Our thoughts, industry views and technology trends

Featured

Contributor:
Andrew Avanessian
June 24th, 2016

Does a younger board make for a more secure organization?

A recent survey conducted by the Financial Times (FT) revealed that just four FTSE 100 companies had board members under the age of 40. Though perhaps this is unsurprising when we think about a traditional corporate hierarchy, the implications of an older board that does not have the digital threat landscape at the top of their agenda could result in a security headache.

 

Continue Reading

Taking COMmand of your Privileges

Least privilege was first put forward as a design principle by Jerry Saltzer and Mike Schroeder 40 years ago [1]. Avecto, along with many others, has championed least privilege and our 5 reasons to love least privilege shows that it is key to mitigating attacks.

Continue Reading


A hacker’s guide to Ransomware: How to successfully lose your data

To be clear, a ransomware developer’s goal is not to destroy your data. The main driver is money, and they care about lining their own wallets (usually bitcoin wallets but this does not make a big difference to you,) which means that destroying your data isn’t really the goal they are trying to achieve.

Continue Reading


How do you like zen apples? A guide to using mindapples to boost your mood

I’ve mentioned previously in a blog that Avecto are currently supporting local mental health charities and trying to promote positive mental health around our offices. I wanted to explore the concept of the mindapple (mīnd-ăp-´əl) and how everyone can use them to improve your own mental health whether it’s to cope with a stressful day at work, bereavement, or even clinical depression – there’s a mindapple to help everyone.

Continue Reading


Go Go PowerWare Rangers

In the tech world recently there have been discussions regarding a new type of ransomware, which has been dubbed “PowerWare”. It has been named this way due to the fact that instead of using an exploit to download malicious software to run on the users’ machine and encrypt their files, exploits are instead used to invoke PowerShell to do the damage.

Continue Reading


You only hear what you want to

If you were listening to popular music in the mid-90s, you doubtless remember “Stay” by Lisa Loeb. I don’t know if the person who told her that she “only hears what she wants to” was a cognitive psychologist, but there was certainly truth in that remark – not just for Lisa, but for all of us.

Continue Reading