We recently surveyed 600 security professionals to hear their view on the state of endpoint security in 2018. Here’s what we learned.
MSPs: Defining Your Security Services Commitments
If you’re thinking of adding on a security services offering to your practice or already have such a solution, confirm that your customers know what to expect from your security service.
Read More >>MSPs – 3 Steps to Making Security Profitable and Valuable
If you’re like most MSPs, you’re always looking to increase either the scope of current services within a given customer or are looking to expand your service offerings.
Read More >>GhostMiner: Cryptomining Malware Goes Fileless
Cybercriminals are increasingly relying on malicious cryptominers as a way of making money online, often shifting from using ransomware or diversifying revenue streams.
Read More >>Endpoint Vaccination: Your IR Teams will Thank You
Contain the next malware outbreak and learn how endpoint vaccination works magic in your incident response.
Read More >>Why are Municipalities and Governmental Services a Prime Target for Cybercriminals?
Threats to state and local governments can be prevented before having to pay a fortune in remediation costs. Learn why municipalities and governmental services are a prime target for . . .
Read More >>Mimicry: The Evolution of Deceptive Defenses and Attacks
Many aspects of cyber-attacks resemble time-tested techniques found in nature. Self-propagating malware is reminiscent of biological viruses spreading from one organism to another, or malicious . . .
Read More >>The Upsurge in Evasive Malware
At this point in our industry’s history, pretty much every IT professional is very aware of the need for a security strategy that not only protects against current threats, but one that’s also . . .
Read More >>Protecting ATMs Against Jackpotting Attacks
Jackpotting attacks against ATMs are highly profitable, and often involve both logical and physical attack vectors. How can banks and ATM manufacturers safeguard their systems against such . . .
Read More >>Considerations for Augmenting Antivirus Protection on the Endpoint
When deciding how to augment your baseline AV protection on the endpoint, understand the benefits and operational characteristics of each approach you’re considering. Here are a few guidelines.
Read More >>Evasive Malware: Learning by Example
Malware authors are evolving as quickly as the AV and security vendors are. Here are some examples of how evasive techniques were implemented in attacks that hit the headlines.
Read More >>Why Your Security Solution Isn’t Catching Evasive Malware
You’re already keenly aware of the malware threat to your organization – this nasty vehicle by which ransomware, external attacks, and data breaches enter in has become so rampant, you have layers . . .
Read More >>