aidarrow-end-inversearrow-endWhy choose AvectoAchieve complianceOperational efficiencycompliancedefendpoint-coloureddefendpoint-thin-2DesktopScaleResources.iconsAsset 21insider-threatsavecto-logo-smallquotation-marksransomwareResources.iconsResources.iconsResources.iconsResources.iconsResources.iconsResources.iconssafePrevent attacksAsset 19social-engineeringTrustedtriangleStop insider attacksAsset 20Resources.iconsResources.iconszero-days
Date published
11/28/2016 9:58:06 AM
Contributor:
Jessica Barker

2017 - The year of social engineering-as-a-service?

Social engineering is the use of psychological tools such as deceit, misdirection, manipulation and flattery to elicit unauthorised information or access to systems. Social engineering is an increasingly common way for criminals to attack organisations as it does not always rely on cyber vulnerabilities but rather takes advantage of the weakest element in an organisation, human beings.

Continue reading
Date published
11/23/2016 9:52:56 AM
Contributor:
Ian Pitfield

Arabian Bytes

Recently, the Avecto team travelled to the Middle East for a four-country roadshow, hopping from KSA to UAE, Jordan and finally Lebanon. We travelled with the esteemed Microsoft MVP, Sami Laiho and our partners in the region Crestan, in a bid to spread the message of the importance of back to basics security and for Sami to showcase the simplicity of breaking Windows without the right security foundations in place.

Continue reading
Date published
11/8/2016 1:14:03 PM
Contributor:
James Maude

Is social engineering the new norm?

Throughout history humans have sought to socially engineer each other, exploiting social norms and applying pressure to reveal information or gain advantage. From travelling conmen and master spies to cyber threats and phishing emails the fundamental problem is the same, humans can be manipulated.

Continue reading
Date published
11/2/2016 9:23:05 AM
Contributor:
James Maude

How to dismantle an atomic bomb

Security researchers at enSilo recently released a novel code injection technique for Windows known as ‘Atom Bombing’. This is so called because it exploits Windows atom tables and Async procedure calls (APC) to evade detection by many common security solutions.

Continue reading
Date published
9/30/2016 10:58:41 AM
Contributor:
James Maude

The thinking problem

Over the past 30 years we’ve seen business technologies come and go in a rapidly evolving landscape of innovation and ingenuity. You could be forgiven for thinking that in the time we shrunk a computer down to the size of a wristwatch and established high speed connectivity to every corner of the globe that we would have also revolutionized information security.

Continue reading
Date published
6/24/2016 8:12:50 AM
Contributor:
Andrew Avanessian

Does a younger board make for a more secure organization?

A recent survey conducted by the Financial Times (FT) revealed that just four FTSE 100 companies had board members under the age of 40. Though perhaps this is unsurprising when we think about a traditional corporate hierarchy, the implications of an older board that does not have the digital threat landscape at the top of their agenda could result in a security headache.

Continue reading
  1. 1
  2. 2
  3. 3