Protection Guides - Emsisoft | Cybersecurity Blog https://www.emsisoft.com/en/blog/category/protection-guides/ Straight-talking security advice from the Malware Experts Tue, 30 Jan 2024 15:13:23 +0000 en-US hourly 1 https://www.emsisoft.com/en/blog/wp-content/uploads/2023/12/cropped-icon_eam-32x32.png Protection Guides - Emsisoft | Cybersecurity Blog https://www.emsisoft.com/en/blog/category/protection-guides/ 32 32 The State of Ransomware in the U.S.: Report and Statistics 2023 https://www.emsisoft.com/en/blog/44987/the-state-of-ransomware-in-the-u-s-report-and-statistics-2023/ Tue, 02 Jan 2024 14:49:02 +0000 https://blog.emsisoft.com/?p=44987 The U.S. was bombarded by financially-motivated ransomware attacks throughout 2023. This report looks at the numbers, the costs, and why a ban on ransom payments may be the only solution.

The post The State of Ransomware in the U.S.: Report and Statistics 2023 appeared first on Emsisoft | Cybersecurity Blog.

]]>
QR phishing: How worried should you be? https://www.emsisoft.com/en/blog/44880/qr-phishing-how-worried-should-you-be/ Thu, 14 Dec 2023 18:11:38 +0000 https://blog.emsisoft.com/?p=44880 Our latest article dives deep into the world of QR code phishing (Qishing), revealing how these seemingly harmless codes can compromise your security. Learn about the rise of Qishing, its methods, and the best practices to protect yourself and your business.

The post QR phishing: How worried should you be? appeared first on Emsisoft | Cybersecurity Blog.

]]>
4 Essential Cybersecurity Measures Everyone Should Implement https://www.emsisoft.com/en/blog/44763/4-essential-cybersecurity-measures-everyone-should-implement/ Wed, 15 Nov 2023 13:33:08 +0000 https://blog.emsisoft.com/?p=44763 Our latest guide dives into four essential measures that can significantly enhance your protection against cyber threats.

The post 4 Essential Cybersecurity Measures Everyone Should Implement appeared first on Emsisoft | Cybersecurity Blog.

]]>
Why Signature-Based Detection Isn’t Yet Dead – Cutting Through The Marketing Noise https://www.emsisoft.com/en/blog/44687/why-signature-based-detection-isnt-yet-dead-cutting-through-the-marketing-noise/ Mon, 16 Oct 2023 07:19:16 +0000 https://blog.emsisoft.com/?p=44687 Our new article dives deep into why signature-based detection remains a crucial line of defense in our digital world. Get the facts, cut through the noise.

The post Why Signature-Based Detection Isn’t Yet Dead – Cutting Through The Marketing Noise appeared first on Emsisoft | Cybersecurity Blog.

]]>
Password Security Best Practices: An In-Depth Guide https://www.emsisoft.com/en/blog/29524/how-to-create-manage-store-passwords/ https://www.emsisoft.com/en/blog/29524/how-to-create-manage-store-passwords/#comments Sun, 24 Sep 2023 13:00:29 +0000 https://blog.emsisoft.com/?p=29524 Everything you need to know about creating strong passwords and managing your login credentials securely in 2023.

The post Password Security Best Practices: An In-Depth Guide appeared first on Emsisoft | Cybersecurity Blog.

]]>
https://www.emsisoft.com/en/blog/29524/how-to-create-manage-store-passwords/feed/ 23
The Complete Guide to Advanced Persistent Threats https://www.emsisoft.com/en/blog/44815/the-complete-guide-to-advanced-persistent-threats/ Fri, 25 Aug 2023 10:11:25 +0000 https://blog.emsisoft.com/?p=44815 APT attacks are on the rise, posing a significant threat to organizations of all sizes. Our comprehensive guide breaks down the anatomy of these threats and the defense mechanisms your business needs.

The post The Complete Guide to Advanced Persistent Threats appeared first on Emsisoft | Cybersecurity Blog.

]]>
The Art of Deception: Unmasking Social Engineering Attacks https://www.emsisoft.com/en/blog/44610/the-art-of-deception-unmasking-social-engineering-attacks/ Fri, 21 Jul 2023 14:23:49 +0000 https://blog.emsisoft.com/?p=44610 Discover the intricate web of deception in the world of cybersecurity. From phishing to pretexting, learn how social engineering attacks play on human emotions and how you can guard against them with Emsisoft

The post The Art of Deception: Unmasking Social Engineering Attacks appeared first on Emsisoft | Cybersecurity Blog.

]]>
Unpacking the MOVEit Breach: Statistics and Analysis https://www.emsisoft.com/en/blog/44123/unpacking-the-moveit-breach-statistics-and-analysis/ Tue, 18 Jul 2023 14:04:35 +0000 https://blog.emsisoft.com/?p=44123 How many organizations were affected by the MOVEit attack? This post looks at the statistics, and how we may be able to prevent similar attacks in future.

The post Unpacking the MOVEit Breach: Statistics and Analysis appeared first on Emsisoft | Cybersecurity Blog.

]]>
What is session hijacking and how do you prevent it? https://www.emsisoft.com/en/blog/44071/what-is-session-hijacking-and-how-do-you-prevent-it/ Fri, 14 Jul 2023 13:32:05 +0000 https://blog.emsisoft.com/?p=44071 Attackers use session hijacking to take control of your sessions and impersonate you online. Discover how session hijacking works and how to protect yourself.

The post What is session hijacking and how do you prevent it? appeared first on Emsisoft | Cybersecurity Blog.

]]>
Learning from the MOVEit attacks: What to know and what to do https://www.emsisoft.com/en/blog/44002/learning-from-the-moveit-attacks-what-to-know-and-what-to-do/ Tue, 20 Jun 2023 14:43:56 +0000 https://blog.emsisoft.com/?p=44002 Learning from the MOVEit attacks: how it unfolded and what you can do to defend your file transfer platforms.

The post Learning from the MOVEit attacks: What to know and what to do appeared first on Emsisoft | Cybersecurity Blog.

]]>
The Trojan Horse Virus: Understanding the Silent Threat https://www.emsisoft.com/en/blog/44510/the-trojan-horse-virus-understanding-the-silent-threat/ Tue, 16 May 2023 08:00:24 +0000 https://blog.emsisoft.com/?p=44510 Emsisoft's latest guide dives into the world of trojan viruses, highlighting their modus operandi and presenting actionable insights on prevention. Equip your business with the knowledge and tools necessary to fend off these covert cyber threats.

The post The Trojan Horse Virus: Understanding the Silent Threat appeared first on Emsisoft | Cybersecurity Blog.

]]>
What is DLL side-loading? https://www.emsisoft.com/en/blog/43943/what-is-dll-side-loading/ Mon, 08 May 2023 07:38:48 +0000 https://blog.emsisoft.com/?p=43943 DLL side-loading is an adversarial technique that exploits the way Windows loads DLL files. Learn how DLL side-loading works and how to protect your system.

The post What is DLL side-loading? appeared first on Emsisoft | Cybersecurity Blog.

]]>