IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

cybercrime

Protecting healthcare from cybercrime
Whitepaper cover with title and image of healthcare professionals in white coats and latex gloves looking at a tablet in a labwhitepaper
Whitepaper

Protecting healthcare from cybercrime

Best practices to address evolving cyber security threats
25 May 2022
The truth about cyber security training
Pair of feet in socks with a chair and plant in the backgroundwhitepaper
Whitepaper

The truth about cyber security training

Stop ticking boxes. Start delivering real change.
25 Apr 2022
The Total Economic Impact™ of Mimecast
Total economic impact of Mimecast - whitepaper from Mimecastwhitepaper
Whitepaper

The Total Economic Impact™ of Mimecast

Cost savings and business benefits enabled by using Mimecast with Microsoft 365
25 Apr 2022
Security awareness training strategies for account takeover protection
Security awareness training strategies for account takeover protection - whitepaper from Mimecastwhitepaper
Whitepaper

Security awareness training strategies for account takeover protection

Why you need an inside-the-perimeter strategy for internal threats
25 Apr 2022
Bring insights and data closer to customers with edge computing
Whitepaper cover with title, text and Red Hat logowhitepaper
Whitepaper

Bring insights and data closer to customers with edge computing

How to innovate, make faster decisions and provide engaging experiences
5 Apr 2022
Microsoft 365 protection made MSPEasy
Whitepaper cover with layered graphic of tablet, envelope and padlockwhitepaper
Whitepaper

Microsoft 365 protection made MSPEasy

The cloud protection solution built for MSPs
4 Apr 2022
Ransomware and Microsoft 365 for business
Whitepaper cover with over-layered graphics of laptop, folder, file and skull/malware imageswhitepaper
Whitepaper

Ransomware and Microsoft 365 for business

What you need to know about reducing ransomware risk
4 Apr 2022
The best defence against ransomware
Blue padlock whitepaper
Whitepaper

The best defence against ransomware

How ransomware is evolving and how to defend against it
31 Jan 2022
TikTok phishing campaign tried to scam over 125 influencer accounts
The TikTok logo on an application store accessed from a smartphone
social media

TikTok phishing campaign tried to scam over 125 influencer accounts

Hackers threatened to delete accounts over copyright violations
18 Nov 2021
Smart luggage is not so smart when it comes to cyber security
Smart luggage in an airport
cyber security

Smart luggage is not so smart when it comes to cyber security

If luggage owners aren’t careful, hackers could use app to steal baggage
15 Nov 2021
Europol reveals how ransomware gangs are evolving to evade capture
Image of a Europol sign affixed to its Amsterdam headquarters
cyber crime

Europol reveals how ransomware gangs are evolving to evade capture

The annual crime report explains how ransomware continues to grow in profitability despite recent capture attempts, and the novel ways DDoS attackers …
12 Nov 2021
The Okta digital trust index
Woman types on a laptop, image is faded purple with title text beside it on white backgroundwhitepaper
Whitepaper

The Okta digital trust index

Exploring the human edge of trust
11 Nov 2021
Attackers use CSS to fool anti-phishing systems
Email sign with a fish hook on blue digital background
phishing

Attackers use CSS to fool anti-phishing systems

Inserting invisible links throws off natural language processing, say researchers
11 Nov 2021
Hackers could use new Wslink malware in highly targeted cyber attacks
Malware in code
malware

Hackers could use new Wslink malware in highly targeted cyber attacks

Malware acts as a server, but its origins baffle boffins
1 Nov 2021
Marsh McLennan reveals its cyber risk analytics center
Hand hovering over laptop with padlock graphic superimposed
risk management

Marsh McLennan reveals its cyber risk analytics center

The center combines the expertise of Marsh, Guy Carpenter, Mercer, and Oliver Wyman
15 Oct 2021
Justice Department unveils civil cyber fraud initiative to battle online crime
Department of justice sign on a building
cyber attacks

Justice Department unveils civil cyber fraud initiative to battle online crime

New proposal will respond to cyber security breaches and cryptocurrency use in undertaking cyber fraud
7 Oct 2021
Senator to introduce new bill to force ransomware payment disclosures
The senate floor during a vote
ransomware

Senator to introduce new bill to force ransomware payment disclosures

Organizations would have 48 hours to inform DHS
6 Oct 2021
Account takeovers rise nearly threefold during pandemic
"Fraud Alert" on a computer screen
cyber attacks

Account takeovers rise nearly threefold during pandemic

Financial services hit hardest by account hijackers, says Sift report
30 Sep 2021
Hackers spoof Zix in credential phishing attack
phishing hook in water surrounded by "at" symbols
phishing

Hackers spoof Zix in credential phishing attack

The attack has impacted around 75,000 Office 365, Google Workspace and Exchange users
28 Sep 2021
100 million IoT devices affected by zero-day flaw
IoT network with hackers
Internet of Things (IoT)

100 million IoT devices affected by zero-day flaw

Vulnerability could affect car, fire detection, and patient data sensors
24 Sep 2021
HP Wolf Security: Threat insights report
Skyscrapers from belowwhitepaper
Whitepaper

HP Wolf Security: Threat insights report

Equipping security teams with the knowledge to combat emerging threats
24 Sep 2021
How to plan for endpoint security against ever-evolving cyber threats
Man and woman looking at a laptop in an office building whitepaper
Whitepaper

How to plan for endpoint security against ever-evolving cyber threats

Safeguard your devices, data, and reputation
24 Sep 2021
Managing security and risk across the IT supply chain: A practical approach
Overlaid images of buildings, a sign saying 'security breach', and yellow text saying 'we have detected a harmful attack attempt'whitepaper
Whitepaper

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security
24 Sep 2021