These are dark days for many businesses and individuals. But they’re salad days for cybercriminals.
Opportunistic hackers, seeing a chance to take advantage of the confusion and fear surrounding the pandemic, have been out in force.
While COVID-19 continues to drive cybersecurity trends as a whole, it has also inspired new attacks capitalizing on our desire for news, assistance or guidelines that could help keep us safe.
For more content on 2020 cybersecurity threat reports, check out this report by Blackberry.
Whether for ensuring business continuity or enhancing workforce retention and productivity, more organizations are embracing mobility, work-at-home and flex-time for their employees. A key element of ensuring reliable mobile access is maintaining...
Each day’s headlines can bring disruptive challenges that require dynamic technology solutions. Public health emergencies, such as the Covid-19 pandemic, or natural events such as earthquakes, can restrict mission-critical staff from travel or...
Phishing attacks have become the primary hacking method used against organizations. In the past, there was a tendency to blame the user, but attacks have evolved to appear so genuine that even the most security savvy recipient can be fooled....
SonicWall SD-Branch reinvents branch connectivity. The solution secures connectivity and improves user experience at branch offices through an integrated platform that combines SD-LAN, SD-WAN and security for distributed enterprises. It is an...
The notion of layered security has been around since the early days of network defense. The ideology is simple: the more obstacles you place in front of an attacker, the better your chances are to identify and stop the attack before your network,...
Given the public nature of retailers, entry points into the network go beyond employee laptops, desktops and smartphones to include public Wi-Fi, and public-facing ecommerce servers. In a small retail business, the role of administering network...
Next-generation firewalls (NGFWs) have become the norm in network security for organizations of all sizes. Unlike their predecessors which offered limited protection from today’s continually evolving threats, NGFWs deliver a much deeper level of...
The evolving nature and delivery schemes of viruses, malware and spyware have radically changed the scope and best practices of network security. In the pursuit of application-level protection, Deep Packet Inspection (DPI) has become the preferred...
There are rare moments when cybercriminals are open to sharing the tricks of their trade. Unfortunately, most organisations are either not listening or are over confident. This brief, based on a real-life two-week conversation with a Russian...
As organizations realize the benefits of moving business applications and services to the cloud, one of the first to move is email service. It is no surprise that businesses of all sizes are increasingly adopting Microsoft Office 365. In addition,...
Introduction 2016 could be considered a highly successful year from the perspective of both security professionals and cyber criminals. Security teams leveraged ...
For More Information © 2016 SonicWall Inc. ALL RIGHTS RESERVED. SonicWall is a trademark or registered trademark of SonicWall Inc. and/ or its affiliates in the U.S.A. and/or other countries. All other trademarks and registered trademarks are...
How ransomware works Ransomware can make its way onto a system through a variety of means, with the victim ultimately downloading and installing a malicious application. Once on the device, the app will spread throughout the system and encrypt files...
3. Back up your files regularly Another safeguard against having to pay ransom is a robust backup and recovery strategy. Depending on how quickly the compromise is detected, how widely it has spread and the level of data loss that is acceptable,...