European Reseller

Helping bring new products to market

Saturday, Feb 04th

Last updateThu, 02 Feb 2023 11am

You are here: Home Security
Hand Held

Be fearful of a new Malware Called 'Hook'

A dangerous new piece of malware called 'Hook' has been uncovered that, once installed, can allow a hacker to control your Android phone remotely, stealing data, sending money and harvesting your WhatsApp messages. 

So if you receive a message from your bank. Be aware. We have heard of messages from NatWest, Barclays Santander, Lloyds and Metro. Some of the UK's best-known lenders.

EnergiserHardCaseAT-H240S-intro

Read more: Be fearful of a new Malware Called 'Hook'

Is Your Company Covered and how Cyber Insurance Works

Is Your Company Covered and how cyber insurance works,

Can you benefit from investing in a policy for a Cybersecurity Attack? That’s the £2 Million Question

Cybercrime continues to be a persistent issue for all sized businesses, but particularly smaller organisations. In fact, according to the National Cyber Security Alliance, nearly 60% of small businesses that experience a cyberattack shut their doors within six months.

How Does Cyber Insurance Work?

Cyber insurance is a policy that helps an organisation pay for any financial losses incurred following a data breach or cyberattack. It also helps cover any costs related to the remediation process, such as paying for the investigation, crisis communication, legal services, and customer refunds.

With the constant – and ever-increasing – threat of potential cyberattacks and need to protect their assets, many companies are applying for cyber insurance, which generally covers a variety of different types of cyber-attacks, including data breaches; business email compromises; cyber extortion demands; malware infections and ransomware.

But, despite the benefits of cyber insurance, it remains surprisingly undervalued. The UK government’s Cyber Security Breaches Survey 2022 found that only 43% of businesses have a cyber insurance policy in place.

Money on fire

Read more: Is Your Company Covered and how Cyber Insurance Works

LastPass calls for stronger cybersecurity practices

LastPass calls for stronger cybersecurity practices

LastPass, a password management company, is calling for urgent action to improve supply chain vulnerability. Ransomware and supply chain attacks continue to threaten businesses worldwide and the results from a single attack could be devastating, causing halts in production, monetary loss, or even reputational damage.

Read more: LastPass calls for stronger cybersecurity practices

Guy March of Tenable lays out the channel angle on Security.

Development has Evolved and Security Must Too.

 If we go back to the turn of the century, IT would have needed to provision physical machines, loaded with a host of applications that were physically connected to the internet, to enable a remote employee. To introduce a new service would have taken, on average, between six and eight months in production. The next ‘phase’ saw us move to the age of Virtual Machines and, while this simplified the deployment, the architecture remained the same. This was still seen as a ‘win’ in terms of agility and speed of deployment. Today, and by harnessing the power of the Cloud, enabling a remote workforce is very different and can be done in a matter of days, if not hours. 

Tenable-Guy-March-.jpg

Guy March, Channel Director – EMEA, Tenable

Read more: Guy March of Tenable lays out the channel angle on Security.

Lord of the Rings, World Password Day, and the keys to well-rounded data security

Lord of the Rings, World Password Day, and the keys to well-rounded data security  

On World Password Day, it’s important to reinforce strong password hygiene — a critical component to data security, but one that merely scratches the surface.  Justin Augat has an Elvish view on the first Thursday in May

iLand Logo

Read more: Lord of the Rings, World Password Day, and the keys to well-rounded data security

Arrow Electronics Enters into UK Distribution Agreement with Fortinet

Arrow Electronics Enters into UK Distribution Agreement with Fortinet

Arrow Electronics has entered into a UK distribution agreement with Fortinet, to provide Fortinet’s cybersecurity solutions to UK channel customers.

Fortinet, states its mission, is to deliver innovative, high-performing network security to secure and simplify IT infrastructure for organisations of all sizes.

 

Mark McHale 002

Read more: Arrow Electronics Enters into UK Distribution Agreement with Fortinet

Channel Marketing Program of the Year first place F-Secure’s Global Partner Program

Helsinki, Finland – Forrester-owned SiriusDecisions has recognised cyber security provider F-Secure’s Global Partner Program as the Channel Marketing Program of the Year.

This distinction validates F-Secure’s achievements in providing industry-leading support for business-to-business (B2B) resellers’ efforts in developing the know-how and expertise needed to deliver more mature security capabilities, such as those offered by detection and response solutions, to organisations.

Read more: Channel Marketing Program of the Year first place F-Secure’s Global Partner Program

How to Protect your Business from Malware

Secure your Network

It has been said many times before, but firewalls and anti-malware software are the first line of defence against cyberattacks. Your business will be connected to the internet through many different sources so your firewall will need to monitor all of these connections. Also, a single installation of an antivirus software is not enough, you should invest in multiple layers of security including; antivirus, anti-malware and anti-ransomware.

bitcoin-WEB 

Read more: How to Protect your Business from Malware

Avast to buy AVG shares

Avast Software and AVG Technologies, two Anti virus companies have  announced that they have entered into a purchase agreement in which Avast will buy shares in AVG for $25.00 per share in cash, for a total  $1.3B

Avast is making this purchase to gain scale, technological depth and geographical breadth,  so that the new organisation can be in a position to take advantage of emerging growth opportunities in Internet Security as well as organisational efficiencies.

Read more: Avast to buy AVG shares