by Scott Tyson, Managing Director, EMEA, Auvik Networks From smart locks, lightbulbs, mirrors, and thermostats to connected contact lenses, activity trackers, and the list goes on—there seems to be a smart version of everything these days. And they’re not all for personal use. As we’re lining up to buy the latest, greatest IoT (Internet of
Pace Technology UK Limited, a leading supplier and installer of vehicle communications systems selected PAV I.T. Services for their email security solution to protect against advanced email-borne threats. PAV provide organisations across the UK with security solutions to protect against data loss, cyber threats and better manage data risk. Contact us to see how we can help your organisation. Visit Pace Technology
Ransomware is living its best life, making headlines week after week. Two in three organisations fell victim to a cyberattack in 2018 which proves traditional anti-malware is not enough. Join this session to learn how intelligent endpoint detection and response is helping you stay safe during National Cybersecurity Awareness Month. • The
by EMILY WOJCIK Director, Global Archiving Campaigns, Mimecast REDUCING COMPLIANCE NIGHTMARES, DATA LOSS HORROR STORIES AND OTHER TERRIFYING THREATS TO AVOID Developing a modern archiving strategy and maintaining compliance can be scary. No doubt, IT departments are increasingly plagued by data growth and service requirements back to internal customers while legal and compliance teams struggle with
by Sophos Naked Security Author Lisa Vaas Remember when Uber was hacked but paid the hackers $100,000 in hush money to delete the data and zip their lips about it? The two guys who did the hack, they’re going down. Brandon Charles Glover, 26, of Florida, and Vasile Mereacre, 23, of Toronto, each pleaded guilty on
Ransomware attacks are only increasing in complexity and are getting more efficient at exploiting network and system vulnerabilities, leaving organizations with a significant clean-up bill. Modern firewalls are highly effective at defending against these types of attack, but they need to be given the chance to do their job. In this whitepaper we will discuss
by Scott Tyson, Managing Director, EMEA, Auvik Networks Our use of the internet—and the sheer volume of data we send and receive over it—has grown in ways that many of us never imagined. Think back to the glory days of the good ol’ Commodore 64 in the mid 80s, when total global internet traffic reached