Cybersecurity Articles & Resources

Cybersecurity & the Legal Industry: What You Need to Know (& Protect)
Technology has become a fact of life in the business world, and the legal industry is no exception. Here’s what you need to know about legal cybersecurity.

Cyber Warfare: How the Rules of Conduct Are Changing
Safeguarding your organization’s digital assets used to feel simple. However, with the internet now crucial to many business functions, it’s become a necessity.

What Are Endpoints (& How Does Endpoint Security Work)?
Your network’s endpoints allow authorized users to access the data they need—but they can also be exploited by malicious actors if they’re not properly protected. Learn more about what endpoints are and how to protect them here so you can keep your digital assets safe.

Social Engineering 101 (& How to Protect Your Data)
How vulnerable are you and your organization to social engineering attacks? The answer might surprise you. Let the experienced cybersecurity professionals at VirtualArmour give you an overview of how modern social engineering works and show you steps you can take to protect yourself from its potentially disastrous effects.
Subscribe to the VirtualArmour Newsletter
Subscribe Here
Content Categories
Cybersecurity Insights, Guides, & Tools
Cybersecurity & the Legal Industry: What You Need to Know (& Protect)
Technology has become a fact of life in the business world, and the legal industry is no exception. Here’s what you need to know about legal cybersecurity.
Cyber Warfare: How the Rules of Conduct Are Changing
Safeguarding your organization’s digital assets used to feel simple. However, with the internet now crucial to many business functions, it’s become a necessity.
Social Engineering 101 (& How to Protect Your Data)
How vulnerable are you and your organization to social engineering attacks? The answer might surprise you. Let the experienced cybersecurity professionals at VirtualArmour give you an overview of how modern social engineering works and show you steps you can take to protect yourself from its potentially disastrous effects.
Cybersecurity Methods, Processes, & Technology
OT Security: Safeguarding Your OT Assets in An Increasingly Connected World
While once rare, cybersecurity incidents targeting Operations Technology (OT) assets have become common in the past few years. Here’s how to protect yourself.
Subscription Model Software: Pros and Cons
The subscription model has become popular over the last few years, but what are the pros and cons of this model? In this article, we’ll dive into the details.
MDR vs EDR: What is the Difference?
The goal of cybersecurity is to safeguard your organization’s digital assets, including data and systems. Both EDR and MDR work to achieve this goal in different ways, and a good strategy will rely on both approaches to create a robust, more comprehensive cybersecurity strategy.
Business Segments & Industries
Cybersecurity & the Legal Industry: What You Need to Know (& Protect)
Technology has become a fact of life in the business world, and the legal industry is no exception. Here’s what you need to know about legal cybersecurity.
Cybercrime’s Evolution Since the 80’s: Historical Facts and Figures
Cybercrime has changed a lot over the past 20 years. Learn more about its history, including the way costs and responses have evolved.
Top 5 Cyber Attacks on Retail Businesses
Retail businesses are particularly vulnerable to several kinds of cyber attacks. Learn more about prominent attacks and what you can do to prevent them.
Risk Mitigation & Prevention
Cybersecurity & the Legal Industry: What You Need to Know (& Protect)
Technology has become a fact of life in the business world, and the legal industry is no exception. Here’s what you need to know about legal cybersecurity.
Cyber Warfare: How the Rules of Conduct Are Changing
Safeguarding your organization’s digital assets used to feel simple. However, with the internet now crucial to many business functions, it’s become a necessity.
Social Engineering 101 (& How to Protect Your Data)
How vulnerable are you and your organization to social engineering attacks? The answer might surprise you. Let the experienced cybersecurity professionals at VirtualArmour give you an overview of how modern social engineering works and show you steps you can take to protect yourself from its potentially disastrous effects.
Breaches & Notable Events
Cyber Warfare: How the Rules of Conduct Are Changing
Safeguarding your organization’s digital assets used to feel simple. However, with the internet now crucial to many business functions, it’s become a necessity.
Cybercrime’s Evolution Since the 80’s: Historical Facts and Figures
Cybercrime has changed a lot over the past 20 years. Learn more about its history, including the way costs and responses have evolved.
Top 5 Cyber Attacks on Retail Businesses
Retail businesses are particularly vulnerable to several kinds of cyber attacks. Learn more about prominent attacks and what you can do to prevent them.
Recent Posts
Cybercrime’s Evolution Since the 80’s: Historical Facts and Figures
Summary of Key Points Experts agree that “cybercrime” as we understand it today originated in the 1980s. Cybercrime has caused nearly $6 trillion in...
The Complete Healthcare Industry Cybersecurity Checklist
Summary of Key Points The healthcare industry is a prime target by cybercriminals due to the sensitive nature, and value, of the data Creating a...
Top 5 Cyber Attacks on Retail Businesses
Summary of Key Points Nearly half of all data breach incidents target retailers, and nearly 20% of customers say they’ll stop shopping at companies...
Top 5 Financial Industry Cyber Attacks
Summary of Key Points The financial services industry faces significant pressure from a cybersecurity perspective The top cyber attacks in the...
7 Common Types of Security Scans (& What They Tell You)
Summary of Key Points The most common types of cybersecurity scans today are virus/malware scans, network port scans, penetration tests, rogue...
Where XDR Fits in Your Security Posture
Summary of Key Points XDR provides holistic protection of your network and connected devices vs. operating in a silo with fragmented security...
The Benefits of XDR: How AI is Improving Your Cybersecurity Posture
Summary of Key Points XDR empowers organizations with holistic security while reducing administration and management XDR reduces reliance on human...
The 7 Most Common Types of Malware
Last updated August 19, 2022 Summary of Key Points: Malware is software designed to steal data, damage equipment, or spy on users. Viruses...
OT Security: Safeguarding Your OT Assets in An Increasingly Connected World
Last updated August 19, 2022 Summary: Operations Technology (OT) is increasingly being targeted by cyber attacks.In recent years, high-profile cyber...
What the War in Ukraine Means for American Cybersecurity Engineers
Last updated September 27, 2022 Summary: The war in Europe has devastating physical consequences, but it’s also being conducted in cyberspace....
Hack the Chat
Last updated August 19, 2022 Summary: By the end of 2022, 70% of white collar workers will interact with chatbots on a daily basis—but chatbots can...
Subscription Model Software: Pros and Cons
Last updated August 19, 2022 Summary: Subscription-based cloud and managed IT and security services help SMBs eliminate the up-front costs of...
MDR vs EDR: What is the Difference?
Last updated August 18, 2022 Summary: MDR and EDR are two different approaches to protecting an organization’s digital assets (including data and...
Phishing Attacks are Evolving: What You Need to Know to Keep Your Company Safe
Last updated August 19, 2022 Summary: Phishing is a form of social engineering where the attacker impersonates a trusted party for the purpose of...
GoDaddy: Have You Been Impacted and What to Do Next?
Last updated August 19, 2022 Summary: In 2021, GoDaddy’s Managed WordPress hosting environment was accessed by an unauthorized third party using a...