Major events shook the global threat landscape in the first half of 2017. Our midyear security roundup covers the old and the new, from ransomware and BEC scams to potential attacks against industrial robots.
No business or user is too big or too small for ransomware. As the threat continues to evolve, organizations and end users must be equally proactive. Here are some best practices for mitigating ransomware.