PRODUCTS

Cyber Security Elements by NSS

Uncategorized

Sophos ranks #1 for endpoint protection by SE Labs

Sophos Intercept X Advanced was the top-ranked solution for both enterprise endpoint protection and small business endpoint protection in the new SE Labs endpoint protection test report (Apr-Jun 2018). Sophos received a 99% protection accuracy rating, 100% legitimate accuracy rating and 100% total accuracy rating. Each of these scores were the highest in the test.

Sophos ranks #1 for endpoint protection by SE Labs Read More »

Gartner names Sophos as a ‘Visionary’ in the first UEM Magic Quadrant

Sophos is proud to be positioned among the “Visionaries” in the 2018 Gartner Magic Quadrant for Unified Endpoint Management (UEM). Gartner states that: Unified endpoint management (UEM) tools combine the management of multiple endpoint types in a single console. UEM tools perform the following functions: Configure, manage and monitor iOS, Android, Windows 10 and macOS,

Gartner names Sophos as a ‘Visionary’ in the first UEM Magic Quadrant Read More »

The 5 W’s of Data Identification and Inventory

Eric Vanderburg, Vice President of Cybersecurity at TCDI, highlights the key questions to consider when identifying your organisation’s data, its importance and the level of protection required… I always figured that you would need to know what you have in order to protect it. However, I have seen far too many companies implement “best practices,”

The 5 W’s of Data Identification and Inventory Read More »

GlobalSign: How To Protect Your Start-Up From Ransomware

Cyber-attacks are making the lives of internet users very difficult. Ransomware in particular has been one of the most disruptive types of attack that hackers are using. Unfortunately, ransomware attacks are accelerating and intensifying with more victims each and everyday. Take the most recent example of WannaCry that took over the news at the end

GlobalSign: How To Protect Your Start-Up From Ransomware Read More »

CyberArk Labs: Breaking Down WannaCry Ransomware. What’s Different?

WannaCry malware continues to spread on a global basis and organizations are still at risk of being infected; Patching the Microsoft vulnerability can prevent infection via the SMB worm, but cannot prevent direct infection via phishing; CyberArk Labs tested prevention tactics on WannaCry over the weekend and found that the combination of enforcing least privilege

CyberArk Labs: Breaking Down WannaCry Ransomware. What’s Different? Read More »

GlobalSign: WannaCry Ransomware Sweeping the World. More Than 200,000 Computers Are Affected So Far

On Friday 12, May 2017, the internet got hit by a massive malware attack. This malware spread like wildfire around the world and more than 200,000 computers were affected over the weekend. This notorious malware is called WannaCry, a deadly “ransomware” which locks your computer and all the files become inaccessible and encrypted. Organizations and

GlobalSign: WannaCry Ransomware Sweeping the World. More Than 200,000 Computers Are Affected So Far Read More »

Wanna Decrypter 2.0 ransomware attack: what you need to know

It was a difficult Friday for many organizations, thanks to the fast-spreading Wanna Decrypter 2.0 ransomware that started its assault against hospitals across the UK before spilling across the globe. The attack appears to have exploited a Windows vulnerability Microsoft released a patch for in March. That flaw was in the Windows Server Message Block

Wanna Decrypter 2.0 ransomware attack: what you need to know Read More »

CyberArk. Insiders and the Privileged Pathway of Attacks

Corroborating the recent surge in headlines, a new industry study reveals that 56 percent of security professionals surveyed say insider threat incidents have become more frequent in the past 12 months. As we’ve covered in previous posts, insiders present a particularly challenging security conundrum. Those who gain access to privileged credentials can initiate seemingly legitimate

CyberArk. Insiders and the Privileged Pathway of Attacks Read More »