Featured

Contributor:
Katy Batley
April 21st, 2016

How do you like zen apples? A guide to using mindapples to boost your mood

I’ve mentioned previously in a blog that Avecto are currently supporting local mental health charities and trying to promote positive mental health around our offices. I wanted to explore the concept of the mindapple (mīnd-ăp-´əl) and how everyone can use them to improve your own mental health whether it’s to cope with a stressful day at work, bereavement, or even clinical depression – there’s a mindapple to help everyone.

Continue Reading

A coffee with Graham Cluley

Organizations, security professionals and vendors are in a constant battle to keep up with an evolving environment of advanced threats and malware strains. It seems as soon as we catch up with the cyber criminals, they shift up a gear. At the recent Gartner Security and Risk Management Summit in London, Avecto grabbed a coffee with the renowned security blogger and independent analyst, Graham Cluley, to take a pulse check of enterprise security.

Continue Reading


Prevention is possible

This blog is meant as a rallying cry for anyone who has a vested interest in their organization’s security. My aim is to spearhead a new era where all companies take a proactive approach to their security. No longer will historic methods of blocking and defense after the event be the only tenets of a security strategy.

Continue Reading


Fear and Loathing in Las Vegas – Advanced attacks and the InfoSec dream

During August members of the InfoSec community leave the comfort of their ergonomic desks and head out into the Nevada desert on a spiritual pilgrimage to Las Vegas. This mass movement is no coincidence, the draw is clear with Black Hat, DEF CON, BSides Vegas and the Star Trek Convention all occurring within a week. If you have an interest in offensive security, protecting data or ensuring your car cannot be remotely hijacked, Las Vegas is the place to be in August.

Continue Reading


Windows 10 whitelisting will not be for everyone

Windows 10′s security overhaul offers a lot but beware its complexities and limitations

With the arrival of Windows 10 in late July, businesses must once again pose many of the same questions that presented themselves at the time of the launch of Windows 8 in 2012, Windows 7 in 2009 and, for those with long enough memories, Windows XP in 2001.

Continue Reading


Don’t blame cyber attackers for data breaches, blame a lack of preparation

Cyber attackers are savvy, their methods are sophisticated, and we in the InfoSec community need to get over it.

At the Check Point Cyber Security Symposium in Sydney last week, Telstra CIO, Mike Burgess criticized those organizations that overly focus on attributing cyber attacks, or blaming ‘sophisticated’ attackers for their networks being compromised.

Continue Reading