The Major Cybersecurity Threats of 2018… So Far

Virtual ArmourCybersecurity, Internet of Things

The Major Cybersecurity Threats of 2018 So Far

It seems like every year a plethora of cybersecurity threats are unleashed on the public. Cybercriminals are constantly evolving their tactics in order to steal and compromise important information. Over the past 12 months, we have seen the frequency – and severity – of cyber attacks reach a level of normalcy that large data breaches, such as the recent Equifax … Read More

Recapping DerbyCon 8.0

Virtual ArmourCybersecurity, Industry News & Events

Written by Tianyi Lu, Chief Architect Compared to larger security conferences, such as Def Con or Black Hat, DerbyCon is more intimate. For me, this means that I’ll have more opportunities to engage speakers and have meaningful conversations. This intimacy is by choice: the conference is quite exclusive, with tickets selling out within minutes of being released. If you’ve never … Read More

Don’t Let Phishing Scams Catch You Unaware

Virtual ArmourCybersecurity

Don’t Let Phishing Scams Catch You Unaware

Phishing emails are nothing new and have come along way since the notorious “Prince of Nigeria” emails. In this article, we will discuss what phishing is, how to recognize it, and what steps you can take to protect your company and its assets. What is Phishing Phishing attacks attempt to trick the recipient into believing they are somebody who they … Read More

What is a Managed Services Security Provider?

Virtual ArmourCybersecurity, Managed Services

What are Managed Security Service Providers? Managed Security Service Providers are the security guards of the digital world. These companies exist to help you monitor your network traffic and other digital infrastructure for strange behavior, suspicious activity, and unauthorized access. Should anything fishy be detected the managed security service provider will not only alert you to the possible security breach … Read More

Phishing Friends… Out of Prison

Virtual ArmourCybersecurity

By Garrett Stanley, Security Analyst & Engineer, VirtualArmour Recently there was a follow-up article about a hacker who was jailed for trying to break his friend out of prison. While the story does have a twist of humorous irony to it, the details of the attack truly underscore where the IT Security landscape sits today. The hacker, utilizing a mixture … Read More

What is your Current State of Readiness?

Virtual ArmourEndpoint

If your board of Directors asked you if your company is prepared for a breach, what would you say? Review this list of questions to figure out your current state of readiness: Can our current solution help me before, during and after an attack? What can our current solution do if we are already breached and it’s deployed after the … Read More