![Why SMBs are Under Attack by Ransomware](https://blog-en.webroot.com/wp-content/uploads/2021/04/13133223/030921_Hacker-File-Podcast_Webroot_800x400.jpg)
![Steven Jurczak](https://blog-en.webroot.com/wp-content/uploads/2020/06/10205236/steven-jurczak.jpg)
![Why SMBs are Under Attack by Ransomware](https://blog-en.webroot.com/wp-content/uploads/2021/04/13133223/030921_Hacker-File-Podcast_Webroot_800x400.jpg)
![Who’s Hacking You?](https://blog-en.webroot.com/wp-content/uploads/2021/03/09120242/Webroot-blog-3-Hackers-800x400-1.jpg)
Who’s Hacking You?
Reading Time: ~ 2 min.![Employee Spotlight: The Human Faces Behind Artificial Intelligence](https://blog-en.webroot.com/wp-content/uploads/2021/01/20162343/1100520_Employee-Spotlight_Webroot_Jordan-Gray.jpg)
Employee Spotlight: The Human Faces Behind Artificial Intelligence
Reading Time: ~ 3 min.![Staying a Step Ahead of the Hack](https://blog-en.webroot.com/wp-content/uploads/2020/12/11143522/Webroot_Social-Engineering_Blog-Image_800x400-02.jpg)
Staying a Step Ahead of the Hack
Reading Time: ~ 3 min.![Employee Spotlight: From Building Code to Building Teams](https://blog-en.webroot.com/wp-content/uploads/2020/11/12122650/1100620_Employee-Spotlight_Webroot_Ben-Jackson_v1.jpg)
Employee Spotlight: From Building Code to Building Teams
Reading Time: ~ 3 min.![The Importance of Mobile Security for Safe Browsing](https://blog-en.webroot.com/wp-content/uploads/2020/11/02123720/Webroot-blog-800x400-mobile-security-safe-browsing.jpg)
The Importance of Mobile Security for Safe Browsing
Reading Time: ~ 3 min.![Hone Your Cybersecurity Superpowers with Tips from Wonder Woman](https://blog-en.webroot.com/wp-content/uploads/2020/10/23155132/WonderWoman-icon-800x400.jpg)
Hone Your Cybersecurity Superpowers with Tips from Wonder Woman
Reading Time: ~ 5 min.![Ransomware: The Bread and Butter of Cybercriminals](https://blog-en.webroot.com/wp-content/uploads/2020/09/03093447/blog-800x400-Evolution-of-ransomware.jpg)
Ransomware: The Bread and Butter of Cybercriminals
Reading Time: ~ 4 min.![WFH for the Long Haul? These Tips Will Help You Create a Cyber Resilient Home Network](https://blog-en.webroot.com/wp-content/uploads/2020/08/10174317/Webroot_WFH4LongHaul_Blog_800x400.jpg)
WFH for the Long Haul? These Tips Will Help You Create a Cyber Resilient Home Network
Reading Time: ~ 3 min.![Company Culture and Cyber Resilience by the Numbers](https://blog-en.webroot.com/wp-content/uploads/2020/07/29093312/Webroot_CyberResilientCulture_Blog_800x400.jpg)
Company Culture and Cyber Resilience by the Numbers
Reading Time: ~ 2 min.![Hack, Crash, Storm, Spill: Pick Your Poison](https://blog-en.webroot.com/wp-content/uploads/2020/07/29092149/Webroot-Blog-800x400_Hurricane.png)
Hack, Crash, Storm, Spill: Pick Your Poison
Reading Time: ~ 5 min.![Summer fitness: Let’s get digital](https://blog-en.webroot.com/wp-content/uploads/2020/07/16121717/Webroot_DigitalFitness_Blog-01.jpg)