Reading Time: 4 minutes Increased dependency on computers and access to data makes an organization more vulnerable to cybersecurity threats. With the increase in cyber-criminals and cyber-attacks...
Reading Time: 3 minutes Rapid technological growth and increasing digitalization in all aspects of life around the world have increased the value of ensuring cyber-security at all levels. This is...
Reading Time: 3 minutes Disruptions are often unforeseen. This could be a catastrophic event like a hurricane, a fire, or an earthquake. Disruptions, however, can also come in other forms such as...
Reading Time: 4 minutes There should be no doubt in anyone’s mind that the coronavirus pandemic will reshape our education systems. It has already altered how students around the world learn an...
Reading Time: 4 minutes With the market expected to reach US$ 248.6 billion by 2023, the cybersecurity space is flourishing globally. In the past 13 years, the cybersecurity market has grown by m...
Reading Time: 3 minutes The same question is asked by many companies that provide IT support and want to make the switch from a managed services provider (MSP) to a managed security services prov...
https://blog.comodo.com/case-studies/how-an-msp-transitioned-to-an-mssp-by-partnering-with-comodo/
Reading Time: 3 minutes The proliferation of ransomware in recent times has made many companies sit up and assess their existing IT infrastructure, especially their IT security solutions. While m...
Reading Time: 2 minutes Cyber breaches are quite common in the medical industry. In 2019 alone, over 40 million patient records were breached, an almost 50% increase in cases from the previous ye...
Reading Time: 2 minutes Ransomware is a dilemma that we have been facing for quite some time now. However, in 2020, we have seen a significant rise in the total number and variety of ransomware a...
Reading Time: 2 minutes If you find the process of getting help with your computer to be frustrating, tedious or slow, you probably haven’t met the IT support team at MyPCFriends. This Orlando...
https://blog.comodo.com/case-studies/mypcfriends-partners-comodo-boost-client-security/
Reading Time: 2 minutes Since Comodo surpassed Symantec as the leader in SSL Certificates in February, Comodo’s market share has increased every month, while Symantec’s has decreased. Coincid...
https://blog.comodo.com/case-studies/why-companies-are-choosing-comodo-for-digital-certificates/
Reading Time: 2 minutes Who are znappz? Znappz is a software developer in the UK and Norway that specializes in games and apps for mobile devices. For example , they are currently featuring an iP...
https://blog.comodo.com/e-commerce/customer-success-story-znappz-wins-free-ssl/
Reading Time: 3 minutes Comodo, as a matter of company policy, supports education in the United States and provides our security products at reduced rates to meet their security needs. In recent ...
https://blog.comodo.com/comodo-news/educational-institutions-turn-comodo-security/
Reading Time: 3 minutes Boiling Springs Savings Bank: Financial Institution introduces SVT technology that authenticates web content to protect critical customer information in online banking tra...
Reading Time: 2 minutes Family Fund is the UK’s largest provider of grants to low-income families raising disabled or seriously ill children and young people. Our relationship with Comodo began...
https://blog.comodo.com/case-studies/case-study-uks-family-fund-fights-spam-comodo-antispam-gateway/
Reading Time: 4 minutes Business Challenge Many customers who are interested in buying a product off a new website feel unsure about the website’s authenticity. They worry that their informa...
https://blog.comodo.com/e-commerce/case-study-zamborg-com-needs-help-assuring-e-commerce/
Reading Time: 3 minutes Community banks and credit unions are taking a best practices approach to mutual authentication by opting for two factor solutions that offer the highest levels of securit...
https://blog.comodo.com/comodo-news/study-2-factor-authentication-like-money-in-the-bank/
Reading Time: 3 minutes Jean had a problem, she was managing over 200 endpoints and had no visual way to distinguish what devices were compliant, or even worse, had malware. To complicate matters...
https://blog.comodo.com/e-commerce/case-study-combating-zero-day-threats/
Reading Time: 2 minutes What do you do when your network is infected and nothing you do can get rid of the problem? Fetco™ Home Decor, a leading designer and wholesaler of photograph frames, ph...
https://blog.comodo.com/pc-security/case-study-fetco-home-decor-calls-comodo-for-help/
Reading Time: 3 minutes Comodo Deploys AntiSpam Gateway for Edward F. Bukaty, III Law firm to Provide Proactive Spam Filtering, Increased Productivity and Protection from Email Based Virus & Malw...
Reading Time: 2 minutes Online retailer, Hayneedle.com, has become an astonishing success with security-conscious shoppers since the brand was introduced in August, 2009. According to Hayneedle�...
https://blog.comodo.com/e-commerce/case-study-hayneedle-enjoys-meteoric-growth-with-comodo-ev-ssl/
Reading Time: 3 minutes Comodo and Trust Assurance Management solutions today has announced a new case study recently published on Merchant-Accounts.ca, an innovative Canadian merchant account se...