Guardian Digital Blog - Page No: 4

We post our thoughts, insights, and leads here. Keep in touch by RSS feed, an email subscription, or just checking back here every so often. 

Ransomware attacks exploiting vulnerabilities in businesses’ networks are on the rise, as cybercriminals recognize that delayed patching and subpar patch management are widespread among organizations and present the perfect opportunity for quick financial gain. A new report from Osterman Research reveals that security professionals acknowledge that rapidly patching vulnerabilities on their networks is key to preventing ransomware attacks, yet fewer than half of survey respondents said that...

Comment

The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime, by Jon DiMaggio comes at a time in American History when everyone ranging from business owners to private citizens can no longer turn a blind eye to the need for cybersecurity. Since the beginning of the COVID-19 pandemic, many businesses have moved to entirely remote or hybrid work and are now facing additional challenges from outside a traditional office environment. DiMaggio effectively...

Comment

Microsoft 365 is the de facto cloud-based email and collaboration platform for many organizations, a trend that has only been magnified in this remote work environment brought on by the pandemic. While Microsoft 365 offers a selection of native security controls, built-in email protection is simply not good enough to protect against impersonation, phishing, and sophisticated modern...

Comment

Cyber risk has reached an all-time high in recent years, largely due to the increase in remote workers and the widespread migration to vulnerable, inadequately secured cloud platforms brought on by the pandemic. Email risk is the greatest form of cybersecurity risk businesses face, as over 90% of all modern cyberattacks begin with phishing emails. CEOs - especially CEOs of small- and medium-sized businesses - face significant email security challenges including a lack of resources and expertise...

Comment

Email is the preferred method of business communications, a trend that has only been magnified by the remote work environment brought on by the pandemic. Cybercriminals are readily taking advantage of this increased reliance on email for business, along with common weaknesses in traditional methods of securing business...

Comment

Despite the wide array of business email security solutions on the market today, malicious email is still reaching users’ inboxes, and often resulting in severely damaging attacks and breaches. These cybercriminals are constantly working on their methods for exploitation, finetuning their techniques and tactics to evade the detection of security defenses. This article will explain the most popular and effective techniques that threat actors use to bypass email security...

Comment

Must Read Blog Posts

Latest Blog Articles

Recommended Reading