cybersecurity

MalwareBytesSecurity

How to fight security fatigue

Credit to Author: Wendy Zamora| Date: Tue, 25 Apr 2017 14:00:55 +0000

We live in the age of the 24-hour news cycle. Each day, whether it’s from TV news, phone notifications, online browsing, social media, or even the good old fashioned paper, we hear stories of the increasing dangers of cybercrime. Cyberthreats are growing more serious! Russian hacker starts his own ransomware service! Experts say tech support…

Categories:

Tags:

(Read more…)

The post How to fight security fatigue appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Mobile Menace Monday: Securing your privacy on Android

Credit to Author: Nathan Collier| Date: Mon, 24 Apr 2017 15:00:31 +0000

If you work at a company that allows you to use your mobile device to login email, access company data, and/or connect to company Wi-Fi, you could be more of a risk than you think.

Categories:

Tags:

(Read more…)

The post Mobile Menace Monday: Securing your privacy on Android appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

3, 2, 1, GO! Make backups of your data!

Credit to Author: Jean Taggart| Date: Wed, 05 Apr 2017 15:00:06 +0000

One of the best defenses against ransomware is having a good backup strategy. Having good backups protects your data against all sorts of unpleasant mishaps. A useful rule of thumb called the “3-2-1 rule”, learn about it here.

Categories:

Tags:

(Read more…)

The post 3, 2, 1, GO! Make backups of your data! appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Who else crushed it at RSA?

Credit to Author: Dana Torgersen| Date: Fri, 24 Feb 2017 18:00:25 +0000

Malwarebytes was proud to once again take part in this spectacular week-long event. Thousands of customers, new businesses, students, press, and industry analysts made their way to our new booth to catch our giant threat theater presentation, see a demo, grab a new collectible T-shirt, and say “Hi” to our robot (who was officially named ZERO).

Categories:

Tags:

(Read more…)

The post Who else crushed it at RSA? appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

What to do after recovering from a cyberattack

Credit to Author: Malwarebytes Labs| Date: Thu, 23 Feb 2017 18:00:04 +0000

More companies are falling victim to cyberattacks, as a wide range of harmful software, social engineering schemes and scams threaten to compromise the personal information and online safety of their clients. With cybercrime rates on the increase every year, it is important for businesses of all sizes to have a recovery plan in place to mitigate any losses. In the unfortunate event of a data breach, these are the steps you should take to recover.

Categories:

Tags:

(Read more…)

Read More