Featured

Behind-the-Scenes of the Ericom Lightboard Series
Peter Silva, Cybersecurity Product Marketing
Get a glance behind how we produce the Ericom Enlighten Lightboard Series with Peter Silva.
All episodes
-
Breaking the Phishing Chain: A Whiteboard Session on Effective Security Tactics
Peter Silva, Cybersecurity Product Marketing
Did you know that 88% of data breach incidents are caused by employee mistakes, according to a study by Stanford University? IBM Security puts the figure at a whopping 95%. Despite an organization’s diligent efforts, someone within your team – perhaps you! -- might trigger a breach with a click on a seemingly benign malicious link.
Tune in for Peter’s 6-minute video as he introduces practical protection that works even when standard anti-phishing solutions fail, and users click. He explains how this prevention-based solution eliminates organizations’ dependence on vulnerable users to avoid threats that are specifically designed to entrap them. See exactly how isolation protects against phishing and malicious links.
-
What is Virtual Meeting Isolation? A Visual Guide to Securing Collaboration
Peter Silva, Cybersecurity Product Marketing
Did you know that virtual meeting tools, like Zoom and Teams, are prime targets for cyberattacks? With over 80% of organizations facing security challenges in the virtual meeting space, Virtual Meeting Isolation or VMI emerges as a game-changer.
Videoconferencing platforms are a staple for businesses, schools, and government organizations. Cyberattacks can be incredibly hard to prevent, with the bad guys using incredibly savvy methods to trick users into doing 'the wrong thing', such as clicking a link that will download malware on these platforms. Attackers are now deploying a growing variety of social engineering tactics, to exploit organizational vulnerabilities associated with hybrid work, human error, and shadow IT.
Join Peter Silva, cybersecurity expert, in this 8-minute session as he whiteboards how VMI preserves meeting functionality, shields against cyber threats, and empowers organizations with controls to prevent inadvertent data loss and data exposure.
-
Proactive Cybersecurity: Whiteboard Session on Safeguarding Users with Isolation
Peter Silva, Cybersecurity Product Marketing
Did you know that the zero-day threats that account for over 60% of successful cyber attacks simply bypass traditional security measures? Join Peter in this concise 9-minute video as he unveils an innovative solution that can stop these zero-day threats.
Traditional Secure Web Gateway technology relies on detecting signatures of known threats but cannot stop zero-day threats, whose signatures are unknown. In this whiteboard session, Peter explores how your organization can eradicate all threats, even zero-days, with a proactive prevention-based security approach that renders websites in isolation in the cloud. Site content is seamlessly streamed to users’ browsers, where it appears and responds like the native site. But browser-based exploits like ransomware, phishing, or cross-site scripting remain isolated in the cloud, never reaching the endpoints they target.
Discover how to elevate your cybersecurity strategy with this insightful exploration of isolation-based prevention.
-
Isolation Case Study: A Teacher, Dropbox, and Ransomware
Peter Silva, Cybersecurity Product Marketing
Did you know that 60% of organizations struck by ransomware face repeat attacks? In this compelling case study, Peter Silvia, cybersecurity product marketing manager, covers the recent experience of one school that suffered two ransomware attacks in rapid succession and was forced to pay twice before uncovering the cause.
Join Peter’s whiteboard session as he narrates the intense saga of how the school discovered the source of attacks… but only after implementing remote browser isolation. Within the secure confines of the isolated cloud, armed with antivirus checks and content disarm and reconstruct capabilities, the true origins of the infections were revealed: A teacher retrieving files from Dropbox had become an unwitting vector for ransomware dissemination.
Gain insights into how isolation solutions altered the cybersecurity landscape, offering crucial knowledge for safeguarding file shares and thwarting the infiltration of malicious files into this K-12 organization.
-
What is WAI? Web Application Isolation Explained in 9 Minutes
Peter Silva, Cybersecurity Product Marketing
Surprisingly, 65% of cyber threats originate from web applications, making the need for Web Application Isolation crucial in today's digital landscape. So what is Web Application Isolation (WAI)?
Think of WAI as a digital fortress for your online world, where each application is its own guarded kingdom, impervious to external threats – because, in the digital realm, every app deserves its sovereign security. Join Peter Silva in this video as he dissects the fundamental concepts of WAI and delves into its practical applications, uncovering how it significantly enhances cybersecurity.
In the span of 9 minutes, our goal is to equip you with a comprehensive understanding of WAI, illuminating its distinctive features, real-world applications, and the foundational principles that establish it as a trustworthy security solution. Come with us on this exploration of innovation as we unravel the transformative potential of WAI, showcasing how it can redefine your approach to secure access.
-
RBI 101: An Illustrated Guide to Remote Browser Isolation
Peter Silva, Cybersecurity Product Marketing
Did you know that 70% of new domains on the web are malicious? Join Peter Silva as he covers the fundamentals of Remote Browser Isolation (RBI), an innovative cybersecurity solution that helps organizations protect themselves against web-borne threats.
In 7 minutes, Peter will guide you through the core concepts of RBI, showcasing how it can safeguard your organization. Discover how isolating sites launched from links in emails, IMs, social media posts, or anywhere can prevent malware infection, and how restricting possible phishing sites to "read-only" can stop credential theft.
-
Behind-the-Scenes of the Ericom Lightboard Series
Peter Silva, Cybersecurity Product Marketing
Get a glance behind how we produce the Ericom Enlighten Lightboard Series with Peter Silva.