Get In Touch
Recently by Jim Black
Overview Emotet malware has been around since 2014, but 2020 saw a resurgence of attacks. In September 2020, Emotet affected 14% of organizations worldwide. So, what is Emotet? And why is it so dangerous?
Last March, Akamai announced the launch of its secure web gateway delivered at the edge, to help enterprises further accelerate their transition to a new security architecture based on Zero Trust and secure access service edge (SASE) principles. As we now know, we were just on the cusp of a global pandemic that changed the nature of work. Literally overnight, companies needed to support tens of thousands of employees working
Cybercriminals continue to target U.S. state, local, tribal, and territorial (SLTT) government organizations. In 2019, there were more than 100 ransomware attacks -- including an attack on Baltimore's IT systems that locked out thousands of computers and disrupted nearly every city service. This attack is estimated to have cost the city as much as $18 million.
Microsoft 365 is becoming the essential productivity suite for enterprises. Over 1 million companies have now signed up for the service, and every month there are more than 200 million active users. Microsoft Teams alone has 75 million active users every day.
One of my favourite websites is archive.org (OK, so I'm a nerd). For anyone not familiar with this website, it's essentially a time machine that allows you to go back and look at pretty much any site from a point in time over the past 20-odd years.
What Is CIPA? Enacted in 2000 by the United States Congress, the Children's Internet Protection Act (CIPA) limits children's exposure to explicit internet material such as obscene content. CIPA mandates that K-12 schools and public libraries must deploy technologies that filter this type of content on internet-connected computers in order to be eligible for federal funding such as E-Rate.
Helping customers further secure their on-premises data centers and IaaS deployments is an interesting new use case for our Enterprise Threat Protector service.
The global pandemic has resulted in a dramatic shift to home working. This has created a perfect security storm that has dramatically increased the security risk for enterprises. The best worst-case scenario is that a single device used by an employee working from home is compromised, and sensitive data on that device is stolen or locked with ransomware. Or worse, the compromised device is the beachhead for lateral movement and
The need for companies to quickly enable remote access to business-critical applications was highlighted in a recent Akamai blog -- Enabling Business Continuity in an Uncertain Global Environment.