The cultural shift toward remote work has been a major catalyst for change among companies across the globe. According to Upwork’s latest Future Workforce Report, a massive 73% of all businesses will have remote employees by 2028. Already, this trend is impacting how organizations approach IT and information security. And, according to a recent Channel Futures article, the … [Read more...]
Everything Your Need to Know About SIM-Jacking
Over the past year, we’ve seen reports of SIM-jacking, a particularly malicious attack hackers are using to assume control of victims’ digital and financial lives. What is SIM-jacking and how exactly does it happen? These attacks allow hackers to take over a person’s cell phone number and usually their digital life along with it. Threat actors typically start by social … [Read more...]
WatchGuard Wi-Fi Cloud Wins Wi-Fi Security Solution of the Year Award
The CyberSecurity Breakthrough Awards 2018 winners were officially announced last week, and we're thrilled to report that WatchGuard Wi-Fi Cloud has been selected as the winner of one of the program's marquee awards: "Wi-Fi Security Solution of the Year." The CyberSecurity Breakthrough Awards recognize the world's best in information security by honoring the excellence, … [Read more...]
The Key To Cyber Self-Defense: Know Your Enemy
The many cyber-attacks making daily news headlines are generated by a variety of different types of threat actors, each with their own set of motivations. A recent article on Slate breaks down the need for cyber self-defense, emphasizing that the first step in protecting your data is to identify exactly what types of information you should be protecting, and who might want to … [Read more...]
Six Ways Hackers Can Use Your Selfies Against You
When was the last time you posted photo on Instagram, Facebook or Twitter? Chances are, it’s been less than a week. Although sharing images on social media platforms is a fun way to visually engage with your network, you might not realize that these posts can also offer cybercriminals an opportunity to gather information they can use against you. In his latest column on … [Read more...]