White Papers

IT Disaster Recovery: Practice Makes Perfect

Testing your technology disaster recovery plan at regular intervals will help ensure that you’re ready for the next crisis. Automated testing is an important aspect of regular testing; however, also testing the people-dependent elements of your plan is the only way to...

read more

Improve Cybersecurity with Blockchain

Blockchain technology may be new, but the innovative practical applications of these tools are predicted to burgeon the markets to somewhere between $20 billion and $176 billion by 2025. Why the huge gap between these two financial forecasts? Blockchain is an...

read more

Top 5 IT Security Improvements You Need Now

ITSP Magazine called IT security in 2018 a “dumpster fire,” and we agree. From Russian state-sponsored hackers infiltrating the U.S. power grid, to ransomware continuing its ugly rampage, to programmer snafus that left millions of personal records exposed, it’s clear...

read more

The Evolution of Phishing Scams — What to Watch for in 2019

Phishing is a popular tool used by cyber terrorists to infiltrate corporate IT networks. Because phishing attacks come in the form of an email message to an internal user in your company, they can rock your world with just one mouse click. Some of the most notorious...

read more

The New Cyberwarfare: AI vs. AI

You’ve probably heard a lot about the powerful technology advancements found within the constructs of artificial intelligence (AI). From the adaptable automation known as machine learning to speech recognition (natural language processing), the algorithms behind AI...

read more

2019 Trustwave Global Security Report

Report Shows Pressing Danger of BEC Attacks In its Email Fraud Threat Report: Year in Review 2017, Proofpoint (Wombat’s parent company) highlights the rise of business email compromise (BEC) attacks during the course of 2017. The report draws from analysis of...

read more

The 2019 What Keeps You up at Night Report

Maintaining organizational security against cyberthreats last year was a unique challenge. Cybercriminals turned up their execution a notch – targeting specific industry verticals, organizations, and even individuals. Increases in the frequency of ransomware,...

read more

Assessing Cybersecurity Risk in 2019

The data regarding cybersecurity risks should worry you. CISCO’s Cybersecurity Special Report says midmarket companies are increasingly vulnerable to cyberattack, with 53% reporting a data breach each year. Experian predicts that both wireless carriers and cloud...

read more

Cybersecurity Awareness and Training White Paper

This white paper was written by the State, Local, Tribal, and Territorial Government Coordinating Council, however it can pertain to any organization. It discusses how cybersecuriy risks are exacerbated when weak or non-existent cybersecurity programs are embedded...

read more

Shelfware Is a Lurking Cybersecurity Risk

Are you hoarding software? Do you even know? Techopedia calls shelfware “software that has been purchased but never used.” While shelfware could be a piece of discounted software you purchased as an impulse buy, it could also be legacy applications that you’ve simply...

read more

Email Fraud Threat Report: Year in Review 2017

Report Shows Pressing Danger of BEC AttacksIn its Email Fraud Threat Report: Year in Review 2017, Proofpoint (Wombat’s parent company) highlights the rise of business email compromise (BEC) attacks during the course of 2017. The report draws from analysis of more than...

read more