aidarrow-end-inversearrow-endWhy choose AvectoAchieve complianceOperational efficiencycompliancedefendpoint-coloureddefendpoint-thin-2DesktopScaleResources.iconsAsset 21insider-threatsavecto-logo-smallquotation-marksransomwareResources.iconsResources.iconsResources.iconsResources.iconsResources.iconsResources.iconssafePrevent attacksAsset 19social-engineeringTrustedtriangleStop insider attacksAsset 20Resources.iconsResources.iconszero-days
Date published
3/9/2017 10:00:46 AM
Contributor:
James Maude

WikiLeaks’ CIA documents offer us an important reminder

With news breaking on the CIA’s ability to listen in via Smart TVs, many will be alarmed by the breadth of the exploits WikiLeaks has uncovered. The security industry has been warning of the dangers of Internet of Things devices for a long time and just last week, a hack on internet-connected teddy bears was making the headlines.

Continue reading
Date published
2/8/2016 9:44:44 AM
Contributor:
Andrew Avanessian

Are admin rights the biggest threat to enterprise security?

Last week saw the launch of the latest Microsoft Vulnerabilities Report, Avecto’s leading research project into the security bulletins issued by the software giant over the past 12 months. Now in its third year, the report has consistently provided intriguing insight into today’s threat landscape, the common attack vectors and the products within the Microsoft portfolio that cause IT departments the most sleepless nights.

Continue reading
Date published
2/2/2016 9:50:06 AM
Contributor:
Mark Austin

Microsoft Vulnerabilities Report 2015 – What you need to know

Now in its third year, the 2015 Microsoft Vulnerabilities Report analyses the data from Security Bulletins issued by Microsoft throughout 2015. Typically issued on the second Tuesday of each month, these “Patch Tuesday” bulletins contain fixes for vulnerabilities affecting Microsoft products. With the launch of Windows 10, this approach changed slightly, with patches being released as soon as they are available.

Continue reading
Date published
4/14/2015 7:33:41 AM
Contributor:
James Maude

The Mitigation Game

Following on from last year, Avecto have analyzed Microsoft vulnerabilities in 2014 to reveal how the removal of admin rights is more important than ever.

Continue reading