Top 5 Warning Signs When Opening Email

Training employees to identify suspicious emails Emails are a core part of what makes modern business practices possible. With projections in 2019 exceeding over 240 billion business-related emails a day, the ability to send messages rapidly around the world has reshaped multinational business proficiency. The downside? It’s also an extremely lucrative tool for cyber crime.  […]

Vaporworm Threat: What You Need to Know About the Next Evolution of Malware

Vaporworm threat

Malware is ever-evolving as attackers develop new variants to bypass or defeat enterprise network security defenses. Fileless malware, in particular, has created headlines in recent years thanks to its ability to bypass several of the protections employed by traditional antivirus solutions. The vaporworm threat has now emerged as the next evolution of malware. It combines […]

How Retailers can Protect Against Cybercrime this Holiday Season

The holiday season is not only a busy time for retailers but also presents a myriad of opportunities for cybercrimes to be committed. The November to January months are the retail industry’s most important selling time with sales during this time accounting for almost one-third of annual sales in some categories. According to a recent […]

5 Ways to Prevent Ransomware

For cybercriminals, ransomware has been a lucrative business in 2019.    For cybersecurity executives, prevention is top of mind; and with good reason. According to a recent McAfee Labs Threat Report, in Q1 2019 alone, ransomware attacks grew by 118%.   Ransomware attacks can be unsettling and sometimes devastating to an organization. Losing access to valuable […]

Cybersecurity 101: Getting Started

Cybersecurity basics

Setting up a cybersecurity program is important, but it can seem like a daunting task.  Organizations shouldn’t feel as if they should try to do everything overnight. This can be overwhelming and become counterproductive. When setting up a cybersecurity program, it’s important to get the basics solidly in place before acquiring and deploying defenses for […]

Security Implications of the Internet of Things

Devices connected to the Internet of Things (IoT) add substantial value to businesses and industries such as manufacturing, transportation, and utilities among others according to a recent Tech Pro Research Survey. By automating tasks and making functionality easily accessible to the average user, many devices, like Internet-enabled security cameras and medical devices, have the potential […]

New Podcast Features Avertium CEO

Episode 3 of Ackermann Marketing and PR’s new “Sweet Tea and Strategy” podcast features Avertium CEO Jeff Schmidt discussing the state of cybersecurity, emerging trends, and the future. Listen to the episode or read the transcript below: Tommy Smith:  Welcome to Sweet Tea and Strategy podcast, produced by Ackermann Marketing and PR. We’re speaking with business […]

The Future of Managed Security Services

Cybersecurity is moving at the speed of light. Threats and technology change on a regular basis. This makes it hard to determine the best course of action. This article explores the future of managed security services to help you decide if outsourcing your 24×7 security operations is right for your organization. What are Managed Security […]

Changing State of Consumer Privacy

Consumer Privacy Laws With data breaches on the rise, many new data protection regulations have been enacted. The European Union’s (EU) General Data Protection Regulation (GDPR) is the first and most well-known of these. This opened a floodgate of action in the US. Several new or bolstered laws have gone into effect in the United […]

Crimeware-as-a-Service Explained

Crimeware-as-a-Service (CaaS) allows specialization in a certain area of the space, while renting goods or services from other cyber criminals as needed.