Heimdal
Latest Articles

Posts

Ransomware | Quick Read

Kolz Ransomware 101: The STOP Djvu Variant to Watch Out for

Kolz Ransomware is Part of the Infamous STOP Djvu Family. Find Out How to Prevent Encryption and Keep Your Devices Safe.

Cybersecurity Basics | Quick Read

Virus vs. Worm: What’s the Difference?

What is each and how you can protect your organization against them

Networking | Quick Read

Network Firewall Security Essentials for Businesses: What You Need to Know

Firewalls Have Been Around for Almost as Long as Personal Computers. Find Out How to Maximize Their Potential.

Institutions | Quick Read

Schools Are Moving to Remote Lessons: Cybersecurity Essentials for Schools [Updated]

Educational Institutions Are More Vulnerable to Cyberattacks Than Ever. Learn How to Keep Your Data Safe This School Year.

Financial protection | Quick Read

Is Coinbase Safe? A Modern Financial Lesson

Thinking about Investing in Cryptocurrency and Using Coinbase? Here’s All You Need to Know about Coinbase Security!

Data security | Quick Read

Cloud Migration 101: Strategy, Precautions, Risks, and Security

Pre- and Post-Migration Cybersecurity Concerns. Pros and Cons of Cloud Migration.

Ransomware | Quick Read

How to Protect Your Enterprise from Ako Ransomware: Essentials to Keep in Mind

Ako Ransomware Is Targeting Businesses. Find Out How to Prevent and Mitigate an Attack.

All things Heimdal | Quick Read

Heimdal™ Security Employee Spotlight: Caroline Stenstrup

Employee Story of the Month. How Caroline Stenstrup became a part of Heimdal™ Security’s journey.

Institutions | Quick Read

The Curious Case of the Baltimore Ransomware Attack: What You Need to Know

Hackers Are Targeting Governmental Agencies. Learn How to Stay One Step Ahead.

Ransomware | Quick Read

Epiq Ransomware - A Team Effort

Preventing a Cyber Attack is Not Enough. Sometimes You Need to Protect Your Company Against a Mix of Cyber Threats.

Data security | Quick Read

Your Blood Work Results May Contain Too Much Sensitive Information

GDPR and Blood Test Results. Are You Sure You Know How Authorities Are Handling Your Data?

Networking | Quick Read

Bot Attacks Are Increasingly Targeting Businesses. How to Stay Safe

Everything You Need to Know About Bot Attacks, The Cyber-Threat Hiding in Plain Sight

Cybersecurity Basics | Quick Read

Web Application Security - A Complete Guide

All You Need to Know about Web Application Security. Definition, Threats, Precautions and More!

Networking | Quick Read

Cloud Computing Threats: Beyond Vulnerabilities

Cloud Computing: Definition, Models, Vulnerabilities and More. Everything you need to know to enhance and protect your business!

Data security | Quick Read

Ensuring Data Security with Business Process Outsourcing Companies

Despite its popularity, many businesses worry about the risks of outsourcing their projects to a low-cost country. This includes data and cybersecurity concerns and how these companies handle it.

Networking | Quick Read

Why a Reliable Firewall Is Essential to Enterprise Security?

Heimdal™ Security’s Approach to Firewall Security

Security alerts | Quick Read

SECURITY ALERT: Zoom Under Scrutiny in Wake of UNC Patch Injection Issue Disclosure

Zoom Bug May Leak Network and Personal Data to Malicious Actors

Advanced malware researches | Quick Read

Traffic to Malicious Websites Spiking as more Employees Take Up Work from Home

Heimdal™ Security Internal Data Reveals Spike in Malicious Connections following Remote Work Exodus

Security alerts | Quick Read

SECURITY ALERT:  TDC Phishing Campaign Spreads like Wildfire through Legitimate Google Ads

TDC A/S Clients Targeted by Fake Sweepstakes, IP-driven Phishing Campaign

Remote Access | Quick Read

(UPDATED) Coronavirus Outbreak Compels More Companies to Endorse Remote Work Requests

Automated patching and Traffic Filtering-mediated Remote Work Security for Coronavirus-isolated Employees.

Endpoint security | Quick Read

Challenges in Software Security for IoT Devices (and How to Tackle Them)

How IoT Works and Its Main Vulnerabilties. How Challenges in Software Security for IoT Can Be Circumvented

Networking | Quick Read

How to Prevent a Botnet Attack from Compromising Your Business

The Effects of a Botnet Attack on Your Organization Explained. How a botnet attack affects your business and how you can protect against it.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats