Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Endpoint Security

Webinar: Top Security Threats Worldwide: Q4 2021 - 5 Apr 2022

Join WatchGuard CSO Corey Nachreiner and Security Operations Analyst Trevor Collins as they cover the latest Internet Security Report from the WatchGuard Threat Lab. In this session, Trevor and Corey will dive into the attack trends and latest malware variants targeting WatchGuard Firebox and EPDR customers worldwide.

How to improve cybersecurity in the healthcare sector

Over the last two years, the healthcare sector has been the number 1 target for hackers who have attempted to attack health centers or even the health department of an entire country. The industry faces threats such as ransomware that blocks the whole healthcare system, deceptive techniques such as phishing, or breaches of sensitive data.

What role does blockchain play in cyberattacks and cybersecurity?

Most company decision-making executives know how blockchain technology works but few have adopted it within their organization at this stage. This is the conclusion drawn by the latest Pulse survey conducted on 145 senior IT managers from companies on three continents. It shows that only 8% have experienced this technology, compared to 53% who know how it works but are yet to use it.

10 Cybersecurity Spring Cleaning Tips

Spring is a good time to do some cleaning; put away winter clothes and ski gear, open windows and let spring breezes clear out the dust that gathered through the winter. But it’s also a good time for IT and cybersecurity teams to “spring clean” their security postures as well. Below we share 10 quick and easy ways to “clean up” your cybersecurity practices and adapt to the security threats we face daily.

Webinar: How to Deliver a Modernized Network and Eliminate Aging Hardware - 24 Mar 2022

The average lifespan of a firewall or access point is five to eight years. What does this mean for MSPs who have customers with aging hardware? Join Product Manager Ryan Poutre and Product Marketing Manager Kayla Myrhow as they discuss the best practices to follow to deliver a modern network for our new way of working.

Companies that impose MFA requirement on all customers

April 2020, Zoom was booming. The start of the COVID pandemic forced employees to work from home, meetings in person migrated to a videoconferencing model, and Zoom was the preferred tool. The massive and fast growth led into an opportunity for attackers. A vulnerability in Zoom could allow an attacker to steal a user’s Windows credentials, as long as the target user would click on a link provided through a Zoom session. The question was then how to get into those private sessions.

Your Current Endpoint Security May Be Leaving You with Blind Spots

Threat actors are continuously honing their skills to find new ways to penetrate networks, disrupt business-critical systems and steal confidential data. In the early days of the internet, adversaries used file-based malware to carry out attacks, and it was relatively easy to stop them with signature-based defenses. Modern threat actors have a much wider variety of tactics, techniques and procedures (TTPs) at their disposal.

EPP/EDR: What Is It and How Can It Help to Keep Your Organization Safe?

Endpoint devices played a big part in malware and ransomware attacks in 2021. According to a study covered by Help Net Security, security researchers detected more malware and ransomware endpoint infections in the first nine months of the year than they did for all of 2020. Attack scripts leveraging PowerSploit, Cobalt Strike, and other tools were particularly prevalent in that nine-month period, having grown 10% over the previous year after having already climbed 666% compared to 2019.