Category: welivesecurity

How MDR can give MSPs the edge in a competitive market
04
Nov
2025

How MDR can give MSPs the edge in a competitive market

With cybersecurity talent in short supply and threats evolving fast, managed detection and response is emerging as a strategic necessity…

Can you spot a spy posing as a job seeker?
04
Nov
2025

Can you spot a spy posing as a job seeker?

Here’s what to know about a recent spin on an insider threat – fake North Korean IT workers infiltrating western…

Cybersecurity Awareness Month 2025: When seeing isn't believing
04
Nov
2025

Cybersecurity Awareness Month 2025: When seeing isn’t believing

Deepfakes are blurring the line between real and fake and fraudsters are cashing in, using synthetic media for all manner…

How to help older family members avoid scams
04
Nov
2025

How to help older family members avoid scams

Families that combine open communication with effective behavioral and technical safeguards can cut the risk dramatically 30 Oct 2025  • …

This month in security with Tony Anscombe – October 2025 edition
04
Nov
2025

This month in security with Tony Anscombe – October 2025 edition

From the end of Windows 10 support to scams on TikTok and state-aligned hackers wielding AI, October’s headlines offer a…

5 things to do after discovering a cyberattack
03
Nov
2025

5 things to do after discovering a cyberattack

When every minute counts, preparation and precision can mean the difference between disruption and disaster 03 Nov 2025  •  ,…

How SMBs can fight back against ransomware
19
Sep
2025

How SMBs can fight back against ransomware

Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than…

A Petya/NotPetya copycat comes with a twist
17
Sep
2025

A Petya/NotPetya copycat comes with a twist

HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI Secure Boot bypass functionality 16 Sep 2025 ESET…

Are cybercriminals hacking your systems – or just logging in?
12
Sep
2025

Are cybercriminals hacking your systems – or just logging in?

As bad actors often simply waltz through companies’ digital front doors with a key, here’s how to keep your own…

Preventing business disruption and building cyber-resilience with MDR
10
Sep
2025

Preventing business disruption and building cyber-resilience with MDR

Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a…

Safeguarding business data with encryption
06
Sep
2025

Safeguarding business data with encryption

As the attack surface expands and the threat landscape grows more complex, it’s time to consider whether your data protection…

This month in security with Tony Anscombe – August 2025 edition
29
Aug
2025

This month in security with Tony Anscombe – August 2025 edition

From Meta shutting down millions of WhatsApp accounts linked to scam centers all the way to attacks at water facilities…