article thumbnail

Hacker Personas Explained: Know Your Enemy and Protect Your Business

Webroot

As we mentioned in a previous blog , hackers come in many forms, but their methods can generally be classified into three distinct types of cybercriminals: The Impersonator – Hackers that pretend to be others, often using social engineering and human psychology to trick users.

Scams 107
article thumbnail

Remote Work is Here to Stay, and Other Cybersecurity Predictions for 2021

Webroot

Personal devices are often used for work and, as we saw in our 2020 Threat Report, are twice as likely as business devices to encounter infections. Hal Lonas, CTO and SVP of SMB engineering, Carbonite + Webroot. Some of that automation will come from AI, but auto-remediation, backup and restore capabilities are also important.

article thumbnail

Protecting your Customers and Brand in 2022: Are you doing enough?

Jane Frankland

Targeted attacks like these, plus social engineering, specifically phishing – where attackers pose as a trusted source, prey on human vulnerability, and use email or malicious websites to gain the information they want – are effective but they aren’t the only problem. Post pandemic, more research has come to light.

CISO 130