Summary of Key Points Legal organizations store and handle large volumes of sensitive client data, making them particularly likely to be targeted by cybercriminals. Legal firms and other...
Risk Mitigation & Prevention Posts
Cyber Warfare: How the Rules of Conduct Are Changing
Summary of Key Points Cyber warfare is similar to cybercrime, but it typically involves nation-states (rather than rival corporations or independent hacker groups). Cyber warfare is not currently...
Social Engineering 101 (& How to Protect Your Data)
Summary of Key Points Social engineering differs from other cybersecurity threats by targeting people instead of directly attacking digital assets. Common social engineering tactics include baiting,...
What Are Endpoints (& How Does Endpoint Security Work)?
Summary of Key Points Endpoints are access points to an organization’s network—including tablets, smartphones, laptops, desktops, and any other device that can access your digital information. IoT...
Top 5 Cyber Attacks on Retail Businesses
Summary of Key Points Nearly half of all data breach incidents target retailers, and nearly 20% of customers say they’ll stop shopping at companies that let themselves get hacked—which makes...
The Benefits of XDR: How AI is Improving Your Cybersecurity Posture
Summary of Key Points XDR empowers organizations with holistic security while reducing administration and management XDR reduces reliance on human resources, using AI to “screen” false alerts and...
The 7 Most Common Types of Malware
Last updated August 19, 2022 Summary of Key Points: Malware is software designed to steal data, damage equipment, or spy on users. Viruses infiltrate a program or device and then spread across a...
OT Security: Safeguarding Your OT Assets in An Increasingly Connected World
Last updated August 19, 2022 Summary: Operations Technology (OT) is increasingly being targeted by cyber attacks.In recent years, high-profile cyber incidents at Stuxnet and Norsk Hydro caused tens...
What the War in Ukraine Means for American Cybersecurity Engineers
Last updated September 27, 2022 Summary: The war in Europe has devastating physical consequences, but it’s also being conducted in cyberspace. Cyberattacks have already targeted Ukraine’s Defense...
Hack the Chat
Last updated August 19, 2022 Summary: By the end of 2022, 70% of white collar workers will interact with chatbots on a daily basis—but chatbots can pose a cybersecurity risk if they are not properly...
Subscription Model Software: Pros and Cons
Last updated August 19, 2022 Summary: Subscription-based cloud and managed IT and security services help SMBs eliminate the up-front costs of setting up their own in-house systems.Managing IT and...
MDR vs EDR: What is the Difference?
Last updated August 18, 2022 Summary: MDR and EDR are two different approaches to protecting an organization’s digital assets (including data and systems).EDR (Endpoint Detection and Response) uses...
Phishing Attacks are Evolving: What You Need to Know to Keep Your Company Safe
Last updated August 19, 2022 Summary: Phishing is a form of social engineering where the attacker impersonates a trusted party for the purpose of gaining access to sensitive information like login...
What Your Vulnerability Scan Report is Telling You (& What It’s Not)
Last updated August 18, 2022 Summary: Vulnerability scans provide visibility of your cybersecurity posture’s weaknesses before cybercriminals can exploit them. They look for weak points in your...
What is Cybersecurity Insurance (& Does Your Business Need It?)
Last updated September 27, 2022 Summary: In 2020, there was one ransomware victim every 10 seconds—and the average cost of a data breach that year was $3.86 million.Organizations in every industry...
Guide to Creating an Effective Incident Response Plan
Last updated August 19, 2022 Summary: Incident Response Plans (IRPs) are instructions that tell your team how to detect, respond to, and recover from cybersecurity threats.Strong IRPs have 5 steps:...
The Risks of Public WiFi (& How to Protect Yourself)
Last updated August 19, 2022 Summary: Public WiFi is inherently risky because it can be accessed by anyone (including threat actors)Common Public WiFi cyberattacks include man-in-the-middle (MitM)...
Why is WiFi 6’s Uptake so Slow? A Look at the Current Technological Environment
Last updated August 19, 2022 Summary: Many organizations have been slow to adopt WiFi 6—due to the upgrade costs, a limited number of clients, and a fear of the bugs and issues early adopters of new...
Identifying a Breach: Finding Indicators of Compromise (IOC)
Last updated August 19, 2022 Summary: Cybersecurity breaches like malware, phishing, and DDoS attacks) can cost organizations millions and damage their reputation beyond repair.In addition to having...
Deleting Yourself From Social Media: A Brief Guide to Getting Out
Last updated August 19, 2022 Summary: Cyber attacks using social media platforms are becoming more common and more sophisticated—in addition to spreading malware and conducting phishing attacks,...
Latest Posts

Cybersecurity & the Legal Industry: What You Need to Know (& Protect)
Technology has become a fact of life in the business world, and the legal industry is no exception. Here’s what you need to know about legal cybersecurity.

Cyber Warfare: How the Rules of Conduct Are Changing
Safeguarding your organization’s digital assets used to feel simple. However, with the internet now crucial to many business functions, it’s become a necessity.

Social Engineering 101 (& How to Protect Your Data)
How vulnerable are you and your organization to social engineering attacks? The answer might surprise you. Let the experienced cybersecurity professionals at VirtualArmour give you an overview of how modern social engineering works and show you steps you can take to protect yourself from its potentially disastrous effects.