Software >
|
Malicious Software
|
|
Malicious Software Reports
|
|
Work from home securely by following these simple tips
sponsored by Zivver
WHITE PAPER:
Businesses are still getting used to remote employees, and as such, security concerns are still being raised. But these remote employees can help ease some of these concerns by being more mindful about IT security. Study this article to learn 8 security tips for keeping your work-from-home environment on lockdown.
Posted: 08 Feb 2021 | Published: 03 Feb 2021
|
|
|
How to Mitigate the Risk of Ransomware Attacks
sponsored by Keeper Security Inc
VIDEO:
Ransomware is becoming one of the most pervasive and consequential threats facing organizations. In this webinar, take a closer look at the key features and capabilities of the Keeper platform, designed to mitigate the risk of ransomware attacks.
Posted: 12 Oct 2020 | Premiered: 12 Oct 2020
|
|
|
Global Phishing Pandemic? You Be the Judge.
sponsored by Inky Technology
RESOURCE:
Since the start of the COVID-19 health crisis, complaints to the FBI’s Internet Crime Complaint Center (IC3) have more than tripled. Why are there so many of these coronavirus-related email phishing threats and where are they coming from? View this article to get a link to a free report of COVID-19 phishing examples around the world.
Posted: 05 Oct 2020 | Published: 05 Oct 2020
|
|
|
Omdia Market Radar: Outbound Email Security
sponsored by Zivver
WHITE PAPER:
When it comes to email security, organizations put their primary focus on potential threats coming in. And that’s fine, but outbound email security is arguably just as important. Browse this white paper to get a closer look at outbound email data protection, which focuses on building controls to offset risks from the insider threat.
Posted: 09 Dec 2020 | Published: 09 Dec 2020
|
|
|
Credential Harvesting: Virtually Hijacking Your Employee’s Credentials
sponsored by Inky Technology
RESOURCE:
Credential harvesting is an approach often used by hackers to virtually hijack your employee’s accounts simply by using their password(s). In this INKY blog post, take a closer look at how credential harvesting works and what practices your organization can implement to minimize the risk.
Posted: 08 Oct 2020 | Published: 08 Oct 2020
|
|
|
CEO Impersonation
sponsored by Inky Technology
WHITE PAPER:
Threat actors have realized that they can achieve at least a minimal rate of success by impersonating a company’s CEO or other high-level official in an email to an employee lower down in the organization. They will typically request money via wire transfer, but it does not stop there. Read this white paper to see some examples.
Posted: 02 Oct 2020 | Published: 02 Oct 2020
|
|
|
Exploiting a Pandemic Coronaphish COVID-19 Phishing Scams
sponsored by Inky Technology
WHITE PAPER:
Phishing scams are constantly evolving, seeking out more effective ways to bypass security measures and trick recipients. In this edition of Understanding Phishing, explore how the COVID-19 pandemic has changed phishing campaigns by dissecting a few real-world examples.
Posted: 01 Oct 2020 | Published: 01 Oct 2020
|
|
|
State Of Malware
sponsored by Malwarebytes
ANALYST REPORT:
2020 was a year of tragedy, upheaval, and adaptation. People and organizations adapted, but so did the cybercriminals who preyed upon them.Download this report to learn more about the state of malware as we enter the new year.
Posted: 10 Mar 2021 | Published: 10 Mar 2021
|
|
|
Five Critical Requirements for Internal Firewalling in the Data Center
sponsored by VMware
WHITE PAPER:
Forrester reports that 58% of companies faced a significant security incident in 2019 despite spending more to secure their networks. Much of this is due to overreliance on perimeter firewalls, which has been a handicap for organizations in recent years. Open this VMware report to get a glimpse at their next-generation firewall technology.
Posted: 01 Sep 2020 | Published: 31 Mar 2020
|
|
|
The Rise of Credential Stuffing Attacks: How to Keep Employee Accounts Secure
sponsored by TechTarget
RESOURCE:
As long as employees are responsible for like passwords and accounts, there will be threats targeting those credentials. This e-guide offers expert insight into protecting your employees against credential stuffing attacks, highlighting key challenges, hacker methods, best practices, and more.
Posted: 02 Apr 2021 | Published: 02 Apr 2021
|
|
|
|
|