Key Insights from the OpenText 2024 Threat Perspective

As we navigate through 2024, the cyber threat landscape continues to evolve, bringing new challenges for both businesses and individual consumers. The latest OpenText Threat Report provides insight into these changes, offering vital insights that help us prepare and protect ourselves against emerging threats. Here’s what you need to know: The resilience of ransomware Ransomware […]

The post Key Insights from the OpenText 2024 Threat Perspective appeared first on Webroot Blog.

May 6, 2024
Read More >>

3 healthcare organizations that are building cyber resilience

From 2018 to 2023, healthcare data breaches have increased by 93 percent. And ransomware attacks have grown by 278 percent over the same period. Healthcare organizations can’t afford to let preventable breaches slip by. Globally, the average cost of a healthcare data breach has reached $10.93 million. The situation for healthcare organizations may seem bleak. […]

The post 3 healthcare organizations that are building cyber resilience appeared first on Webroot Blog.

April 5, 2024
Read More >>

5 ways to strengthen healthcare cybersecurity

Ransomware attacks are targeting healthcare organizations more frequently. The number of costly cyberattacks on US hospitals has doubled. So how do you prevent these attacks? Keep reading to learn five ways you can strengthen security at your organization. But first, let’s find out what’s at stake. Why healthcare needs better cybersecurity Healthcare organizations are especially […]

The post 5 ways to strengthen healthcare cybersecurity appeared first on Webroot Blog.

April 5, 2024
Read More >>

Understanding brute force attacks: The persistent threat in cybersecurity

Brute force attacks illustrate how persistence can pay off. Unfortunately, in this context, it’s for bad actors. Let’s dive into the mechanics of brute force attacks, unraveling their methodology, and focusing on their application. Whether it’s Remote Desktop Protocol (RDP), or direct finance theft, brute force attacks are a prime tactic in the current cybersecurity […]

The post Understanding brute force attacks: The persistent threat in cybersecurity appeared first on Webroot Blog.

April 2, 2024
Read More >>

9 tips to protect your family against identity theft and credit and bank fraud

Did you know that more than nine million Americans have their identity stolen each year? Your data is stored across countless databases for various purposes, making it a prime target for criminals. With access to your personal information, bad actors can drain your bank account and damage your credit—or worse. But that doesn’t mean you […]

The post 9 tips to protect your family against identity theft and credit and bank fraud appeared first on Webroot Blog.

February 15, 2024
Read More >>

Navigating the Web of Romance Scams: A Guide for Businesses and Consumers

In the digital age, the quest for love has moved online, but so have the fraudsters, with romance scams reaching record highs. These scams don’t just harm individuals financially and emotionally; they can also pose significant risks to businesses. Let’s explore how these scams work, their impact, and how both businesses and consumers can protect […]

The post Navigating the Web of Romance Scams: A Guide for Businesses and Consumers appeared first on Webroot Blog.

February 13, 2024
Read More >>

Tax Season Alert: Common scams and cracked software

OpenText is committed to providing you with the latest intelligence and tips to safeguard your digital life, especially during high-risk periods like tax season. Our threat analysts are constantly monitor the ebb and flow of various threats. One trend that has recently caught our attention is the notable spike in malware-infected cracked software, particularly as […]

The post Tax Season Alert: Common scams and cracked software appeared first on Webroot Blog.

February 9, 2024
Read More >>

Uncover the nastiest malware of 2023

Our annual analysis of the most notorious malware has arrived. As always, it covers the trends, malware groups, and tips for how to protect yourself and your organization. This post covers highlights of our analysis, including the rise of ransomware as a service (RaaS), the six nastiest malware groups, and the role of artificial intelligence […]

The post Uncover the nastiest malware of 2023 appeared first on Webroot Blog.

October 25, 2023
Read More >>

Building a Cyber Resilient Business: The Protection Layer

Cybercrime is on the rise. The number of ransomware attacks has increased by 18%, while the worldwide volume of phishing attacks doubled to 500 million in 2022. Depending on the size of the business, one-third to two-thirds of businesses suffer malware attacks in any given year. And those attacks are costing companies a lot of […]

The post Building a Cyber Resilient Business: The Protection Layer appeared first on Webroot Blog.

September 7, 2023
Read More >>

How Easy is Email Encryption? You’d Be Surprised.

When it comes to keeping sensitive data safe, email encryption is a necessity. But it doesn’t have to be a necessary evil. Too many employees and IT experts have experienced the pain of trying to use a needlessly complicated email encryption solution. There’s the endless steps, the hard-to-navigate portals, and the time-consuming processes that add […]

The post How Easy is Email Encryption? You’d Be Surprised. appeared first on Webroot Blog.

September 7, 2023
Read More >>