Not found, error 404
The page you are looking for no longer exists. Perhaps you can return back to the site's homepage and see if you can find what you are looking for. Or, you can try finding it by using the search form below.
Pages:
- 2018-Endpoint Buyers Guide - Request
- Contact Us
- Contact Us
- Contacts Page Test
- Free Security Tools
- Have a question
- Home
- Portal
- Privacy Statement
- Product Pricing
- Profile
- Request Quote
- Request Quote for Astaro/Sophos
- Request Quote for Snare System
- Request Quote for Sophos
- Seceon - Open Threat Management
- Security Partners
- Security Solutions
- Alertlogic
- Bitdefender Business Solutions
- Data Erasure
- Endpoint Security Solutions
- Forensic Solution - Threat Hunting
- Hexis Cyber Solutions
- Kaspersky - Endpoint Solutions for Business
- LogPoint - SIEM
- LogRhythm
- NetShield
- Network Access Control
- NGFW - UTM - Perimeter Security
- NXLog - Log Management Solutions
- Request Information - Security Awareness
- Request More Information
- Security Awareness Training
- Security Information and Event Management Systems (SIEM)
- SolarWinds
- Kiwi Syslog Server
- SolarWinds Enterprise Operations Console (EOC)
- SolarWinds Log & Event Manager (LEM)
- SolarWinds NetFlow Traffic Analyzer (NTA)
- SolarWinds Network Configuration Manager
- SolarWinds Network Configuration Manager (NCM)
- SolarWinds Network Performance Monitor (NPM)
- SolarWinds Network Topology Mapper
- SolarWinds Server & Application Monitor (SAM)
- SolarWinds Virtualization Manager
- Sophos
- Sophos Cloud
- Sophos Complete Security Suite
- Sophos Encryption
- Sophos End Point Protection
- Sophos Enduser Protection
- Sophos Mobile Control
- Sophos Network Protection
- Sophos Next Generation EndUser Protection
- Sophos Server Protection
- Sophos Webinar Series
- Ultimate IT Security Package
- Sophos Complete Security
- Sophos Security Gateways/UTM
- Management Tools
- Request Quote for Sophos Firewall
- Sophos Access Points
- Sophos iView Reporting
- Sophos Mail Security
- Sophos Network Protection Quote Request
- Sophos Network Security
- Sophos Red (Remote Ethernet Device)
- Sophos Security Gateway Appliances
- Sophos Security Subscriptions
- Sophos Smart Installer
- Sophos UTM Endpoint Protection
- Sophos UTM Software Appliances
- Sophos UTM VM Appliance
- Sophos VPN Clients
- Sophos Web Application
- Sophos Web Security
- Sophos Wireless Subscription
- Unified threat
- Thank You
- User Education - Phishing
- Services
- test
- Thank you
- Upcoming Events
- White Papers
- Client Login
- Client Profile Page
Categories:
- Advanced Persistent Threat
- antivirus
- Bitdefender
- Blog
- byod
- Cloud
- compliance
- CyberThreats
- endpoint
- HealthCare
- Hexis
- industry
- Infocyte
- IoT
- Kaspersky
- KnowBe4
- Log Management
- LogRhythm
- Malware
- NetClarity
- Network Access Control
- Network Monitoring
- PCI
- Phishing
- Products
- profile
- Ransomware
- Security Awareness
- Security News
- Snare
- Snare Agents
- Snoopwall
- SolarWinds
- Sophos
- Uncategorized
- Unified Threat Management
Authors:
- admin (297)
- Cathy Burnham (7)
Monthly:
- November 2018
- October 2018
- September 2018
- August 2018
- June 2018
- May 2018
- April 2018
- March 2018
- February 2018
- January 2018
- December 2017
- November 2017
- September 2017
- August 2017
- June 2017
- April 2017
- March 2017
- February 2017
- January 2017
- December 2016
- November 2016
- October 2016
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- August 2012
Recent Posts:
- How to Protect Your Data While Using Public Wi-Fi
- Phishing Attacks - A Concern for Healthcare
- How to Implement a Security Awareness Program at Your Organization
- The Importance of Ransomware Protection
- Voice Phishing Scams are Getting More Clever
- Three Reasons to Hire a Cyber Security Consultant
- Tips for Choosing Strong Passwords
- Five Ways to Detect a Cyber Threat
- Three Questions to Ask When Hiring a Cyber Security Consultant
- Beware of Phishing
- Ransomware – fail to prepare, prepare to fail
- New Sleeper Strain of SamSam Ransomware Bypasses AV And Stays Hidden On Your Network
- Younger employees ‘main culprits’ for security breaches
- Almost all business report being hit with an email-borne attack, survey
- Optimizing the Security Awareness of your End-Users
- Banking Trojans replaced Ransomware as top email-based payload in Q1
- Cybercriminals are after your servers too
- A New Age of Malware - Cryptocurrency Mining
- Sophos #1 in Exploit Protection
- According to ISACA - Cyber Threats Up but no increase in Ransomware
- The Anatomy of a Hack
- KnowBe4 Adds ThinkHR Training Modules
- Phishing Attack Bypasses Two-Factor Authentication
- Ransomware Attacks Double for Second Year in a Row
- Almost One Quarter Of Canadians Have Clicked On A Phishing Link
- Organizations Are Failing To Learn From Phishing And Ransomware Attacks
- The four myths hampering cybersecurity maturity
- KnowBe4 Attains SOC 2 Type I Compliance For The Hosted Phishing And Training Product Offerings
- Cyber security awareness top priority in financial sector
- The two most important ways to defend against security threats
- Over 12,000 Business Websites Leveraged for Cybercrime
- Sophos Named Leader (again) in Gartner Magic Quadrant for Endpoint Protection
- Digital Extortion to Expand Beyond Ransomware
- AI - Could Be the Next Hole in your Security Posture
- Over a Quarter of Ransomware now targets Corporates
- IBM Discovers Cybercrime Ring Targeting Canadian Businesses
- Many businesses continue to leave their doors wide open to unsophisticated attackers, research shows
- Uber Total Loss: 57 Million Records Stolen But Data Breach Was Hidden For A Year
- KnowBe4 Releases Email Exposure Check Pro
- SyncCrypt ransomware able to sneak past most antivirus defenses
- Two Dangerous Ransomware Are Back – Protect Your Computers
- Don’t be Held Hostage by Ransomware - CFO Magazine
- SnoopWall Named one of the 10 Fastest Growing Security Companies for 2017
- Chinese ‘Fireball’ Malware Infects 20% of Global Corporate Networks
- Infocyte Uncovering a Major Hidden Risk of GDPR Legislation
- SMEs Still Too Complacent About Cyber Attack
- Today’s Phishing Attacks
- 10 Cyber Security Threats to keep you awake at night
- Cerber Ransomware Now Evades Machine Learning
- Scam of the Week: The Evil Airline Phishing Attack
- Phishing Your Employees for Schooling & Security
- Threats Evolve - Your Security Should Too
- To find the best endpoint security tools, focus on these features
- Anti-malware is imperfect but still necessary. Here’s why
- Threats Converge: IoT Meets Ransomware
- ‘Insider Sabotage’ among Top 3 Threats CISOs Can’t yet Handle
- Ransomware Is A Repeat Offender: How To Protect Your Business
- Report: 2016 saw 8.5 million mobile malware attacks, ransomware and IoT threats on the rise
- Kaspersky: Banking malware attacks up 30.6% in 2016; finance sector phishing also more prevalent
- Stolen Health Record Databases Sell For $500,000 In The Deep Web
- Canada will soon force companies to disclose hacking attempts, data breaches
- SnoopWall NetSHIELD Nano Wins Best Network Access Control (NAC) in the Cybersecurity Excellence Awards
- ‘Shock And Awe’ Ransomware Attacks Multiply
- Canadians’ Internet Data Affected As Trump Cancels Privacy Rules
- Michigan Cybersecurity Breach Could Impact 22K Patients
- Daniel Reardon on Cybersecurity and Health Care Industry
- 12 Endpoint Solutions for Corporate Networks under Windows 10 Put to the Test
- Protecting the endpoint – Advice from Pros Not the vendors
- Overcoming the Cyber Analysis Gap
- Sophos again in the Gartner Magic Quadrant as a Leader
- BitDefender Perspectives - Outsider Attacks Give Nightmares To CIOs, CEOs, CISOs
- New Year’s Cyber Security Resolution
- Security Training 101: Stop Blaming The User
- 4 Reasons Why You Should Take Ransomware Seriously
- Major Cyberattacks on Healthcare Grew 63% in 2016
- Anti-Malware Is Necessary In The Data Center: 3 Examples
- The big cybersecurity trends that will likely continue through 2017
- The Top 8 Things to Analyze in Your Network to Detect a Compromised System
- Malware Most Common Smart Hospital Data Security Threat
- ‘Frighteningly Easy’ Hack Guesses Full Credit Card Details In 6 Seconds
- Avoid Major Data Breaches with Effective Threat Lifecycle Management
- Introducing LogRhythm 7.2
- Avalanche (crimeware-as-a-service infrastructure)
- 2017 Security Predictions
- Cerber Ransomware Delivered via Google, Tor2web
- Windows Malware Infections spiked 106% from Black Friday to Cyber Monday
- Mirai strikes again, leaving 1 million users offline
- Carleton University Latest Victim of Ransomware
- Gartner acknowledges Sophos’s continued data protection leadership
- LogRhythm taps machine learning and analytics for its SOC
- Scriptless Zero-Day Exploit Bypasses Linux Security Features
- What is next-gen endpoint protection, anyway?
- Cybersecurity 101: The criticality of event logs
- Ransomware Surveys Fill in Scope, Scale of Extortion Epidemic
- The Next Generation of Ransomware Might Leak you Data, Not Destroy It
- NIST Releases Version of Cybersecurity Framework for Small Businesses
- LogRhythm boosts automation, processing in security platform
- Sophos Finalist for Best UTM Solution
- LogRhythm Finalist in three categories - SC Awards 2017
- The Definitive Guide to Security Intelligence and Analytics