Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Wi-Fi in WatchGuard Cloud - Unboxing the Wi-Fi 6 AP432

Join Sr Sales Engineer, Martin Lethbridge, as he unboxes WatchGuard’s AP432. Perfect for high-density indoor environments that need lightning-fast connectivity and secure WPA3 encryption. Managed in WatchGuard Cloud, this Wi-Fi 6 access point is essential to deploying a wireless network that supports the most demanding of needs.

The U.S. Department of Justice Announces Takedown of the Cyclops Blink Botnet

Today, the U.S. Department of Justice (DOJ) announced further actions to disrupt Cyclops Blink, a sophisticated state-sponsored botnet that affected network devices from multiple vendors, including a limited number (less than 1%) of WatchGuard firewall appliances.

Hybrid Work Is Only Viable with Unified Cybersecurity

It should be no surprise that both knowledge workers and the companies that employ them want to benefit from hybrid work environments. After two years of a new remote workplace routine, businesses must provide workplace flexibility to compete for the best talent, allowing employees the option of working from a corporate office or elsewhere.

Webinar: Top Security Threats Worldwide: Q4 2021 - 5 Apr 2022

Join WatchGuard CSO Corey Nachreiner and Security Operations Analyst Trevor Collins as they cover the latest Internet Security Report from the WatchGuard Threat Lab. In this session, Trevor and Corey will dive into the attack trends and latest malware variants targeting WatchGuard Firebox and EPDR customers worldwide.

How to improve cybersecurity in the healthcare sector

Over the last two years, the healthcare sector has been the number 1 target for hackers who have attempted to attack health centers or even the health department of an entire country. The industry faces threats such as ransomware that blocks the whole healthcare system, deceptive techniques such as phishing, or breaches of sensitive data.

What role does blockchain play in cyberattacks and cybersecurity?

Most company decision-making executives know how blockchain technology works but few have adopted it within their organization at this stage. This is the conclusion drawn by the latest Pulse survey conducted on 145 senior IT managers from companies on three continents. It shows that only 8% have experienced this technology, compared to 53% who know how it works but are yet to use it.

10 Cybersecurity Spring Cleaning Tips

Spring is a good time to do some cleaning; put away winter clothes and ski gear, open windows and let spring breezes clear out the dust that gathered through the winter. But it’s also a good time for IT and cybersecurity teams to “spring clean” their security postures as well. Below we share 10 quick and easy ways to “clean up” your cybersecurity practices and adapt to the security threats we face daily.

Companies that impose MFA requirement on all customers

April 2020, Zoom was booming. The start of the COVID pandemic forced employees to work from home, meetings in person migrated to a videoconferencing model, and Zoom was the preferred tool. The massive and fast growth led into an opportunity for attackers. A vulnerability in Zoom could allow an attacker to steal a user’s Windows credentials, as long as the target user would click on a link provided through a Zoom session. The question was then how to get into those private sessions.

Webinar: How to Deliver a Modernized Network and Eliminate Aging Hardware - 24 Mar 2022

The average lifespan of a firewall or access point is five to eight years. What does this mean for MSPs who have customers with aging hardware? Join Product Manager Ryan Poutre and Product Marketing Manager Kayla Myrhow as they discuss the best practices to follow to deliver a modern network for our new way of working.