Cloud computing represents a seismic shift from traditional computing, one that enables users, whether businesses or government agencies, to do more, faster. In part, this shift is due to the way in which cloud services are provisioned and maintained, allowing customers to tap into the power of cloud data centers and services without having to build, manage, or maintain them. However, this technological transformation has been plagued by security concerns – driven, in part, by both increased understanding of the general online risk environment and by persistent media coverage ofRead more
Last Monday morning, news broke that a security protocol on which millions of WiFi devices reply on, is vulnerable to attack.
The vulnerability is being referred to as “KRACK” which stands for Key Reinstallation Attack. According to ZDNet, “the bug, knows as ‘KRACK’ exposes a fundamental flaw in WPA2, a common protocol used in securing most modern wireless networks. Mathy Vanhoef, a computer security academic, who found the flaw, said the weakness lies in the protocol’s four-way handshake, which securely allows new devices with a pre-shared password to join the network.”
This vulnerability can,Read more
On September 26, 2017 at the Microsoft Ignite in Orlando, FL, Microsoft announced the next perpetual release of Office is scheduled for the second half of 2018. According to the Microsoft site, “Office 2019 will add new user and IT capabilities for customers who aren’t yet ready for the cloud. For example, new and improved inking features—like pressure sensitivity, tilt effects, and ink replay—will allow you to work more naturally. New formulas and charts will make data analysis for Excel more powerful. Visual animation features—like Morph and Zoom—will add polish toRead more
A free software download, CCleaner, used for personal computers and Android phones for removing junk programs and cookies has been compromised by Hackers.
According to MSN News, “A version of CCleaner downloaded in August included remote administration tools that tried to connect to several unregistered web pages, presumably to download additional unauthorized programs, security researchers at Cisco’s Talos unit said.”
The full article can be found here.
If you have installed this software and have questions about uninstalling, updating or blocking from download (if your systems can), please email email@example.com and we will provide guidance.Read more
As a longtime Microsoft partner, we’re deeply invested in the Microsoft platform and recommend, implement and support all that is Microsoft including the wildly popular Office 365 platform. During this past July at Microsoft Inspire, the annual partner conference, Microsoft CEO Satya Nadella introduced Microsoft 365 which includes Office 365, Windows 10 and Enterprise Mobility + Security (watch Satya Nadella announce Microsoft 365). So what does this mean for our SMB customers?
Basically, Microsoft is rolling our Microsoft 365 Enterprise and Microsoft 365 Business to “help companies empower their employees, unlockingRead more
Businesses need a next-gen email security solution that offers comprehensive threat prevention capabilities. A multilayered approach to email security ensures protection for business communications.
Cyber threats are evolving rapidly from mass spam attacks to advanced forms of targeted attacks and we want to make sure you’re protected with a next-gen email security solution.
Read this Solution Brief to learn about:
- The increased importance of next-gen email security
- The critical capabilities that your next-gen email security solution should include
- How SonicWall’s next-gen email security solutions will protect your business
In today’s hyper-connected world, email-based communications are not just commonplace – they have become a fundamental cornerstone for effectively conducting business.
Emails offer hackers a vehicle to exploit a variety of vulnerabilities in an organization and we want to make sure you’re protected!
Read this Executive Brief to discover:
The Anatomy of an email attack
What email threats organizations face today
What your email security solution should include
Given today’s complex, mature threats, it’s tantamount that organizations deploy a multi-layered security solution that includes dedicated, leading-edge email protection. We recommend SonicWall Email Security: A Next-Generation Solution.Read more
Don’t let these type of attacks hold your data hostage.
In this free guide, you’ll learn how ransomware works and the tactics cyber criminals use to infiltrate your organization. You’ll also get advice on how to safeguard your company against the latest ransomware attacks.
Get this ebook: How ransomware can hold your business hostage and learn about:
Various types of ransomware attacks and how they’re delivered
How to detect vulnerable areas in your IT environment
Ways to block threats, such as phishing emails and malicious advertising
Steps to protect against hidden malware in encrypted traffic
We recommendRead more
Get your copy of this brief to discover the top five ways your firewall sandbox can fail. Plus, learn how your business can stay ahead of advanced persistent threats (APTs) and prevent cyber criminals, hackers and malware from invading your network.
Find details on how you can:
Stop emerging attacks at the gateway
Block evolving, polymorphic and dynamic zero-day threats
Remain one step ahead of APTs and prevent network intrusions
Lower costs and complexity with an effective multi-layer sandboxing solution
We recommend SonicWall Capture ATP (Advanced Threat Protection) service to protect your organization. Watch a liveRead more
2016 was a highly active attack year. Ransomware alone increased by well over 100%, showing that cyber criminals remain aggressive on all fronts.
- Ransomware was the payload of choice for spam campaigns and exploit kits
- Internet of Things devices were compromised on a massive scale
- The fall of dominant exploit kits left a void for smaller exploit kits
- Android remained a popular and risk-prone target