How A UK-Based IT and Software Solutions Provider Is Helping Employees to Work Remotely and Securely During the COVID-19 Pandemic
Comodo Blog
by Carolyn Muzyka
3y ago
Reading Time: 3 minutes Disruptions are often unforeseen. This could be a catastrophic event like a hurricane, a fire, or an earthquake. Disruptions, however, can also come in other forms such as that of a pandemic. This means that a building doesn’t necessarily have to be demolished or lives have to be lost for an unforeseen event to completely interrupt a company. We are witnessing this in the form of the COVID-19 pandemic, which has impacted the continuity of many businesses while forcing most of the workforce to work from home. The remote workforce poses new challenges for businesses as ac ..read more
Visit website
How An Austin-Based MSSP is Making Enterprise-Level Security Affordable for the MSP Community through Comodo
Comodo Blog
by Carolyn Muzyka
3y ago
Reading Time: 4 minutes Today, organizations are constantly at risk from cyber-attacks. This is a major issue not only because of the traditional business risks, but because in today’s increasingly globalized world, effective intrusion by a cybercriminal might, among other things, bring the operations of a company to a standstill. Therefore, while businesses need to match the security system with their needs, they also need to consider the business’s tolerance to risks and enforce security controls that strengthen their general security environment without needing excess spending. A master MSS ..read more
Visit website
How Rosedale Union School District is Ensuring Continued Learning of Students in the Middle of the COVID-19 Pandemic
Comodo Blog
by Carolyn Muzyka
3y ago
Reading Time: 4 minutes There should be no doubt in anyone’s mind that the coronavirus pandemic will reshape our education systems. It has already altered how students around the world learn and share knowledge with their peers in just a matter of months. Those changes can give insight into how education will progress in the long run, for better or worse. How COVID-19 is Changing Education in the U.S. In the U.S., the COVID-19 pandemic has led to the closure of many public and private schools. According to an article published by Forbes, by forcing the world towards a remote and online educati ..read more
Visit website
How an MSP Transitioned to an MSSP by Partnering with Comodo
Comodo Blog
by Carolyn Muzyka
3y ago
Reading Time: 3 minutes The same question is asked by many companies that provide IT support and want to make the switch from a managed services provider (MSP) to a managed security services provider (MSSP): Is it worth it? This is a critical question that anyone contemplating such a move should ask themselves. The simple answer to this question would be yes, transitioning to an MSSP is worth the risk. As COVID-19 has unlocked the window for hackers to leverage the fears of people to serve their malicious ambitions, the rising security demands of organizations are forcing many MSPs to seriousl ..read more
Visit website
How Comodo’s Auto-Containment Technology Is Helping an IT Company Provide Ransomware Protection to Clients
Comodo Blog
by Carolyn Muzyka
3y ago
Reading Time: 3 minutes The proliferation of ransomware in recent times has made many companies sit up and assess their existing IT infrastructure, especially their IT security solutions. While many of the security solutions that businesses have been using for several years now help to mitigate the threat of ransomware, they are not built to thwart these threats completely. This is one of the main reasons the number of ransomware attacks surged during the first half of 2020. One company that realizes the need for better protection ransomware and other cyber-threats is Global Tech Solutions. Th ..read more
Visit website
How an End-to-End IT Solutions Provider is Helping Customers Stop Ransomware
Comodo Blog
by Comodo
3y ago
Reading Time: 2 minutes Ransomware and malware are two major cybersecurity threats facing companies around the globe. The total cost of ransomware attacks is expected to reach $20 billion by 2021. A company that realizes the threat of ransomware for businesses is IP Infotech. Their Challenge IP Infotech is one of the leading end-to-end information technology solutions providers in Southeast Asia and Africa. The company offers network security appliances for both the public and private sectors. The company has built a large base of loyal clients in Southeast Asia and Africa that depend on the c ..read more
Visit website
What is Comodo Dragon Platform’s Adaptive Event Modeling and Why We Think It’s Better Than Crowdstrike’s
Comodo Blog
by Comodo
4y ago
Reading Time: 3 minutes There is a dilemma over event collection of Endpoint Detection and Response (EDR) products. Collecting all events generated by endpoints means bottlenecks on the endpoint and on the network.  Collecting less may result in missing important events; collecting more could result in low performance endpoints. Current EDR vendors including Crowdstrike use a predefined event schema where all are hard coded in their agents. Crowdstrike announces that they are using 400 different events (where a percent of it are their own agent specific events) that are static, with prede ..read more
Visit website
Cyber-threat Alert: Summer 2017 Phishing Trip to Avoid
Comodo Blog
by Comodo
4y ago
Reading Time: 3 minutesA Special Update from the Comodo Threat Intelligence Lab Phishing attacks using emails have become very common but the techniques are continually being enhanced and personalized to the point where we all need a refresher course. In the past, very obvious grammatical and spelling errors made many phishing attempts easier to spot, but each month seems to now bring more sophisticated versions. In July 2017, The Comodo Threat Intelligence Lab has identified a new series of phishing emails that purport to be replies to previously asked requests for information from well-known ..read more
Visit website
Petya Ransomware | How It Spreads and How to Stay Ahead
Comodo Blog
by Comodo
4y ago
Reading Time: 2 minutes After an examination of the encryption routine of the malware utilized as a part of the Petya/ExPetr assaults, experts understand that the malware author can’t decode the casualties’ circle – regardless of the possibility that an instalment was made. As it turns out, this malware attack is more like a wiper but mimics a ransomware. Reports about a new avatar of ransomware attacks have been disturbingly frequent since June 27th 2017. With different versions of names unveiled – Petya, NotPetya. Petrwrap and exPetr – causing a rift in the virtual space worldwide. It main ..read more
Visit website
Best 10 Features of an Effective Endpoint Security Strategy
Comodo Blog
by Comodo
4y ago
Reading Time: 4 minutes With overwhelming cyber attacks happening through malicious apps on mobile devices, security geeks are to intensify the endpoint security measures multiple folds. Setting up stringent endpoint security measures would be the best way to encounter possible malicious risks. Endpoint Security Strategy Be it company devices or BYOD devices, when connected to the network are prone to malware attacks. Endpoint protection has become the most critical aspect of IT security to protect any business and customer data and identity. When a device is connected to the company’s networ ..read more
Visit website

Follow Comodo Blog on FeedSpot

Continue with Google
Continue with Apple
OR