Resource Center

White Papers
Featured Resource

Mitigating File-Borne Threats in the Financial Services Industry

Financial institutions face an ever-growing threat from incoming files. Every loan application uploaded to a web portal, emailed spreadsheet, or signed PDF sent to an account manager can contain malicious code that threatens the organization. All files are suspect. Ransomware campaigns and other destructive malware are running rampant as malicious actors seek out high value...
White Papers
Featured Resource

14 Lessons Learned for CISOs from a Ransomware Survivor CIO

In a recent panel event, Frank Johnson, battle-tested, ransomware survivor Public Sector CIO and Chris Fedde, Board Member of Votiro, reviewed lessons learned from Frank’s experience dealing with a breach. Download the report to get the 14 top lessons learned by Frank in dealing with the aftermath of the breach, including: Why the conventional advice on how to avoid ransomware breaks down Where...
White Papers
Featured Resource

Ryuk Ransomware & Government Agencies

Cyber extortion has become an attack of choice for hackers. It is estimated that attacks cost the US more than $7.5 billion in 2019 and malware attacks is expected to increase. As of now, U.S. law generally does not prohibit paying a ransom, but this may change in the future. First discovered in mid-August 2018,...
White Papers
Featured Resource

The Biggest Cyber Threat to Healthcare Insurance Companies in 2021

Every incoming file is a risk for health insurance companies. From a benefit claim sent from a hospital to an approval application uploaded from a patient all the way to a report sent from the CEO’s home computer – there is essentially no such thing as a safe file. Because health insurance companies must remain...
White Papers
Featured Resource

Malicious Macros: The Holes in Microsoft Software That Hackers Hope You Don’t Know About

A macro is a mini program that is designed to automate a task within a larger program in order to make the user experience faster and easier. Macros are a legitimate and important component of any productivity software, including common Microsoft Office software for creating documents, spreadsheets, and presentations. Unfortunately, these efficiency-drivers are easily compromised...
White Papers
Featured Resource

How to Best Protect Your Enterprise Email from File-Borne Attacks

Many common cybersecurity technologies are powerless in an environment where undisclosed and zero-day attacks abound. With cybercriminals becoming more sophisticated than ever and investing enormous effort in preparing successful targeted attacks through email, a revolutionary approach to cyber protection is required. Download the eBook to learn more.