Blog Tag: Multi-Scanning

Computer Security Day 2021: 10 Tips to Protect Your Employees’ Computers and Laptops from Security Threats

November 30, 2021
When addressing cyber security threats, insider threats have come to the forefront. Insider threats are one of the leading causes of breaches. However, insider...

How to Protect Against Software Supply Chain Attacks

October 04, 2018 by Taeil Goh
What protections do you have in place to ensure that your software builds are virus-free before releasing to the public? With software supply chain attacks on...

Fake Android Apps Containing Coinhive Miner Identified by Metadefender Cloud

January 10, 2018
Waqas Amir of HackRead reported on fake Android applications that infect devices with Monero-mining Coinhive earlier this week. Coinhive is a cryptocurrency...

How to Integrate Multiple Antivirus APIs

December 20, 2017 by Yiyi Miao
Protecting files, systems, and data against malware attacks requires ever more sophisticated anti-malware solutions as attacks increase in volume and...

How to Defend Against Malware Outbreaks with Secure File Transfer

October 05, 2017
Threats may be present in any file. This is a given, and cyber security defense strategies must take this into account. This is why secure file transfer...

Top 5 Ways to Keep Email Inboxes Secure

September 25, 2017 by Yiyi Miao
Over 7% of phishing emails successfully trick users into opening malicious links or attachments, per Verizon — and Proofpoint research shows that 25.5%...

For more information, please contact one of our critical infrastructure cybersecurity experts.