The new capabilities from Avast Software’s AVG managed Workplace update will allow for evaluation of password policies, patch management, and anti-virus software.
Called Sentinel, the cloud-based system uses artificial intelligence technology to block dangerous messages in real time, and includes domain fraud prevention and end user awareness functionality as well.
Fileless ransomware uses a clever bit of trickery to get around antivirus programs. Here’s how it works.
Cyber attacks are top of mind today, with recent news about high profile incidents involving the Democratic National Committee and Yahoo dominating the headlines. While such incidents certainly lead to much hand wringing, cyber attacks perpetrated on individuals, companies and countries can have significant fallout that outlasts the current news cycle. At best, cyber attacks […]
You work in the financial department of your company and you just got an email from a C-level executive. It tells you to pay an invoice of $78,000 before 1 p.m., and includes instructions for how to wire the money to your vendor’s bank. You send the money, as requested, and it quickly moves to […]
Cyber Security is hard to get a handle on. Ask even the most sophisticated experts. It’s constantly evolving and changing. Cyber criminals are coming up with new exploits as quickly as companies are able to patch them up. Cyber security is a constant battle between the “good guys” and the “bad guys.” In this case, […]
If you’ve been on the internet in the past few weeks you’ve heard about the large scale cyberattack on DNS provider Dyn. On October 21, major websites including Twitter, Amazon, Spotify, Reddit, PayPal, Airbnb, Wired, Pinterest, and more experienced outages. The common thread? Each of these sites used Dyn as their upstream DNS provider. A […]
Here are some hard truths. The Internet of Things is coming to business. You’re going to need to adopt it in some fashion if you want to survive. When you do, your network will be more susceptible to being hacked than ever. At last week’s Internet of Things Security Summit in Boston, professionals from all […]
“Dear Client”. That’s how the letter usually begins. The next few sentences are a little trickier; there is really no good way for someone to hear that their data has been stolen. Unfortunately, getting this letter is becoming an all too common occurrence in business. While a security breach might be one of the last […]
Hackers are waiting to pounce when companies bring their internet and phone infrastructure to the cloud. Cloud security is a daunting concern for small- and medium-sized businesses (SMBs) and their in-house security resources, which are already stretched. SMBs are especially vulnerable to hacks that compromise the confidentiality, accuracy and availability of their information assets. One […]