How to

5 Mistakes that Lead to Wasting Money on Security Software You Don't Need

This post is a preview of our new Endpoint Security Buyer's Guide, which you can download here. I'd love to hear your feedback, so take a look...

Read More
May 2016
How to

105 Phishing Prevention Tips to Keep Your Users Off the Hook

They say the classics never go out of style. The Dodge Charger, the little black dress, phishing attacks...wait, phishing attacks? Yep, even...

Read More
May 2016
How to

Evaluating Security Software: The 3 People You Need Involved in Free Trials

My favorite part of any action movie is when they assemble the team.

Read More
May 2016
How to

New eBook Preview: Endpoint Security Buyer's Guide

This post is a preview of our new Endpoint Security Buyer's Guide, which you can download here. I'd love to hear your feedback, so take a look...

Read More
May 2016
How to

How to Recover from Ransomware: The First 5 Things You Should Do

It happened. Your user has ransomware. Maybe they clicked on a phishing email, maybe they visited a site infected with malvertising — whatever the...

Read More
May 2016
How to

Surviving Ransomware: Lessons from IT Pros Who Didn't Pay

Police evidence and case records held hostage.A hospital brought to a grinding halt.An entire school district extorted. Hardly a day goes by...

Read More
May 2016
How to

3 Better Ways to Use Backup to Recover from Ransomware

When faced with a ransomware attack the current wisdom is if your computer gets infected and it encrypts your files you have three basic options:

Read More
Apr 2016
How to

5 Security Safety Nets that Can Protect Your Users from Cyber Attacks

Prepare to be amazed as your users open suspicious email attachments with the greatest of ease!

Read More
Apr 2016
How to

Everything You Need to Know About Endpoint Security (New Guide)

Introducing the IT Pro's Guide to Endpoint Protection Endpoint security isn't as simple as it used to be. For one thing, it's no longer all...

Read More
Apr 2016
How to

5 Ways to Keep Your Users Safe from Spear Phishing

A more highly-targeted variant of phishing, “spear phishing” is a technique used by cybercriminals in which they send an email that appears to be...

Read More
Apr 2016