How to Protect your Business from Malware
Secure your Network
It has been said many times before, but firewalls and anti-malware software are the first line of defence against cyberattacks. Your business will be connected to the internet through many different sources so your firewall will need to monitor all of these connections. Also, a single installation of an antivirus software is not enough, you should invest in multiple layers of security including; antivirus, anti-malware and anti-ransomware.
examples of malware that would be most damaging
These are some examples of malware that would be most damaging to your business
Viruses, Ransomware, Spyware,
Viruses: A kind of self-replicating software that will eventually slow down and cripple your computer systems which will inevitably destroy or alter data held on them.
Avast to buy AVG shares
Avast Software and AVG Technologies, two Anti virus companies have announced that they have entered into a purchase agreement in which Avast will buy shares in AVG for $25.00 per share in cash, for a total $1.3B
New Offering from Imation in low cost BYOD
Imation a global provider of data storage and information security, have announced its IronKey Workspace W200 PC on a Stick USB flash drive.
This is a robust USB flash drive, with Microsoft Windows 10 certification, offering a high-performance, low-expense option for cost-sensitive enterprises, which can save up to 95 percent compared to providing employees with company laptops.
This brings a new vision to bring your own devise, it could be supporting a mobile workforce, a contingency staff or a BYOD programme, the IronKey Workspace W200 allows enterprise IT administrators to provide a Windows 10 or 8.1 mobile corporate environment containing all the IT security tools and policies to protect these users, no matter where they work.
Cost of Data Breaches will increase 4 fold
New Juniper Research, suggests that the cost of data breaches to will increase $2.1 trillion globally by the end of 2018, this is four times the estimated cost of breaches in 2015.
The document, entitled “The Future of Cybercrime & Security: Financial & Corporate Threats & Mitigation”, has predicted that the majority of these breaches will come from existing IT and network infrastructure. While new threats targeting mobile devices and the Internet of Things are being reported at an increasing rate, the number of infected devices is minimal in comparison to more traditional computing devices.
The Cybercrime Economy Driving Action
Free Tesla Cars Just call.... Electric Car Website Hack Attack
Tesla Motors’ website was “hacked” on Saturday as well as its official Twitter account. The teslamotors.com website was redirected to a server hosted in Amsterdam and within a few minutes, the account began sending tweets promising free Tesla cars.
Later that same day it was revealed that Tesla founder Elon Musk’s Twitter account was compromised. According to Dave Smith at Business Insider “though the parties claiming responsibility offer up different names, it appears to be one coordinated attack on all of Musk’s online and social properties.”
Andrew Hay from the OpenDNS Security Labs team has written a blog post that lays out the process that attackers used to hijack Elon Musk's personal Twitter account, as well as the Tesla Motors website. It gives a deep dive on the infrastructure used in the attack with highlights including:
Read more: Free Tesla Cars Just call.... Electric Car Website Hack Attack
25% of UK IT professionals Under Attack 2 Weeks Before they Realised
A new report, Tackling Attack Detection and Incident Response, from Enterprise Strategy Group (ESG), commissioned by Intel Security, reveals slow responses to cyber-attacks from UK enterprises are leaving companies vulnerable to targeted online crime. This report uncovers why UK corporations struggle to detect and defend against targeted online attacks and it found a quarter of UK IT Professionals took over two weeks to realise they were under attack from an advanced cyber threat in 2014
Highlights:
• 39% admitted that a threat, once discovered took between two and twelve weeks to remove and remediate
• Across the globe, businesses on average dealt with 78 security incidents last year
• 26% involved targeted and bespoke attacks
Raj Samani, EMEA CTO Intel Security
Read more: 25% of UK IT professionals Under Attack 2 Weeks Before they Realised
Employees Cost UK Business £130,000 Managing Passwords
But a third of workers do not use passwords on mobile devices used for work according to the Widmeyer survey
Poor password habits are putting employers at risk and losing them hundreds of thousands of pounds in lost productivity, according to new research from Centrify , a unified identity management company specialising in data centre’s, cloud and mobile.
The Widmeyer survey of 1,000 UK workers, showed the average employee wastes £261 a year in company time on trying to manage multiple passwords, which for a company with 500 staff is a loss of more than £130,000 a year.
High on many people’s list of ‘most annoying things’, passwords it seems are becoming the cause of major headaches today.
Read more: Employees Cost UK Business £130,000 Managing Passwords
How Long Should You Keep Email?
There’s no easy answer – The Data Protection Act’s deliberately woolly. Rather than define a period of time, it states that email must be kept for “no longer than is absolutely necessary”.
And different industries have very different ideas about what that means.
Many sectors operate Best Practice guidelines with penalties for non-compliance. There are books cataloguing recommended retention periods, going up to a mind-boggling 80-years plus for correspondence relating to pension policies. However, self-regulation is only as good as enforcement by the Self-Police.
More Articles...
- PC on a Stick from IronKey (Imation)
- Scotland Setting Sail Scam
- Macmon Secure chooses Wick Hill As Sole UK Distributor
- Naked Videos of Facebook Friends
- Exhilarating Experience Open to Channel Partners
- MSSPs Rapidly Adopt AlienVault USM
- Facebook instant messaging Trojan spreads through EMEA
- Infosec 2014 survey reveals 50% of security professionals fail to secure data
- Mergers & Acquisition in the technology sector
- WICK HILL NOW SHIPPING WATCHGUARD’S NEW APT
- Synerzip has Developed Unified Threat Management Platform
- Security Threat and Multi-Factor Authentication
- Edward Snowdon and the RSA receiving $10 million for a back door with NSA
- Delivering M2M Security Within Encrypted Networks
- Best Practices for Secure Shell Key Management