Our research focuses on not only analyzing the current threats, but also the threat trends that we identify. This year we have seven key trends we’re watching closely.
Category Archives: Malware
Cybersecurity for small and medium-sized business presentation
Many businesses tend to underestimate their cybersecurity risks, and as a result, make themselves appetizing targets for malicious hackers, malware and other problematic activity. Cybersecurity is a critical part of every business’ operational durability. Without attention to it, an attack can be crippling. We recommend business owners and managers view cybersecurity as an investment, rather than a sunk cost, as it pays in dividends of business continuity and resilience.
Securing your business’ remote workforce: part 1
With novel coronavirus (COVID-19) creating more demand for companies to facilitate remote work capabilities for employees, security must be carefully managed. A number of new threat trends are specifically targeting remote workers, including phishing, malware, directed attacks on home networks and more. We have compiled this list of best practices and configurations to avoid to assist your company in managing its remote workforce and maximizing security resilience as a follow-up to our article about preparing your business for remote work. In addition, please review our cybersecurity presentation for SMBs: risks, trends and best practices.
The criticality of preventive maintenance to business cybersecurity and IT continuity
We all know that awful feeling when technology isn’t working as we expect, or worse yet, we suspect our security has been breached. It sparks anxiety, frustration and even impulsive decision making. But just how did we get to such an unpleasant place?
Top ten tips to tighten small business cybersecurity
Small businesses are often targeted by malicious hackers. The motivation for this activity comes down to the perception of softer cybersecurity. Many small companies have easier to access sensitive resources and lower awareness of unauthorized activity on their systems and network(s).