Remote Browser Isolation solutions are not created equal. Here’s a quick guide to help you distinguish between solutions that are fully mature and those that use cludgy, older 1st gen RBI technology.
The huge REvil ransomware attack on the Kaseya supply chain reinforces the importance of clear cybersecurity guidelines. In this post, we weigh in on the definitions of critical software per the US executive order on improving cybersecurity.
Many insurance companies recommend cybersecurity measures to their policyholders. But there may be more they can do to keep attacks from succeeding.
During virtual meetings malicious code in the portal can install malware on participants’ devices, including software that enables cameras to stay on, even after the meeting is over, or that installs ransomware on user devices. Protect your users with Virtual Meeting Isolation.
Cybercriminals are targeting industries that may not traditionally have been considered attractive cyberattack targets and therefore may not have made cybersecurity a top priority.
Following the Colonial Pipeline and JBS SA attacks, the US government has issued security directives and recommendations for organizations. But the lack of a central organization responsible for cybersecurity weakens their efforts.
Cyber criminals are all too willing to risk lives. It’s time for healthcare organizations to realize that preventing cyberattacks is as crucial for healthcare as preventing disease.
The best way for midsize enterprises to defend their distributed businesses against today’s cyber threats is to adopt a cloud-based Zero Trust security approach that protects them no matter where users or resources are located.
The code of virtual meeting solution web portals can hide malware that can compromise endpoint browsers and networks. First-of-its-kind Ericom Virtual Meeting Isolation isolates portal code to secure meetings and enable full functionality.