How to Identify and Block Ransomware

In the last post, we took an in-depth look at how ransomware changed during 2016, and what we expect to see happen in the coming year. The post, which was based on a recent webinar, was pretty long and in-depth, so if you'd like some context you might like to go back and read it before continuing or feel free to watch the on-demand webinar. In this post we’re going to run through the most important part of the webinar: what you can do to secure your organization against ransomware.
Read more

The Ransomware Explosion: Lessons Learned in 2016

In 2016, a year when cybercrime soared to previously undiscovered heights, ransomware was one of the top worries for organizations of all sizes. And for good reason. Compared to other malware, ransomware has a very high infection rate, and whether or not organizations opt to pay ransom demands it can cause significant disruption to business processes. Even worse, many co-called “copycat” ransomware families have turned out to be far more destructive than intended, and as a result many files can't be recovered even if payment is made.
Read more

Security Awareness Training: A Recipe for Success

In recent months we’ve written a lot about security awareness and phishing awareness training. It’s an involved topic, clearly, and if you’ve taken away anything we hope it will be this: If you want real, measurable improvements you must test your employees. And when it comes to email security, that means phishing your employees on a regular basis. In this post, we’ll take a deep dive into a managed phishing awareness training program, and examine the ins and outs of effective security awareness training. From planning to post-game analysis, here are the best practices for managing your program.  
Read more