Threat Lab

Girl Scouts and OpenText empower future leaders of tomorrow with cyber resilience

The transition to a digital-first world enables us to connect, work and live in a realm where information is available at our fingertips. The children of today will be working in an environment of tomorrow that is shaped by hyperconnectivity. Operating in this...

World Backup Day reminds us all just how precious our data is

Think of all the important files sitting on your computer right now. If your computer crashed tomorrow, would you be able to retrieve your important files? Would your business suffer as a result? As more and more of our daily activities incorporate digital and online...

3 Reasons We Forget Small & Midsized Businesses are Major Targets for Ransomware

The ransomware attacks that make headlines and steer conversations among cybersecurity professionals usually involve major ransoms, huge corporations and notorious hacking groups. Kia Motors, Accenture, Acer, JBS…these companies were some of the largest to be...

How Ransomware Sneaks In

Ransomware has officially made the mainstream. Dramatic headlines announce the latest attacks and news outlets highlight the staggeringly high ransoms businesses pay to retrieve their stolen data. And it’s no wonder why – ransomware attacks are on the rise and the...

An MSP and SMB guide to disaster preparation, recovery and remediation

Introduction It’s important for a business to be prepared with an exercised business continuity and disaster recovery (BC/DR) plan plan before its hit with ransomware so that it can resume operations as quickly as possible. Key steps and solutions should be followed...

Podcast: Cyber resilience in a remote work world

The global pandemic that began to send us packing from our offices in March of last year upended our established way of working overnight. We’re still feeling the effects. Many office workers have yet to return to the office in the volumes they worked in pre-pandemic....

5 Tips to get Better Efficacy out of Your IT Security Stack

If you’re an admin, service provider, security executive, or are otherwise affiliated with the world of IT solutions, then you know that one of the biggest challenges to overcome is efficacy. Especially in terms of cybersecurity, efficacy is something of an amorphous...

How Cryptocurrency and Cybercrime Trends Influence One Another

Typically, when cryptocurrency values change, one would expect to see changes in crypto-related cybercrime. In particular, trends in Bitcoin values tend to be the bellwether you can use to predict how other currencies’ values will shift, and there are usually...

Cyber Security Awareness Month: Cyber tune-up checklist

October is the month for pumpkin spice and all things spooky. But protecting your personal information online doesn’t need to be scary. For more than 20 years now, October has also been recognized as Cybersecurity Awareness Month.

In our digitally connected world, apps and online accounts can make our lives much more convenient. Sadly, they can also make our personal data more vulnerable to cyber threats. Each year, a shocking number of people become victims of sophisticated cyberattacks. In one recent data breach, 2.9 billion people had their social security numbers and other personal information hacked, and all that stolen data ended up for sale on the dark web.

Created by the National Security Division within the Department of Homeland Security and the National Cyber Security Alliance, Cyber Security Awareness Month promotes online safety and security for both individuals and small businesses. Its theme is Secure Our World, and its mission is to raise awareness about the importance of cybersecurity and showcase some of the easy ways we can all become more cyber resilient. By safeguarding our information from cyber threats, we can all help keep the digital world we live in more secure.

Password best practices

One of the best ways to keep your personal data out of the hands of hackers is also one of the simplest. Create strong passwords. Here are some tips for creating unbreakable passwords.

  • Keep it complicated
    We juggle so many passwords, it’s tempting to use something easy to remember. Unfortunately, using “12345” or “Password” just doesn’t cut it anymore. Each of your passwords needs to incorporate numbers, symbols and capital letters, use at least 16 characters. Do not use your pet’s name!
  • Use a password manager
    Keeping track of complex passwords for each of your accounts can seem overwhelming, but a password manager offers a simple and safe solution. Quality password managers like the one included with Webroot Premium will generate, store and encrypt all your passwords, requiring you to only remember one password.
  • Turn on multi-factor authentication
    Using multi-factor authentication adds a layer of security to your passwords by having you prove your identity in multiple ways. This means getting a text or email with a security code or answering a security question.

Identifying phishing scams

Phishing scams appear in our email inboxes, text messages and even voicemails on a daily basis. Designed to trick you into giving up your personal and financial information, knowledge is power when identifying what is real and what is in fact, fake.

Research from Deloitte found that 91% of all cyber attacks begin with a phishing email

  • Urgent requests
    Beware of messages that demand immediate action and threaten consequences if you don’t respond.
  • Suspicious email domains
    If an email is really from your bank, the address should contain the official domain name (e.g., noreply@yourbank.com.) Authentic company emails do not usually come from addresses like @gmail.com.
  • Poor grammar
    If an email contains awkward phrases, misspellings, and grammatical errors, it probably didn’t come from a legitimate company.
  • Generic greetings
    Your bank is probably never going to address you as “Dear Customer”. They know your name, and if they’re really trying to contact you, they’re going to use it.

If you think you’ve been a target of phishing, you can report it at reportphishing@apwg.org. For added safety, products Webroot Premium will protect you from identity theft and keep your personal and financial data out of the hands of cyber thieves.

Keeping technology up to date

Another simple weapon in the war on cybercrime – keeping your devices, software and apps up to date. When you install the latest updates you receive all the newest features, as well as the latest security upgrades. Here are some easy tips to stay continuously up-to-date.

  • Enable automatic updates
    Adjust the settings on your apps, software and devices to automatically update. You can schedule updates to happen overnight, so they never interrupt your screen time.
  • Verify your sources
    Download software from known sources and only download apps from your device’s official app store. Pirated or unlicensed software can spread dangerous malware and viruses to your devices.
  • Avoid software updates in pop-up windows
    Pop-up windows that demand a software update may be phishing scams. Close your browser and don’t take the bait.

Because we’re all connected to multiple software services, apps and devices, it’s easy to forget all the updates you need to make on a regular basis. Don’t forget to add your smart TVs, streaming services, routers and gaming devices to your update checklist. If you’re using products like Apple Watch, Google Nest or a Ring doorbell, you need to keep them updated as well.

Identity protection

Cybercriminals relentlessly scour the internet in search of leaked personal data. Guarding your personal data, especially financial details, is crucial. Here are some more steps you can take to protect your online identity.

  • Invest in the latest antivirus protection
    Reliable antivirus software acts like an anti-missile shield, keeping hackers from attacking your devices, including PCs, Macs, phones and tablets.
  • Beware of public Wi-Fi
    Using public Wi-Fi networks is convenient, but not necessarily safe. Always confirm your connection is encrypted when you’re out and about, and don’t make any financial transactions unless you’re on a private Wi-Fi network.
  • Use a VPN
    A virtual private network (VPN) protects your online privacy and helps keep your information safe. A trusted VPN encrypts your internet connection, which masks your IP address and keeps hackers away.
  • Keep data private when using AI
    With AI so prevalent it’s important to understand how it works, be aware of how vendors handle your data, and avoid entering private data into AI apps.
  • Don’t let your browser store your login details
    It certainly makes life easier when you let your browser remember your passwords for you, but that can backfire if your devices fall into the wrong hands. It’s always safest to enter your passwords each time you log in.
  • Use automatic backup
    Individuals and businesses alike can keep digital information secure by enabling automatic backup. Consider using a service like Carbonite, which offers encrypted cloud backup. If your data is ever lost, a backup solution provides an extra layer of safety, offering seamless recovery of all your files and other information.

World Economic Forum estimated that 95% of cybersecurity breaches are due to human error, making it more important than ever to take steps to protect yourself online and build more cyber resilience. So, grab a pumpkin spice latte and let’s work together to create a safer online environment. October is the perfect time to make sure you don’t get spooked by cybercrime.

Looking for more information and solutions?

Protecting your identity: Stay one step ahead of cybercriminals

As October rolls around, it’s time to focus on cybersecurity. After all, it’s Cybersecurity Awareness Month—a perfect reminder to check in on the safety of your identity. If you’ve ever had your identity stolen or know someone who has, you understand how serious the problem is. From text scams to stolen passwords, criminals are finding new ways to steal personal information.

So, how can you protect yourself and your loved ones? Follow these four identity protection strategies, and you’ll be in a good position to keep your digital identity safe and sound.

1. Get informed!

  • Learn about scams
    Identity thieves use various tactics to trick people. Some of the most common scams include phishing emails where criminals pretend to be a trusted organization like your bank, and phone calls or texts from fake customer service representatives asking for personal details. Being aware of these tactics is your first line of defense.
  • Check with your bank
    Most financial institutions have strict policies in place to protect your account. Get familiar with what your bank and credit card companies do to prevent identity theft. For example, many banks will never ask for your password or request sensitive information through email or text messages. Knowing their security protocols can help you spot a scam.

2. Know the warning signs

Cybercriminals are clever, and new scams pop up all the time. Here are a few things you should always be cautious about:

  • Unsolicited messages
    Be wary of unexpected emails, phone calls, and text messages that ask for your personal information or password details. Scammers often impersonate legitimate companies to make their requests seem official. If you receive a suspicious communication, always reach out to the company directly through their official website or customer service line.
  • Too-good-to-be-true offers
    If something sounds too good to be true, it probably is. Handle these communications with a healthy amount of skepticism. Offers like “free money” or “prizes” that require you to share your personal information are almost always scams. Look out for common warning signs, such as a sense of urgency. Scams will often pressure you to act quickly to claim your “reward.” When in doubt, pause and investigate the offer before responding. You can search online for the company or offer name to confirm its legitimacy.

3. Know what not to share

  • Social security number
    Keep this number private. Only share it when absolutely necessary, such as with your employer or financial institutions.
  • Passwords
    Never share your passwords with anyone. No legitimate company will ask for them.
  • Full date of birth
    While some websites and services require your date of birth for verification, sharing it publicly—especially on social media—can increase your risk of identity theft. Consider only sharing part of the date, such as the month and day, and leave the year off your public profiles.
  • Credit card details
    Be extra careful with your credit card information. Don’t email your credit card number or input it on suspicious-looking websites. Make sure you’re on a secure site (look for the padlock symbol in the address bar) before making any online purchase transactions.

4. Get proactive with your identity protection

  • Monitor your credit
    One of the best ways to catch identity theft early is by keeping a close eye on your credit reports. Services like AnnualCreditReport.com let you monitor your credit activity for free. If you see any unfamiliar accounts or activities, report them immediately.
  • Invest in identity protection services
    Companies like Webroot offer services that monitor your personal information for any suspicious activity. These services can alert you if there’s a suspicious financial transaction on your accounts or if your data is found on the dark web.
  • Freeze your credit
    If you’re not planning on applying for new credit anytime soon, consider freezing your credit. This prevents anyone from opening new accounts in your name. You can unfreeze your credit at any time, and it’s free to do so through major credit bureaus like Experian, TransUnion, and Equifax.

As cyber threats grow more sophisticated, protecting your identity has never been more important. While October is Cybersecurity Awareness, it serves as a year-long reminder to remain vigilant about your personal information. By staying informed, recognizing potential threats, and using the right tools and services, you can safeguard yourself against identity theft. Remember, the best defense is a proactive one!

What you need to know: The biggest cyber threats in 2024

In today’s world, both small businesses and everyday consumers face a growing number of cyber threats. From ransomware attacks to phishing scams, hackers are becoming more sophisticated. OpenText’s 2024 Threat Hunter Perspective sheds light on what’s coming next and how to protect yourself. Whether you’re running a small business or managing personal data at home, here’s what you need to know.

Nation-states are teaming up with cybercrime gangs

Cybercrime is no longer just about lone hackers. Now, nation-states like Russia and China are working with organized cybercrime groups to launch highly targeted attacks on businesses, governments, and even individuals.

  • Russia has been particularly active, coordinating with groups like Killnet to attack critical infrastructure in countries supporting Ukraine.
  • China is focusing on its political goals in the South China Sea, often collaborating with cybercrime rings like Storm-0558.

For SMBs: Be aware that even smaller businesses can be collateral damage in nation-state cyber wars, especially if you’re part of a critical supply chain. Strengthen your security measures to avoid becoming an easy target.

For consumers: Stay alert to potential phishing attacks or scams related to global events. Hackers often exploit moments of political tension or publicized aid efforts.

Timing is everything for hackers

One of the key insights from the report is how hackers choose the most disruptive moments to strike. Whether it’s during an election, the holiday season, a big sporting event, or a major business transaction, cybercriminals wait for the right moment to maximize damage.

Fever chart showing spike in cyber attacks followiing announcement of military aid for Ukraine

For example, businesses supporting Ukraine saw a significant increase in attacks within 24-48 hours of announcing aid. This shows that hackers pay attention to the news—and use it to time their attacks for maximum chaos.

For SMBs: Be especially vigilant during peak business times or important events, like product launches, financial closings, or holiday seasons. These are moments when your business may be more vulnerable due to distractions or heavy workloads.

For consumers: During holidays or big events (like the Super Bowl or Black Friday), be cautious of unexpected emails, texts, or promotions. Scammers love to take advantage of busy times to trick people into clicking malicious links.

Top cyber threats you need to know about in 2024

The OpenText report highlights some of the most dangerous cyber threats we’ll be facing this year. Whether you run a small business or manage your own personal data, these threats are ones to watch out for:

  • Killnet and Storm0558 (nation-state-linked groups)
  • Akira and Black Basta (ransomware gangs targeting businesses of all sizes)

These groups are known for launching ransomware attacks, where they lock down your systems or steal data, demanding a hefty ransom to get it back.

For SMBs: Invest in ransomware prevention and always back up your data. Having regular backups means you can recover without having to pay a ransom.

For consumers: Keep personal backups of important files (photos, documents, etc.) on an external drive or in the cloud. That way, even if your devices get infected, you won’t lose everything.

What to expect this fall: U.S. election and beyond

With the U.S. presidential election in fall 2024, the cyber landscape is expected to get even more dangerous. Cybercriminals and nation-states alike will likely target key services and use misinformation to influence the public.

In addition, the report predicts an increase in attacks on critical infrastructure—things like power grids, water systems, and hospitals—throughout 2024, as part of the growing cyber arms race.

For SMBs: Be prepared for increased cyber activity around major political events, as hackers may use the chaos to launch broader attacks. Ensure your cybersecurity measures are updated and your employees are trained to spot phishing attempts.

For consumers: Be skeptical of political content online, especially as we approach the election. Deepfake videos and fake news are expected to rise, making it harder to tell fact from fiction.

AI: Both a help and a threat

AI is playing a bigger role in cybersecurity, but it’s also giving hackers new tools. Cybercriminals are using AI to create more convincing scams, such as deepfake videos and phishing emails that are harder to detect. But at the same time, AI can help businesses defend themselves by detecting threats faster and automating security responses.

For SMBs: AI tools can help boost your cybersecurity efforts by automating threat detection, but remember that AI is not a fix-all solution. Human oversight is still crucial to ensure your defenses are robust.

For consumers: Be wary of AI-driven scams. If you receive a message, video, or email that seems suspicious—even if it looks real—double-check before sharing any information or clicking on a link.

Practical security tips for SMBs and consumers

The report emphasizes simple yet effective security measures that can protect both businesses and individuals from cyber threats.

  • Keep software updated: Whether you’re running a business or just protecting personal devices, always update your software and security tools. Patches often fix vulnerabilities that hackers could exploit.
  • Use strong, unique passwords: Weak or reused passwords are an easy way in for cybercriminals. Use a password manager to create and store strong passwords.
  • Enable two-factor authentication (MFA): For added protection, enable two-factor authentication on your accounts. This ensures that even if a hacker gets your password, they can’t access your account without a second step.
  • Train employees on security basics: If you run a business, make sure your team is aware of common threats like phishing emails and knows how to report suspicious activity.

For SMBs: Consider a cybersecurity audit to identify any weaknesses in your system, and make sure your backup plans are up to date. Cyber insurance might also be worth looking into as an additional safety net.

For consumers: Keep an eye out for phishing scams, especially during high-risk times like holidays or after major news events. When in doubt, verify the source before clicking.

Download your copy of OpenText’s 2024 Threat Hunter Perspective today

Webroot SecureAnywhere Internet Security Ranks #1 Among 8 Competitors for Overall Performance

Webroot® once again outperformed competitors in its latest round of testing by the performance benchmarking firm PassMark for February, 2023. In taking the highest score in the category, Webroot beat out competitors including BitDefender™, McAfee®, Norton, and ESET® security products.

PassMark® Software Party, Ltd. specializes in “the development of high quality performance benchmarking solutions as well as providing expert independent IT consultancy services to clients ranging from government organizations to major IT heavyweights.”

For this report, the company conducted objective testing of nine endpoint security products, including Webroot® SecureAnywhere Internet Security with Antivirus. Tests measured efficacy and performance in 15 categories including:

  1. Scan Time
  2. Scheduled scan time
  3. Installation size
  4. Installation time
  5. Registry Key added
  6. Boot time
  7. Use interface launch time
  8. Chrome Launch Time
  9. Memory Usage during System Idle
  10. Memory Usage during Initial Scan
  11. Browse time
  12. File Copy, Move and Delete
  13. File Format Conversion
  14. File Compression and Decompression
  15. File Write, Open and Close

The table below shows overall scores achieved by the tested products, with a score of 100 being an ideal product achieving the highest possible score in each of the selected test metrics. Antivirus products have been ranked by their overall scores:

The overall scores above are only part of the story. Here’s some additional findings:

  • Security scans 6x faster than average competitor
  • 21x faster to install than average competitor
  • Taking up 50x less space than average competitor (on hard drive)
  • Uses 4 times less memory than average competitor (RAM, during system idle and initial scan)
  • Fastest PC boot time compared with competitors

Not only did Webroot ranked first overall, but it also did in 7 specific benchmarks:

  • Scheduled scan time
  • Installation size
  • Installation time
  • Registry Key added
  • Boot time
  • Memory Usage during Initial Scan
  • File Write, Open and Close

Why is this important?

Enjoying your digital life to the fullest means you can stay safe online and leverage the full power of your devices and your connections without security getting in the way. Choosing a comprehensive Internet Security solution that has little to no impact on your device’s performance helps you ensures you can work, shop, bank, play, connect, stream online without worry!

For more, check out the PassMark report.

AI in education: Balancing innovation with security

Artificial intelligence (AI) and chatbots like ChatGPT are transforming the way educators and students approach education. It’s not just college students leveraging AI to get ahead; high school and even grade school students are using AI resources for their projects and homework. Students can write essays, get math tutoring help, and even create study plans using these advanced tools.

While AI offers numerous educational benefits, it also presents challenges like cheating and plagiarism. Understandably, the use of AI has raised questions for many educators who must balance its educational value while also ensuring students do not misuse the technology. They must now address topics about academic integrity and the authenticity of student work in the context of AI’s influence.

Interestingly, 63% of teachers are incorporating ChatGPT into their instruction methods; yet, when it comes to schoolwork, 62% of teachers prohibit students from using AI. Educators are now tasked with finding ways to ensure students use these tools ethically. Implementing plagiarism checks and fostering an environment that values original thought are crucial steps in addressing this issue. Likewise, by promoting a culture of authenticity and integrity, schools can ensure that AI serves as a valuable educational tool rather than a shortcut for students.

Data security and privacy concerns

Then, there’s the security considerations with AI use in school. With the increased reliance on AI in education, safeguarding students’ data has become a critical issue. It’s essential to protect sensitive information, such as academic records and personal data, from theft, breaches, and misuse. This includes addressing emerging threats like malware and ransomware to ensure comprehensive data security. Likewise, having dark web and identity theft monitoring in place is crucial to preemptively address potential risks to student data security.

As educators and parents explore the benefits of AI tools for enhancing learning experiences, having robust security in place is essential. Comprehensive protection tools like Webroot deliver all-in-one device, privacy & identity protection to safeguard against cybercriminals and identity theft. These tools provide features such as malware protection, private browsing with VPN, and identity theft protection, which safeguard against cyber threats, protect online privacy, and monitor for unauthorized use of personal information.

By integrating robust security solutions, educators and parents can effectively mitigate risks associated with AI use while promoting a safe and trusted learning environment. This holistic approach strengthens data security measures and supports the responsible integration of AI in education.

The future of AI in education

As AI continues to evolve, its role in education will likely expand. The key to harnessing its potential lies in striking a balance between leveraging its benefits and mitigating its risks. By promoting ethical use, enhancing data security, and fostering a culture of originality, we can ensure that AI becomes a valuable asset in the educational landscape.

Ultimately, AI’s future in education will depend on collaborative efforts between educators, policymakers, technology developers, and communities. By fostering innovation and embracing AI responsibly, we can prepare students for a future where technological advancements and human creativity go hand in hand.

7 tips on keeping your data private when using AI

In recognition of its profound impact, July 16 is celebrated as Artificial Intelligence (AI) Appreciation Day. AI is one of the defining technologies of our era, and its adoption is skyrocketing. People are using AI tools like OpenAI’s ChatGPT and Microsoft Copilot for a wide range of personal applications. Indeed, AI is integrated into various aspects of our daily lives — from AI-powered apps that assist with language translation and personal finance management to tools that help with creative writing and music composition.

However, with the rapid growth of AI comes the pressing need to maintain privacy in our tech-driven world. As these intelligent systems become more capable and ubiquitous, they also collect vast amounts of data. Staying informed about the privacy practices of the AI tools you use and taking proactive steps to safeguard your information is crucial in navigating this new digital landscape.

Here are some tips to help you keep your data private in our AI-enabled era:

  1. Understand the technology
    Imagine stepping into a futuristic world where robots and computers are your helpful companions. That’s our world today with AI! But as with any new tech, it’s crucial to know how it works. AI is evolving fast, so take some time to understand the basics. Knowing how AI algorithms function and the specific types of data they use is key to understanding how these systems make decisions.
  2. Know the vendor’s privacy practices
    Think of using an AI tool like choosing a new roommate. You wouldn’t want to live with someone who’s careless with your belongings, right? The same goes for your data privacy. Before you start using any AI tool, look into how the company handles your information. Are they safeguarding it, or selling it off to the highest bidder? A little research can help you find AI tools that respect your privacy.
  3. Avoid inputting private data
    Avoid sharing sensitive information like your address and phone number when interacting with AI tools. While it’s important to be cautious, remember that certain types of private data, such as preferences or non-sensitive information, can be safely shared with AI. Just as you wouldn’t divulge all your secrets to a new acquaintance, exercise discretion in what you share to ensure your privacy remains protected.
  4. Use strong passwords
    Think of your passwords as the locks on your doors. Weak locks are easy to pick, while strong ones keep intruders out. Create strong, unique passwords for your accounts, and use a reputable password manager like Webroot to keep track of them. This way, you won’t have to remember each one, and you can rest easy knowing your accounts are secure.
  5. Keep software up-to-date
    Imagine driving a car with outdated brakes — scary, right? Using outdated software is just as risky. Keep your AI-powered devices and services up-to-date. Software updates often include security patches and bug fixes that keep your data safe and your devices running smoothly.
  6. Protect your devices
    Your devices are like digital treasure chests, full of valuable information. Unfortunately, they’re also targets for cyber-attacks. AI-powered cyber threats are common and can wreak havoc on your systems. So strong antivirus protection is essential. Invest in a powerful solution like Webroot to keep the bad guys out and your devices safe.
  7. Use two-factor authentication
    Think of two-factor authentication (2FA) as a double lock on your front door. It adds an extra layer of security by requiring a second form of verification, like a text message or an app notification, along with your password. Enabling 2FA on your accounts makes it much harder for someone to break in, even if they know your password.

By following these tips, you can enjoy the wonders of AI without sacrificing your privacy. Stay informed, stay cautious, and stay protected! The future is bright with AI — just make sure you’re navigating it safely.

Learn more about data protection.

What to do if you’re using Kaspersky security software that is now banned in the U.S.

If you’re using cyber security software from Kaspersky Lab, Inc, you will need to find an alternative solution soon. On June 20, 2024, the U.S. Department of Commerce banned software from the Russian-owned company, saying it posed an unacceptable risk to national security. 

Citing the Russian government’s offensive cyber capabilities and its capacity to influence Kaspersky’s operations, Commerce Department regulators are strongly encouraging individuals and businesses that use Kaspersky products and services to transition to new vendors to limit potential exposure of personal or sensitive data.  

While customers won’t face legal penalties for continuing to use the software, federal regulators caution that users will assume any risks associated with a breach. 

The only good news is that current users of Kaspersky software are being given several months to transition to alternative cyber security products — until 12:00 AM EDT on September 29, 2024. 

Factors to consider when evaluating antivirus software

After events like this, you may wonder how much it matters where your cyber security solutions are developed and headquartered. Effective cybersecurity solutions can come from any corner of the globe, and transparency and openness to independent review are far more important factors than national origin. 

So how do you go about evaluating and selecting antivirus software?   

Once you’ve looked around and realized that a free solution won’t provide the protection you need, you’ll want to consider protecting yourself with software from one of the well-established industry leaders in this space. Here’s what a best-in-class provider like Webroot® has to offer: 

  • Regular definition updates – In the age of polymorphic malware and zero-day phishing attacks, any software with regular, cloud-initiated definition updates is out of date by the time it’s installed on your computer. 
  • Refined malware detection – The threat landscape in the field of cybersecurity is always evolving. You need a multi-layered approach to malware protection.  
  • Designated threat research team – While AI is increasingly important in the field of internet security, there’s still no substitute for a team of trained professionals to sift through the data and identify the latest cyber threats
  • Customer service – You’ll want to rely on  team of threat researchers with award-winning support available 24/7.  
  • Reliable and reputable – The number of cyber security companies and products has exploded in recent years. But you should give greater weight to one of the well-established market leaders in this space. Webroot, for example, was founded in 1997 in Boulder, CO. The brand is now part of OpenText, a global leader in Enterprise Information Management.  

Resources to help you choose the right antivirus

Personal or business: Business requirements (think networks, fleets of computers, and downtime risks) are different than those of an individual trying to protect their laptop and mobile device. Webroot has products tailored to both business and personal use. 

Need help choosing? Evaluating security solutions and matching them to your needs can be daunting. Consider using Webroot’s self-guided tools to help you pick a personal or business product.  

Try before you buy: You can kick the tires on Webroot’s products for free. Try the personal free trials here. Or try the business free trials here

Internet Safety Month: Keep your online experience safe and secure

What is Internet Safety Month?

Each June, the online safety community observes Internet Safety Month as a time to reflect on our digital habits and ensure we’re taking the best precautions to stay safe online. It serves as a reminder for everyone—parents, teachers, and kids alike—to be mindful of our online activities and to take steps to protect ourselves.

Why is it important?

As summer approaches and we all pursue a bit more leisure time—that typically includes more screen time—it’s important to understand the risks and safeguard our digital well-being. While the Internet offers us countless opportunities, it also comes with risks that we must be aware of:

This makes Internet Safety Month the perfect time to review our digital habits and ensure that we are doing everything we can to stay safe.

7 tips to keep your online experience secure

Malware is malicious software designed to harm your computer or steal your personal information. It can infect your device through malicious downloads, phishing emails, or compromised websites, leading to potential loss of access to your computer, data, photos, and other valuable files.

How to protect it
Install reputable antivirus software like Webroot on all your devices and keep it updated. Regularly scan your devices for malware and avoid clicking on suspicious links or downloading unknown files.

2. Be skeptical of offers that appear too good to be true
If an offer seems too good to be true, it probably is. Scammers often use enticing offers or promotions to lure victims into sharing personal information or clicking on malicious links. These can lead to financial loss, identity theft, or installation of malware.

How to protect it
If an offer seems too good to be true, it probably is. Research the company or website before pursuing an offer or providing any personal information.

3. Monitor your identity for fraud activity

Identity theft happens when someone swipes your personal information to commit fraud or other crimes. This can wreak havoc on your finances, tank your credit score, and bring about a host of other serious consequences.

How to protect it
Consider using an identity protection service like Webroot Premium that monitors your personal information for signs of unauthorized use. Review your bank and credit card statements regularly for any unauthorized transactions.

4. Ensure your online privacy with a VPN
Without proper protection, your sensitive information—like passwords and credit card details—can be easily intercepted by cybercriminals while browsing. Surfing the web and using public Wi-Fi networks often lack security, giving hackers a prime opportunity to snatch your data.

How to protect it
Use a Virtual Private Network (VPN) when connecting to the internet. A VPN encrypts your internet traffic, making it unreadable to hackers. Choose a reputable VPN service and enable it whenever you connect to the internet.

5. Avoid clicking on links from unknown sources
Clicking on links in emails, text messages, or social media from unknown or suspicious sources can expose you to phishing attacks or malware. These seemingly harmless clicks can quickly compromise your security and personal information.

How to protect it
Verify the sender’s identity before clicking on any links. Hover over links to see the actual URL before clicking. If you’re unsure about a link, type the company’s name directly into your browser instead.

6. Avoid malicious websites
Malicious websites are crafted to deceive you into downloading malware or revealing sensitive information. Visiting these sites can expose your device to viruses, phishing attempts, and other online threats, putting your security at risk.

How to protect it
Install a web threat protection tool or browser extension that can block access to malicious websites. Products like Webroot Internet Security Plus and Webroot AntiVirus make it easy to avoid threatening websites with secure web browsing on your desktop, laptop, tablet, or mobile phone.

7. Keep your passwords safe

Weak or reused passwords can easily be guessed or cracked by attackers, compromising your online accounts. But keeping track of all your unique passwords can be difficult if you don’t have them stored securely in a password manager. If one account is compromised, attackers can gain access to your other accounts, potentially leading to identity theft or financial loss.

How to protect your passwords
Use a password manager to create and store strong, unique passwords for each of your online accounts. A password manager encrypts your passwords and helps you automatically fill them in on websites, reducing the risk of phishing attacks and password theft.

Take action now

As we celebrate Internet Safety Month, take a moment to review your current online habits and security measures. Are you doing everything you can to protect yourself and your family? If not, now is the perfect time to make some changes. By following these tips, you can enjoy a safer and more secure online experience.

Remember, Internet Safety Month is not just about protecting yourself—it’s also about spreading awareness and educating others.

Sources:

[1] Forbes. The Ultimate Internet Safety Guide for Kids.

[2] Forbes. The Ultimate Internet Safety Guide for Kids.

[3] Pew Research Center

[4] Information Week. What Cybersecurity Gets Wrong.

[5] MIT. Learn how to avoid a phishing scam.

Graduation to adulting: Navigating identity protection and beyond!

Congratulations, graduates! As you gear up for life after high school or college, you’re stepping into a world of exciting firsts—new jobs, new homes, and new adventures. There’s one first you might not have considered: your first identity protection plan.

Why is identity protection important? Let’s dive in.

Why protecting your identity matters

Imagine this: you’re building your credit score, applying for a credit card, or renting your first apartment. These milestones are crucial, but they also make you a prime target for identity theft and fraud. Your credit score is your financial fingerprint—it impacts job opportunities, apartment rentals, and even car loans. Protecting your identity from fraud is key to a smooth transition into adulthood.

Plus, as you start crafting resumes and portfolios for your dream job, your devices become treasure troves of personal information. Losing them to cyber threats can compromise your future. This is where identity and virus protection step in.

Understanding the risks

Identity theft and fraud pose significant risks, especially for new graduates entering the world of financial independence. As you start using credit cards or taking out loans, you become a prime target for cybercriminals looking to exploit your personal information. If your identity is stolen, it can wreak havoc on your credit history and financial well-being.

But it’s not just about identity theft. Your personal devices—laptops, smartphones, and tablets—hold a wealth of sensitive information that cybercriminals target through malware, ransomware, and other cyber threats. From important resumes and portfolios to personal documents, your digital footprint needs robust protection.

Safeguarding against identity theft and cyber threats

To protect yourself against these digital risks, consider adopting the following technology approaches:

Protecting your identity and personal information is essential as you embark on your journey into adulthood and financial independence. By incorporating these technology solutions into your digital habits, you can significantly reduce the risk of identity theft, fraud, and cyberattacks.

Choosing the right protection

Now, let’s talk about finding the right protection for you. Do you have multiple devices that need safeguarding? Are you protecting just yourself, or your family too? These are the questions that will guide your choice.

Enter Webroot. Webroot can help you navigate the complex world of identity, privacy, and virus protection. With a range of options, you can select the level of security that fits your lifestyle and needs. Worried about credit fraud? Interested in keeping your devices secure? Webroot has you covered.

Ready to make your first smart adulting decision? Explore Webroot’s protection plans and secure your future today.

Help me choose the right protection.

Key Insights from the OpenText 2024 Threat Perspective

As we navigate through 2024, the cyber threat landscape continues to evolve, bringing new challenges for both businesses and individual consumers. The latest OpenText Threat Report provides insight into these changes, offering vital insights that help us prepare and protect ourselves against emerging threats. Here’s what you need to know:

The resilience of ransomware

Ransomware remains a formidable adversary, with groups like LockBit demonstrating an uncanny ability to bounce back even after significant law enforcement actions. Despite a recent crackdown that saw authorities dismantle its infrastructure, LockBit swiftly resumed operations, even taunting law enforcement agencies in the process. This adaptability highlights how resourceful ransomware groups have become, enabling them to evade detection and persistently challenge defenders.

For businesses, this means implementing a comprehensive incident response plan that includes secure, immutable backups and regular testing to ensure rapid recovery in the event of an attack. Consumers should also take measures like frequently backing up their data to an external drive or cloud solution. This resilience requires ongoing vigilance and robust security measures for everyone involved.

Malware infections on the rise

Chart showing rise in malware infections for business and consumer PCs.

For the first time in years, malware infection rates are rising among both businesses and consumers. The uptick is primarily attributed to attackers leveraging advanced tools like generative artificial intelligence (AI), which helps them craft malware that’s more sophisticated and adaptive. Malware variants are becoming more difficult to detect, and infection methods are increasingly creative, such as using enticing email attachments or redirecting users to malicious sites via QR codes.

This new wave of malware infections serves as a stark reminder for businesses and individuals to strengthen their cyber defenses. Keep all devices updated with the latest security patches, and use reputable antivirus solutions that can block suspicious downloads and identify malicious software. Additionally, be wary of unexpected attachments or links and avoid clicking on anything that looks suspicious.

Phishing gets personal

Phishing attacks are becoming more sophisticated, thanks to tools like generative AI, which enable attackers to personalize their campaigns for maximum impact. What was once a clear distinction between mass phishing emails and more targeted spear-phishing attempts is now blurring, making it harder to distinguish between the two. Attackers can craft convincing emails that mimic legitimate brands, logos, and domains to trick unsuspecting victims into providing sensitive information or clicking malicious links.

For both businesses and consumers, this trend emphasizes the need for increased vigilance and cybersecurity awareness. Educate yourself on common phishing tactics and train employees to recognize fraudulent emails. Multi-factor authentication (MFA) can add a vital layer of protection, and carefully inspect email addresses and links before taking any action.

The critical role of cyber resilience

The report underscores the importance of adopting a multi-layered defense strategy to mitigate the impact of these evolving threats. Cyber resilience involves proactive measures to prevent attacks while also ensuring you can quickly recover if a breach occurs. For businesses, this means implementing strong antivirus software, endpoint protection solutions, and regular software updates. For consumers, being alert to suspicious emails, using secure passwords, and frequently backing up data is crucial.

A multi-layered approach integrates different layers of defense, making it much harder for an attacker to compromise all systems simultaneously. Combine antivirus tools with DNS protection, endpoint monitoring, and user training for comprehensive protection.

Regional disparities in cyber threats

Map showing cyber threat increases on each continent from 2022 to 2023.

Geographical factors significantly influence the prevalence and nature of cyber threats. The report identifies regions like Asia, Africa, and South America facing higher infection rates than North America and Europe, partly due to differing economic conditions, cybersecurity maturity, and regulatory environments. Malware campaigns are often tailored to exploit regional nuances, such as the availability of local payment methods or common software vulnerabilities.

Businesses operating globally should adapt their cybersecurity strategies to account for these disparities, ensuring protections are tailored to local risks. Similarly, consumers should stay updated on the regional trends to better prepare for prevalent scams and threats in their area.

Industry-specific risks

Bar chart showing risks of cyber threats in each industry, with manufacturing the highest risk at 32.9%
This chart shows the percentage of businesses in each industry that encountered at least one malware infection over the past year

Specific industries like manufacturing, education, and healthcare are frequently targeted due to the valuable data they hold and the potential disruption caused by successful attacks. Manufacturing is particularly vulnerable to ransomware due to the high cost of production stoppages, which can prompt quicker ransom payments. Educational institutions, on the other hand, often have limited cybersecurity budgets, leaving them vulnerable to malware and phishing attacks that can compromise student and faculty data.

While businesses in these industries must enhance their cyber defenses and train staff accordingly, consumers should also be aware of how these attacks could indirectly impact them. For instance, a ransomware attack on a healthcare provider could lead to data breaches exposing patient information.

Recommendations for enhancing cybersecurity

The 2024 OpenText Threat Perspective serves as a crucial resource, offering insights that are essential for both businesses and consumers aiming to navigate the complexities of today’s cyber threat landscape. By understanding these threats and implementing a multi-layered defense strategy, we can significantly enhance our collective cyber resilience.

3 healthcare organizations that are building cyber resilience

From 2018 to 2023, healthcare data breaches have increased by 93 percent. And ransomware attacks have grown by 278 percent over the same period. Healthcare organizations can’t afford to let preventable breaches slip by. Globally, the average cost of a healthcare data breach has reached $10.93 million.

The situation for healthcare organizations may seem bleak. But there is hope. Focus on layering your security posture to focus on threat prevention, protection, and recovery.

Check out three healthcare organizations that are strengthening their cyber resilience with layered security tools.

1. Memorial Hermann balances user experience with encryption

Email encryption keeps sensitive medical data safe and organizations compliant. Unfortunately, providers will skip it if the encryption tool is difficult to use. Memorial Hermann ran into this exact issue.

Juggling compliance requirements with productivity needs, the organization worried about the user experience for email encryption. Webroot™ Email Encryption powered by Zix™ provides the solution. Nearly 75 percent of Memorial Hermann’s encrypted emails go to customers who share Webroot. Now more than 1,750 outside organizations can access encrypted email right from their inbox, with no extra steps or passwords.

Read the full case study.

2. Allergy, Asthma and Sinus Center safeguards email

The center needed to protect electronic medical records (EMR). But its old software solution required technical oversight that was difficult to manage.

Webroot™ Email Threat Protection by OpenText™ gives the healthcare organization an easy way to keep EMR secure. OpenText’s in-house research team is continually monitoring new and emerging threats to ensure the center’s threat protection is always up to date. With high-quality protection and a low-maintenance design, the IT team can focus on other projects. When patient data is at stake, the center knows it can trust Webroot.

Read the full case study.

3. Radiology Associates avoid downtime with fast recovery

Radiologists need to read and interpret patient reports so they can quickly share them with doctors. Their patients’ health can’t afford for them to have downtime.

After an unexpected server crash corrupted its database, Radiology Associates needed a way to avoid workflow interruptions. Carbonite™ Recover by OpenText™ helps the organization get back to business quickly in the event of a data breach or natural disaster. Plus, the price of the solution and ease of use gave Radiology Associates good reasons to choose our solution.

Read the full case study.

Conclusion

As ransomware becomes more sophisticated and data breaches occur more frequently, healthcare organizations must stay vigilant. Strong cyber resilience should be a priority so that you can protect patient privacy and maintain trust within the healthcare industry.

And you don’t have to do it alone. We’re ready to help out as your trusted cybersecurity partner. Together, we can prevent data breaches, protect sensitive data, and help you recover when disaster strikes.

Contact us to learn more about our cybersecurity solutions.

Read more about cyber attacks in the healthcare sector:

The Catastrophic Cyberattack That Shook Healthcare to Its Core

The Change Healthcare Cyberattack: A Wake-Up Call for Healthcare Cybersecurity

Navigating the Aftermath: The Change Healthcare Cyberattack

5 ways to strengthen healthcare cybersecurity

Ransomware attacks are targeting healthcare organizations more frequently. The number of costly cyberattacks on US hospitals has doubled. So how do you prevent these attacks? Keep reading to learn five ways you can strengthen security at your organization. But first, let’s find out what’s at stake.

Why healthcare needs better cybersecurity

Healthcare organizations are especially vulnerable to data breaches because of how much data they hold. And when a breach happens, it creates financial burdens and affects regulatory compliance. On average, the cost of a healthcare data breach globally is $10.93 million. Noncompliance not only incurs more costs but also hurts patient trust. Once that trust is lost, it’s difficult to regain it, which can impact your business and standing within the industry.

Adopting a layered security approach will help your organization prevent these attacks. Here are five ways to strengthen your cybersecurity:

1. Use preventive security technology

Prevention, as the saying goes, prevention is better than the cure. With the right systems and the right methodology, it’s possible to detect and intercept most cyberthreats before they lead to a data breach, a loss of service, or a deterioration in patient care.
Examples of prevention-layer technologies include:

2. Provide cybersecurity training

According to Verizon, 82 percent of all breaches involve a human element. Sometimes malicious insiders create security vulnerabilities. Other times, well-intentioned employees fall victim to attacks like phishing, legitimate-looking emails that trick employees into giving attackers their credentials or other sensitive information—like patient data. In fact, 16 percent of breaches start with phishing.

When your employees receive basic cybersecurity training, they are more likely to recognize bad actors, report suspicious activity, and avoid risky behavior. You can outsource cybersecurity training or find an automated security training solution that you manage.

3. Ensure regulatory compliance

Healthcare providers are subject to strict data privacy regulations like HIPPA and GDPR. If an avoidable data breach occurs, organizations face hefty fines from state and federal authorities. The email and endpoint protection tools described above help you stay compliant with these regulations.

But sometimes a breach is out of your control. So regulators have provided guidelines for how to respond, including investigation, notification, and recovery.

4. Build business recovery plans

Adding a recovery plan to your multilayered security approach is crucial to achieving and maintaining cyber resilient healthcare. Ideally, you’ll catch most incoming threats before they become an issue. However, the recovery layer is critical when threats do get through or disasters occur.

You might think that your cloud-based applications back up and secure your data. But SaaS vendors explicitly state that data protection and backup is the customer’s responsibility of the customer. Some SaaS applications have recovery options, but they’re limited and ineffective. A separate backup system is necessary to ensure business continuity.

Reasons for implementing a solid recovery strategy include:

  • Re-establishing patient trust.
  • Avoiding disruptions to patient care.
  • Remaining compliant with HIPPA and GDPR requirements.

Remember, lives depend on getting your systems back up quickly. That’s why your healthcare organization needs a secure, continuously updated backup and recovery solution for local and cloud servers.

5. Monitor and improve continuously

Once you have your multilayered security approach in place, you’ll need a centralized management console to help you monitor and control all your security services. This single-pane-of-glass gives you real-time cyber intelligence and all the tools you need to protect your healthcare organization, your reputation, and your investment in digital transformation. You can also spot gaps in your approach and find ways to improve.

Conclusion

Cybersecurity can seem daunting at times. Just remember that every step you take toward cyber resilience helps you protect patient privacy and maintain your credibility within the healthcare industry.
So when you’re feeling overwhelmed or stuck, remember the five ways you can strengthen your layered cybersecurity approach:

  1. Use preventive technology like endpoint protection and email encryption.
  2. Train your employees to recognize malicious activities like phishing.
  3. Ensure that you’re compliant with HIPPA, GDPR, and any other regulation standards.
  4. Retrieve your data from breaches with backup and recovery tools.
  5. Monitor your data and improve your approach when necessary.

Read more about cyber attacks in the healthcare sector:

The Catastrophic Cyberattack That Shook Healthcare to Its Core

The Change Healthcare Cyberattack: A Wake-Up Call for Healthcare Cybersecurity

Navigating the Aftermath: The Change Healthcare Cyberattack