Summary of Key Points Legal organizations store and handle large volumes of sensitive client data, making them particularly likely to be targeted by cybercriminals. Legal firms and other...
Cybersecurity Posts
Cyber Warfare: How the Rules of Conduct Are Changing
Summary of Key Points Cyber warfare is similar to cybercrime, but it typically involves nation-states (rather than rival corporations or independent hacker groups). Cyber warfare is not currently...
Social Engineering 101 (& How to Protect Your Data)
Summary of Key Points Social engineering differs from other cybersecurity threats by targeting people instead of directly attacking digital assets. Common social engineering tactics include baiting,...
What Are Endpoints (& How Does Endpoint Security Work)?
Summary of Key Points Endpoints are access points to an organization’s network—including tablets, smartphones, laptops, desktops, and any other device that can access your digital information. IoT...
Cybercrime’s Evolution Since the 80’s: Historical Facts and Figures
Summary of Key Points Experts agree that “cybercrime” as we understand it today originated in the 1980s. Cybercrime has caused nearly $6 trillion in damages since the 1980s, and that figure is...
The Complete Healthcare Industry Cybersecurity Checklist
Summary of Key Points The healthcare industry is a prime target by cybercriminals due to the sensitive nature, and value, of the data Creating a cybersecurity checklist and reviewing it regularly...
Top 5 Financial Industry Cyber Attacks
Summary of Key Points The financial services industry faces significant pressure from a cybersecurity perspective The top cyber attacks in the financial industry include phishing, ransomware, DDoS...
7 Common Types of Security Scans (& What They Tell You)
Summary of Key Points The most common types of cybersecurity scans today are virus/malware scans, network port scans, penetration tests, rogue access point scans, program bug scans, vulnerability...
Where XDR Fits in Your Security Posture
Summary of Key Points XDR provides holistic protection of your network and connected devices vs. operating in a silo with fragmented security products Using artificial intelligence and machine...
The Benefits of XDR: How AI is Improving Your Cybersecurity Posture
Summary of Key Points XDR empowers organizations with holistic security while reducing administration and management XDR reduces reliance on human resources, using AI to “screen” false alerts and...
The 7 Most Common Types of Malware
Last updated August 19, 2022 Summary of Key Points: Malware is software designed to steal data, damage equipment, or spy on users. Viruses infiltrate a program or device and then spread across a...
OT Security: Safeguarding Your OT Assets in An Increasingly Connected World
Last updated August 19, 2022 Summary: Operations Technology (OT) is increasingly being targeted by cyber attacks.In recent years, high-profile cyber incidents at Stuxnet and Norsk Hydro caused tens...
What the War in Ukraine Means for American Cybersecurity Engineers
Last updated September 27, 2022 Summary: The war in Europe has devastating physical consequences, but it’s also being conducted in cyberspace. Cyberattacks have already targeted Ukraine’s Defense...
Hack the Chat
Last updated August 19, 2022 Summary: By the end of 2022, 70% of white collar workers will interact with chatbots on a daily basis—but chatbots can pose a cybersecurity risk if they are not properly...
Subscription Model Software: Pros and Cons
Last updated August 19, 2022 Summary: Subscription-based cloud and managed IT and security services help SMBs eliminate the up-front costs of setting up their own in-house systems.Managing IT and...
MDR vs EDR: What is the Difference?
Last updated August 18, 2022 Summary: MDR and EDR are two different approaches to protecting an organization’s digital assets (including data and systems).EDR (Endpoint Detection and Response) uses...
Phishing Attacks are Evolving: What You Need to Know to Keep Your Company Safe
Last updated August 19, 2022 Summary: Phishing is a form of social engineering where the attacker impersonates a trusted party for the purpose of gaining access to sensitive information like login...
GoDaddy: Have You Been Impacted and What to Do Next?
Last updated August 19, 2022 Summary: In 2021, GoDaddy’s Managed WordPress hosting environment was accessed by an unauthorized third party using a compromised password.The hack accessed the personal...
What Your Vulnerability Scan Report is Telling You (& What It’s Not)
Last updated August 18, 2022 Summary: Vulnerability scans provide visibility of your cybersecurity posture’s weaknesses before cybercriminals can exploit them. They look for weak points in your...
What Your Business Can Learn From Netflix About Credential Sharing
Last updated September 27, 2022 Summary: Credential sharing is when you use someone else’s identity to access a product or platform—like using a friend or family member’s login information to use...
Latest Posts

Cybersecurity & the Legal Industry: What You Need to Know (& Protect)
Technology has become a fact of life in the business world, and the legal industry is no exception. Here’s what you need to know about legal cybersecurity.

Cyber Warfare: How the Rules of Conduct Are Changing
Safeguarding your organization’s digital assets used to feel simple. However, with the internet now crucial to many business functions, it’s become a necessity.

Social Engineering 101 (& How to Protect Your Data)
How vulnerable are you and your organization to social engineering attacks? The answer might surprise you. Let the experienced cybersecurity professionals at VirtualArmour give you an overview of how modern social engineering works and show you steps you can take to protect yourself from its potentially disastrous effects.