Webinar Summary: Defense In Depth for Office 365

defense-in-depth-office-365-j-peter

In today’s security environment, email deserves serious attention. Ninety-one percent of cyber attacks arrive via links or attachments in emails. Eighty-five percent of companies have already fallen victim. [Read more…]

A brief history of ransomware: from fins to wings

ransomware fortinet evolution softchoice

The FBI recently published a report claiming that ransomware victims paid out over US$209 million just in the first quarter of 2016, compared to US$24 million for all of 2015. Ransomware has very quickly become the most fashionable malware on the market, flooding the threat landscape in ways never seen before. We are seeing new strains of ransomware almost every single day.

[Read more…]

6 Tips for Increasing the Portability of Your Hybrid Cloud Security Strategy

hybrid cloud security intel security

Security should be a high priority in any scenario, however, and strategies for hybrid cloud environments must take into account the potential for frequent movement of data between public clouds as well as between public and private clouds. Here are six factors to consider to ensure that your security strategy is portable across all services and service providers.

[Read more…]