Tag: coronavirus

Cybercriminals sell research data on the dark web is represented by a man in a cartoon burlar outfir running away from another man with a stolen folder

Smart Cybercriminals Sell Research Data on the Dark Web

by Kevin Lancaster

Passwords aren't the only thing cybercriminals are stealing to sell - cybercriminals also sell research data on the Dark Web, especially in healthcare. See how to foil their plans.

Read More

3 Ways for Healthcare Orgs to Combat COVID-19 Cyberattacks

by Kevin Lancaster

New information from CISA and NCSC details how healthcare organizations are under attack by cybercriminals looking to profit from COVID-19 data. These tips can help stop them.

Read More
A red envelope indicates a dangerous email

COVID-19 Relief Check Phishing Attacks Put Company Data at Risk

by Kevin Lancaster

Your staffers are hungry for information about their COVID-19 federal relief checks - and cybercriminals are ready to take advantage of that. But satisfying worker curiosity may put your data at risk and you should act quickly to prevent a cybersecurity disaster.

Read More

Google Fights Back in Phishing Explosion & So Should You

by Kevin Lancaster

Phishing attacks have exploded in the wake of COVID-19, and it only seems to be getting worse. These tools can help SMBs be ready to defend against the onslaught.

Read More
a gold pocket watch is depicted on a one dollar bill

Solutions for 3 Urgent CISO Priorities

by Kevin Lancaster

Welcome to the new remote-work world. CISOs may have accounted for upgrades and increases in cyberattacks in their 2020 planning, but no one accounted for COVID-19. Here are 3 urgent priorities that CISOs must address in the wake of COVID-19 and fast solutions to get them checked off your list.

Read More
A baby blue background features a sleek laptop with a bright pink pop up box springing out of it with asterisks and a lock to indicate a secure login.

Boost Remote Security and Ease Everyone’s Stress With This Tool

by Kevin Lancaster

More technology brings more tools for work and entertainment - and more logins to remember. Everyone has too many these days, causing endless trouble for both users and techs. This phenomenon leads to endemic password reuse, weak passwords, and password mishandling. How can SMBs solve this problem? By making logins a one-stop-shop.

Read More
A worker sits at a sleek desk wearing a suit jacket and tie on top and flip flops and flowered shorts on the bottom with an adorable orange cat under the desk, animation-style.

Cyberattacks Double as Remote Work Creates Unexpected Vulnerabilities

by Kevin Lancaster

New ways to work bring new cybersecurity challenges - and new opportunities for cybercriminals. Cyberattacks have doubled since January 2020, and phishing attacks have skyrocketed. Here are 3 safety steps that SMBs can take today to defend against this surge in attacks.

Read More
A dark-haired caucasian woman smiles while typing on her silver laptop computer at a sleek desk with a green wall and window behind her.

Remote Work Vulnerabilities and How to Address Them

by Kevin Lancaster

Remote workers are getting things done, but they're also creating some unexpected cybersecurity risks to their companies systems and data. Here are some actionable steps to help mitigate those risks before you have a data breach.

Read More
A blue globe with a dark blue arrow appears on a computer monitor.

Stolen Account Info Zooms to Dark Web for 500K+ Zoom Users

by Kevin Lancaster

Zoom meetings have become the way we do business right now, but they aren't as safe as you might think. A batch of stolen credentials recently discovered on the Dark Web plus unexpected vulnerabilities means that every company needs to be alert to the dangers of virtual meetings.

Read More

Passly Packs 7 Essential Features to Secure a Remote Workforce

by Kevin Lancaster

Today's worker can stay connected to the systems and data that they need to work efficiently anytime from anywhere. Remote work isn't just convenient for companies - it's also convenient for cybercriminals. Take a look at 7 features of Passly that can quickly mitigate that threat.

Read More