<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1018517621595528&amp;ev=PageView&amp;noscript=1">

Resources

Tools, tips, and guides galore

Ransomware

survival-guide
ransomware_decryption_tool_finder_promo.jpg

Ransomware Decryption Tool Finder: Unlock Your Files without Paying Criminals a Cent

Hit with ransomware? Find out whether there are decryption tools available that can help you unlock your encrypted files for free. 
See the Tool
Surviving Ransomware: Lessons from IT Pros Who Didn't Pay

Surviving Ransomware: Lessons from IT Pros Who Didn't Pay

Get first-hand insights and ransomware prevention tips from IT pros who have grappled with it firsthand and did not pay the ransom.
See the Infographic
16800384582_b7528920b8_k-288891-edited_1.jpg

How to Recover from Ransomware: The First 5 Things You Should Do

What do you do when ransomware strikes? Here are 5 first aid tips to help you stop the attack, contain the infection, and get back to work.
Read More

Phishing

barkly-lure-phishing-guide-promo.gif
5 Ways to Keep Your Users Safe from Spear Phishing

5 Ways to Keep Your Users Safe from Spear Phishing

Here are five tips to share with your users to help them avoid spear phishing attacks and keep your IT environment as secure as possible.
Read More
105 Phishing Prevention Tips to Keep Your Users Off the Hook

105 Phishing Prevention Tips to Keep Your Users Off the Hook

Phishing, spear phishing, and whaling attacks are on the rise. We've gathered 105 phishing prevention tips to help you and your users avoid the worst.
Read More
An Example of Just How Good Phishing Attacks Have Become

An Example of Just How Good Phishing Attacks Have Become

Many of us may still think of phishing as easy-to-spot spam messages from Nigerian princes. Here is an example of what today's advanced phishing attacks actually look like.
Read More

Security Awareness

SecurityAwarenessTraining
3 Practical Cybersecurity Training Tips that Actually Inspire Action

3 Practical Cybersecurity Training Tips that Actually Inspire Action

Training employees on cybersecurity awareness is hard. That’s why we’ve collected no-nonsense tips from top security experts in our new eBook, The Realist's Guide to Cybersecurity Awareness.
Read More
5 Things We Need to Change to Fix Cybersecurity in 2016

5 Things We Need to Change to Fix Cybersecurity in 2016

It's a new year. Let's turn the page on five stubbornly persistent things we should all stop doing if we actually want to improve cybersecurity in 2016.
Read More
How to Change Security Behavior: a Roadmap

How to Change Security Behavior: a Roadmap

A roadmap to help you create lasting changes in security behavior at your organization.
Read More

Malware Research

clocking_ransomware.jpg
Malware Chat: How Will Ransomware Evolve Next

How Will Ransomware Evolve Next

The latest developments in ransomware — from the first full-fledged ransomware for OSX to the arrival of new virus-like ransomware and more.
Read More
The Rise of Fileless Malware

The Rise of Fileless Malware

The Barkly malware research team looks at the evolution of fileless malware — what it does, why it’s difficult to prevent, and the threat it poses.
Read More
New Dridex Malware Update Takes Advantage of Critical Gaps in Security

New Dridex Malware Update Takes Advantage of Critical Gaps in Security

In this week's new Malware Slack Chat, the Barkly malware research team examines the new Dridex banking trojan variant making waves since researchers announced its discovery.
Read More

Security Management

How to Pick the Right Security Tools for You (And Get the Most Out of Them)

How to Pick the Right Security Tools for You (And Get the Most Out of Them)

With no lack of tools to choose from, here are a few guidelines to help you evaluate and choose the right security solutions to safeguard your business.
Read More
5 Mistakes that Lead to Wasting Money on Security Software You Don't Need

5 Mistakes that Lead to Wasting Money on Security Software You Don't Need

Here are five common mistakes to avoid if you want to buy the right security software the first time around.
Read More
MSSP Matchmaker: 10 Criteria for Choosing the Right Managed Security Services Provider

MSSP Matchmaker: 10 Criteria for Choosing the Right Managed Security Services Provider

Getting into a relationship with a MSSP is serious business. Here are 10 key criteria for choosing the right managed security services provider for you.
Read More

Stats & Trends

ConfidenceReport-600x300.png
Top 10 Stats from the Verizon 2016 Data Breach Investigations Report

Top 10 Stats from the Verizon 2016 Data Breach Investigations Report

See the top 10 stats from the Verizon 2016 Data Breach Investigations Report, along with quick takeaways you can digest before breakfast.
Read More
Small Business Cybersecurity Stats (Infographic)

Small Business Cybersecurity Stats (Infographic)

Many SMBs still think they're too small to warrant much attention from cyber attackers, but the latest small business cybersecurity stats show they've become big targets.
Read More
Cyber Attacks Are Not Unique Snowflakes

Cyber Attacks Are Not Unique Snowflakes

By exploiting commonalities in cyber attacks and malware we can turn the tables on attackers and reframe cybersecurity as a winnable battle.
Read More

Downloadable Assets

The Realist's Guide to Cybersecurity Awareness

The Realist's Guide to Cybersecurity Awareness

Tips for engaging and empowering employees in the real world.
Get the Guide
Cybersecurity Made Simple: A Getting Started Guide

Cybersecurity Made Simple: A Getting Started Guide

This 48-page guide gives you a clear, step-by-step process to take control of your security.
Get the Guide
2016 Cybersecurity Playbook

2016 Cybersecurity Playbook

Kick off 2016 with quick wins and a new strategic approach for tackling today's toughest threats.
Get the Guide
ConfidenceReport-600x300.png

2016 Cybersecurity Confidence Report

Find out where you stand based on 350 IT pros' top cybersecurity priorities, needs, and concerns.
Get the Report
IT Pros Guide to Endpoint Protection: 5 min. summary

IT Pros Guide to Endpoint Protection: 5 min. summary

Malware is evolving fast. So is the technology companies are using to stop it. Here’s what you need to know to stay ahead.
Get the Highlights
Endpoint Security Buyer's Guide

Endpoint Security Buyer's Guide

Skip the jargon and get the information you need to make evaluating and buying endpoint security easy. 
Get the Guide
Ransomware Protection 101: A Healthcare IT Handbook

Ransomware Protection 101: A Healthcare IT Handbook

Learn how to prepare for the increasing likelihood of a ransomware attack and pick up actionable tips for avoiding infection in the first place.
Get the Handbook
barkly-lure-phishing-guide-promo.gif

Phishing Field Guide: How to Keep Your Users off the Hook

See what types of tricks phishers are using and teach your most at-risk employees how to avoid taking the bait.
Get the Field Guide
SecurityAwarenessTraining-BlogFeatureImage-1016.png

The Amazing Security Awareness Playbook

Most security awareness training is a waste of time. Ready to do (and see) things differently?
Get the Playbook
survival-guide

The Ransomware Survival Handbook

Learn how ransomware infects and spreads so you can recover quickly and prevent future attacks. 
Get the Survival Handbook
promos-17playbook-3.jpg

The Open Source Cybersecurity Playbook

A customizable IT security plan to protect your organization from cyber attacks and data theft, with practical tips from security tactician Pete Herzog.
Get the Playbook