Guardian Digital Blog - Page No: 5

We post our thoughts, insights, and leads here. Keep in touch by RSS feed, an email subscription, or just checking back here every so often. 

In this digital risk environment, email threats are evolving faster than ever. Cybercriminals are employing new, increasingly sophisticated methods, tactics, and techniques like social engineering and fileless malware to deceive users, evade security defenses, and ultimately, get paid. Too many businesses are struggling to adapt and adjust to the heightened digital threat landscape brought on by the pandemic, or have failed to make email security the priority that it needs to be, leaving them...

Comment

Effective email security defenses are of critical importance to businesses’ security and success, especially in this heightened digital threat environment we face due to the pandemic. In fact, over 90% of modern cyberattacks begin with phishing emails. Threats like targeted spear phishing, fileless malware, and zero-day attacks are becoming increasingly sophisticated, and difficult to detect. If successful these attacks carry great costs for victims including data theft, significant, costly...

Comment

Whether it’s the mask we wear when running errands or the bottle of hand sanitizer we now carry with us at all times, we are constantly reminded of the increased physical risk we face daily due to COVID. However, our health is not the only thing that has been threatened by this pandemic. The email threat landscape has remodeled how we work in recent years, leaving businesses, users and critical data at heightened...

Comment

In response to the cyberattacks in Ukraine, including the defacement of government websites and the presence of potentially destructive malware on Ukrainian systems, CISA has published a few tips aimed to protect users from the increase in potential cyber...

Comment

Have you ever considered how much money an organization spends on cybersecurity? Some research suggests that cybersecurity costs tally upwards of $123 billion across the globe. Regardless of whether this figure is accurate, the total is significant, and despite such heavy investment, it still seems that one of the greatest weaknesses in cybersecurity is the implementation of password...

Comment
fileless malware anatomy of an attack

There’s a new type of cyberattack that is surreptitiously threatening your systems, your data and your business - and this one lives up to every bit of the danger and sophistication conveyed in its name: fileless...

Comment

Must Read Blog Posts

Latest Blog Articles

Recommended Reading