Resources and Tools
History of Cybersecurity
Explore 100+ pages of cyber attacks and innovations from Commodore 64 to COVID-19. Explore the biggest breaches, threats and technologies that shaped our industry. See the origin of spyware, ransomware, viruses and worms as well as lessons learned from those early incidents. The more we learn about yesterday’s attacks, the better we can defend against tomorrow’s threats. Get insights from our top cybersecurity experts.
Cybersecurity Field Guides
Featuring easily searchable content, these field guides will become a constant reference and are filled with cybersecurity strategies and tactics. Start with Optiv Cybersecurity Field Guide #1: What to Do When Everything Changes. COVID-19 meant an accelerated digital transformation (change, change and more change). Our first guide will help you navigate cybersecurity complexities in a world where innovation never stops, and small and large threats flare up daily.
Phishing is #1
From phishing to ransomware and malicious domains, cyber attackers are capitalizing on COVID-19. Taking steps to protect your work-from-home (WFH) and enterprise environments is critical to minimize risk. Focusing on mobile device security, social activities, network monitoring and multifactor authentication (MFA) helps security teams react quickly. Here’s a technical checklist that breaks down the steps you can take within each of these areas to harden security and expedite response times.
Predictions and Advice
Where are things going and what should you do? Check out our webinar: "Is Cybersecurity Virus Resistant?" with our partner, Momentum Cyber, and refine your COVID signal-to-noise ratio. Or watch our video blog, "Protecting IoT if You Work from Home a Q&A," with Optiv's own Sean Tufts, take a look at Risk Landscape Changes During COVID-19 with Dustin Owens, get an introduction to Zero Trust, and more.