PRODUCTS

Cyber Security Elements by NSS

Uncategorized

Sophos. The importance of zero trust network access (ZTNA) in healthcare

With perimeter boundaries quickly blurring thanks to remote care and telehealth, the implicit trust placed in perimeter-centric security makes healthcare dangerously vulnerable. The Sophos State of Ransomware in Healthcare 2022 report revealed a 94% increase in ransomware attacks on healthcare year over year, with 66% of healthcare organizations getting hit by ransomware in 2021. Furthermore, […]

Sophos. The importance of zero trust network access (ZTNA) in healthcare Read More »

Sophos XGS Architect Training September 2022

[vc_row][vc_column width=”1/1″][vc_single_image media=”103038″ media_width_percent=”100″][vc_empty_space empty_h=”2″][vc_button button_color=”color-150912″ size=”btn-xl” border_animation=”btn-ripple-out” custom_typo=”yes” font_family=”font-762333″ font_weight=”900″ letter_spacing=”fontspace-210350″ border_width=”2″ display=”inline” link=”url:mailto%3Asales%40nss.gr%3Fsubject%3DSophos%20XGS%20Architect%20Training%26body%3DI%20would%20like%20to%20participate%20in%20the%20XGS%20Architect%20Training%20on%20the%2021st%20and%2022nd%20of%20September%202022||target:%20_blank|” icon=”fa fa-hand-o-right”]Book Your Training Today![/vc_button][vc_button button_color=”color-283957″ size=”btn-xl” border_animation=”btn-ripple-out” custom_typo=”yes” font_family=”font-377884″ font_weight=”900″ letter_spacing=”fontspace-210350″ border_width=”2″ display=”inline” link=”|||” icon=”fa fa-volume-control-phone”]Call us now for more +30 211 8000 330[/vc_button][vc_separator sep_color=”color-210407″][/vc_column][/vc_row][vc_row row_height_percent=”0″ back_color=”color-210407″ overlay_alpha=”50″ gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″][vc_column width=”1/1″][vc_custom_heading heading_semantic=”h1″ text_font=”font-377884″ text_size=”h1″ text_weight=”200″ text_color=”color-xsdn”]Sophos XGS

Sophos XGS Architect Training September 2022 Read More »

HelpSystems. Enterprise Data Security: Why It Matters and How To Build a Strategy

Before trying to better understand what enterprise data security is, it’s best to know the meaning of data security in a broader sense. In essence, data security is everything that surrounds the protection of digital data from destructive forces or unwanted actions of unauthorized users, such as from a cyberattack or data breach. Data security

HelpSystems. Enterprise Data Security: Why It Matters and How To Build a Strategy Read More »

Datto. Defending Against Data Loss: Choose the Reliable Solution

When a large-scale data loss recently occurred at a backup provider, it shined a new spotlight on data safety. Managed service providers (MSPs) that were directly affected, as well as those that weren’t, had to re-evaluate their approach to client data protection. When you place top priority on dependable backup, you position yourself to maintain

Datto. Defending Against Data Loss: Choose the Reliable Solution Read More »

BeyondTrust. One-Time Password (OTP) Solutions for Privileged Access

What are one-time passwords? A one-time password (OTP) is the password used in a credential pair that is valid for only one login session or transaction. OTPs are used to minimize the risks of traditional, static password-based authentication by making passwords variable per operation. As an added layer of security, OTP implementations can also incorporate

BeyondTrust. One-Time Password (OTP) Solutions for Privileged Access Read More »

HelpSystems. Customer Phishing Protection Couldn’t Be Easier with Agari and PhishLabs

It’s not news that cybercrime is a constant battle—large enterprises and small businesses everywhere are susceptible to a myriad of advanced email threats and socially engineered attacks, such as executive or brand impersonation. According to IC3’s Internet Crime Report, over $44 million in losses in 2021 were a direct result of malicious phishing and advanced

HelpSystems. Customer Phishing Protection Couldn’t Be Easier with Agari and PhishLabs Read More »

Core Security by HelpSystems. 4 Steps to Take Following a Pen Test

Congratulations! You’ve just completed a penetration test. So what now? A pen test shouldn’t represent the pinnacle of your security efforts. Rather, the test validates what your organization is doing right and highlights areas for improvement. Even if the test showed that it was possible to gain administrative access and move laterally through your network,

Core Security by HelpSystems. 4 Steps to Take Following a Pen Test Read More »

Introducing Sophos Cloud Native Security

Protect all your servers, from on-prem to multi-cloud, Windows to Linux, all fully integrated within Sophos Central. As customers transition server workloads from on-prem to cloud hosts, containers, or serverless environments, they need their environments to be tough, hard to compromise, and quick to recover. To achieve that, they need a single integrated security platform

Introducing Sophos Cloud Native Security Read More »

Sophos. What is zero trust and why is ZTNA so important?

Trust is a dangerous word in IT, especially when that trust is granted without much consideration: when it’s implied, or when it’s never questioned. Creating a sealed-off perimeter where everything and everyone within the network is fully trusted has proven to be a flawed design. Yet, that’s how many networks are still implemented today. Anyone

Sophos. What is zero trust and why is ZTNA so important? Read More »