New Threat Intelligence Report Reveals The Rise Of Emotet
Tuesday, 10 March 2020
The Mimecast Threat Center launched the Threat Intelligence Report: RSA Conference Edition, finding a 145% increase in attack campaigns across the globe from October to December. Researchers believe the increase can be attributed to Emotet’s renewed activity after four months of relative dormancy, coupled with cybercriminals’ higher rates of activity due to the holiday shopping season. From October
- Published in Blog
No Comments
Cybercriminals Escalate Impersonation Attacks During Tax Season
Tuesday, 21 January 2020
With the 2020 tax season underway, cybersecurity analysts are seeing an increase in the number of impersonation attacks focused on stealing personal information through voice phishing, texts, and email. According to the Daily Mirror and other news sites, taxpayers are at their most vulnerable during income tax self-assessments due to uncertainties over filing processes. Other
- Published in Blog
This Year, Resolve To Be Ready For Ransomware
Thursday, 16 January 2020
It’s a new year. Like many of you, on New Year’s Eve, I gathered with friends and family in the countdown to midnight and joined people in singing, “Should Auld acquaintance be forgot, and never brought to mind.” Well, if you want to forget about your old acquaintances, that’s your choice. But here’s something you
- Published in Blog
The Achilles Heel of Next-Gen Firewalls
Wednesday, 15 January 2020
Results of a global study of 3,100 IT managers in 12 countries. Network security is the bedrock of every organization’s cyber defenses, the foundation on which other protection services such as endpoint, server, mobile and encryption are layered. It’s the trusty work horse that plays a pivotal role in keeping organizations moving. To better understand
- Published in Blog
Does your network keep you up at night?
Tuesday, 14 January 2020
CIOs: Does your network keep you up at night? It should. What keeps CIOs up at night? According to CIO Magazine’s annual survey of CIO concerns, everything from security threats, to data protection, to the skills gap to digital transformation are top-of-mind. What’s not on their list? Their networks. The heart of the concerns they
- Published in Blog
4 Essential Requirements To Protect Against Brand Exploits
Tuesday, 07 January 2020
The increasingly digital global economy has created a “perfect storm” for cyber attackers. As our reliance on websites and email to interact with organizations has grown, so too has the opportunity for criminals who are increasingly preying on the trust we have in these organizations. Sophisticated attackers are hoodwinking their targets by posing as trusted
- Published in Blog
Struggling to enforce your application bans? Start by removing the Bart barrier
Wednesday, 11 December 2019
by Scott Tyson, Managing Director, EMEA, Auvik Networks The Simpsons has made some eerily accurate predictions over the years. And we’re willing to bet there are tons of employees who have that classic Bart Simpson reaction when they’re asked about gaming, streaming Netflix, or accessing other banned applications at work: “I didn’t do it, nobody saw
- Published in Blog
A smart way to manage smart devices at work
Monday, 25 November 2019
by Scott Tyson, Managing Director, EMEA, Auvik Networks From smart locks, lightbulbs, mirrors, and thermostats to connected contact lenses, activity trackers, and the list goes on—there seems to be a smart version of everything these days. And they’re not all for personal use. As we’re lining up to buy the latest, greatest IoT (Internet of
- Published in Blog, Networking, News
Pace Technology UK Limited Chooses PAV i.t. Services
Monday, 18 November 2019
Pace Technology UK Limited, a leading supplier and installer of vehicle communications systems selected PAV I.T. Services for their email security solution to protect against advanced email-borne threats. PAV provide organisations across the UK with security solutions to protect against data loss, cyber threats and better manage data risk. Contact us to see how we can help your organisation. Visit Pace Technology
Why data over-sharing is making you an easier phishing target
Friday, 15 November 2019
by Renatta Siewert, Content Manager at Mimecast. We live in a world where sharing too much data – or the wrong data – is like asking to be hacked. It’s bad online security practice, particularly as phishing is on the rise, growing to nearly 41% in 2018. But data sharing, whether it’s with social media companies or engaging in
- Published in Blog
Free Webinar: Protecting Your Network from Encrypted Threats
Thursday, 14 November 2019
Encryption of network traffic is rapidly approaching 100% creating an enormous blind spot in your network security that hackers and malware authors are already starting to exploit. And with most Firewall solutions unable to adequately handle this challenge, many organizations are left powerless to do anything about it -leaving them vulnerable to attack. In this
- Published in Events
Free Webinar: Three Lies You’ve Heard About Threat Hunting (And One Thing That’s True)
Friday, 08 November 2019
The term “Threat Hunting” doesn’t deserve to be placed on the security buzzword bingo board alongside terms like “artificial intelligence,” “real time,” and “next-gen,” to name a few. Unfortunately, its meaning has been co-opted and corrupted by marketers, making it difficult for those looking to add Threat Hunting capabilities to their security program to really
- Published in Events
- 1
- 2