![Why Your Cyber Resilience Plan Doesn’t Include Windows 7](https://blog-en.webroot.com/wp-content/uploads/2020/05/20151352/Webroot-Blog_TR2_Windows_800x400-1.png)
![Tyler Moffitt](https://blog-en.webroot.com/wp-content/uploads/2019/03/22155946/Tyler-Moffitt_avatar_1522946622.jpg)
![Why Your Cyber Resilience Plan Doesn’t Include Windows 7](https://blog-en.webroot.com/wp-content/uploads/2020/05/20151352/Webroot-Blog_TR2_Windows_800x400-1.png)
![Poor Password Practices: The Curse of the Cybersecurity Risk Index Score](https://blog-en.webroot.com/wp-content/uploads/2020/04/28144704/Webroot-Riskiest-States-Blog-2-800x400-11.png)
Poor Password Practices: The Curse of the Cybersecurity Risk Index Score
Reading Time: ~ 4 min.![What’s Behind the Surge in Phishing Sites? Three Theories](https://blog-en.webroot.com/wp-content/uploads/2020/04/09133817/Webroot-Blog-800x400_TR_Phishing-01.png)
What’s Behind the Surge in Phishing Sites? Three Theories
Reading Time: ~ 3 min.![2020’s Most (and Least) Cyber-Secure States](https://blog-en.webroot.com/wp-content/uploads/2020/04/03134755/Webroot-Riskiest-States-Blog-1-800x400.png)
2020’s Most (and Least) Cyber-Secure States
Reading Time: ~ 3 min.![Staying Cyber Resilient During a Pandemic](https://blog-en.webroot.com/wp-content/uploads/2020/03/18174935/WEBROOTblog-animated-shield-shatter-800x400.gif)
Staying Cyber Resilient During a Pandemic
Reading Time: ~ 4 min.![A False Sense of Cybersecurity: The Riskiest States in America](https://blog-en.webroot.com/wp-content/uploads/2019/05/06104633/states_800x400.gif)
A False Sense of Cybersecurity: The Riskiest States in America
Reading Time: ~ 5 min.![Post Coinhive, What’s Next for Cryptojacking?](https://blog-en.webroot.com/wp-content/uploads/2019/03/blog-800x400-Coinhive-1.jpg)
Post Coinhive, What’s Next for Cryptojacking?
Reading Time: ~ 2 min.![Avoid Unsecure IoT: Smart Device Shopping Tips](https://blog-en.webroot.com/wp-content/uploads/2019/02/iot-devices-graphic-image1.jpg)
Avoid Unsecure IoT: Smart Device Shopping Tips
Reading Time: ~ 3 min.![Charity Scams to Watch Out for During the Holidays](https://blog-en.webroot.com/wp-content/uploads/2018/11/blog-image-holiday-charity-scams1.jpg)
Charity Scams to Watch Out for During the Holidays
Reading Time: ~ 5 min.![Unsecure RDP Connections are a Widespread Security Failure](https://blog-en.webroot.com/wp-content/uploads/2018/09/blog-image-hexagon-21.jpg)
Unsecure RDP Connections are a Widespread Security Failure
Reading Time: ~ 3 min.![Between Two Worlds: An Interview with Reverse Engineer Eric Klonowski](https://blog-en.webroot.com/wp-content/uploads/2018/08/19Q1-Blog-800x400-Eric-K-interview-v1.jpg)
Between Two Worlds: An Interview with Reverse Engineer Eric Klonowski
Reading Time: ~ 4 min.![Crime and Crypto: An Evolution in Cyber Threats](https://blog-en.webroot.com/wp-content/uploads/2018/08/Blog-Crime-and-Crypto-Feature-Image-1-800x400.jpg)