Lord of the Rings, World Password Day, and the keys to well-rounded data security
Lord of the Rings, World Password Day, and the keys to well-rounded data security
On World Password Day, it’s important to reinforce strong password hygiene — a critical component to data security, but one that merely scratches the surface. Justin Augat has an Elvish view on the first Thursday in May
Read more: Lord of the Rings, World Password Day, and the keys to well-rounded data security
Arrow Electronics Enters into UK Distribution Agreement with Fortinet
Arrow Electronics Enters into UK Distribution Agreement with Fortinet
Arrow Electronics has entered into a UK distribution agreement with Fortinet, to provide Fortinet’s cybersecurity solutions to UK channel customers.
Fortinet, states its mission, is to deliver innovative, high-performing network security to secure and simplify IT infrastructure for organisations of all sizes.
Read more: Arrow Electronics Enters into UK Distribution Agreement with Fortinet
Channel Marketing Program of the Year first place F-Secure’s Global Partner Program
Helsinki, Finland – Forrester-owned SiriusDecisions has recognised cyber security provider F-Secure’s Global Partner Program as the Channel Marketing Program of the Year.
Read more: Channel Marketing Program of the Year first place F-Secure’s Global Partner Program
How to Protect your Business from Malware
Secure your Network
It has been said many times before, but firewalls and anti-malware software are the first line of defence against cyberattacks. Your business will be connected to the internet through many different sources so your firewall will need to monitor all of these connections. Also, a single installation of an antivirus software is not enough, you should invest in multiple layers of security including; antivirus, anti-malware and anti-ransomware.
examples of malware that would be most damaging
These are some examples of malware that would be most damaging to your business
Viruses, Ransomware, Spyware,
Viruses: A kind of self-replicating software that will eventually slow down and cripple your computer systems which will inevitably destroy or alter data held on them.
Avast to buy AVG shares
Avast Software and AVG Technologies, two Anti virus companies have announced that they have entered into a purchase agreement in which Avast will buy shares in AVG for $25.00 per share in cash, for a total $1.3B
New Offering from Imation in low cost BYOD
Imation a global provider of data storage and information security, have announced its IronKey Workspace W200 PC on a Stick USB flash drive.
This is a robust USB flash drive, with Microsoft Windows 10 certification, offering a high-performance, low-expense option for cost-sensitive enterprises, which can save up to 95 percent compared to providing employees with company laptops.
This brings a new vision to bring your own devise, it could be supporting a mobile workforce, a contingency staff or a BYOD programme, the IronKey Workspace W200 allows enterprise IT administrators to provide a Windows 10 or 8.1 mobile corporate environment containing all the IT security tools and policies to protect these users, no matter where they work.
Cost of Data Breaches will increase 4 fold
New Juniper Research, suggests that the cost of data breaches to will increase $2.1 trillion globally by the end of 2018, this is four times the estimated cost of breaches in 2015.
The document, entitled “The Future of Cybercrime & Security: Financial & Corporate Threats & Mitigation”, has predicted that the majority of these breaches will come from existing IT and network infrastructure. While new threats targeting mobile devices and the Internet of Things are being reported at an increasing rate, the number of infected devices is minimal in comparison to more traditional computing devices.
The Cybercrime Economy Driving Action
Free Tesla Cars Just call.... Electric Car Website Hack Attack
Back in 2015 Tesla Motors’ website and Twitter account was “hacked” . The teslamotors.com website was redirected to a server hosted in Amsterdam and within a few minutes, the account began sending tweets promising free Tesla cars. All very interesting for World Password Day , the first Thursday in May
Later that same day it was revealed that Tesla founder Elon Musk’s Twitter account was compromised. According to Dave Smith at Business Insider “though the parties claiming responsibility offer up different names, it appears to be one coordinated attack on all of Musk’s online and social properties.”
Andrew Hay from the OpenDNS Security Labs team has written a blog post that lays out the process that attackers used to hijack Elon Musk's personal Twitter account, as well as the Tesla Motors website. It gives a deep dive on the infrastructure used in the attack with highlights including:
Read more: Free Tesla Cars Just call.... Electric Car Website Hack Attack
More Articles...
- 25% of UK IT professionals Under Attack 2 Weeks Before they Realised
- Employees Cost UK Business £130,000 Managing Passwords
- How Long Should You Keep Email?
- PC on a Stick from IronKey (Imation)
- Scotland Setting Sail Scam
- Macmon Secure chooses Wick Hill As Sole UK Distributor
- Naked Videos of Facebook Friends
- Exhilarating Experience Open to Channel Partners
- MSSPs Rapidly Adopt AlienVault USM
- Facebook instant messaging Trojan spreads through EMEA
- Infosec 2014 survey reveals 50% of security professionals fail to secure data
- Mergers & Acquisition in the technology sector
- WICK HILL NOW SHIPPING WATCHGUARD’S NEW APT
- Synerzip has Developed Unified Threat Management Platform
- Security Threat and Multi-Factor Authentication