WatchGuard Blog - Cybersecurity Trends

Other Ways Remote Work Has Changed Businesses

There have been some great outcomes from staying home but remote work isn’t all sunshine & saved money. It also creates security risks for your organization. Download the infographic to find out more.

Knowing where access attempts come from, the key to MFA

The good thing about risk-based authentication is that it takes risk factors into account when performing an authentication decision. WatchGuard partners can now offer their customers increased security in their authentication processes through push notifications that include geolocation.

Webinar: Top Security Threats Worldwide - Q3 2021

WatchGuard CSO Corey Nachreiner and Security Operations Manager Marc Laliberte discussed key findings from the Internet Security Report Q3. Now you can access the on- demand webinar here and keep up to date with the main findings.

WatchGuard’s 2022 Predictions

Interested to know what the trends will be and what other emerging security issues might surface next year? Don’t miss WatchGuard's Security Predictions for 2022.

How to prevent known exploited vulnerabilities at the endpoint

MSPs must lay down plans and clear policies for updating their customers' operating systems, servers, proprietary and third-party software. Advanced tools to keep IT and security operations up to date and avoid delays that can be the entry vector for serious incidents are now available.

The Oculus (Meta) Quest Scam

Quick turn around one of the most widespread online scams during the shopping season: Black Friday, Cyber Monday and Christmas are here... Don't get caught unawares!

How businesses can protect themselves from DDoS attacks

A recent study estimates that DDoS attacks are already responsible for up to one-third of downtime incidents. MSPs should provide a portfolio of solutions that reduce the likelihood of DDoS attacks blocking or affecting their customers' connectivity.

Malware Evasion Techniques

In this Cybersecurity Insights, learn how threat actors mask their attack payloads from detection and what you can do to defend your organization and customers from these evasive threats.