Enterprise Endpoint Security : 5 Warning Signs of a Possible Malware Breach

Malware has been around for decades, but the strains that current technology users face are considerably different from those seen years ago. According to industry research, new malware specimen emerged every 4.6 seconds in 2016; in the first quarter of 2017, it occurred at 4.2 seconds. In 2014 when massive malware attacks like Heartbleed rocked th...

Threat Focus : Why is the Blank Slate Malspam Still a Threat?

Organizations use email every day to send and receive information, track activities and other essential tasks. However, this communication method isn't as safe as users might believe. Email is currently the number one delivery vehicle for malware, ransomware and other malicious breach techniques. Hackers can send out an infinite...

Incident Response Planning : The 7 Stages of Incident Response – Part 1

Incident response plans will be integral to helping organizations manage the aftermath of a breach in a way that limits damage and reduces recovery time and costs. According to an FBI report, ransomware alone caused more than 4,000 attacks daily in 2016, a 300 percent increase over the previous year. Malware strains are continually evolving to subv...

Faronics Tech Roundup – July in Review

Cyber threats never take a break, and July was no exception. Organizations and federal entities are doing more to help strengthen their security posture and prepare for the next wave of advanced attacks. Let's take a look at some of the biggest events that happened this month in the realm of cyber security:

SMBs Increasingly Targeted

Sma...