How Stay-at-Home Parents Can Transition Back to Work

The vast majority of people who take time off to raise children (or other caregiving work) would ultimately like to return to the workplace. But transitioning back isn’t so easy. Research by the Center for Talent Innovation shows that only 73% of highly qualified women who wanted to return to work were able to do so, and just 40% of those landed a regular full-time job. What’s the problem, and how … [Read more...]

Report: Cybercrime climate shifts dramatically in first quarter

The first quarter of 2017 brought with it some significant changes to the threat landscape and we aren’t talking about heavy ransomware distribution either. Threats which were previously believed to be serious contenders this year have nearly vanished entirely, while new threats and infection techniques have forced the security community to reconsider collection and analysis efforts. Read more … [Read more...]

#3 Mac Usage in the Workplace

By Beatrice Vogel Windows Applications on a Mac with Parallels Desktop for Mac As enablers of Mac® integration into traditional Windows® networks, Parallels® often surveys Windows IT professionals to understand the trends associated with supporting a dual platform environment. In our latest research, we wanted to understand the usage and growth of incoming Mac devices, the advantages of … [Read more...]

Moving to Cloud Information Management

By Dave Packer It has never been simple to manage your company's most critical data. Understanding all the various technology options available for an ever-growing list of data sources has made this endeavor far more difficult and is encompassing an expanding number of functions within organizations. Businesses need to evolve the way in which they approach this challenge by embracing the cloud … [Read more...]

The Rise of the Cloud OS

By Swapna Jayachandran Online businesses must anticipate and manage hard-to-predict spikes in user activity. If a business fails to meet peak demand, there is a risk of a service crash (remember, which could result in downtime and negatively impact customer experience. To avoid nasty surprises, companies outline stringent service-level agreements (SLAs) for their IT … [Read more...]

Mobile Menace Monday: Securing your privacy on Android

By Nathan Collier Whether you are a government employee with sensitive data stored on your mobile device or just a casual user that just can't lose your precious cat pictures, turning on security settings to keep your privacy secure on your Android device is important. Convenience vs security In an era of having to keep track of multiple complex passwords, dealing with policies to reset … [Read more...]

A week in security (Apr 17 – Apr 23)

By Malwarebytes Labs Last week, we doubled back on the Locky ransomware, seeing that it's back. The good news is we still protect our users from this new strain. Moker, a Trojan also known as Yebot and Tilon, was spotted by our researchers being used as payload by the Rig-V exploit kit. As such, a deep analysis of the said malware was in order. Lastly, we profiled a malvertising campaign that … [Read more...]

How to Work with Someone Who Isn’t a Team Player

Do you work with someone who isn’t a team player? Maybe they’re overly focused on completing and promoting their own work. Or they don’t chip in when everyone else is scrambling to meet a deadline or pulling a presentation together. This isn’t simply frustrating; it can affect your entire group’s performance. How do you work with this person in a way that doesn’t make you resentful? And how can … [Read more...]


Innovative machine learning technology automatically identifies and alerts for suspicious Privileged Account access and activity based on individual behavior baselines Why IT Admins and Security Pros love Privileged Behavior Analytics for Secret Server? Gives real-time graphical views of privileged accounts and access patterns for individual users across your enterprise Provides early … [Read more...]

Locky ransomware is back, but we already protect against it

By Malwarebytes Labs In our Q1 2017 Tactics and Techniques report, we mentioned that the Locky ransomware had mysteriously vanished. Indeed, for a while, it completely disappeared and allowed for Cerber to take the number one spot as the most distributed piece of ransomware (and malware for that matter). However, the group controlling the Necurs botnet has just opened the spam floodgates again … [Read more...]