Category: Webroot Blog

5 ways to strengthen healthcare cybersecurity

Ransomware attacks are targeting healthcare organizations more frequently. The number of costly cyberattacks on US hospitals has doubled. So how do you prevent these attacks? Keep reading to learn five ways you can strengthen security at your organization. But first,…

The Marvels and Challenges of AI

Let’s delve into the fascinating world of Artificial intelligence (AI), unpacking its concepts, implications, and real-world applications. Brace yourself for an extended journey through the marvels and challenges of artificial intelligence. Part 1: Unleashing marvels in our digital lives Generative…

7 Cyber Safety Tips to Outsmart Scammers

Welcome to the wild west of the digital world where cyber scammers lurk around every pixelated corner. Cybercrime isn’t just a futuristic Hollywood plotline, it’s a real threat that targets everyone—from wide-eyed kids to seasoned adults and wise grandparents. And…

Tax Season Alert: Common scams and cracked software

OpenText is committed to providing you with the latest intelligence and tips to safeguard your digital life, especially during high-risk periods like tax season. Our threat analysts are constantly monitor the ebb and flow of various threats. One trend that…

Uncover the nastiest malware of 2023

Our annual analysis of the most notorious malware has arrived. As always, it covers the trends, malware groups, and tips for how to protect yourself and your organization. This post covers highlights of our analysis, including the rise of ransomware…

How Easy is Email Encryption? You’d Be Surprised.

When it comes to keeping sensitive data safe, email encryption is a necessity. But it doesn’t have to be a necessary evil. Too many employees and IT experts have experienced the pain of trying to use a needlessly complicated email…

Educating girls on how to be their own cyber hero

No matter how old you are, it is important to learn how to stay safe online! According to a study conducted by Learning Innovation, more than 93% of students have access to smartphones and laptops. Cyber threats show no sign…

The 5 most important rules for online shopping

The end of year holidays mark the busiest time of the year for online shoppers. We’re all rushing around trying to find the right gift that doesn’t break the budget. Throw in family time and stress can get out of…

How to stop social engineering tactics

With social engineering now the #1 cause of cyberattacks, it’s imperative for you to learn how to stop social engineering attacks against your business. Your first step in stopping them is to learn what they are and how they work.…

Can your business stop social engineering attacks?

Social engineering attacks like phishing, baiting and scareware have skyrocketed to take the top spot as the #1 cause of cybersecurity breaches. So what makes social engineering so effective? When cybercriminals use social engineering tactics, they prey on our natural…

Cyber threats in gaming—and 3 tips for staying safe

This article has been indexed from Webroot Blog The popularity of online gaming surged during the COVID-19 pandemic—and so did cyberattacks against gamers. If you’re the parent of a gamer, or if you’re a gamer yourself, it’s important to learn…

Social engineering: Cybercrime meets human hacking

This article has been indexed from Webroot Blog According to the latest ISACA State of Security 2021 report, social engineering is the leading cause of compromises experienced by organizations. Findings from the Verizon 2021 Data Breach Investigations Report also point…

Threating hunting: Your best defense against unknown threats

This article has been indexed from Webroot Blog Threat actors are becoming more sophisticated, agile and relentless in their pursuit of stealing personal information for financial gain. Rapid and evolving shifts in the threat landscape require the knowledge and solutions…

Report: Phishing Attacks Sustain Historic Highs

This article has been indexed from Webroot Blog Phishing attacks sustain historic highs In their latest report, IDG and the pros behind Carbonite + Webroot spoke with 300 global IT professionals to learn the current state of phishing. We learned…

The Benefits of Using a VPN on Your Home Network

This article has been indexed from Webroot Blog If you’ve considered using a virtual private network (VPN) at all, it’s likely to establish a secure connection while working remotely or to connect to public networks. But privacy enthusiasts appreciate the…

Pro tips for backing up large datasets

This article has been indexed from Webroot Blog Successfully recovering from disruption or disaster is one of an IT administrator’s most critical duties. Whether it’s restoring servers or rescuing lost data, failure to complete a successful recovery can spell doom…

MSP to MSSP: Mature your security stack

This article has been indexed from Webroot Blog Managed service providers (MSPs) deliver critical operational support for businesses around the world. As third-party providers of remote management, MSPs are typically contracted by small and medium-sized businesses (SMBs), government agencies and…

Making the case for MDR: An ally in an unfriendly landscape

This article has been indexed from Webroot Blog Vulnerability reigns supreme On Oct. 26, we co-hosted a live virtual event, Blackpoint ReCON, with partner Blackpoint Cyber. The event brought together industry experts and IT professionals to discuss how security professionals…

Shining a light on the dark web

This article has been indexed from Webroot Blog Discover how cybercriminals find their targets on the dark web: For the average internet user, the dark web is something you only hear about in news broadcasts talking about the latest cyberattacks.…

Shining a light on the dark web

This article has been indexed from Webroot Blog Discover how cybercriminals find their targets on the dark web: For the average internet user, the dark web is something you only hear about in news broadcasts talking about the latest cyberattacks.…

Ransom hits main street

This article has been indexed from Webroot Blog Cybercriminals have made headlines by forcing Fortune 500 companies to pay million-dollar ransom payments to retrieve their data and unlock their systems. But despite the headlines, most ransomware targets families as well…

The Rise of Ransomware

This article has been indexed from Webroot Blog Ransomware attacks dominate news coverage of the cybersecurity industry. And it’s no wonder – with million-dollar payouts, infrastructure attacks and international manhunts, ransomware makes for exciting headlines. But its recent domination of…

Ransomware Series: Video 2

This article has been indexed from Webroot Blog The Rise of Ransomware Ransomware attacks dominate news coverage of the cybersecurity industry. And it’s no wonder – with million-dollar payouts, infrastructure attacks and international manhunts, ransomware makes for exciting headlines. But…

The 6 Nastiest Malware of 2021

This article has been indexed from Webroot Blog Malware leaps from the darkness to envelop our lives in a cloak of stolen information, lost data and worse. But to know your enemy is to defeat your enemy. So we peered…

What a difference a year makes, or does it?

This article has been indexed from Webroot Blog 2020 was a year of immense change. One thing is for certain – the world collectively witnessed the increase of digital interconnectivity. We began even more to rely on the internet as…

Supply chain attacks are closing in on MSPs

This article has been indexed from Webroot Blog If you attended Black Hat this year, you couldn’t avoid the topic of supply chain attacks. From keynotes to vendor messaging to booth presentations, they were a ubiquitous topic in Las Vegas…

Podcast: How to build a cyber resilient business

This article has been indexed from Webroot Blog Cyber resilience refers to a business’s ability to mitigate damage to its systems, processes and even its reputation. It’s based on the principle that, in the real (and really connected) world, adverse…

Podcast: Can we fix IoT security?

This article has been indexed from Webroot Blog For many U.S. workers the switch to remote work is a permanent one. That means more high-stakes work is being conducted on self-configured home networks. For others, home networks are simply hosting…

Your password is too predictable

This article has been indexed from Webroot Blog Password predictability is one of the most significant challenges to overall online security. Well aware of this trend, hackers often seek to exploit what they assume are the weak passwords of the…

Oh no! A client failed a pen test. Now what?

This article has been indexed from Webroot Blog In a previous post, we talked a bit about what pen testing is and how to use the organizations that provide them to your benefit. But, what about when one of them…

An Inside Look at Cybercrime-as-a-Service

This article has been indexed from Webroot Blog You’ve likely heard of software-as-a-service (SaaS), infrastructure-as-a-service (IaaS), and numerous other “as-a-service” platforms that help support the modern business world. What you may not know is that cybercriminals often use the same…

Why SMBs are Under Attack by Ransomware

Read the original article: Why SMBs are Under Attack by Ransomware Ransomware attacks generate big headlines when the targets are government entities, universities and healthcare organizations. But there’s one increasingly frequent target of ransomware attacks that tends to slip under…

Is the Value of Bitcoin Tied to Ransomware Rates?

Read the original article: Is the Value of Bitcoin Tied to Ransomware Rates? With investors currently bullish on Bitcoin, is its high value is driving cybercriminals to pursue crypto-generating forms of cybercrime like ransomware and illicit miners? At time of…

Cyber News Rundown: Phishing Targets NHS Regulatory Commission

Read the original article: Cyber News Rundown: Phishing Targets NHS Regulatory Commission Spanish labor agency suffers ransomware attack Multiple systems were taken offline following a ransomware attack on the Spanish government labor agency SEPE, which has affected all 700 of…

Does a SIEM make sense for my MSP?

Read the original article: Does a SIEM make sense for my MSP? Every device on an MSP’s managed network provides insight into what’s happening on that network. This includes network routers, switches, printers, wireless devices to servers, endpoints, IoT devices…

Who’s Hacking You?

Read the original article: Who’s Hacking You? One of the reasons why there’s so much cybercrime is because there are so many ways for cybercriminals to exploit vulnerabilities and circumvent even the best defenses. You may be surprised to find…

3 Ransomware Myths Businesses Need to Stop Believing ASAP

Read the original article: 3 Ransomware Myths Businesses Need to Stop Believing ASAP Despite the rising ransomware numbers and the numerous related headlines, many small and medium-sized businesses (SMBs) still don’t consider themselves at risk from cyberattacks. Nothing could be…