ThreatLocker Administration Guide

    Exploitation of SolarWinds Orion Software

    On a quiet day, security is a challenge to digest. The list of latest breaches seems to never end. Cybersecurity professionals are expected to digest and implement a plan for the various...

    Read more

    Does Your MSP Provide Zero Trust Security?

    Businesses today are actively looking for robust cybersecurity protection to keep up with the rapidly evolving cybersecurity landscape.

    Read more

    Massive Spying Campaign Affects Google Chrome Users

    In February of this year, Google removed over 500 malicious plugins from the Chrome store which stole data from nearly 1.7 million users.

    Read more

    Australia Faces Wide Spread Cyber Attack

    Prime Minister Scott Morrison has spoken about a major cyber attack.

    Read more

    How Ragnar Locker Ransomware Evades Threat Detection

    Ransomware gangs have shown no sign of slowing down as more sophisticated and complex attacks are developed to evade traditional security solutions such as antivirus, firewalls, and...

    Read more

    Why Threat Detection Isn't Enough

    One of the biggest challenges IT Professionals face today is establishing the right security foundation for their organization.

    Read more

    Visibility and Control at the Application Layer

    In the past, the axiom, “humans are the weakest link,” was the battle cry of many cyber security professionals. Users, that is, non-security employees, were constantly doing “dumb”...

    Read more

    How Insider Threats Pose A Major Security Risk

    Historically, data breaches that make the news are typically carried out by outside attacks, however; the frequency and cost of insider-related cyber attacks have increased over the last...

    Read more

    Maze Ransomware Attacks Are Increasing

    A new strain of ransomware known as Maze is disrupting organizations around the world.

    Read more

    How to Protect Remote Workers From Cyber Threats

    Over the last month, we have observed a major shift in the way businesses and organizations communicate internally. As millions of new users are introduced to remote-collaboration tools,...

    Read more

    Beware of Federal Stimulus Package Scams

    The FBI has issued a public service announcement warning citizens to be wary of email and malware scams that continue to circulate in tandem with the Covid-19 news cycle. While many of...

    Read more

    How Safe is Zoom?

    Earlier this week, a new vulnerability in Zoom was discovered. If you aren’t familiar with this tool, it is currently one of the leading video conferencing software applications on the...

    Read more

    The Hidden Dangers of Chrome Extensions

    While I.T. professionals fully understand the dangers of allowing users to choose what software is permitted to run, few have given any thought to what extensions users can add to Google...

    Read more

    Hardening Windows 7 after January 14th, 2020

    The deadline for Windows 7 end of life is approaching quickly. With only a few weeks to go, organizations around the world are scrambling for ways to protect themselves, facing the...

    Read more

    Why Small Businesses Have Become Targets of More Cyber-Attacks Than Large Enterprises

    Thousands of computers that belong to customers of managed services providers (MSPS) have suffered from ransomware attacks over the last year. Often times, this begins with a phishing...

    Read more

    Threatlocker Enables the Essential Eight

    ThreatLocker’s application whitelisting and ringfencing technology has grown by leaps and bounds and we have observed the adoption of this approach to security in Australia. We thought...

    Read more

    How Application Whitelisting and Ringfencing protects you from BlueKeep RDP vulnerability

    The latest “oops” moment for Microsoft is the discovery that an attacker can infect a connecting machine with malware from a Remote Desktop Session. Every few months a new vulnerability...

    Read more

    Anti-Vaxxing and Cyber Security

    I read almost everything the CDC publishes and I am a fanatic for the NIH publications on disease and medical innovations. I personally just think it’s amazing the things that such...

    Read more

    Less Hackable - For Small Business Owners

    After nearly 20 years working in cybersecurity, I am still asked the age-old question by business owners: "How can I make myself unhackable?" Seldom do they understand when I try to...

    Read more

    Text compliments encourage users to download apps they don't need, exposing your data

    ThreatLocker, C.E.O talks about how socially engineered text message encourages users to download software that could pose a risk.

    Read more