Next week is the annual RSA Conference, and the cybersecurity community will be coming together to discuss how we can keep organizations safe from the latest cyber crime efforts.
This week we uncovered a new form of ransomware malware (Locky), which infects organizations and holds data hostage until a ransom is paid.
Federal cybersecurity teams are under intense scrutiny as public sector breaches dominate headlines. Unfortunately, another critical threat is looming.
Sunday is the big game and fans across the U.S. are getting ready. In preparation, our expert social media research team examined the official Facebook pages for the 12 playoff teams between January 7-27, 2016.
Last Friday, January 22, our worldwide threat intelligence system detected the largest sustained Dridex campaign on record—66 percent greater than the previous high.
It’s been clear for a long time that attackers will leverage any means necessary to infiltrate a targeted organization.
In the five years since its inception, Instagram has rapidly increased in popularity, joining Facebook, YouTube, and Twitter as one of the top social media sites on the web.
Hackers, spammers and scam artists see social media as an opportunity to easily distribute their wares to massive audiences. We see it all the time in association with large brands. A single phishing or scam lure posted to a big brand can reach ten thousand potential victims.
As a Proofpoint customer, your satisfaction is our top priority. We strive to continuously improve our service offerings and are excited to share that we will be migrating to a new support portal in 2016! This new service will allow for a smarter, more personalized customer experience.
Chances are, you are considering Microsoft Office 365 as part of your archiving strategy. Today, practically every IT team is asking themselves:
“Is it good enough?”
“How does it work?” and
“How does it compare with third party solutions?”