start thinking about one. Here’s what to tell your employees and customers about phishing attacks.
Data scraping treasure trove found in the wild
3 large databases containing scraped content landed in front of security researchers. How bad is it?
6 security concerns to consider when automating your business
When considering an automation strategy, business representatives must be aware of any security risks involved. Here are six automating concerns network admins and other IT staff should keep in mind.
How to create a sticky cybersecurity training program
Organizations know that training employees is not only expensive but time-consuming. But when it comes to cybersecurity, training is a must. Whether you’re an organization of 50 or 50,000, this guide will show you the ropes in creating a cybersecurity training program that works from start to finish.
Bring your own security (BYOS): good idea or not?
We know about BYOD. What about BYOS? Is it a good idea to Bring Your Own Security, or use your own security solution on devices that you use for work? What if they are company owned? We walk companies and employees through the pros and cons of each.
How to protect your RDP access from ransomware attacks
Ransomware distributors have started using RDP to gain access to business networks. Do you have your remote desktops under control?
White hat, black hat, and the emergence of the gray hat: the true costs of cybercrime
Osterman Research recently completed a major survey on behalf of Malwarebytes to determine the actual cost of cybercrime to businesses. Here’s what we discovered.
4 steps for improving employee trust while securing them
4 key steps you can take within your business to help gain trust with your employees while educating them to make more secure decisions.