aidarrow-end-inversearrow-endWhy choose AvectoAchieve complianceOperational efficiencycompliancedefendpoint-coloureddefendpoint-thin-2DesktopScaleResources.iconsAsset 21insider-threatsavecto-logo-smallquotation-marksransomwareResources.iconsResources.iconsResources.iconsResources.iconsResources.iconsResources.iconssafePrevent attacksAsset 19social-engineeringTrustedtriangleStop insider attacksAsset 20Resources.iconsResources.iconszero-days
Date published
5/25/2017 7:27:04 AM
Contributor:
Ian Pitfield

GDPR – A threat and an opportunity

With just a year to go until GDPR takes effect, there are concerns that around half of businesses may not meet the new data protection standards in time. While the majority of IT security professionals are aware of GDPR, a recent poll found just under half are preparing for its arrival.

Continue reading
Date published
1/22/2017 3:22:32 PM
Contributor:
Katy Batley

Customer Success: It Takes A Village

Recently I was in a meeting discussing a customer that had been particularly slow to adopt our solution and someone said to me “Isn’t that your job?” and for a moment I felt personally culpable for the failure of a speedy time-to-value for customer X.

Continue reading
Date published
11/24/2016 8:50:26 AM
Contributor:
James Maude

Buy now - breached later

Once again retailers are ramping up operations in time for the infamous Black Friday and Cyber Monday sales. Given the recent huge scale DDoS attacks powered by IOT devices under the control of the Mirai botnet retailers are taking many precautions to keep the transactions flowing during the sales. Unfortunately, just as the retailers are getting prepared so are the attackers, ready to seize any opportunity to steal user’s data or hold retailers to ransom.

Continue reading
Date published
3/7/2016 4:17:04 PM
Contributor:
Neil Proctor

Who administrates the admins?

The challenge of finding the right balance between giving too many admin rights vs. too little admin rights is often talked about from the end user perspective, however the same challenge applies to those managing the IT department itself and this is a part of the journey that is often overlooked.

Continue reading
Date published
2/1/2016 3:21:46 PM
Contributor:
James Maude

The Cyber Pyramid Scheme

In a previous blog I discussed why it is important to focus on the endpoint first when it comes to security. This generated some really interesting discussions with people arguing the case for product X and Y or asking “what about detection on the endpoint?”

Continue reading
Date published
12/17/2015 3:13:58 PM
Contributor:
Andrew Avanessian

2016 predictions: Securely does it

2015 has often been referred to as the year of the breach, with high profile attacks affecting global organizations in huge numbers. It was the year data breaches got personal with high profile attacks compromising almost every aspect of user’s lives.

Continue reading