With the average person managing 90 accounts that require a username and password, and credential-stealing malware on the rise, your users are firmly in the crosshairs of cyber criminals. At the same time, the drive toward workplace flexibility and desire to empower people to work where they are most comfortable challenges some foundations of cyber security. More work than ever … [Read more...]
Security for Users on the Go, without the Extra Baggage
Mark likes to return customer emails from his local coffee shop, Jennifer considers a plane her second office, and Tim – well, sometimes Tim has to respond to that urgent request in the wee hours of the morning, no matter where he is. The days where everything was contained within your secure network perimeter are gone. Business today happens on the go. There are more … [Read more...]
In Breaches, as in Life, Time Is Money
In 2017, Ransomware wreaked havoc around the globe, bringing business, hospitals, and government organization alike to a grinding halt. Thousands were greeted by ominous messages demanding ransom payment to decrypt their files, and news of the attacks spread nearly as fast as the attacks themselves. But, in my opinion, one of the broader consequences of those dark days of … [Read more...]
PowerShell, the Double-Edged Sword
Eset researchers recently revealed some rather sophisticated fileless malware samples that cyber criminals use. Fileless malware is malicious software that only runs directly in computer memory, making it more difficult for traditional malware products to detect. The WatchGuard Threat Lab predicted a general rise of fileless malware during 2019, but more specifically forecasted … [Read more...]
5 Security Tips for Spring Cleaning Season
Spring is well underway and summer is just around the corner. If you haven’t gotten around to giving your network a good spring cleaning yet, now is the perfect time to step back and sweep out the cobwebs to improve your security posture. In his latest guest article for Help Net Security, WatchGuard’s Sr. Security Researcher, Marc Laliberte, suggests a few key tips you can use … [Read more...]