This is a top technique used to pray on employee vulnerabilities, often in an attempt to trick them into revealing sensitive information.
What is phishing?
This type of skillset is consistently ranked as a top talent gap by technology leadership, which can lead to staff burnout and increased risk.
What is Cybersecurity Talent?
This Comcast Business service provides 24/7 threat monitoring and active cyber defense.
What is Managed Detection and Response (MDR)?
I am a small business owner, and I need help with my account or my service. Who do I call?
Who is Care?
This is the big bet security product for small businesses launching in Decemeber 2025.
What is SecurityEdge Preferred?
This technique was the most common method attackers used to attempt to gain initial access to systems according to the CB Threat Report.
What is drive-by compromise?
Employees of businesses of what size should be aware and vigilant about cybersecurity threats.
What are businesses of all sizes?
This acronym refers to a cloud-delivered framework combining networking and security.
What is SASE (Secure Access Service Edge)?
I am an Enterprise customer, and I’m getting a notification about my MDR service. Who do I contact?
Who is the Security Operations Center?
Which small business security solution provides the first level of cybersecurity protection?
What is SecurityEdge?
This type of attack uses massive amounts of internet traffic from multiple compromised computers to overwhelm and sometimes take down systems.
What is a DDoS attack?
This technology is both a powerful tool for defenders and an attack multiplier for cybercriminals.
What is artificial intelligence/AI?
True or False – SecurityEdge Preferred helps protect both inbound and outbound internet traffic.
What is TRUE?
I am a managed voice customer, and I need help with my service. Who do I call?
Who is the Network Operations Center?
Which small business security product allows you to block pings from specific geolocations?
What is SecurityEdge Preferred?
Attackers use this tactic to enter and control remote systems on a network, often pivoting through multiple systems and accounts to increase access.
What is Lateral Movement?
Artificial intelligence is enabling attackers to launch attacks with greater...
What is volume OR speed OR sophistication?
According to the 2025 Threat Report, Comcast Business detected how many cybersecurity events over a 12-month period?
What is 34.6 billion?
I am under a DDoS attack. Who do I call at Comcast Business?
Who is Customer Security Assurance?
What does the product UTM stand for?
What is Unified Threat Management?
This concept refers to attackers using legitimate system tools to avoid detection.
What is living off the land?
This Comcast executive is our highest security leader and penned the foreword to the 2025 CB Threat Report.
Who is Noopur Davis, EVP Chief Information Security and Product Privacy Officer, Comcast?
Name one way SD-WAN helps deliver better security for businesses.
What is integrated security OR end-to-end encryption OR network segmentation OR centralized management and policy enforcement OR high-availability OR secure cloud access?
The SMS notifications for this service are the only product-related notifications that bypass "Do Not Disturb" (the unsubscribe list).
What is DDoS?
Which enterprise-grade security product detects, monitors, and responds to cyberthreats?
What is Managed Detection and Response (MDR)?