aidarrow-end-inversearrow-endWhy choose AvectoAchieve complianceOperational efficiencycompliancedefendpoint-coloureddefendpoint-thin-2DesktopScaleResources.iconsAsset 21insider-threatsavecto-logo-smallquotation-marksransomwareResources.iconsResources.iconsResources.iconsResources.iconsResources.iconsResources.iconssafePrevent attacksAsset 19social-engineeringTrustedtriangleStop insider attacksAsset 20Resources.iconsResources.iconszero-days
Date published
7/3/2017 7:50:07 AM
Contributor:
Ian Pitfield

ATM: Another Targeted Machine

Last week marked the 50th anniversary of the ATM, a device that changed the face of personal monetary transactions forever. According to the ATM Industry Association (ATMIA) there are now close to three million of them worldwide, with over 70,000 in the UK alone where it all began. On 27th June 1967, the world's first "hole in the wall" was revealed at Barclays Bank in Enfield, London. Celebrations aside, I’d like to look at exactly what’s going on under the hood from a software perspective. Is securing them through industry best practice is realistic and practical?

Continue reading
Date published
3/29/2017 12:45:06 PM
Contributor:
Laura Butler

Avecto partner focus: Crestan

Sandra Salame, Operations Manager at Crestan, talks about the benefits of a partnership with Avecto and discusses our successful Middle East roadshow featuring award-winning speaker and Microsoft MVP Sami Laiho.

Continue reading
Date published
12/10/2015 9:45:11 AM
Contributor:
Paul Kenyon

From small acorns…

From the genius of Alan Turing and the development of “Baby”, the world’s first computer, all the way through to the discovery of Graphene - Manchester has long been a technology trailblazer.

Continue reading
Date published
11/13/2015 12:48:41 PM
Contributor:
Katy Batley

Take a long hard look at your shelfware

Twenty-eight percent of security spending is wasted on shelfware, according to CSO's news article earlier this year. Shelfware, in case you don't have any of your own, and aren't familiar with the term, is a word coined by the technology industry to refer to something that is purchased but is never put in to production.

Continue reading
Date published
9/28/2015 11:01:13 AM
Contributor:
Laura Butler

A coffee with Graham Cluley

Organizations, security professionals and vendors are in a constant battle to keep up with an evolving environment of advanced threats and malware strains. It seems as soon as we catch up with the cyber criminals, they shift up a gear. At the recent Gartner Security and Risk Management Summit in London, Avecto grabbed a coffee with the renowned security blogger and independent analyst, Graham Cluley, to take a pulse check of enterprise security.

Continue reading
Date published
1/23/2015 10:07:22 AM
Contributor:
James Maude

Malvertising Campaigns - Who can you trust?

Malware is an ever evolving field and as such security should be seen as a journey not a destination. One of the latest malware evolutions is the practice of Malvertising where attackers place malicious content in seemingly innocent adverts. When the user views the page the advert is loaded and the malware attempts to exploit the machine.

Continue reading