The recent, unprecedented attack on peace and stability in Ukraine has captured the whole world’s attention. Comodo has had longstanding operations in Ukraine. To our staff and families- you are our co-workers, partners, and family. We will support you in any way we can. At the same time, we continue to take steps to offer our customers the only Active Breach Prevention platform on the market.
We are actively monitoring the global threat landscape to identify bad actors attempting to exploit the current conflict, and who want to instigate further cyber disruptions. Some are lone threat actors stirring up the maelstrom; others are governments and sophisticated criminal organizations engaged in attacks on Chernobyl, banks, and infrastructural systems. Many of these threats will radiate around the globe; the impact and threat to all businesses is real. Protecting your organization from these threats is a high priority. Comodo is highly resilient and is actively mobilized to protect its Ukrainian assets and community, the Eastern European region at large, and the ever more dangerous threat landscape globally. Do consider the following immediate action items offered here to help you protect your organization:
Prioritize employee cyber training regarding phishing and scam site lures
Conduct daily, business-wide application patching
Rollout multifactor authentication
Consider implementing blocking rules for sanctioned IPs known to originate from Russia
Learn more about worldwide threat actors and source/destination attacks in the conflict region and around the world
During these times where Russian aggression comes with threats of launching unprecedented cyberattacks into an already dangerous environment, we at Comodo try to walk the fine line trying to help without sounding like opportunists. The fact is, we stop what others miss.
Not an Existing Customer? Need immediate support? – See how Comodo provides 100% breach protection for your business or organization with Comodo’s unified endpoint security solution: integrated Advanced Endpoint Protection (AEP), Endpoint Detection and Response (EDR), and Endpoint Management (EM) + Managed Detection & Response (MDR) for full-stack threat defense.
Reading Time: 3 minutes
What Is Phishing?
Phishing is a method employed by cybercriminals to...
Reading Time: 5 minutes
One of the priorities of the Comodo One (C1) project is to put an end to...
How An Austin-based MSSP is Making Enterprise-Level Security Affordable for the MSP Community through Comodo
Reading Time: 4 minutes
Today, organizations are constantly at risk from cyber-attacks. This is a...