I know from my experience of deploying privilege management in global organizations that people think it’s going to be hard. Every organization is facing an endpoint security balancing act. On one hand employees, and their endpoints, need to be secure. But on the other hand, many employees require a free and flexible operating environment.
A widespread scam affecting Google Docs began to land in users’ inboxes on Wednesday in what has been described as a sophisticated phishing campaign.
The much anticipated 2017 Data Breach Investigations Report from Verizon was launched this week and once again it highlights some interesting and concerning security trends.
Avecto is listed as an official security provider in the Endpoint Protection Platforms category on the Gartner Peer Insights website. In case you aren't familiar with the site, it's a review portal for security leaders and their teams to get anonymous third party feedback on a vendor and their software solutions. We firmly believe this type of resource is a hugely valuable, open and honest way of assessing the security landscape. So this is our rallying call, for Avecto customers to tell the world what you think about our Defendpoint software.
On the 28th May 2017, a team from Avecto will be taking part in the Great Manchester Run to raise money for Stockport Mind. As an employee of Avecto and avid runner, this feels like a perfect partnership. I strongly believe that running makes me better at my job and can have a hugely positive impact on everybody's mental health.
The recent NCA report shows how easy it is for young people to slip down the path of cybercrime. The barrier to entry in the cyber crime market is at an all-time low with the tools needed to create new ransomware attacks available for free online. There are videos, tutorials, and blogs all detailing how to make money usually in the form of anonymous crypto currencies such as bitcoin.
I speak to many IT professionals who don’t have visibility over the endpoints and don’t really understand the day to day work behaviors of their staff. When asked to “secure the endpoint” by their management, there are many misconceptions about the effectiveness which naturally arise.
The Dridex banking Trojan, once one of the most active and prolific malware strains, went quiet back in the summer of 2016. The large-scale spam operations distributing it dried up and the few samples that still appeared showed no significant changes.
Another day, another data breach. This time, payday lender, Wonga has revealed it’s the latest victim in a long and seemingly endless line of companies to have had their customer data compromised.
Sandra Salame, Operations Manager at Crestan, talks about the benefits of a partnership with Avecto and discusses our successful Middle East roadshow featuring award-winning speaker and Microsoft MVP Sami Laiho.
One thing that troubles me when speaking to clients, from SMBs to truly global enterprises, is a number of times I see technology driving security strategies and not the business requirements.