Tag Archives: endpoint security

Taking COMmand of your Privileges

Least privilege was first put forward as a design principle by Jerry Saltzer and Mike Schroeder 40 years ago [1]. Avecto, along with many others, has championed least privilege and our 5 reasons to love least privilege shows that it is key to mitigating attacks.

Continue Reading


A hacker’s guide to Ransomware: How to successfully lose your data

To be clear, a ransomware developer’s goal is not to destroy your data. The main driver is money, and they care about lining their own wallets (usually bitcoin wallets but this does not make a big difference to you,) which means that destroying your data isn’t really the goal they are trying to achieve.

Continue Reading


Lockdown Locky

Locky is the latest in an ever increasing range of ransomware threats used by cyber criminals in an expanding and increasingly  lucrative market. . What makes Locky special is that it appears to have come from the same group behind several large Dridex campaigns showing that they are possibly diversifying their range of attacks.

Continue Reading


The Cyber Pyramid Scheme

In a previous blog I discussed why it is important to focus on the endpoint first when it comes to security. This generated some really interesting discussions with people arguing the case for product X and Y or asking “what about detection on the endpoint?”

Continue Reading


Endpoint vs. Network Security – who wins?

If you can contain or block threats before they hit the endpoint with network-based security such as detection and sandboxing, that is always a good idea. The problem is that if you don’t secure the endpoints first, you end up with an eggshell security stance, where you are reliant on a single outer shell to protect your data. Without secure endpoints, even one small crack in the network shell will cause all of your data to spill out, creating a real mess..

Continue Reading