It is time to get back to basics, and to really detail out your plan of attack. We invite you to read our ‘Back to Basics – How to Protect your Organizational Assets and Confidential Information. It is provided as a guideline only, however if you do have any questions, or would like some additional information please feel free to contact me directly. Getting_Back_to_Basics
Solution offers combined gateway, endpoint, and cloud Web protection
BOSTON, MA – May 13, 2013 – Sophos today announced the availability of Sophos UTM Connected, the latest version of its award-winning UTM (unified threat management solution). This release introduces expanded UTM managed endpoint protection with unique Web in Endpoint functionality, broader wireless coverage for large scale wireless deployments and higher performance networking.
As the complexities of securing all networks have grown, so have the struggles for businesses to fully optimize the many point security solutions they have purchased. A UTM is the proven solution to address this problem, however most simply put layers of protection on a single appliance. The introduction of Web in Endpoint functionality lets Sophos UTM go a stage further and make security layers communicate and combine to deliver more effective protection. This approach simplifies user experience and delivers a higher level of overall protection on which customers can rely.
ComputerWeekly News – by Warwick Ashford
Advanced cyber attacks hit businesses 20 times an hour on average, according to researchers at security firm FireEye.
This indicates just how pervasive advanced malware capable of evading traditional security defences has become, according to the firm’s latest advanced threat report.
Data gathered from 89 million malware events, along with direct intelligence uncovered by the research team, shows that many cyber attacks routinely bypass traditional defences such as firewalls, intrusion prevention systems, anti-virus and security gateways.
While enterprises experience a malware event up to once every three minutes on average, the report said the rate of malware activity varies acrossindustries, with technology companies experiencing the highest volume at up to one event a minute.
By Kevin Piddle
New focus is being paid to security concerns in Oracle’s widely used Java platform. Discoveries of new vulnerabilities, the proliferation of exploit kits and recent high-profile incidents, like the sophisticated zero-day attack against Facebook in February, have signalled a growing trend that isn’t slowing down.
In an effort to gain a deeper understanding of how widespread the current Java vulnerability landscape truly is, web security solutions provider Websense used its ThreatSeeker network to assess which versions of Java were actively being used across millions of customer endpoints.
Websense published the research findings at the end of March and in a recent interview with The Standard, Charles Renert, VP of research and development for Websense Labs, called the results “surprising”.
To read the full article – Striking majority of endpoints vulnerable to Java exploits
By Richard Wang and Anand Ajjan, SophosLabs
For the last two years users have increasingly been faced with messages like this and demands for money in exchange for access to their PCs. But these are not the actions of law enforcement, quite the opposite—it’s an example of ransomware. This paper looks in depth at ransomware variants and delivery mechanisms, and how you can protect your data with a complete security strategy.
Please Click here for Whitepaper