According to a recent committee hearing by the House Small Business Committee, nearly 60 percent of small companies go out of business within six months following a hack and 71 percent of all cyber assaults occur at businesses with under 100 workers. Our own data at Trend Micro indicates that small businesses are not immune from cyberattacks. In fact, small businesses are generally regarded as being more susceptible to attacks due to lack of dedicated security personnel and minimal investment in security software and hardware. Continue reading
Apart from Infosecurity coming up, March will be all about webinars. There’s several hot topics on which we would like to share our knowledge and expertise. In these interactive webinars you will learn all about the following topics: Continue reading
Mobile malware is still growing significantly: the number of unique samples of malware has been growing almost continuously throughout the year. By the end of 2016, over 19 million unique samples of malicious Android apps had been collected and analyzed, almost twice as much as in 2015. The number and diversity of mobile threats increases along with the number of devices and the advances in technologie that power these mobile devices. That is the most important conclusion from Trend Micro’s Mobile Threat Landscape Report. Continue reading
As we close out 2016 and prepare to ring in the New Year we must take a look back at the past 11 months before we can predict what lies ahead. In the realm of cybersecurity, that means evaluating how the threat landscape has changed to accurately assess how it will continue to evolve. Continue reading
Ransomware, targeted attacks, zero day threats, information stealing malware – modern CISOs face a formidable array of threats today. Just last month the FBI was forced to issue yet another warning on ransomware, while Trend Micro alone has identified 79 new variants in the first half of the year, a staggering 179% increase on the total figure for 2015. Effective, multi-layered endpoint security is vital to keep threats at bay and ensure enterprise data is safe from harm. Continue reading
‘Next-generation’ endpoint protection or next-gen AV has been getting a lot of press recently. But what does the term actually mean? For IT security managers under pressure, the most important thing isn’t the latest buzzword but finding a solution which is effective in protecting their organization from an increasingly agile and determined online enemy. Multiple threat protection techniques working in synergy is the key to this. Continue reading
Enterprises, small companies and everyone in between is adopting cloud-based tools and environments for their business and personal needs. RightScale’s 2016 State of the Cloud report found that 82 percent of enterprises were using a multi-cloud strategy, meaning they are using the infrastructure services of more than one cloud provider. In addition, according to projections made last year by Intuit, 78 percent of small businesses will be fully in the cloud by 2020. By saving data in virtual environments, companies are becoming more flexible and saving money on their IT infrastructure, allowing them to do better business and enhance revenues in the long run. Continue reading
If you’re reading this posting, odds are that you or someone you know is the victim of a ransomware attack. Ransomware continues to grow as a prevalent threat . The number of new ransomware families we saw in the first half of 2016 alone has already eclipsed the total 2015 volume by 172%. With ransomware attacks becoming more and more sophisticated and prevalent, we believe that the threat will potentially cause more damage going into the second half of the year.
This post is meant to tell you exactly what we think you should do if you’re looking at a ransomware screen. Most importantly, here’s what you shouldn’t do …. pay the ransom. I can’t emphasize that enough: don’t pay the ransom. Continue reading
Try as they might, companies are often unprepared when it comes to the security of their IT infrastructure. While organizations have to do everything in their power to plug up every single vulnerability in their systems, hackers only have to find one to be successful in their attack. What’s more, the wide variety of techniques cyber criminals have to choose from means that businesses just can’t predict how they’ll be hacked. Continue reading
Pick up any newspaper or log-on to your favorite tech news site today and you’re likely to come across a story about ransomware. Trend Micro alone has blocked over 100 million such threats since last October and counting.
The best way of tackling ransomware is to take preventative measures built around layered protection. But the first step we need to take is understanding the problem. So let’s take a closer look at exactly what this new malware menace is and the implications for organizations. Continue reading