According to AV-TEST, an independent IT security organization that tracks the global distribution of malware, there were more than 140 million brand-new variants created in 2014. This represents a 75%…
Ransomware is any malware (malicious software) used by cyber criminals to hold digital files on smartphones, computers and other connected devices for ransom, demanding payment in order to regain…
According to the 2015 Verizon Data Breach Investigations Report, there were nearly 80,000 security incidents reported during 2014—a 25% increase over the previous year. It’s a better time than ever to…
As someone who works in network security, I’ve worked closely with plenty of IT teams. It’s given me a front row seat into the issues that unnecessarily use up valuable IT resources that could be used…
If your business accepts credit or debit cards, then you know that PCI DSSstands for Payment Card Industry Data Security Standard, often referred to simply as PCI. This security standard applies to…
Implementing antivirus and other endpoint security measures in virtual environments is often characterized as a trade-off between performance and security. Broadly speaking, there are two approaches: