News
-
‘Zero trust’ was supposed to revolutionize cybersecurity. Here’s why that hasn’t happened yet.
- June 29, 2023
- Posted by: Dan Corcoran
- Category: Cybersecurity, Remote Work, Security, SMB, Zero Trust Network Access (ZTNA)
No CommentsDespite more than a decade of talk, the seminal concept in cybersecurity of zero trust — the assumption that no user or device on a computer network can be trusted — hasn’t been implemented nearly as widely as one might expect from all of the attention.
-
10 Ways a Zero Trust Architecture Protects Against Ransomware
- October 18, 2022
- Posted by: Dan Corcoran
- Category: Business Email Compromise, Criminal Gangs, Cybersecurity, Hacktivists, Nation-States, Phishing, Ransomware, Security, SMB, Zero Trust Network Access (ZTNA)
While ransomware has been around for decades, its prevalence has exploded in the last few years. These attacks used to be perpetrated by individuals; now, they’re launched by networked groups of affiliates who buy and sell each other’s specialized skills and toolkits. Attacks were once unfocused and one-dimensional; now, they use targeted, multilayered tactics that are much harder to defend against and command much higher ransoms. Ransomware is expected to cause $42 billion in damages by the end of 2024.
-
Why business email compromise still tops ransomware for total losses
- September 9, 2022
- Posted by: Ken Stilwell
- Category: Business Email Compromise, Criminal Gangs, Cybersecurity, Hacktivists, Phishing, Remote Work, Security
While businesses are busy trying to protect themselves against ransomware attacks that spark headlines news, threat actors are sticking to one of the oldest and most effective hacking techniques—business email compromise (BEC).
-
The State of SMB Cybersecurity in 2022
- September 2, 2022
- Posted by: George Sidman
- Category: Criminal Gangs, Cybersecurity, Hacktivists, Security, SMB
Businesses – regardless of their size – are regularly finding themselves facing attack from threat actors ranging from criminal gangs to hacktivists to nation-states, meaning that the challenge of defending against such attacks is more important but equally more difficult than ever before.
By giving packets verifiable identity, precisely controlling packet usage and significantly collapsing the threat surface, TrustWrx enables the MSP to provide corporate-class Zero Trust security to the small and medium size business.