Carbonite Whitepapers


Sort by: Date | Company | Title


Why It’s Critical for Businesses to Implement a Cyber Resilience Framework
By Carbonite | 8/6/2022

Phishing attacks ramped up to historic levels at the onset of the COVID-19 pandemic. Now that it’s been two years since these highs, IDG checked in with 300 IT executives across North America, Europe and the Asia-Pacific region to learn their current levels of concern about phishing.

They found 93% of executives were still concerned about phishing, with 61% highly concerned. It’s no wonder – companies reported an average of 18 attacks each in the past 12 months.

And victims of phishing cited serious consequences:

• 37% suffered downtime lasting longer than a day

• 32% experienced lost productivity

• 19% had to pay legal or regulatory fines

Together, IDG and OpenText share successful strategies for defending against these kinds of attacks. Download the full report to read their insights and recommendations for protecting against phishing as well as other kinds of cyberattacks.

Download this now


7 Reasons Every Business Needs SaaS Backup
By Carbonite | 8/6/2022

7 Reasons Every Business Needs SaaS Backup

Download this now


From Buying to Build-out Guide for SAT
By Carbonite | 31/5/2022

Mastering Security Awareness Training from Buy-in to Build-out

Webroot Security Awareness Training was designed to be such a program, helping busy IT professionals improve user behavior with respect to email and all types of digital security and with compliance. Continuous training is proven to rapidly reduce click rates on phishing emails by 64% or more. But the benefits of Webroot® Security Awareness Training extend far beyond click-rates to help encourage a security-conscious cyber-aware culture.

For example, we’ve seen customers using our training encounter 20% less malware than those employing our business endpoint protection solution alone. In addition to powerful phishing simulations, our training provides a wide and growing range of courses that address topics including password hygiene, physical security and compliance issues. Together these features help to shape overall security behavior, making organizations safer from data loss and cybercrime.

Download this now