30 Mar

What Are Rootkits and Rootkit Attacks?

If you’re ever at the receiving end of a rootkit attack, then you’ll understand why they are considered one of the most dangerous cyber threats today.

read more

Share this
23 Mar

How to Secure IoT Deployment During Talent Shortage

Businesses across industries are placing bigger and bigger bets on the Internet of Things (IoT) as they look to unlock valuable business opportunities. But there are concerns over the complexity of IoT security and its associated risks—to the company, its brands, and its customers. With the growing number and increased severity of IoT attacks, these organizations have good reason to be cautious.

read more

Share this
16 Mar

How One Attack Laid the Foundations for a Ransomware Invasion

Ransomware has been one of the most prolific cyber threats facing the world throughout 2019, and it’s unlikely to stop being a menace any time soon.

read more

Share this
10 Feb

Top 7 Tech Nightmares Haunting IT Pros

Your network faces nightmares from cybercriminals, system errors and more. Time to shine a light on the 7 most sinister terrors that haunt sysadmins. Welcome to the tech nightmares.

read more

Share this
03 Feb

Mobile Malware: The Biggest Cyber Security Threat

It turns out we had no idea how popular and prevalent mobile malware is, and how much it is in use for surveillance and espionage campaigns. In reality, there are many active actors and advanced persistent threats we never knew existed.

read more

Share this
27 Jan

5 Security Operations and Analytics Trends for 2020

According to ESG research, 36% of organizations are actively integrating disparate security analytics and operations tools in pursuit of a more cohesive security technology architecture. Another 48% of organizations say they are somewhat active with security analytics and operations tool integration.

read more

Share this
23 Dec

Cybersecurity & Data Privacy Trends for 2020

Cybersecurity continues to be the number one “external concern” for American CEOs, regardless of their industry. That’s because the number of cyberattacks is increasing every year – with hackers attempting to break into a computer “every 39 seconds on average.”

read more

Share this
16 Dec

How to Tell If an App Is Malware?

There are a lot of apps you can download on Apple’s App Store and the Google Play Store. That’s obvious. What’s not so obvious is that even though both companies do a pretty good job of (mostly) catching malware apps, there are still plenty that sneak through because they just toe the line between scammy and barely helpful.

read more

Share this
25 Nov

5 Ways to Maintain Your ERP’s Data Security

High-profile network breaches in recent years have impacted the discussion of data security significantly. The ability of institutions to safeguard personal information has come into question, even to the point of government entities enacting new legislation that mandates increased effort towards individual data safety. As current data loss prevention methods are reevaluated, so too will the data security of enterprise software systems have to be.

read more

Share this
18 Nov

How Malware Is Using Your PC for Cyber Attacks

It’s not just botnets that can hijack PCs for nefarious ends. Microsoft and Cisco’s Talos researchers have identified a new malware strain, Nodersok (or Divergent), that uses web apps to turn systems into proxies for malicious internet traffic.

read more

Share this

© 2017 Awontis. All rights reserved.