by Scott Tyson, Managing Director, EMEA, Auvik Networks From smart locks, lightbulbs, mirrors, and thermostats to connected contact lenses, activity trackers, and the list goes on—there seems to be a smart version of everything these days. And they’re not all for personal use. As we’re lining up to buy the latest, greatest IoT (Internet of
Pace Technology UK Limited, a leading supplier and installer of vehicle communications systems selected PAV I.T. Services for their email security solution to protect against advanced email-borne threats. PAV provide organisations across the UK with security solutions to protect against data loss, cyber threats and better manage data risk. Contact us to see how we can help your organisation. Visit Pace Technology
Encryption of network traffic is rapidly approaching 100% creating an enormous blind spot in your network security that hackers and malware authors are already starting to exploit. And with most Firewall solutions unable to adequately handle this challenge, many organizations are left powerless to do anything about it -leaving them vulnerable to attack. In this
The term “Threat Hunting” doesn’t deserve to be placed on the security buzzword bingo board alongside terms like “artificial intelligence,” “real time,” and “next-gen,” to name a few. Unfortunately, its meaning has been co-opted and corrupted by marketers, making it difficult for those looking to add Threat Hunting capabilities to their security program to really
Ransomware is living its best life, making headlines week after week. Two in three organisations fell victim to a cyberattack in 2018 which proves traditional anti-malware is not enough. Join this session to learn how intelligent endpoint detection and response is helping you stay safe during National Cybersecurity Awareness Month. • The
by EMILY WOJCIK Director, Global Archiving Campaigns, Mimecast REDUCING COMPLIANCE NIGHTMARES, DATA LOSS HORROR STORIES AND OTHER TERRIFYING THREATS TO AVOID Developing a modern archiving strategy and maintaining compliance can be scary. No doubt, IT departments are increasingly plagued by data growth and service requirements back to internal customers while legal and compliance teams struggle with
by Sophos Naked Security Author Lisa Vaas Remember when Uber was hacked but paid the hackers $100,000 in hush money to delete the data and zip their lips about it? The two guys who did the hack, they’re going down. Brandon Charles Glover, 26, of Florida, and Vasile Mereacre, 23, of Toronto, each pleaded guilty on
Ransomware attacks are only increasing in complexity and are getting more efficient at exploiting network and system vulnerabilities, leaving organizations with a significant clean-up bill. Modern firewalls are highly effective at defending against these types of attack, but they need to be given the chance to do their job. In this whitepaper we will discuss
by Scott Tyson, Managing Director, EMEA, Auvik Networks Our use of the internet—and the sheer volume of data we send and receive over it—has grown in ways that many of us never imagined. Think back to the glory days of the good ol’ Commodore 64 in the mid 80s, when total global internet traffic reached