<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=699131483885781&amp;ev=PageView&amp;noscript=1">
Back to Avast SMB Blog

Cybersecurity Monitor (Vol. 12): SMB Stats, Stories and News

The Monitor The Monitor , 17 January 2019

We scour the internet every week here at The Monitor, to stay up-to-date on IT security news. The result is a focused, curated collection of the latest cybersecurity news, stories and reports as it relates to businesses with anywhere from 2 to 2000 employees.

This collection aims to cut through the noise of cybersecurity stories, highlighting publications and reports about small and medium businesses.

In this week's edition, we focus in on a couple of phishing topics, highlight cybersecurity efforts in the agriculture industry, and reveal more information about botnets and how they use CNC servers to do their dirty work.

Keeping you informed and safe online, it's another edition of The Monitor!

Phishing warning: If you work in this one industry you're more likely to be a target
ZD Net | November 28, 2018

Hackers are launching cyber attacks against companies in the pharmaceutical sector more than any other, and campaigns against firms who make drugs have more than doubled in the last year...which represents a 149 percent jump in the number of fraudulent business email compromises and phishing attacks against the sector in the same period last year. Click for the full article

As agriculture gets more high-tech, is cybersecurity a concern?
Agdaily | December 14, 2018

Cowboys of another age watched out for rustlers, as ploughboys likewise kept dogs around to protect the hen house from weasels. But as the 21st century ends its second decade, agriculture has gone so high-tech that security is no longer a matter of lassos and blue tick hounds. Whether a small family farm, or a large-scale agricultural supplier, cybersecurity is a big part of business these days, and it pays to be informed.  Click for the full article

Security Think Tank: Smart botnets resist attempts to cut comms
Computer Weekly | December 14, 2018

As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including "sleepers" designed to be activated at a future date.  Click for the full article

Seven Phishing Scams in 2018 and How to Protect Yourself
The Street | December 2018

Identity fraud is running rampant as more consumers turn to digital technology to interact with one another, purchase products and services, and join social media groups, chat groups, and online clubs.  Unfortunately, in doing so, personal data is shared and stored in ways that make those users vulnerable to an onerous form of data theft - phishing.  Click for the full article

Want this delivered to your inbox?

Subscribe to The Monitor

Related articles

IT Security

5 ways IT service providers can boost security sales

Generating consistent, recurring revenue and finding new ways to continuously provide value to customers is something that many IT providers struggle with.

07 January 2020 16 min read

Security appliances – is "all in one" really all you need?

On premise and UTM security appliances often offer "all in one" protection. When in fact, most appliances sized for the mid-market fail to provide the essentials layers of security to adequately protect your clients. If you are using or planning to use an on-premise security appliance to keep your customers safe from cyberthreats, here are a...

05 September 2019 6 min read

The Hidden Costs of Network Security and UTM Appliances for SMBs

The interesting and attractive part of a network security appliance is that you can just plug it in to your network, get it configured, purchase a support contract with your hardware vendor, and then you're all set. When one takes a look with a focus on other costs, however, the flaws and blemishes become clear. Let's take a look at some of...

21 August 2019 8 min read