Speaking of Malware
The Strongarm Blog

October Scam of the Month: Crypto-currency Mining

October 18, 2017 | By Todd O'Boyle

You’re probably familiar with Bitcoin, the online cryptocurrency that has garnered quite a bit of both positive and negative attention. Mining is a part of all cryptocurrencies and forms the root of trust in the currency. Typically, “miners” make money for mining, trading computing resources...


Introducing: Per-Network Content Filtering Policies

October 16, 2017 | By Austin Rose

Back in August we released content filtering as a capability within Strongarm. Today, we are excited to announce the addition of a commonly requested improvement: per-network policies for content filtering. If you protect many networks with Strongarm, each of those networks may have different content...


Asked and Answered: 5 Questions from Our Webinar with Savage Security

October 13, 2017 | By Matt Lawson

On October 3rd, we held a webinar with our friends over at Savage Security, called Going Savage: Strategies for Taking Control of Your Cybersecurity Fate. Our CTO Todd O’Boyle and Adrian Sanabria of Savage conducted a lively discussion about how you can “plan to fail,”...


Multi-Factor Authentication: Everything You Need to Know

October 5, 2017 | By Oliver Scarborough

It is no secret that login credentials are among the most frequently targeted pieces of user data by malicious entities. This past summer, one of the largest spambot dumps—including over 711 million records, including nearly 50 million passwords, was reported by Troy Hunt. Having your...


September Scam of the Month: RDP Servers Hit with Ransomware

September 27, 2017 | By Todd O'Boyle

About once a quarter, we see an attack of ransomware on a server. Originally, we thought this was just another human error (someone clicking on a phish), and we warned people not to read email or use a web browser on a server. However, what...


Three Strategies for Taking Control of your Cybersecurity Fate (+ Free Webinar!)

September 26, 2017 | By Todd O'Boyle

When it comes to cybersecurity, the average organization spends the majority of its energy buying security products. But does this actually make them safer? While companies hope that some combination of firewalls, antivirus, and other security products will prevent a cyberattack, this approach ignores the...