Story image

The cyber threats you’ll face in 2017 - and tips for defending against them

23 Feb 17

What can send an organisation into chaos within a matter of seconds?

Malware and ransomware are two threats that are often in the limelight and don't seem to be going anywhere anytime soon. 

They are constant and malicious and according to Webroot, there are new trends surrounding these threats being created all the time.

Most recently, the threat intelligence company has uncovered the prevalence of a trend dubbed 'polymorphism'.

For several years, the most important trend in malware and potentially unwanted application (PUA) executables has been polymorphism. 

These threats are generated by attackers in ways that make each instance unique. 

To find out more about polymorphism, malicious mobile apps and other threat trends, download Webroot’s 2017 Threat Report below.

What you’ll gain from this report:

  • Invaluable analysis and insight from the Webroot Research team
  • Steps to protect against the latest threat trends
  • Knowledge to future-proof your business against hidden threats
  • Important information sourced from more than 600 million domains, 4 million IP addresses and 50 million mobile apps
IP theft: A global issue catching NZ businesses off guard
“We have this incredible record of innovation in New Zealand. But our innovative businesses haven’t always been meticulous in shoring up their IP."
Why A/NZ organisations need to improve compliance protocols
Only a mere 4% of IT decision makers and data managers surveyed said their organisation faced no data management challenges. 
What the people say - Gartner’s November Customers’ Choices
A roundup of the latest Gartner Peer Insight Customers’ Choices from Backup and Recovery to Business Intelligence and Analytics, and more.
BlackBerry buys out cybersecurity AI firm Cylance
“We are eager to leverage BlackBerry’s mobility and security strengths to adapt our advanced AI technology to deliver a single platform.”
Data protection is key to building customer trust
"New data compliance rules offer an opportunity for businesses to re-evaluate their processes and improve data management and customer loyalty."
NZ Internet Task Force joins iSANZ Hall of Fame
NZITF chair Barry Brailey and former chairs Mike Seddon and Paul McKitrick received the award in Auckland last week.
Quantum computing: The double-edged sword for cybersecurity
Quantum computing is quickly moving from science fiction to reality.
Three ways to achieve data security whilst enabling BYOD
"A mobility strategy is now more important than ever before, that said, selecting the right one is often no small task."