The cultural shift toward remote work has been a major catalyst for change among companies across the globe. According to Upwork’s latest Future Workforce Report, a massive 73% of all businesses will have remote employees by 2028. Already, this trend is impacting how organizations approach IT and information security. And, according to a recent Channel Futures article, the … [Read more...]
Why the 2FA Lawsuit Against Apple Doesn’t Have Two Legs to Stand On
Multi-Factor Authentication (MFA) is one of the most powerful security controls in existence. At WatchGuard, we believe that strong authentication is the cornerstone of security, which is why it’s so encouraging to see MFA beginning to become increasingly common in everyday products and services. So, what happens when one Apple customer decides to file a class action lawsuit … [Read more...]
Why WPA3 Is Not a Cure-all for Wi-Fi Hacking
Do you remember the Key Re-installation Attack or “KRACK attack” news from 2017? Most of us will never forget. When one researcher uncovered a number of vulnerabilities present in WPA2’s 4-way handshake, the world was shocked to realize that such a trusted standard’s encryption could be defeated so easily. In response, the Wi-Fi industry rallied together to develop an improved … [Read more...]
Vaporworms – The Top Threat of 2019?
Anyone that’s been paying attention knows that fileless malware has been on the rise for the past few years. But, did you know that we’re likely to see this infamous threat transform in new and menacing ways this year? Enter the Vaporworm. Just a few short months ago, the WatchGuard Threat Lab predicted that 2019 would be the year we’d see a new breed of fileless malware with … [Read more...]
Artificial Intelligence: An Essential Layer of Security for Businesses of All Sizes
Cyber attacks occur in the blink of an eye. A single point of infection can spread like wildfire from endpoint to endpoint; location to location; and business to business. Traditional approaches to protection rely heavily on manual processes and preestablished policies to block attacks that fail to keep up with the ever-evolving nature of threats. Parsing through huge … [Read more...]