{"id":12592,"date":"2024-12-16T22:16:03","date_gmt":"2024-12-16T22:16:03","guid":{"rendered":"https:\/\/www.abrahamsconsulting.com\/blog\/?p=12592"},"modified":"2024-12-16T22:16:03","modified_gmt":"2024-12-16T22:16:03","slug":"infostealers-are-a-major-risk-for-avd-w365","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/infostealers-are-a-major-risk-for-avd-w365\/","title":{"rendered":"Infostealers are a major risk for AVD &#038; W365"},"content":{"rendered":"<p>Infostealer malware is one of the biggest threats your business faces. This infographic illustrates how SentryBay&#8217;s technology effectively protects against top-tier infostealer malware. View the infographic and contact Abrahams Consulting LLC to explore how these security solutions can be tailored to your business needs.<\/p>\n<p><a href=\"https:\/\/stuf.in\/bfiaxb\" target=\"_blank\">View: Infostealers are a major risk for AVD &#038; W365<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Infostealer malware remains a significant threat to businesses, especially those using AVD and W365.<\/p>\n<p>Fortunately, they&#8217;re little match for SentryBay&#8217;s Armored Client which blocks 100% of the techniques used by the top 15 infostealers, including LokiBot and Agent Tesla.<\/p>\n<p>View this infographic to see how SentryBay enhances endpoint security and reach out to Abrahams Consulting LLC for further insights. @sentrybay<\/p>\n","protected":false},"author":2,"featured_media":12591,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1136],"tags":[],"class_list":["post-12592","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Infostealers are a major risk for AVD &amp; W365 - TechTonic Times<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/infostealers-are-a-major-risk-for-avd-w365\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Infostealers are a major risk for AVD &amp; W365 - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"Infostealer malware remains a significant threat to businesses, especially those using AVD and W365. Fortunately, they&#039;re little match for SentryBay&#039;s Armored Client which blocks 100% of the techniques used by the top 15 infostealers, including LokiBot and Agent Tesla. View this infographic to see how SentryBay enhances endpoint security and reach out to Abrahams Consulting LLC for further insights. @sentrybay\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/infostealers-are-a-major-risk-for-avd-w365\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-16T22:16:03+00:00\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/infostealers-are-a-major-risk-for-avd-w365\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/infostealers-are-a-major-risk-for-avd-w365\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"Infostealers are a major risk for AVD &#038; W365\",\"datePublished\":\"2024-12-16T22:16:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/infostealers-are-a-major-risk-for-avd-w365\/\"},\"wordCount\":62,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/infostealers-are-a-major-risk-for-avd-w365\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2024\/12\/IG_Infostealers_Are_Major_Risk_for_AVD_W365_thumb.jpg\",\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/infostealers-are-a-major-risk-for-avd-w365\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/infostealers-are-a-major-risk-for-avd-w365\/\",\"name\":\"Infostealers are a major risk for AVD & W365 - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/infostealers-are-a-major-risk-for-avd-w365\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/infostealers-are-a-major-risk-for-avd-w365\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2024\/12\/IG_Infostealers_Are_Major_Risk_for_AVD_W365_thumb.jpg\",\"datePublished\":\"2024-12-16T22:16:03+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/infostealers-are-a-major-risk-for-avd-w365\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/infostealers-are-a-major-risk-for-avd-w365\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/infostealers-are-a-major-risk-for-avd-w365\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2024\/12\/IG_Infostealers_Are_Major_Risk_for_AVD_W365_thumb.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2024\/12\/IG_Infostealers_Are_Major_Risk_for_AVD_W365_thumb.jpg\",\"width\":600,\"height\":337},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/infostealers-are-a-major-risk-for-avd-w365\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infostealers are a major risk for AVD &#038; W365\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Infostealers are a major risk for AVD & W365 - TechTonic Times","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/infostealers-are-a-major-risk-for-avd-w365\/","og_locale":"en_US","og_type":"article","og_title":"Infostealers are a major risk for AVD & W365 - TechTonic Times","og_description":"Infostealer malware remains a significant threat to businesses, especially those using AVD and W365. Fortunately, they're little match for SentryBay's Armored Client which blocks 100% of the techniques used by the top 15 infostealers, including LokiBot and Agent Tesla. View this infographic to see how SentryBay enhances endpoint security and reach out to Abrahams Consulting LLC for further insights. @sentrybay","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/infostealers-are-a-major-risk-for-avd-w365\/","og_site_name":"TechTonic Times","article_published_time":"2024-12-16T22:16:03+00:00","author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/infostealers-are-a-major-risk-for-avd-w365\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/infostealers-are-a-major-risk-for-avd-w365\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"Infostealers are a major risk for AVD &#038; W365","datePublished":"2024-12-16T22:16:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/infostealers-are-a-major-risk-for-avd-w365\/"},"wordCount":62,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/infostealers-are-a-major-risk-for-avd-w365\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2024\/12\/IG_Infostealers_Are_Major_Risk_for_AVD_W365_thumb.jpg","articleSection":["Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/infostealers-are-a-major-risk-for-avd-w365\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/infostealers-are-a-major-risk-for-avd-w365\/","name":"Infostealers are a major risk for AVD & W365 - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/infostealers-are-a-major-risk-for-avd-w365\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/infostealers-are-a-major-risk-for-avd-w365\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2024\/12\/IG_Infostealers_Are_Major_Risk_for_AVD_W365_thumb.jpg","datePublished":"2024-12-16T22:16:03+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/infostealers-are-a-major-risk-for-avd-w365\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/infostealers-are-a-major-risk-for-avd-w365\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/infostealers-are-a-major-risk-for-avd-w365\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2024\/12\/IG_Infostealers_Are_Major_Risk_for_AVD_W365_thumb.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2024\/12\/IG_Infostealers_Are_Major_Risk_for_AVD_W365_thumb.jpg","width":600,"height":337},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/infostealers-are-a-major-risk-for-avd-w365\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infostealers are a major risk for AVD &#038; W365"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/12592","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=12592"}],"version-history":[{"count":1,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/12592\/revisions"}],"predecessor-version":[{"id":12593,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/12592\/revisions\/12593"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/12591"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=12592"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=12592"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=12592"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}