PRODUCTS

March 2022

Sophos. ZTNA strengthens security controls for remote workers

Remote access has been a component of the network since the days of acoustic, dial-up modems and the blazing fast speeds of 56 kbps. Well, perhaps not blazing fast. These modems eventually gave way to faster and more secure technologies, with virtual private networks (VPNs) hitting the market in the early 2000s. In today’s pandemic-dominated, […]

Sophos. ZTNA strengthens security controls for remote workers Read More »

Sophos Firewall OS v18.5 MR3 is Now Available

The product team is pleased to announce the latest maintenance release update for SFOS with important customer and partner requested features, as well as important security, performance, and reliability fixes. It is a critically important cybersecurity best-practise to keep your firewall updated with the latest firmware. SFOS v18.5 MR3 Highlight: DHCP Boot Option Configurations –

Sophos Firewall OS v18.5 MR3 is Now Available Read More »

Datto. Top 20 Most Common Hacker Behaviors

[vc_row][vc_column][vc_column_text]When the OWASP Top 20 Vulnerabilities was first published it revolutionized our industry’s approach to vulnerability management. Instead of playing wack-a-mole with thousands of individual vulnerabilities every time a new one was discovered, we approached vulnerability management by primarily addressing these Top 20 Techniques. Still considered “advanced”, behavioral detection has just begun to hit the

Datto. Top 20 Most Common Hacker Behaviors Read More »

Datto. Conti Ransomware – How it Works and 4 Ways to Protect Yourself

What is Conti Ransomware? Conti is a ransomware-as-a-service (RaaS) affiliate program, first appearing in early 2020. Associated with Russian-speaking cybercrime actors, Conti ransomware developers sell or lease their ransomware technology to affiliates, who then use that technology to carry out their attacks. The group behind Conti has published a website where they leak documents extracted

Datto. Conti Ransomware – How it Works and 4 Ways to Protect Yourself Read More »

Sophos. Optimizing Breach Prevention: Stop Them Before They Get In

In sports, there is a saying that if the opponent cannot score, they cannot win. A similar sentiment works for cybersecurity: If the attacker cannot penetrate your organization, they cannot compromise it. Taking that a step further, the most effective way to eliminate the possibility of a breach escalating into a business-threatening attack is to

Sophos. Optimizing Breach Prevention: Stop Them Before They Get In Read More »

Array. Top 5 Web Application Security Practices That Can Save You from Attacks in 2022

On May 7, 2021, the largest oil pipeline system in the US suffered a major cyber attack. A hacker group identified as DarkSide intruded into the colonial pipeline system and stole 100 gigabytes of data within a couple of hours. Following the data theft, attackers infected the pipeline’s IT network with ransomware. The consequences were

Array. Top 5 Web Application Security Practices That Can Save You from Attacks in 2022 Read More »

Sophos. Five Tips to Better Protect Yourself During the Current Russia-Ukraine Crisis

The current Russia-Ukraine crisis is unprecedented. One aspect of the current crisis is the very real concern around increased cyberattacks on an unprecedented scale. The concern is reasonable: there’s simply no way to know what’s going to happen next. And the concern stems not just from nation-state actors and their proxies: cybercriminals, hacktivists, and vandals

Sophos. Five Tips to Better Protect Yourself During the Current Russia-Ukraine Crisis Read More »