New Threat Intelligence Report Reveals The Rise Of Emotet
Tuesday, 10 March 2020
The Mimecast Threat Center launched the Threat Intelligence Report: RSA Conference Edition, finding a 145% increase in attack campaigns across the globe from October to December. Researchers believe the increase can be attributed to Emotet’s renewed activity after four months of relative dormancy, coupled with cybercriminals’ higher rates of activity due to the holiday shopping season. From October
- Published in Blog
No Comments
Effective Data Management in a Constantly Evolving Technology World
Monday, 09 March 2020
by Mark Jow, Commvault Technology constantly evolves — so data management should too The vast majority of businesses today acknowledge that their data is important, even critical to their operations. Despite this, however, many organisations fail to take adequate measures to safeguard this crucial asset. With data breaches caused by cyber-attacks on the rise, protecting
- Published in Blog
Cybercriminals Escalate Impersonation Attacks During Tax Season
Tuesday, 21 January 2020
With the 2020 tax season underway, cybersecurity analysts are seeing an increase in the number of impersonation attacks focused on stealing personal information through voice phishing, texts, and email. According to the Daily Mirror and other news sites, taxpayers are at their most vulnerable during income tax self-assessments due to uncertainties over filing processes. Other
- Published in Blog
This Year, Resolve To Be Ready For Ransomware
Thursday, 16 January 2020
It’s a new year. Like many of you, on New Year’s Eve, I gathered with friends and family in the countdown to midnight and joined people in singing, “Should Auld acquaintance be forgot, and never brought to mind.” Well, if you want to forget about your old acquaintances, that’s your choice. But here’s something you
- Published in Blog
The Achilles Heel of Next-Gen Firewalls
Wednesday, 15 January 2020
Results of a global study of 3,100 IT managers in 12 countries. Network security is the bedrock of every organization’s cyber defenses, the foundation on which other protection services such as endpoint, server, mobile and encryption are layered. It’s the trusty work horse that plays a pivotal role in keeping organizations moving. To better understand
- Published in Blog
Does your network keep you up at night?
Tuesday, 14 January 2020
CIOs: Does your network keep you up at night? It should. What keeps CIOs up at night? According to CIO Magazine’s annual survey of CIO concerns, everything from security threats, to data protection, to the skills gap to digital transformation are top-of-mind. What’s not on their list? Their networks. The heart of the concerns they
- Published in Blog
4 Essential Requirements To Protect Against Brand Exploits
Tuesday, 07 January 2020
The increasingly digital global economy has created a “perfect storm” for cyber attackers. As our reliance on websites and email to interact with organizations has grown, so too has the opportunity for criminals who are increasingly preying on the trust we have in these organizations. Sophisticated attackers are hoodwinking their targets by posing as trusted
- Published in Blog
Simple, Effective Authentication at Your Fingertips
Monday, 09 December 2019
The WatchGuard AuthPoint solution addresses a common security gap with multi-factor authentication (MFA) on an easy-to-use Cloud platform. With a simple push notification, the AuthPoint mobile app makes each login attempt visible, allowing the user to accept or block access right from their smartphone. Furthermore, AuthPoint is a Cloud service, so there’s no expensive hardware
- Published in Blog
A smart way to manage smart devices at work
Monday, 25 November 2019
by Scott Tyson, Managing Director, EMEA, Auvik Networks From smart locks, lightbulbs, mirrors, and thermostats to connected contact lenses, activity trackers, and the list goes on—there seems to be a smart version of everything these days. And they’re not all for personal use. As we’re lining up to buy the latest, greatest IoT (Internet of
- Published in Blog, Networking, News
Backup is a moving target – but you can get it in your sights
Friday, 22 November 2019
Data protection and governance requirements are something of a moving target for IT departments at the moment. Whether it’s trying to manage backups from multiple clouds, virtual machines, applications and databases, or endpoints or any combination of them, there’s a lot of moving parts to be considered. On top of that there’s the need to
- Published in Blog, IT Certainty
Pace Technology UK Limited Chooses PAV i.t. Services
Monday, 18 November 2019
Pace Technology UK Limited, a leading supplier and installer of vehicle communications systems selected PAV I.T. Services for their email security solution to protect against advanced email-borne threats. PAV provide organisations across the UK with security solutions to protect against data loss, cyber threats and better manage data risk. Contact us to see how we can help your organisation. Visit Pace Technology
Free Webinar: Protecting Your Network from Encrypted Threats
Thursday, 14 November 2019
Encryption of network traffic is rapidly approaching 100% creating an enormous blind spot in your network security that hackers and malware authors are already starting to exploit. And with most Firewall solutions unable to adequately handle this challenge, many organizations are left powerless to do anything about it -leaving them vulnerable to attack. In this
- Published in Events
- 1
- 2