Struggling to enforce your application bans? Start by removing the Bart barrier
Wednesday, 11 December 2019
by Scott Tyson, Managing Director, EMEA, Auvik Networks The Simpsons has made some eerily accurate predictions over the years. And we’re willing to bet there are tons of employees who have that classic Bart Simpson reaction when they’re asked about gaming, streaming Netflix, or accessing other banned applications at work: “I didn’t do it, nobody saw
- Published in Blog
No Comments
INTRODUCING MERAKI TRUSTED ACCESS
Monday, 09 December 2019
The Easiest Way to Grant Secure Access to Devices These days, as individuals carry multiple types of devices and expect to be connected at all times, the job of an IT admin becomes more complicated and stressful. Knowing what each end-user and device is trying to do on the network can be a burden. How
- Published in Blog
Simple, Effective Authentication at Your Fingertips
Monday, 09 December 2019
The WatchGuard AuthPoint solution addresses a common security gap with multi-factor authentication (MFA) on an easy-to-use Cloud platform. With a simple push notification, the AuthPoint mobile app makes each login attempt visible, allowing the user to accept or block access right from their smartphone. Furthermore, AuthPoint is a Cloud service, so there’s no expensive hardware
- Published in Blog
5 Steps to Develop Your Cloud Data Management Strategy
Tuesday, 03 December 2019
KEY INSIGHTS TO PREVENT COSTLY FAILURES IN YOUR CLOUD EXECUTION PLAN Developing or refining a cloud data management strategy is critical to a business that relies on the cloud for backup or disaster recovery. If you don’t have a cloud data management strategy, your business could be severely impacted. Here are five key elements to
- Published in Blog
A smart way to manage smart devices at work
Monday, 25 November 2019
by Scott Tyson, Managing Director, EMEA, Auvik Networks From smart locks, lightbulbs, mirrors, and thermostats to connected contact lenses, activity trackers, and the list goes on—there seems to be a smart version of everything these days. And they’re not all for personal use. As we’re lining up to buy the latest, greatest IoT (Internet of
- Published in Blog, Networking, News
Backup is a moving target – but you can get it in your sights
Friday, 22 November 2019
Data protection and governance requirements are something of a moving target for IT departments at the moment. Whether it’s trying to manage backups from multiple clouds, virtual machines, applications and databases, or endpoints or any combination of them, there’s a lot of moving parts to be considered. On top of that there’s the need to
- Published in Blog, IT Certainty
Pace Technology UK Limited Chooses PAV i.t. Services
Monday, 18 November 2019
Pace Technology UK Limited, a leading supplier and installer of vehicle communications systems selected PAV I.T. Services for their email security solution to protect against advanced email-borne threats. PAV provide organisations across the UK with security solutions to protect against data loss, cyber threats and better manage data risk. Contact us to see how we can help your organisation. Visit Pace Technology
Why data over-sharing is making you an easier phishing target
Friday, 15 November 2019
by Renatta Siewert, Content Manager at Mimecast. We live in a world where sharing too much data – or the wrong data – is like asking to be hacked. It’s bad online security practice, particularly as phishing is on the rise, growing to nearly 41% in 2018. But data sharing, whether it’s with social media companies or engaging in
- Published in Blog
Free Webinar: Protecting Your Network from Encrypted Threats
Thursday, 14 November 2019
Encryption of network traffic is rapidly approaching 100% creating an enormous blind spot in your network security that hackers and malware authors are already starting to exploit. And with most Firewall solutions unable to adequately handle this challenge, many organizations are left powerless to do anything about it -leaving them vulnerable to attack. In this
- Published in Events
Top 5 Reasons To Build Cyber Resilience Into Office 365 Email
Monday, 11 November 2019
by RENATTA SIEWERT Mimecast Content Manager Threat intelligence teams know that cyberattacks are most frequently conducted via email, and they know many simple attacks can be successful with the right blend of human error and obfuscated malware in compressed file formats. On top of this industry fact, Mimecast researchers uncovered data from October 17-23, showing
Free Webinar: Three Lies You’ve Heard About Threat Hunting (And One Thing That’s True)
Friday, 08 November 2019
The term “Threat Hunting” doesn’t deserve to be placed on the security buzzword bingo board alongside terms like “artificial intelligence,” “real time,” and “next-gen,” to name a few. Unfortunately, its meaning has been co-opted and corrupted by marketers, making it difficult for those looking to add Threat Hunting capabilities to their security program to really
- Published in Events
A Travel Advisory for Your Network
Friday, 08 November 2019
by Scott Tyson, Managing Director, EMEA, Auvik Networks Brazil, China, India, Russia, Vietnam, and the list goes on. While considered a vacation destination by many, they’re also among some of the world’s biggest cybercrime hotspots. So why is it that, before our holidays abroad, we’re inclined to check the latest travel advisories for any safety
- 1
- 2