September 8th, 2017
- April 27th, 2017
Avecto is listed as an official security provider in the Endpoint Protection Platforms category on the Gartner Peer Insights website. In case you aren’t familiar with the site, it’s a review portal for security leaders and their teams to get anonymous third party feedback on a vendor and their software solutions. We firmly believe this type of resource is a hugely valuable, open and honest way of assessing the security landscape. So this is our rallying call, for Avecto customers to tell the world what you think about our Defendpoint software.
- April 24th, 2017
On the 28th May 2017, a team from Avecto will be taking part in the Great Manchester Run to raise money for Stockport Mind. As an employee of Avecto and avid runner, this feels like a perfect partnership. I strongly believe that running makes me better at my job and can have a hugely positive impact on everybody’s mental health.
- April 21st, 2017
The recent NCA report shows how easy it is for young people to slip down the path of cybercrime. The barrier to entry in the cyber crime market is at an all-time low with the tools needed to create new ransomware attacks available for free online. There are videos, tutorials, and blogs all detailing how to make money usually in the form of anonymous crypto currencies such as bitcoin.
- April 18th, 2017
I speak to many IT professionals who don’t have visibility over the endpoints and don’t really understand the day to day work behaviors of their staff. When asked to “secure the endpoint” by their management, there are many misconceptions about the effectiveness which naturally arise.
- April 12th, 2017
The Dridex banking Trojan, once one of the most active and prolific malware strains, went quiet back in the summer of 2016. The large-scale spam operations distributing it dried up and the few samples that still appeared showed no significant changes. This appears to have represented a period where the attackers were retooling as Dridex has returned with fury and a spam campaign spearheaded by malicious Word documents exploiting a zero day vulnerability in Microsoft Office.