Ericom Blog

The Ericom team and guest bloggers share their latest thinking on Zero Trust, SASE and the key cyber issues of the day.

Better Together: Ericom Joins Cradlepoint

A letter from Ericom’s CEO, celebrating the company’s acquisition by Cradlepoint and the opportunities it creates for our organizations and customers.

Read More

EvilProxy Broadens AitM Cyberthreat with Phishing-as-a-Service Tool

Adversary-in-the-Middle attacks, which made the news a while ago as new way to bypass MFA, is now available as a service.

Read More

Helping the Public Sector Drive Innovation and Security

SaaS apps, collaboration platforms, and virtual meeting solutions can increase efficiency, they also increase exposure to cybersecurity risks.

Read More

Regulated Industries and Shadow IT Headaches

For organizations in highly regulated industries, like financial services, Shadow IT poses a double threat, with us exposing them to compliance risk as well as breaches and cybersecurity risk.

Read More

The 3 Top Attack Vectors and How to Protect Government Agencies Against Them

86% of cyberattacks are initiated through only three attack vectors. Shut them down and the odds of a breach at your organization drop significantly.

Read More

Not Just a Netflix Plotline: Nation-State Cyberattacks Get Real

As nation-state cyberattacks are more widely deployed and effective, it’s time for governments at every level to adopt strong Zero Trust defenses.

Read More

Financial Services Under Cyberattack

FinServ organizations are being attacked at a rate that is disproportionate to the size of the industry, in attacks that top the cost charts at 40% more than the average across all sectors.

Read More

Supreme Court Leak Highlights Importance of Cybersecurity Controls

The investigation into the 2022 leak of a controversial US Supreme Court draft opinion revealed significant gaps in court cybersecurity.

Read More

Does Anti-Phishing Training Add Up to Protection from Phishing Attacks?

Anti-phishing training aims to transform users into “human firewalls.” But crunching a leading training company’s own success figures reveals that intensively training users wasn't effective.

Read More