Behind the Headlines: Why Ransomware Will Be One of 2020’s Most Infamous Legacies

With attacks increasing by 140 percent between 2018 and 2019, the threat from ransomware was growing long before the COVID-19 pandemic began. Last year, however, thanks to a perfect storm of unfortunate circumstances, the trend line for ransomware… Continue reading Behind the Headlines: Why Ransomware Will Be One of 2020’s Most Infamous Legacies

How Ransomware Techniques Have Changed

Over 30 years ago, a disgruntled researcher unleashed the first noted ransomware virus, the “Aids Trojan.” Distributed on 20,000 floppy disks marked “AIDS Information — Introductory Diskettes” using hijacked mail subscriber lists to the World Hea… Continue reading How Ransomware Techniques Have Changed

Why Less Can Be More When It Comes to Cybersecurity

When it comes to cybersecurity, more investment doesn’t necessarily mean more protection. Even though the cybersecurity market grew by over 10 percent annually before 2020, last year still saw a record amount of damage done by data breaches. While… Continue reading Why Less Can Be More When It Comes to Cybersecurity

Windows Defender Is an Underutilized Endpoint Security Resource

Microsoft Defender Antivirus suffers from a perception problem. For the first decade of its existence, starting with its 2006 release, Defender was a much-maligned piece of software that no business would use to protect its endpoints. That’s no lo… Continue reading Windows Defender Is an Underutilized Endpoint Security Resource

How COVID-19 Has Changed Cybersecurity for Government Departments

Before COVID-19 started making headlines earlier this year, government departments might have been considered unlikely candidates for making large scale remote working a success. However, with service levels maintained across the public sector des… Continue reading How COVID-19 Has Changed Cybersecurity for Government Departments

OS-Native Endpoint Security Outpaces Third-Party Tools

For the first two decades of the internet age, from the early 1990s to the 2010s, high-quality antivirus software that blocked the most malware came at an appropriate premium. After all, the endpoint was—and still is—of the primary attack vectors … Continue reading OS-Native Endpoint Security Outpaces Third-Party Tools

Busting Cloud Security Myths

Although far from new in technological terms, the ubiquity of public and hybrid cloud use is a relatively recent phenomenon. Driven in part by the current COVID-19 pandemic, it would be difficult to find an organization that isn’t relying on a clo… Continue reading Busting Cloud Security Myths

How Hackers Compromise Virtual Desktop Infrastructure

How do you steal something that doesn’t exist? That’s the thinking behind the widespread fallacy that virtual desktop infrastructure (VDI) is more secure than physical desktops.
The post How Hackers Compromise Virtual Desktop Infrastructure appear… Continue reading How Hackers Compromise Virtual Desktop Infrastructure

Here’s What’s Driving the Rise In Cloud Workload Cyber Threats

Available anytime and capable of being run from anywhere, cloud computing provides a perfect solution to operational challenges posed by the COVID-19 pandemic. With public and hybrid cloud use rising across every sector, dramatically increased upt… Continue reading Here’s What’s Driving the Rise In Cloud Workload Cyber Threats

Virtual Desktop Infrastructure: Crucial in a Work-From-Home World

The coronavirus pandemic has forced companies to experiment with remote work in ways they never had before. For many, working from home was the only viable option for weeks or months due to mandatory shutdown orders and grave public health concern… Continue reading Virtual Desktop Infrastructure: Crucial in a Work-From-Home World