Speaking of Malware
The Strongarm Blog

7 SMB-Specific Security Challenges and How to Overcome Them

July 27, 2017 | By Joel Silberman

Did you know that 43 percent of cyberattacks are aimed at small and midsized businesses? If you fall into that category and think you’re too “small fry” for a cybercriminal to come after you, think again. Small businesses are a lucrative target because many do...


KnowBe4 + Strongarm: Provide Real-Time Phishing Education for Users

June 29, 2017 | By Joel Silberman

What do ransomware, credential theft, and stolen intellectual property all have in common? These common security attacks often start with a phish—an email sent to users that attempts to steal information or get them to click on a malicious attachment or link. If the phish...


Announcing the Strongarm MSP Partner Program

June 14, 2017 | By Joel Silberman

Small and midsized businesses are increasingly a hot target for cybercriminals.  In fact, 43 percent of targeted cyberattacks are aimed at SMBs. The worst part? A full 60 percent of them go out of business within six months of a cyberattack. Of course, one of...


Phishing for Credentials: Why Macs Are Not Immune and What To Do About It

May 18, 2017 | By Joel Silberman

Many tech-savvy businesses today use Mac computers not only because they’re more powerful and sleeker, but because they’re secure by design. Or are they? This is actually a bit of a misconception, as this post explains. In truth, Mac computers can and do fall victim...


Arresting Ransomware: How Municipalities Can Fight Back

May 10, 2017 | By Joel Silberman

These days, it seems that no organization is immune to ransomware. From San Francisco’s public transit system to a New Jersey municipality to police departments all over the U.S., government agencies in particular have become a popular target for hackers. According to Symantec’s new Internet...


Take Our Security Grader Quiz: How Does Your Company Stack Up?

April 19, 2017 | By Joel Silberman

More companies today, especially small businesses, need to protect themselves from security threats. But with limited budget and time, and an endless number of acronyms and vendors, it can be hard to know what to implement first, what technologies overlap, and when you’re secure enough....