In recent years, a high number of security breaches and data leaks have occurred, ranging from minor disruptions to high-impact hacks. Fortunately, organizations seem to be realizing the importance of cybersecurity, which has been confirmed by Gartner research into growing expenditures around security worldwide, including significant contributions to security defenses.…
Read More
The spread of malware from user PCs to handheld devices such as smartphones has been a gradual process that started gaining momentum about a decade ago. At first, relatively basic Trojans would focus on stealing SMS messages to compromise two-factor authentication (2FA) sent to users by their banks. Then, increasingly…
Read More
Email security remains a top priority in 2019 as organizations continue to face the threat of costly email compromise. The email attack surface is also expanding. Despite growing use of cloud-based collaboration tools and SMS for business, email remains the most common method for exchanging corporate information, with 74 percent…
Read More
You are not going crazy — endpoint management requirements and challenges really are far more complex than they have been since the advent of personal computing in the 1980s. It doesn’t seem all that long ago that enterprises were able to maintain consistent, reliable and secure end-user computing services across…
Read More