The much anticipated 2017 Data Breach Investigations Report from Verizon was launched this week and once again it highlights some interesting and concerning security trends.
I speak to many IT professionals who don’t have visibility over the endpoints and don’t really understand the day to day work behaviors of their staff. When asked to “secure the endpoint” by their management, there are many misconceptions about the effectiveness which naturally arise.
Another day, another data breach. This time, payday lender, Wonga has revealed it’s the latest victim in a long and seemingly endless line of companies to have had their customer data compromised.
Gartner recently published “The Real Value of a Non-Signature-Based Anti-Malware Solution to Your Organization” providing insight into how non-signature approaches to malware prevention can not only prevent attacks but offer reduced footprints on the endpoint. As you would expect Avecto are mentioned as one of the vendors in this space.
Last week marked an exciting new first – ransomware on a Mac disclosed by Palo Alto who had seen it with a client. What’s simultaneously encouraging and disappointing is that it could have been prevented without detection using highly recommended best practices – application whitelisting.
If you can contain or block threats before they hit the endpoint with network-based security such as detection and sandboxing,that is always a good idea. The problem is that if you don’t secure the endpoints first, you end up with an eggshell security stance, where you are reliant on a single outer shell to protect your data.
At the recent InfoSec event in London, I talked about why removing admin rights is the one big thing you can do to immediately improve your security posture. But instead of being at the top of the agenda, it’s often neglected. Why?
The latest research report from renowned research institute Ponemon has revealed a few big surprises about the priorities of IT and security professionals in 2014 and their plans to deal with today’s cyber threats.