Security

How to Stop Ransomware

on Mar 30, 2018

Key Technologies and Security Best Practices 54% of organizations have been hit by ransomware – twice on average¹. So it’s critical that you have advanced protection technologies in place, combined with good user security practices to keep your organization secure. Securing Your Endpoints Stopping ransomware from gaining a foothold on your endpoint...

Read More

Petya Global Ransomware Attack

on Jun 28, 2017

As you may have seen in the news yesterday, we are currently experiencing another global ransomware attack. The last attack was the WannaCry in May. This latest ransomware has been called “Petya”. We wanted to send out a brief email to bring our customers up to date, and advise what steps can be taken to defend yourself and your company against these more...

Read More

Fireball Malware

on Jun 13, 2017

A new piece of malware was discovered this week and has already infected more than 250 million machines. Fireball Originating out of China, Fireball changes the default search engine and tracks web traffic. The malware also has the ability to remotely run any code on the victim’s machine, or download new malicious files. It’s potentially serious malware,...

Read More

Worming through SMB

on May 16, 2017

Wannacry’s, the group responsible for the malware, utilizes a propagation method which includes port scanning of potential hosts over Transmission Control Protocol (TCP) port 445, which is where the Server Message Block (SMB) network communications protocol take place. This application-layer protocol is being targeted by Wannacry specifically to help it spread...

Read More

Security Testing

on Dec 15, 2016

It’s important to know where your vulnerabilities are; but that might not be enough. The main objective of vulnerability scanning & penetration testing is to determine security weaknesses. These tests can also be used to demonstrate an organization’s security policy compliance, its employees’ security awareness, and the organization’s...

Read More