ThreatProtector Blog
A Comprehensive Guide to Security Information and Event Management (SIEM)
There are many uses for security information and event management (SIEM). Some of the most common uses include monitoring and analyzing system logs, identifying security incidents, and providing evidence for forensic investigations. Additionally, SIEM can be used to...
Six Core Requirements for Securing Endpoints
6 Requirements for Securing Endpoints Endpoint security requirements are necessary because they ensure that devices which connect to a network are properly secured. This helps to protect the network from unauthorized access and from viruses and other malware. In order...
How to Protect Your Precious Data from the Bad Guys
5 Major Types of Endpoint Security for Enterprise Customers
Endpoint security is the process of securing individual devices that connect to a network. This can include laptops, smartphones, and tablets, as well as any other type of device that can be used to access company data. Endpoint security measures are designed to...
5 Major Threat Detection and Response Techniques
5 Major Threat Detection and Response Techniques In today's world, it is more important than ever to have a robust threat detection and response system in place. With the rise of sophisticated cyber attacks, businesses must be vigilant in order to protect their data...
5 Major Endpoint Risks & 6 Best Endpoint Security Practices for Organizations
One of the major endpoint security risks is the potential for data breaches. Endpoints are often the weak link in an organization's overall security posture, and as such, are frequently targeted by malicious actors. Endpoint security is the process of protecting...
Cybersecurity Firm Malwarebytes Targeted by Same Bad Actors as SolarWinds
Hackers who took control of Solar winds now have breached a leading cybersecurity firm, Malware Bytes. Malwarebytes said that it was breached by the same group who were able to take control of SolarWinds. It is the fourth major cybersecurity vendor who has been...
Time for Scare Tactics in Phishing Training and Education
No, it isn't any wonder why cybercrime activities have increased during 2020. Starting in May, the number of cyber attacks was close to the total number of those in 2019. That information is based on a report from the federal government. Phishing education is...
Scam of the Month – Business Email Compromise Scam Targets an Employee
Each month we highlight a REAL scam that was submitted to our security team. We highlight these real examples of tactics criminals are using RIGHT NOW, that way you'll be better prepared when the next scam hits your inbox. This month's submission comes from "John."...
TBI Adds ThreatProtector to Provider Portfolio
TBI Adds Innovative CyberSecurity Platform, ThreatProtector, to Provider Portfolio The partnership brings channel-exclusive innovative cybersecurity services to TBI’s partner community. CHICAGO, IL – JANUARY 6, 2021 — TBI, the nation’s leading technology brokerage...
2021 Shaping Up to be Worst Year Ever for Ransomware
Ransomware wreaked havoc in 2020 for businesses of all size. It is shaping up to be even worse for 2021 and you need to be prepared. In 2021 alone, the average ransom payment from businesses to the bad guys jumped a record 31% to $233,817. To most businesses a...
Voting for Cybersecurity Education
No, this is not a political office. In fact, we know that there are some topics that are not even worth trying. They are important, but different opinions have their value. Yet, cybercrime should make us a united front against it. It's a choice, and it's making it a...
We Do Not Negotiate with Criminals | Good or Bad Strategy?
As we all know, in terms of rescue negotiations, the US government insists that "we do not negotiate with terrorists." Whether it can be 100% specific can be demonstrated by more methods than we discuss here. We can be sure that the government this week expressed...
Risks of Stimulus Scams Increasing
The election is over, and the new administration will soon begin releasing future plans, but there remain other uncertainties at this time. One of the factors is the continued risk of cybercrimes and hackers, which continue to have a strong position that gives them an...
Just When You Thought COVID19 Was Bad Enough
Hackers Now Targeting Companies Involved in the Covid19 Vaccine Distribution Supply Chain A global spear phishing campaign has been targeting organizations associated with the distribution of COVID-19 vaccines and is gaining in popularity. Cyber criminals were quick...
Holiday Season Fraud Prevention Guide
The holiday season is also the phishing and scams season as attackers leverage the increasing use of online shopping to get credentials or money. This increase will likely be more dramatic this year due to the COVID-19 pandemic. With an increase in people staying safe...
A Sincere Thanks to All Customers and Partners
To our Clients and Partners (both new and old), As the end of year draws near we would like to take this opportunity to thank all of you for an amazing year. The success of Threat Protector is based on the relationships we have built over the years, and we really...
Scam of the Month – Fraudulent Texts Indicating a Possible COVID-19 Exposure
Each month we highlight a REAL scam that was submitted to our security team. We highlight these real examples of tactics criminals are using RIGHT NOW, that way you'll be better prepared when the next scam comes your way. This month's submission comes from "Cindy."...
Five Reasons Why Your Business Needs Antivirus Endpoint Protection
Cybersecurity has never been more important to businesses. Technology has transformed the way that organizations across the globe operate and engage with colleagues, stakeholders, and customers. However, while these advancements have helped to make businesses become...
Humans are the problem and the solution
Human factors and cybersecurity go hand-in-hand. First, to be cybersecure, the elements of security technology must be addressed. While you're executing this monumental task, remember that human factors ought to be a fundamental consideration when creating your...
Three Important Reasons to Implement the Best IT Security Solutions
Proper IT security is one of the pillars of a successful business in the digital age. Without adequate IT security measures in place, your business’s sensitive data could be breached, and you could lose years of hard work and research. Naturally, you want to do...
2 Reasons Why Cybersecurity Awareness Education and Training Are Essential
In an ultra-modern world that fully embraces the digital landscape, cyber crimes are on the rise and continue to be. Phishing, identify theft, and hacking are some of the most concerning types of cybercrimes that have become more and more common. For this reason, it...
How Phishing Can Impact Your Business
Phishing is one of the most popular forms of attack that cybercriminals utilize. No matter whether you are a one-person entrepreneur or a global corporation, the danger of falling victim to a phishing scam is on the rise, and criminals become increasingly more...
4 Incredible Ways to Keep Your Business Safe From Cybersecurity Threats
It's imperative to ensure that you and your employees focus on the importance of cybersecurity. Unfortunately, letting your company's guard down can lead to lots of problems. Here are four important ways to keep your company safe from cybersecurity threats. Keep Login...
(Infographic) Coronavirus Epidemic Leads to Massive Increase in Ransomware Attacks Against SMB’s
Cyberattacks have surged to unprecedented levels during the coronavirus pandemic. We expose details surrounding ransomware attack trends by continent, industry, costs, types of attacks, and more. In recent months cyberattacks have dramatically increased as cyber...
What Is System Endpoint Protection?
How secure are your IT solutions? Businesses across the globe utilize various tools to keep their staff connected with each other and their clients. From laptops and desktops to smartphones and tablets, there is a huge array of devices being used, creating multiple...
Scam of the Month – QR Code Scanning Leads to Big Issues
Each month we highlight a REAL scam that was submitted to our security team. We highlight these real examples of tactics criminals are using RIGHT NOW, that way you'll be better prepared when the next scam hits. This month's submission comes from "Javier". Javier was...
Encrypted Email Providers: Five Reasons You Should Use Them
Encrypted Email Providers: Five Reasons You Should Use Them Since the very first email was sent by Ray Tomlinson back in 1971, the method of communication has completely transformed the world that we live in. Long gone are the days of having piles of paper clogging up...
What is Cryptojacking and How You Can Stop It
Cryptojacking (also called malicious cryptomining) is an emerging online threat that hides on a computer or mobile device and uses the machine's resources to “mine” forms of online money known as cryptocurrencies. It’s a burgeoning menace that can take over web...
What Is the HB3834 Texas Cybersecurity Awareness Training Certification?
The threat of cybercrime is on the rise, and businesses of all sizes are at risk of falling victim to cybercriminals. Research suggests that only 5% of companies are suitably protected from cybersecurity risks, while in the first six months of 2019, 4.1 billion...
Why You Should Provide Your Staff with Cybersecurity Awareness Training
In this increasingly digital world, we are spending more time online than ever before. Businesses are reliant on internet connectivity, and IT security solutions have become crucial in keeping systems and data secure. However, despite the advancement of endpoint...
Insider Threats: What’s the Harm?
Some may think this type of activity is a victimless crime. Quite the contrary! Identity Theft: The unauthorized access of information brought about by an employee's abuse of their privileges could result in identity theft issues for those whose information was...
Cybersecurity Awareness Month in October
Cybersecurity awareness month always is in October of each year. If we can guarantee this year, we must adopt cyber intelligence practices. Uncertainty, unexpected circumstances, and unknown factors allow hackers to gain our trust and ultimately access professional or...
Scam of the Month – USB drives and Potential Scams
Each month we highlight a REAL scam that was submitted to our security team. We highlight these real examples of tactics criminals are using RIGHT NOW, that way you'll be better prepared when the next scam hits. To protect identities, the names have been changed in...
Get Employees to Buy-In to Cybersecurity Training
Every Cog in the Wheel Matters Whether your name is on the sign out front, or you are in a leadership role, the success of the business is in your hands. In that role, you know that each department feeds into the overall health of the business, and you need to ensure...
Inside the Anatomy of a CyberAttack
Cyber attackers are ever evolving. You ever wonder what goes through the mind of a hacker? How they think? How they view your business?There are four major components to how a ransomware breach happens, which include:Reconnaissance - Hackers often research...
City Takeovers with RobbinHood Ransomware
RobbinHood – the Not so Heroic New Outlaw Stealing from the rich to give to the poor – in theory, the original Robin Hood had good intentions. There’s a new generation of him and his not so merry men and in this adaption, the takeovers are far less charitable. Using...
Ransomware Attacks up 105% in Q1 of 2019
Ransomware Is Not Randomware Gone are the days where you “might know” someone who has, or will, come under attack to a ransomware attack. The skyrocket in cases has come in at a 105% increase according to Beazley Breach Response (BBR) Services team which compared...
Addressing the Vertical – Cybersecurity in All Directions
And So, It Grows First, it was a widespread, if not generic, notion – you need to protect your personal information. Then we began to call it cybersecurity, and it was applicable to your business as well. It was still a concept that blanketed data generically – the...
Casting a Wide Net
In business, if you can cast a bigger net to reach a larger audience, it’s considered a good idea – a win. Unfortunately, hackers are now taking the same approach. With c-level executives offering a higher payoff when compromised, sending out phishing emails to the...
The Future is Here
Sunday funnies Remember the Jetsons? Robots that cleaned, food choices you tapped into a computer for preparation…moving sidewalks? Flying cars aside, we aren’t too far off from the technology that seemed so unlikely and impossible. The future – it’s here. We live in...
Think Global, Act Local
When Global News Hits Home When you hear and watch news headlines, you can often tune out. It’s not happening here; it’s not affecting you directly. It’s a global issue right now. You’ll worry about it when things are closer to home. The problem is, by the time it...
5 Steps to Protect Your Information Online
Spending time on the internet and social channels is good for us, as it helps us to get connected with our loved ones. But do we really care about our data privacy? How much time do we spend to keep our personal information safe? The good news is that you can continue...
43% of Cyber Attacks Still Target Small Business while Ransomware Stays On the Rise
And cyber attacks on small businesses represent the largest share of all the attacks in the report. The disparity highlights a lack of resources and knowledge. So small business owners must learn more and invest in better digital security. But cybercriminals also seem...
HACKERS GAIN ACCESS TO OVER 80 ECOMMERCE SITES
Magecart is in the news a lot lately for conducting several high-profile heists against major companies including British Airways, Ticketmaster, Newegg, and others. Cybersecurity researchers have discovered over 80 Magecart compromised e-commerce websites that were...
WARNING — Malware Found in CamScanner Android App With 100+ Million Users
Beware! Attackers can remotely hijack your Android device and steal data stored on it, if you are using free version of CamScanner, a highly-popular Phone PDF creator app with more than 100 million downloads on Google Play Store. So, to be safe, just uninstall the...
Three Steps to Reduce Cyber Criminal Threats to High Value Legal Content
The Verizon 2019 Data Breach Investigations Report says that 34 percent of all breaches in 2018 were caused by insiders or untrained employees clicking on cyber criminal emails making it to their desktop, and it’s only going to get worse. Law firms, their clients and...
What’s the Value of a Single Employee Password to a Bad Guy?
Ever wonder what a single employee password is worth to a bad guy? Ever wonder what a bad guy can do just knowing your employees email address and password? Well we decided to conduct a test with one of our clients... read on and get the detail: (FYI, this is a TRUE...
How to Protect your Business through Cyber Security Awareness Training for Employees
Can you imagine what the implications would be if the personal and financial information of every employee in your company were leaked to an intruder? Or worse yet, the information of your customers? The 100 employees and over 2,000 customers of Johnson...