Remove Backups Remove Phishing Remove Security Awareness Remove Threat Reports
article thumbnail

Ransomware, BEC and Phishing Still Top Concerns, per 2021 Threat Report

Webroot

Although cybercriminal activity throughout 2020 was as innovative as ever, some of the most noteworthy threat activity we saw came from the old familiar players, namely ransomware, business email compromise (BEC) and phishing. COVID-19 definitely affected phishing in very visible ways.

article thumbnail

BrightCloud® Threat Report Mid-Year Update: Reinvention is the Name of the Game

Webroot

The OpenText Security Solutions threat intelligence team is sharing mid- year updates to our 2022 BrightCloud® Threat Report. PHISHING PREYED ON A VOLATILE MARKET. Phishing activity was exceptionally high. Phishing continued to proliferate with 46% of all successful phishing attacks using HTTPS.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Report: Phishing Attacks Sustain Historic Highs

Webroot

Phishing attacks sustain historic highs. In their latest report, IDG and the pros behind Carbonite + Webroot spoke with 300 global IT professionals to learn the current state of phishing. Luckily, the report details how to fight back. Phishing capitalizes on COVID. Consequences of phishing. of attacks.

Phishing 102
article thumbnail

5 Tips to get Better Efficacy out of Your IT Security Stack

Webroot

Be sure to choose vendors who provide the type of guidance, support, and enablement resources you need; who can and will advise you on how best to configure your cybersecurity and backup and disaster recovery systems; and who are invested in helping you ensure maximum return on the investment you and your customers are making in these solutions.

Phishing 143
article thumbnail

Hacker Personas Explained: Know Your Enemy and Protect Your Business

Webroot

Impersonators are known to use phishing , Business Email Compromise (BEC) and domain spoofing to lure victims, and they’re always looking for new ways to innovate. This is why a multi-layered approach that can block phishing sites (including HTTPS) in real time, is key for staying safe.

Scams 108