article thumbnail

BrightCloud® Threat Report Mid-Year Update: Reinvention is the Name of the Game

Webroot

The OpenText Security Solutions threat intelligence team is sharing mid- year updates to our 2022 BrightCloud® Threat Report. Everyone benefits from ongoing security awareness training to reduce the likelihood of successful attacks that can wreak havoc on a business network and affect continuity.

article thumbnail

Ransomware, BEC and Phishing Still Top Concerns, per 2021 Threat Report

Webroot

Although cybercriminal activity throughout 2020 was as innovative as ever, some of the most noteworthy threat activity we saw came from the old familiar players, namely ransomware, business email compromise (BEC) and phishing. Here are some of the findings from the report. COVID-19 definitely affected phishing in very visible ways.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Report: Phishing Attacks Sustain Historic Highs

Webroot

In fact, phishing attacks spiked by 510% from just January – February 2020, according to the 2021 Threat Report. Overall, 76% of executives report that phishing is still up compared to before the pandemic. The report cites training as one of the most effective tools. Ready to start protecting yourself and your business?

Phishing 103
article thumbnail

The Pain of Double Extortion Ransomware

Thales Cloud Protection & Licensing

According to a recent market study 1 , 71% of individuals surveyed said double and triple extortion tactics have grown in popularity over the last 12 months, and 65% agree that these new threats make it tougher to refuse ransom demands. By prioritizing three security steps, businesses can optimize their ransomware protection tactics.

article thumbnail

5 Tips to get Better Efficacy out of Your IT Security Stack

Webroot

Be sure to choose vendors who provide the type of guidance, support, and enablement resources you need; who can and will advise you on how best to configure your cybersecurity and backup and disaster recovery systems; and who are invested in helping you ensure maximum return on the investment you and your customers are making in these solutions.

Phishing 143
article thumbnail

Hacker Personas Explained: Know Your Enemy and Protect Your Business

Webroot

In fact, our 2020 Threat Report found that impersonators are now imitating legitimate business websites to release malicious payloads or steal data, and a shocking 27% of phishing sites use HTTPS to trick the user into clicking phishing links, which makes these attacks even more dangerous.

Scams 109