How to

What to Do When You've Been Hit With Ransomware

Ransomware FAQs: Your Ransomware Questions, Answered Having an incident response program is one thing. But how do you deal with a type of attack...

Read More
Sep 2016
How to

10 Free Phishing Prevention Tools to Help Keep Your Users Safe

Did you know that 85% of organizations have suffered a phishing attack? When you couple that with the fact that an average phishing email has a ...

Read More
Aug 2016
How to

5 Bad Email Habits that Get Users Phished

Bad habits are hard to break, but when they can cost your company $3.7 million it’s worth a try.

Read More
Aug 2016
How to

How to Stop Today's Cyber Attacks: 3 Benefits of Behavior-Based Protection

Today's cyber attacks seemingly have two major things going for them: quantity and variability. But while the former is undeniable, the latter is...

Read More
Aug 2016
How to

How to Evaluate Security Software and Make the Most of Free Trials

Software free trials are a great way to evaluate a new security tool before you purchase it. You can see how a product works, how well it...

Read More
Aug 2016
How to

Testing Antivirus vs. Anti-malware vs. Behavior-Based Endpoint Security

Figuring out the best way to test our endpoint security software is something we get asked about regularly. Like most vendors, we don’t encourage...

Read More
Aug 2016
How to

Phishing Protection: 4 Ways to Prepare for User Mistakes

Twenty years ago, hackers attempted to breach organizations by breaking holes (or finding them) in the network perimeter of organizations, or in...

Read More
Jul 2016
How to

Meet the Biggest Phishing Targets in Your Office

Give a man a fish you feed him for a day. Teach a cyber criminal to phish, and it can wind up costing companies almost $4 million per year.

Read More
Jul 2016
How to

Why Phishing Employees is a Lot Like Pokemon Go

Chances are if you’re reading this it is through the lens of your phone and there is a Zubat flying around next to the screen.

Read More
Jul 2016
How to

The Phishing Field Guide: Protect Your Users by Thinking Like a Phisher (eBook Sneak Peek)

We love talking with IT pros about security, and one question we always ask is: What's your biggest security challenge right now?

Read More
Jul 2016