Ericom Blog

The Ericom team and guest bloggers share their latest thinking on Zero Trust, SASE and the key cyber issues of the day.

Law Firms Increasingly Targeted by Cybercriminals

Law firms are especially attractive targets for cybercrime due to the sensitive nature of their work, which requires them to handle large amounts of highly confidential client data.

Read More

The Evolving Technology of Cybercrime

In this second post covering the 2021 IOCTA report, we discuss the increasing use of cloud-based “crime as a service” platforms and the convergence between plain old criminals and the cyber variety.

Read More

Update On Evolving Cybercrime Tactics

The new IOCTA report describe how today’s cybercriminals have adopted increasingly strategic approaches to who they attack and how they do it – and are securing larger payouts as a result.

Read More

HTML Smuggling Evades Traditional Cybersecurity Solutions

HTML smuggling attacks are on the rise and unfortunately are able to evade traditional cyber defenses. Learn what these attacks are, and what you can do about them.

Read More

Instant Messaging Could Take Down Your Network

IM web clients pose a real danger to network security because a single click on a ransomware-infected file can bring an organization to its knees.

Read More

Cybersecurity Challenges Midsize Enterprises, Small Businesses Face

In our most recent e-book, we’ve looked at the challenges faced by midsize enterprises and small organizations and came up with some ideas that can help.

Read More

Keeping the Zero Trust Picture for Businesses in Focus

The Gartner “Quick Answer” on explaining Zero Trust to technical executive leaders presents important points on examining Zero Trust concepts through a business lens.

Read More

Over 50B Brute Force Attacks During the Summer of 2021

A recent cybersecurity report revealed that 55 billion new brute force attacks on RDP ports had been detected between May and August of 2021 - over 450 million attacks every day.

Read More

The Latest Scam: Soliciting Employees to Deploy Ransomware

In a new twist on email-based attacks, cybercriminals are recruiting disgruntled or greedy employees to deploy ransomware in their employers' systems, in exchange for a cut.

Read More

Moving to a Zero Trust isolation-based security approach is faster and easier than you think.

Get a 1:1 Demo