<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

 

Blog

Read or download all Datashield news, reviews, content, and more.

 

What is Ransomware?

Ransomware is a form of malware cybercriminals use to encrypt data stored in computers or online servers. Cybercriminals demand payment to release the encryption key blocking the user from accessing the encrypted data. Payment is typically made through diverse mediums, including digital currency like Bitcoin. Once payment has been made, the victim is generally provided with instructions on decrypting their data.

Detecting and Preventing UNC1878

Recently, The FBI, the Department of Health and Human Services and the Cybersecurity and Infrastructure Security Agency (CISA) released an alert that warned that the healthcare industry was being targeted by hackers.

Mimecast: Outlook Plugin

Mimecast is a security company that offers solutions for corporate users to secure their email communications along with threat detection technologies.

Proofpoint: Targeted Attack Protection

One of the most complex cyber-security protections provided by security firm Proofpoint is their Targeted Attack Protection (TAP) solution. Proofpoint TAP is aimed at protecting your systems against ransomware and other threats that usually penetrate your business systems through e-mail messages.

VIDEO: Remote Workforce Roundtable Pt. 2 - Endpoint Security & EDR

In part one of our Remote Workforce Roundtable, we spoke to the larger cybersecurity trends at hand with remote working and security vulnerabilities. This time I sat down with Greg Foss from VMware Carbon Black for a more endpoint-focused discussion on remote work.

How a SOC Handles Credential Harvesting

By Nick Sandin, Security Analyst and contributing author Brandon Doty, SOC Manager Dealing with credential harvesters has its perks. Day in and day out I get to personally observe how sophisticated a phishing website can be. Some websites are so elaborate that only a trained analyst can identify them, while others are so obvious no one in their right mind would fall for it. Either way, if it looks suspicious just follow the “POST”.

Partner Digest: Week of 4/27/20 - Ransomware attacks & Zoom's New Security Threat

Datashield Partner Digest for the Week of April 27th, 2020 - Highlights: VMware Carbon Black report that Ransomware attacks are up and newly discovered security threat with Zoom.

A Message Concerning Coronavirus (COVID-19)

Datashield is an organization that’s core focus is security. In light of the current Coronavirus (COVID-19) pandemic, we are taking guidance from the CDC and implementing changes to protect the health of our employees and customers. Read more about the official policies at ADT.com/coronavirus.

Why Phishing is Still a Problem

Is Phishing Still a Problem?

How Does Mimecast Work?

Mimecast is a cloud-based, anti-spam, and archive filtering service for securing email accounts and communications for businesses.

    Related Posts

    Lumifi Cyber Acquires Datashield to Deliver Next-Generation Managed Detection and Response

    Combines AI and Machine Learning-Based Software with MDR Services to Provide Fortune 500-Grade Security to Companies of All Sizes Palm Desert, CA and Scottsdale, AZ — May 3, 2022 — Lumifi Cyber, Inc., a next-generation managed detection and response (MDR) cybersecurity software provider, today announced its acquisition of Datashield, Inc., an end-to-end cybersecurity resilience services provider, to deliver Fortune 500-grade security to companies of all sizes for an affordable monthly price.

    Datashield Becomes Member of Microsoft Intelligent Security Association (MISA)

    Datashield Becomes Member of Microsoft Intelligent Security Association (MISA)

    The Difference Between Cybersecurity & Network Security

    The Difference Between Cybersecurity & Network Security