Tagged - malware

Threat Landscape Briefing – June 2023

This monthly recording covers topics such as cyber threat and regulatory trends, nation states, cyber criminals, hacktivists campaigns, data breaches, control strategies,...

Threat Landscape Briefing – January 2022

This monthly recording covers topics such as cyber threat and regulatory trends, nation states, cyber criminals, and hacktivists campaigns, data breaches, control...

Threat Landscape Briefing – December 2021

This monthly recording covers topics such as cyberthreat and regulatory trends, nation-states, cybercriminals and hacktivists campaigns, data breaches, control...

Security Awareness Month Materials

October is Security Awareness Month and we’ve built four decks for you to share. Use these decks to remind your end users of security best practices.

Acronis Cyber Protect Cloud Turns Managed Service Providers Into Managed Security Providers

More than ever, cybersecurity solutions are core to any MSPs offering. No longer should technology service providers be farming this out to dedicated security providers....

Develop a Security Awareness and Training Program That Empowers End Users

Cyberattackers target your end users, who remain today’s weakest link in organizational security. Design and deliver an effective and up-to-date training program to...
  • guided implementation icon

Security Incident Runbook Prioritization Tool

Prioritize the order in which the security incident runbooks will be developed based on the frequency and the impact of the potential incidents.

Security Incident Management Plan

Formalize the security incident management program by defining a central, high-level guide to describe goals, roles, and responsibilities, as well as the process that...

GTB Gets the W-I-N for DLP in 2019

GTB Technologies was recently crowned the winner of Acquisition International’s cyber security award in the DLP category for its anti-malware and insider threat capabilities.

Training Materials – Cyber Attacks

This is one of eight security awareness and training templates that can be used to educate end users on best practices. This presentation focuses on cyber attacks.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us