SMBs lack resources to defend against cyberattacks, plus pay more in the aftermath

We take a look at the top challenges and threats to SMBs today, and recommend ways they can easily shore up their defenses.

Categories:

Tags:

(Read more…)

The post SMBs lack resources to defend against cyberattacks, plus pay more in the aftermath appeared first on Malwarebytes Labs.

Pulse VPN patched their vulnerability, but businesses are trailing behind

After a vulnerability in a popular business VPN solutions was discussed at length and an easy to use exploit is availbale, organizations still fail to apply the patch. What’s up?

Categories:

Tags:

(Read more…)

The post Pulse VPN patched their vulnerability, but businesses are trailing behind appeared first on Malwarebytes Labs.

Why all organizations must better protect sensitive data

The truth is that companies, businesses, and organizations have an obligation to the data that belongs to their employees, users, and customers. For some organizations, that obligation is a matter of real, physical safety.

Categories:

Tags:

(Read more…)

The post Why all organizations must better protect sensitive data appeared first on Malwarebytes Labs.

Securing the managed service provider (MSP)

Managed service providers (MSPs) have become the target of attacks, as lack of aggressive security posturing has left them—and the high-value data of their clients—vulnerable. Learn how MSPs can secure against a rising tide of threats.

Categories:

Tags:

(Read more…)

The post Securing the managed service provider (MSP) appeared first on Malwarebytes Labs.

What role does data destruction play in cybersecurity?

Organizations are keen to protect the personal data of their employees and customers from cyberattack. But what about the data they no longer need? We discuss why data destruction is just as important to cybersecurity as protection.

Categories:

Tags:

(Read more…)

The post What role does data destruction play in cybersecurity? appeared first on Malwarebytes Labs.

Making the case: How to get the board to invest in higher education cybersecurity

CISOs working in institutions of higher learning have their own considerations when communicating with the board about risk management. One of the top security officials at Boston College offers his takeaway on what it takes to get board buy-in on campus.

Categories:

Tags:

(Read more…)

The post Making the case: How to get the board to invest in higher education cybersecurity appeared first on Malwarebytes Labs.

Making the case: How to get the board to invest in government cybersecurity

CISOs are increasingly tapped to communicate with the board and executive management about security. Here’s what government officials need to know for success.

Categories:

Tags:

(Read more…)

The post Making the case: How to get the board to invest in government cybersecurity appeared first on Malwarebytes Labs.

Enterprise incident response: getting ahead of the wave

As with traditional warfare, beating back attacks and winning depends on having a plan. Here are several incident respond models security researchers have developed for responding to threats.

Categories:

Tags:

(Read more…)

The post Enterprise incident response: getting ahead of the wave appeared first on Malwarebytes Labs.

Malware targeting industrial plants: a threat to physical security

When malware shuts down the computer systems of an industrial plant, it could threaten the physical security of those working in or living near it. Here’s how to protect your workforce and your business from targeted threats.

Categories:

Tags:

(Read more…)

The post Malware targeting industrial plants: a threat to physical security appeared first on Malwarebytes Labs.