Happy October and National Cyber Security Awareness Month! Thycotic developed a cyber security hub for security tips, free training, and resources to help you and your organization stay safe online. Remember to check back each week for a new video with quick tips for each week’s theme. Here’s a look at the upcoming themes per week: … Continue reading October is National Cyber Security Awareness Month- Stay Aware. Stay Safe.
No, this isn’t just another one of those social media holidays that pop up on your Newsfeed on a regular basis. It’s National Cybersecurity Awareness Month and it’s an actual thing! National Cybersecurity Awareness is celebrating its 15th year as an annual initiative to raise awareness about the importance of cybersecurity! NCSAM 2018 is a collaborative … Continue reading It’s National Cybersecurity Awareness Month, Do You Know if Your Customers are Secure?
How well is your customer’s companies’ data protected? Likely, not enough! 62% of IT Professionals from around the world reported gaps within their security infrastructure that would allow attackers to breach. However, staying on top of these gaps manually is no longer manageable. Artificial intelligence (AI), machine learning (ML), as well as other new technology … Continue reading Acronis Active Protection, and why your customers NEED it!
When it comes to IT security, everyone has a role to play. October is National Cybersecurity Awareness Month and Sophos wants to make sure you have the tools needed to stay on top of today’s targeted threats. Join their webcasts every Wednesday in October where they’ll breakdown the latest in cybersecurity, from ransomware to deep … Continue reading Don’t Become a Statistic! Join the Sophos Webcast Series for Cybersecurity Awareness Month!
Anti-Virus Software is the most commonly used security feature when protecting against cybercrime. For years it has been a well known staple for computer users. You’re protected- the hackers will never get through- until they do. What happens when your anti-virus software isn’t enough? Any information you can’t afford to lose should be backed up … Continue reading Back Up Your AV with StorageCraft
If you’re on Micro Focus’s product announcement email list then you might have noticed that a new version of Advanced Authentication (AA) was recently released. We continue to evolve AA to be the most flexible and powerful MFA/strong authentication solution that you can buy. In contrast point solutions are just that, a one trick solution … Continue reading New Release of Micro Focus Advanced Authentication
Bitdefender recently released an article around the startling Ransomware statistics and who is a likely target. The answer is in fact that no one is safe. Getting close to number one, Ransomware is a top threat globally and plans need to be put in place to protect against these cybercrimes. Due to the nature of the … Continue reading Ransomware Doesn’t Discriminate
Already an industry leader in next-gen endpoint protection, Intercept X now harnesses the power of a deep learning neural network for unsurpassed protection against malware. The artificial intelligence used by Sophos is an advanced form of machine learning that mimics the human brain. This results in a smarter, more scalable and lighter approach to security. … Continue reading Sophos launches the future of Cybersecurity with Deep Learning Technology
All IoT connected devices carry a certain amount of security risk. In the wake of threats from IoT Botnets and WannaCry ransomware attacks, the heat is officially on medical device manufacturers and hospitals to better protect their systems from cyber attacks. Click here to learn more about how Flexera can help you or your clients protect themselves. Continue reading The Other Healthcare Issue – What’s in Your Code?
Not all hacks, or data breaches, are equal. While many breaches result in inconvenience and minor financial losses, others have the potential to devastate your organization’s finances, credibility, privacy, ability to meet compliance, and much more. A privileged account hack falls into the second category. Our white paper, The Anatomy of a Privileged Account Hack, … Continue reading The Anatomy of a Privileged Account Hack: everything you need to know to protect your organization