How an Attacker Bypasses Network, Software, and Physical Controls

Massive BYOD growth has created a wide range of new vulnerabilities for business networks. These…


What Is Your Business’ “Security Maturity?”

Protecting your business means reaching the “flying” stage with a fully mature security strategy.…


Cyber Criminals Are Taking Advantage of Coronavirus Fears

Criminals are taking advantage of COVID-19 fears to launch a new wave of cyberattacks. With an…


DoppelPaymer: Not Your Average Ransomware

DoppelPaymer represents a dangerous evolution of ransomware known as “extortionware.” DoppelPaymer…


Don’t Wait Until Ransomware Has Your Business Locked Down

Proactive endpoint protection can help prevent your business from getting locked out by……


Make it Make Sense: The Case for Moving Your ERP to the Cloud

The answer to avoiding a costly misstep is often a hosted ERP solution. According to the…


Sophisticated Attackers Targeting Petroleum Marketers

Cyber criminals are launching increasingly sophisticated attacks against fuel retailers. PDI does a…


Security Patching: How Fast is Fast Enough?

On average, how long does it take your organization to roll out a critical path to endpoints?…


Tales from the SOC: Surprise! You’ve Got Active Malware

The PDI SOC team operates 24/7/365, proactively monitoring for known and emerging cyber threats.…


How Much Security Is Enough?

Carefully evaluating your risk-to-cost tolerance can help protect your critical data and systems.…


3 Cybersecurity Functions That Should Not Be On “Autopilot”

Going on autopilot might make sense for some tasks, but not for all cybersecurity functions. While…


SMB Data Monitoring: Yes, It’s a Thing

With more data running through their networks, SMBs should take a proactive approach to monitoring…