Blog Posts Tagged with "Prevention"

294bb83c6b16fd49b4b29b275f319000

How to Protect SMBs Against Phishing Attacks via Social Engineering

November 06, 2018 Added by:Timur Kovalev

Attackers are constantly changing tactics, so ensuring that you are armed against the latest threats is critical.

Comments  (0)

A4c42684a8889958a83ecca5d2fe59e5

Buy, Rent, or Uber Your Security Operations Center

November 05, 2018 Added by:A. N. Ananth

What better way to provide continuous monitoring and analysis than through a security operations center (SOC)? But a SOC is complex and expensive.

Comments  (0)

F9b46f5646b843bd0f87903611d30aad

Ransomware: Keep Safe and Stay Safe

October 09, 2018 Added by:Richard Hummel

Ransomware may not be the threat it once was, but it still poses a risk to the files and systems of businesses everywhere.

Comments  (0)

A98c8f7dbb46467b790e2ac1fbbd3f50

EDR for Everyone Is about Fighting Alert Fatigue

February 21, 2018 Added by:Liviu Arsene

Endpoint detection and response solutions (EDR) are predicted to become a key security technology by 2020.

Comments  (0)

3cf030edb83351856102235bcee85613

Healthcare Orgs in the Crosshairs: Ransomware Takes Aim

November 03, 2017 Added by:Sanjay Ramnath

Ransomware and other threats are not going away anytime soon and healthcare will continue to be a target for attackers. The hope is that healthcare professionals continue to keep IT security top of mind.

Comments  (0)

591c39c65cf5c298ccd0f1cd5818e961

The Weakest Link In Banking Security – ATMs

October 03, 2017 Added by:Vanishree Rao

We have recently seen the weak link theory play out with the very familiar Automated Teller Machines (ATMs) that are used regularly around the globe.

Comments  (0)

Cddf97a969951d5d4db2728c7894524b

Malware Prevention Key to Countering Evasive Attack Techniques

June 28, 2017 Added by:Eddy Bobritsky

We can’t stay in the malware arms race by building a tool for every trick malware creators conjure up. It’s critical that we develop broadly applicable methods that frustrate their efforts by turning those tricks into defensive weapons.

Comments  (0)