May 13th, 2017
On Friday, a cyber attack on an unprecedented scale struck a wide range of organizations in over 99 countries across the globe. The ransomware attack, known as WannaCry or WannaCrypt0r shut down IT systems in NHS hospitals and GP surgeries in the UK as well as many large global organizations including Telefonica, FedEx and Renault.
- April 28th, 2017
The much anticipated 2017 Data Breach Investigations Report from Verizon was launched this week and once again it highlights some interesting and concerning security trends.
- April 27th, 2017
Avecto is listed as an official security provider in the Endpoint Protection Platforms category on the Gartner Peer Insights website. In case you aren’t familiar with the site, it’s a review portal for security leaders and their teams to get anonymous third party feedback on a vendor and their software solutions. We firmly believe this type of resource is a hugely valuable, open and honest way of assessing the security landscape. So this is our rallying call, for Avecto customers to tell the world what you think about our Defendpoint software.
- April 24th, 2017
On the 28th May 2017, a team from Avecto will be taking part in the Great Manchester Run to raise money for Stockport Mind. As an employee of Avecto and avid runner, this feels like a perfect partnership. I strongly believe that running makes me better at my job and can have a hugely positive impact on everybody’s mental health.
- April 21st, 2017
The recent NCA report shows how easy it is for young people to slip down the path of cybercrime. The barrier to entry in the cyber crime market is at an all-time low with the tools needed to create new ransomware attacks available for free online. There are videos, tutorials, and blogs all detailing how to make money usually in the form of anonymous crypto currencies such as bitcoin.
- April 18th, 2017
I speak to many IT professionals who don’t have visibility over the endpoints and don’t really understand the day to day work behaviors of their staff. When asked to “secure the endpoint” by their management, there are many misconceptions about the effectiveness which naturally arise.