VAR White Papers

  1. The Radicati Group Endpoint Security - Market Quadrant 2019 Report
    11/11/2019

    An Analysis of the Market for Endpoint Security Revealing Top Players, Trail Blazers,Specialists and Mature Players.

  2. Protect Yourself: 8 Security Best Practices For Retailers
    10/21/2019

    The retail industry is a favorite target of cyber attackers. Hackers know a successful attack on a retailer can give them access to the data of thousands or even millions of payment cardholders. Cyber criminals can sell that data for a tidy profit to other criminals on the dark web who use it for fraud, identity theft, and phishing attacks. Cyber crime is big business; it’s projected to cause damages of $6 trillion by 2021 on organizations of all types and sizes.

  3. 2019 Webroot Threat Report - Mid-Year Update
    10/1/2019

    The act of prediction, itself, is the application of probability to determine what might happen. For example, if a person takes an action once, you might expect them to do it again. However, if that action caused a poor or negative result, you’d most likely expect the person not to do it again. Now, let’s make it more complex. Say that the person has taken the action in some situations, but not in others. By analyzing the details of each situation, determining the differences and factors in each one, you could begin to predict the likelihood of the person’s actions in a given context. Thus, to make a reasonable prediction for the future, you must have clear insight into past events, complete with context.

  4. Hook, Line, and Sinker: Why Phishing Attacks Work
    9/18/2019

    When we talk about phishing, it might conjure up memories of scam emails from foreign princes, chock-full of terrible typos, grammar mistakes, and other easy-to-spot signs that the message might not be legitimate. If you’re thinking in those terms, it might shock you to find out how many people actually fall for such attacks.

  5. 3 Tips To Selling DNS For MSPs
    9/18/2019

    Threats are everywhere, and endpoint security simply isn’t enough to keep your clients safe. Pairing domain name system (DNS) protection with endpoint security is a proactive way to prevent costly network attacks. Most clients, however, don’t understand the need for this added layer of security.

  6. Size Does Matter: Small Businesses And Cybersecurity
    9/18/2019

    Small businesses are part of the UK’s economic lifeblood. SMBs account for at least 99.5% of businesses in every main industry sector and we need to support and protect them in this challenging climate. Technology is key to helping small businesses grow, reach new customers and thrive. But digital technologies can present challenges and difficulties for any business, the top one is cybersecurity issues.

  7. Retail Cash Loss: Addressing The Problem With Intelligent Technology
    9/6/2019

    Any business that accepts cash for transactions has come to expect that some percentage of it will vanish as a result of fraud, administrative errors and employee misdeeds. Inventory shrink, which includes cash loss, costs retailers an estimated $47 billion annually. It is so prevalent that retailers have a line item for it in their P&L statement.

  8. Security Services Fueling Growth For MSPs
    7/17/2019

    As the threat landscape continues to grow, regulatory requirements multiply, and CEOs and executive boards become more aware of the business impact of security incidents, most organizations are feeling an urgency to strengthen their cybersecurity efforts. This increased awareness is especially visible in small and midsized businesses (SMBs) that have traditionally underestimated the impact of cybersecurity threats to their organizations. Even so, SMBs are still failing to fully recognize and appreciate the risks, threats and vulnerabilities that are targeting their organizations. 

  9. 2019 Webroot Threat Report
    7/17/2019

    Agile isn’t just a watchword for software development. It has also found its way into the world of cybercrime. In 2018, we saw numerous instances of agility and innovation as bad actors evolved their approaches, combined attack vectors, and incorporated more artificial intelligence to wreak havoc. While traditional attack approaches are still going strong, new threats emerge every day, and new vectors are being tried and tested.

  10. The Ultimate Guide To The World's Best MSPs
    7/17/2019

    You can’t read three sentences about the channel nowadays without encountering “fast-changing,” “rapid evolution” or some other such term referring to the whirlwind pace of change happening in the sector. As oft-used as these phrases are, they aren’t over-used. The indirect IT sales channel is, in fact, growing, changing and evolving at a rapid clip, and there’s no point in sight when it might slow down.