Blog

Blog

Highlights from Release Day 2025.1

Fortra’s 2025.1 Release Day includes improvements to email security, managed file transfer, data classification, security awareness training, and more.
Blog

Major Launches Announced on Release Day 2024.2

About Fortra’s Release Day Each quarter, we at Fortra get to roll out the fruits of our labors for the past few months. We showcase new features, updates, and even products. This Release Day features several groundbreaking projects. We’ve broken into the XDR arena and are thrilled to introduce you to our new offering. We’ve issued major releases for over a half-dozen of our flagship products....
Blog

The Terrifying Truth About Ransomware

Headlines are screaming with ransomware attacks and the ever-increasing payout demands. In May, Colonial Pipeline fell under a substantial ransomware attack that shut down production along the East coast, affecting oil prices worldwide. Colonial Pipeline disclosed they paid out $4.4 Million in Bitcoin to restore files because they could not recover quickly enough otherwise.Ransomware’s Terrifying...
Blog

How Threat Scanning Amplifies Endpoint Protection

If you find yourself concerned about your organization’s current cybersecurity efforts, you’re not alone. According to Yahoo.com, nearly four out of five executives lack confidence in their current cybersecurity posture. In response, 91% of these companies are increasing their cybersecurity spending in 2021.If upping your IT budget is not one of your top priorities, it’s crucial to consider the...
Blog

The Evolution of Cybersecurity Solutions for Organizations

In the early days of the internet, cybersecurity was fairly straightforward, with all solutions and strategies geared toward prevention. While prevention remains critical, cybersecurity has also had to evolve, with businesses layering their defenses and regularly evaluating the status of their safeguards to adapt to change—whether those be organizational or within the wider cybersecurity sphere.
Blog

Top 3 Attack Vectors Ransomware Loves to Exploit

At the ripe old age of 30, ransomware could be considered antique in the malware world. This particular type of malicious software has been around since 1989, when the first version was created by the “Father of Ransomware”, Joseph L. Popp. Disseminated via mailed floppy disks, the program demanded a hefty ransom of $189 to free victims’ data.A lot has changed since then and ransomware has matured...
Blog

How to Get Started with NIST 800-171 Compliance

Are you ready to report your NIST 800-171 compliance status by the end of the year? If you do business with the federal government, you need to comply with SP NIST 800-171 by the end of the year. Now is the time to implement your compliance plan.