Cybersecurity Articles & Resources

Cyber Warfare: How the Rules of Conduct Are Changing
Safeguarding your organization’s digital assets used to feel simple. However, with the internet now crucial to many business functions, it’s become a necessity.

Social Engineering 101 (& How to Protect Your Data)
How vulnerable are you and your organization to social engineering attacks? The answer might surprise you. Let the experienced cybersecurity professionals at VirtualArmour give you an overview of how modern social engineering works and show you steps you can take to protect yourself from its potentially disastrous effects.

Explaining Open XDR: How It Works & Where It Fits
Open XDR integrates with your tools from other vendors to unify your cybersecurity stack—learn more about how it works and where it should fit in your organization’s IT strategy here.

What Are Endpoints (& How Does Endpoint Security Work)?
Your network’s endpoints allow authorized users to access the data they need—but they can also be exploited by malicious actors if they’re not properly protected. Learn more about what endpoints are and how to protect them here so you can keep your digital assets safe.
Subscribe to the VirtualArmour Newsletter
Subscribe Here
Content Categories
Cybersecurity Insights, Guides, & Tools
What Are Endpoints (& How Does Endpoint Security Work)?
Your network’s endpoints allow authorized users to access the data they need—but they can also be exploited by malicious actors if they’re not properly protected. Learn more about what endpoints are and how to protect them here so you can keep your digital assets safe.
Cybercrime’s Evolution Since the 80’s: Historical Facts and Figures
Cybercrime has changed a lot over the past 20 years. Learn more about its history, including the way costs and responses have evolved.
The Complete Healthcare Industry Cybersecurity Checklist
Our healthcare cybersecurity checklist will help keep your organization and patient data safe! Our checklist is reviewed/updated annually.
Cybersecurity Methods, Processes, & Technology
Identifying a Breach: Finding Indicators of Compromise (IOC)
Last updated August 19, 2022 Summary: Cybersecurity breaches like malware, phishing, and DDoS...
Making Sense of TTPs, Cybersecurity, & What That Means for Your Business
Last updated August 19, 2022 Summary: TTPs are tactics, tools, & procedures that threat actors...
What Are the Risks of Using Unsupported Hardware?
Last updated September 27, 2022 Summary: Holding off on replacing your hardware until it breaks...
Business Segments & Industries
Hack the Chat
Chatbots are incredibly useful tools that can help drive sales; however, they can also pose a security risk if appropriate cybersecurity measures aren’t taken.
Subscription Model Software: Pros and Cons
The subscription model has become popular over the last few years, but what are the pros and cons of this model? In this article, we’ll dive into the details.
Phishing Attacks are Evolving: What You Need to Know to Keep Your Company Safe
Phishing scams tend to peak during and around the winter holiday season, catching individuals and businesses alike unprepared.
Risk Mitigation & Prevention
What Are Endpoints (& How Does Endpoint Security Work)?
Your network’s endpoints allow authorized users to access the data they need—but they can also be exploited by malicious actors if they’re not properly protected. Learn more about what endpoints are and how to protect them here so you can keep your digital assets safe.
Top 5 Cyber Attacks on Retail Businesses
Retail businesses are particularly vulnerable to several kinds of cyber attacks. Learn more about prominent attacks and what you can do to prevent them.
The Benefits of XDR: How AI is Improving Your Cybersecurity Posture
Modern digital security requires a more complex approach than installing antivirus software & setting up a firewall. XDR uses AI to improve your cybersecurity.
Breaches & Notable Events
Top 5 Financial Industry Cyber Attacks
The financial services industry faces significant pressure from a cybersecurity perspective. Being proactive to prevent these attacks from taking place is critical.
The 7 Most Common Types of Malware
The Digital age has helped increase productivity & efficiency, but it’s also brought a sharp rise in digital crime, including the distribution of malware.
What the War in Ukraine Means for American Cybersecurity Engineers
The Russian invasion of Ukraine has shocked the world, driving millions from their homes as they seek safety. However, in the internet age, wars aren’t fought in the physical world alone, and cyber warfare has become an increasingly serious threat.
Recent Posts
What Your Vulnerability Scan Report is Telling You (& What It’s Not)
Last updated August 18, 2022 Summary: Vulnerability scans provide visibility of your cybersecurity posture’s weaknesses before cybercriminals can...
What Your Business Can Learn From Netflix About Credential Sharing
Last updated September 27, 2022 Summary: Credential sharing is when you use someone else’s identity to access a product or platform—like using a...
The Growing Trend of “Hacktivism”, & What it Means for Businesses
Last updated August 19, 2022 Summary: “Hacktivism” occurs when activists digitally disrupt the systems or operations of a given organization—often...
What is Cybersecurity Insurance (& Does Your Business Need It?)
Last updated September 27, 2022 Summary: In 2020, there was one ransomware victim every 10 seconds—and the average cost of a data breach that year...
Guide to Creating an Effective Incident Response Plan
Last updated August 19, 2022 Summary: Incident Response Plans (IRPs) are instructions that tell your team how to detect, respond to, and recover...
The IoT is Really the Internet of Endpoints
Last updated September 27, 2022 Summary: IoT devices make life more convenient, but constant connection to a network also makes you more vulnerable...
The Risks of Public WiFi (& How to Protect Yourself)
Last updated August 19, 2022 Summary: Public WiFi is inherently risky because it can be accessed by anyone (including threat actors)Common Public...
Why is WiFi 6’s Uptake so Slow? A Look at the Current Technological Environment
Last updated August 19, 2022 Summary: Many organizations have been slow to adopt WiFi 6—due to the upgrade costs, a limited number of clients, and a...
Everything You Need to Know About WiFi 802.11ax (AKA WiFi 6)
Last updated August 19, 2022 Summary: Since 2020, the FCC has expanded access for unlicensed traffic to the broadband spectrum. This access to...
Identifying a Breach: Finding Indicators of Compromise (IOC)
Last updated August 19, 2022 Summary: Cybersecurity breaches like malware, phishing, and DDoS attacks) can cost organizations millions and damage...
Making Sense of TTPs, Cybersecurity, & What That Means for Your Business
Last updated August 19, 2022 Summary: TTPs are tactics, tools, & procedures that threat actors to orchestrate cyber attacks.Analyzing TTPs helps...
Deleting Yourself From Social Media: A Brief Guide to Getting Out
Last updated August 19, 2022 Summary: Cyber attacks using social media platforms are becoming more common and more sophisticated—in addition to...
Is it Possible to Still Browse Anonymously?
Last updated August 19, 2022 Summary: Many internet users use the terms “privacy” and “anonymity” interchangeably, but these are not the same. While...
What Are the Risks of Using Unsupported Hardware?
Last updated September 27, 2022 Summary: Holding off on replacing your hardware until it breaks can seem like an easy way to save money, but old...
Terms & Phrases Used in the Managed IT & Cybersecurity Industries
Last updated September 27, 2022 Summary: Not everyone knows what a managed IT provider does—or how to define cybersecurity. Learning some technical...