European Reseller

Helping bring new products to market

Wednesday, Aug 21st

Last updateSat, 17 Aug 2019 10am

You are here: Home Security
Hand Held

How to Protect your Business from Malware

Secure your Network

It has been said many times before, but firewalls and anti-malware software are the first line of defence against cyberattacks. Your business will be connected to the internet through many different sources so your firewall will need to monitor all of these connections. Also, a single installation of an antivirus software is not enough, you should invest in multiple layers of security including; antivirus, anti-malware and anti-ransomware.


Read more: How to Protect your Business from Malware

examples of malware that would be most damaging

These are some examples of malware that would be most damaging to your business



Viruses, Ransomware, Spyware,

Viruses: A kind of self-replicating software that will eventually slow down and cripple your computer systems which will inevitably destroy or alter data held on them.

Read more: examples of malware that would be most damaging

Avast to buy AVG shares

 Avast Software and AVG Technologies, two Anti virus companies have  announced that they have entered into a purchase agreement in which Avast will buy shares in AVG for $25.00 per share in cash, for a total  $1.3B

Read more: Avast to buy AVG shares

New Offering from Imation in low cost BYOD

Imation a global provider of data storage and information security, have announced its IronKey Workspace W200 PC on a Stick USB flash drive.

This is a robust USB flash drive, with Microsoft Windows 10 certification, offering  a high-performance, low-expense option for cost-sensitive enterprises, which can save up to 95 percent compared to providing employees with company laptops.

This brings a new vision to bring your own devise, it could be supporting a mobile workforce, a contingency staff or a BYOD programme, the IronKey Workspace W200 allows enterprise IT administrators to provide a Windows 10 or 8.1 mobile corporate environment containing all the IT security tools and policies to protect these users, no matter where they work.

Read more: New Offering from Imation in low cost BYOD

Cost of Data Breaches will increase 4 fold

New Juniper Research, suggests that the cost of data breaches to will increase $2.1 trillion globally by the end of 2018, this is four times the estimated cost of breaches in 2015.

The document, entitled “The Future of Cybercrime & Security: Financial & Corporate Threats & Mitigation”, has predicted that the majority of these breaches will come from existing IT and network infrastructure. While new threats targeting mobile devices and the Internet of Things are being reported at an increasing rate, the number of infected devices is minimal in comparison to more traditional computing devices.


The Cybercrime Economy Driving Action

Read more: Cost of Data Breaches will increase 4 fold

Free Tesla Cars Just call.... Electric Car Website Hack Attack

Tesla Motors’ website was “hacked” on Saturday as well as its official Twitter account. The website was redirected to a server hosted in Amsterdam and within a few minutes, the account began sending tweets promising free Tesla cars.


Later that same day it was revealed that Tesla founder Elon Musk’s Twitter account was compromised. According to Dave Smith at Business Insider “though the parties claiming responsibility offer up different names, it appears to be one coordinated attack on all of Musk’s online and social properties.”

Andrew Hay from the OpenDNS Security Labs team has written a blog post that lays out the process that attackers used to hijack Elon Musk's personal Twitter account, as well as the Tesla Motors website. It gives a deep dive on the infrastructure used in the attack with highlights including:

Read more: Free Tesla Cars Just call.... Electric Car Website Hack Attack

25% of UK IT professionals Under Attack 2 Weeks Before they Realised

A new report, Tackling Attack Detection and Incident Response, from Enterprise Strategy Group (ESG), commissioned by Intel Security, reveals slow responses to cyber-attacks from UK enterprises are leaving companies vulnerable to targeted online crime. This report uncovers why UK corporations struggle to detect and defend against targeted online attacks and it found  a quarter of  UK IT Professionals took over  two weeks  to realise they were under attack from an advanced cyber threat in 2014


•           39% admitted that a threat, once discovered took between two and twelve weeks to remove and remediate

•           Across the globe, businesses on average dealt with 78 security incidents last year

•           26% involved targeted and bespoke attacks


Raj Samani, EMEA CTO Intel Security



Read more: 25% of UK IT professionals Under Attack 2 Weeks Before they Realised

Employees Cost UK Business £130,000 Managing Passwords

But a third of workers do not use passwords on mobile devices used for work according to the Widmeyer survey

Poor password habits are putting employers at risk and losing them hundreds of thousands of pounds in lost productivity, according to new research from Centrify , a unified identity management company specialising in data centre’s, cloud and mobile.

The Widmeyer survey of 1,000 UK workers, showed the average employee wastes £261  a year in company time on trying to manage multiple passwords, which for a company with 500 staff is a loss of more than £130,000 a year.

High on many people’s list of ‘most annoying things’, passwords it seems are becoming the cause of major headaches today. 

encryption Padlock2


Read more: Employees Cost UK Business £130,000 Managing Passwords

How Long Should You Keep Email?

There’s no easy answer – The Data Protection Act’s deliberately woolly.  Rather than define a period of time, it states that email must be kept for “no longer than is absolutely necessary”. 

And different industries have very different ideas about what that means.

Many sectors operate Best Practice guidelines with penalties for non-compliance.  There are books cataloguing recommended retention periods, going up to a mind-boggling 80-years plus for correspondence relating to pension policies.  However, self-regulation is only as good as enforcement by the Self-Police.

crystalball money400

Read more: How Long Should You Keep Email?