Profile cover photo
Profile photo
Ericom Software
210 followers -
Be Connected, Be Secure — Liberate users, Empower IT!
Be Connected, Be Secure — Liberate users, Empower IT!

210 followers
About
Posts

Post has attachment
The increasingly complex nature of today’s networks creates numerous security blind spots. Read on for top tips and examples »

#cybersecurity #infosec #breach
Add a comment...

Post has attachment
We're pleased to announce highlights of our 2018 Secure Browsing Survey » https://okt.to/kNVoRs

Thanks to everyone who participated - and congratulations to the winner of our survey giveaway, Matthew Ellis from the University of British Columbia!
Add a comment...

Post has attachment
Antivirus software is perhaps the most well-known solution for protecting an endpoint from cyber threats -- but there's a lot more to the story. Read on » https://okt.to/GCLGAf
Add a comment...

Post has attachment
Who exactly is behind #cryptojacking and what can be done to stop it? Ericom CEO Joshua Behar takes a closer look in this feature article.

#infosec
Add a comment...

Post has attachment
Escalating cryptocurrency values have encouraged cybercriminals to branch out.

Instead of utilizing malware to steal data and impose ransoms, hackers are now surreptitiously hijacking your company's computing power to mine more currency. How can you fight back?
Add a comment...

Post has attachment
End users are targeted by #malware thousands of times a day, with more than 90% of detected malware originating from #email and #browser #threat vectors. Here's how #MSSP's can help keep them safe »
Add a comment...

Post has attachment
Complex #networks are liable to contain a number of 'blind spots', making it harder to identify threats. Here are four security blind spots that #cybersecurity professionals should be aware of »

#infosec
Add a comment...

Post has attachment
Simply visiting an ad-supported website may be enough to become infected—even if you don’t click on anything. So what can be done to protect endpoints from #malvertising?
Add a comment...

Post has attachment
Understanding how #ransomware spreads is a crucial starting point in developing an effective battle strategy against it...

#infosec
How Ransomware Spreads
How Ransomware Spreads
blog.ericom.com
Add a comment...

Post has attachment
Google Chromebooks are increasingly popular in #schools
but the ongoing need to support Windows & #Java-based applications is still a challenge for some.

Learn how you can reap the benefits of #Chromebooks, without closing the door on your #Windows applications » https://okt.to/Oz9nrF

#EdTech #HigherEd
Photo
Add a comment...
Wait while more posts are being loaded