Introduction¶ Device independent threats to workstations, mobiles, and tablets. Detection, analysis and prevention of phishing Preventing drive-by downloads Using multifactor authentication (MFA) Ransomware prevention, detection and removal Analysing trojans (in general)