Guardian Digital Blog - Page No: 3

We post our thoughts, insights, and leads here. Keep in touch by RSS feed, an email subscription, or just checking back here every so often. 

As digital threats continue to evolve to become more sophisticated and harder to detect, traditional methods of securing email like built-in cloud email protection and endpoint security alone are no longer effective in safeguarding against damaging cyberattacks and breaches. Phishing attacks have risen 600% since the start of the pandemic, and users are now three times more likely to absentmindedly open a malicious link within a phishing email than they were pre-pandemic. Organizations continue...

Cloud computing - the delivery of services and resources such as servers, storage, databases, networking, software and analytics over the internet - has experienced rapid growth among organizations of all sizes in recent years, and for good reason. Cloud computing offers clear benefits including a foundation for improving efficiencies and remote access to networks and services and the ability to respond to changing market conditions with increased agility, all while reducing maintenance...

While allowing public access to the sensitive behind-the-scenes operation of a program sounds risky, open-source software actually has the potential to be even more secure than a program with hidden code. However, as with any type of software, vulnerabilities still exist and can present a serious security risk if they remain unidentified and...

Ransomware is a universal threat that can have devastating consequences for any organization that falls victim to an attack. A successful attack often results in financial and data loss, significant costly downtime, recovery costs, legal fees, and severe, lasting reputational harm, or worse - permanent business closure. Sixty percent of companies that are hit with ransomware go out of business within six months of experiencing the...

Cybercriminals are readily taking advantage of organizations’ increased reliance on email as a preferred channel for confidential business communications, along with common weaknesses in traditional methods of securing business email, to cripple corporate networks and systems with ransomware and gain access to sensitive information that can be monetized for personal...

Is this a genuine email or is it a fake designed to deceive recipients into giving up confidential information? Email is the source of more than 93% of all cybersecurity events, so having an understanding of how these phishing attacks work can prevent account takeover leading to identity theft, bank fraud, loss of intellectual property, and disruption of business...

Must Read Blog Posts

Latest Blog Articles

Recommended Reading