91ÖÆÆ¬³§

Tagged - malware

Acronis Cyber Protect Cloud Turns Managed Service Providers Into Managed Security Providers

More than ever, cybersecurity solutions are core to any MSPs offering. No longer should technology service providers be farming this out to dedicated security providers....

Develop a Security Awareness and Training Program That Empowers End Users

Cyberattackers target your end users, who remain today’s weakest link in organizational security. Design and deliver an effective and up-to-date training program to...
  • guided implementation icon

Security Incident Runbook Prioritization Tool

Prioritize the order in which the security incident runbooks will be developed based on the frequency and the impact of the potential incidents.

Security Incident Management Plan

Formalize the security incident management program by defining a central, high-level guide to describe goals, roles, and responsibilities, as well as the process that will...

GTB Gets the W-I-N for DLP in 2019

GTB Technologies was recently crowned the winner of Acquisition International’s cyber security award in the DLP category for its anti-malware and insider threat capabilities.

Training Materials – Cyber Attacks

This is one of eight security awareness and training templates that can be used to educate end users on best practices. This presentation focuses on cyber attacks.

Online Advertising: Fertilizer or Waste?

Last week, the technology world waited with breath held while Jack Dorsey took Square through its IPO paces, in what must have been a frightening process - but which the...

Is the Net at Risk?

Anyone paying attention has to be asking the question: Is the Internet today more useful to those intending good, or to those intending harm? For cybertheft, or for...

The Mobile Global Computer

We have just built the world's most powerful computer, but no one has used it yet. What is even more amazing: no one even knows it exists.

Special Letter: Solving the Greatest Enterprise Security Threat

About five years ago, Ray Ozzie, then newly anointed chief software architect at Microsoft, described the world he saw, from a security perspective, and the vision was...
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us