"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
Quarantine in the cybersecurity world happens when files containing malware are placed into isolation...
Read moreA Polymorphic Virus is a type of 'shape-shifting' virus, producing malicious code that is able to...
Read moreA Parasitic Virus, also known as a file virus, is spread by attaching itself to executable programs....
Read moreA Boot Sector Virus is a virus that infects the 'boot sector' of floppy disks or the 'Master Boot...
Read moreA Macro Virus is a virus that adds its code to the macros embedded within documents, spreadsheets,...
Read moreA Memory-Resident Virus is a virus that is located in the memory of a computer, even after the 'host'...
Read moreSQL Slammer Spread 30 min Coronavirus Spread 90+ Days The SQL Slammer Virus, also known as the Sapphire Virus,...
Read moreThe Melissa Virus is malware that was was deployed in late March of 1999. A programmer by the name of...
Read moreThe ILOVEYOU Virus, also known as, the Love Bug, is a computer worm that infected over 10 million...
Read moreA Trojan Horse is a computer program that appears to have a useful function, but also has a hidden and...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.