Tags » Enduser

Get under the skin of ransomware

In 2016 alone, hackers have taken over $1 Billion in the form of ransoms from users trying to retrieve their files after being infected with ransomware. 125 more words

Corporate

Join our webcast: Stop the Exploit. Stop the Attack.

We know ransomware is one of the biggest threats facing organizations today but the security industry has traditionally struggled to keep up with this sophisticated, ever-changing attack. 106 more words

Corporate

Moving beyond EMET, Part 2

Microsoft has now mapped out the future for the Enhanced Mitigation Experience Toolkit (EMET) in part one and it looks pretty bleak. The advice given to EMET users was also a little vague: Upgrade to Windows 10. 144 more words

Corporate

Watch now – Sophos Intercept X: Signatureless Exploit Prevention in 60 Seconds

Exploits are one of the key methods attackers use to spread malware. They take advantage of the vulnerabilities in genuine software products to deliver their chosen flavor of malware on to your system. 87 more words

Corporate

Sophos responds to the new Investigatory Powers Act

Since the Snowden revelations, it is not news to anyone that GCHQ and other government agencies are spying on UK citizens’ online activities.

Whatever you may feel about government snooping, it could be argued that all the Investigatory Powers Act has changed is to formalise what the UK government was already doing, and put more structure and control around it. 606 more words

Corporate

Staying secure against ransomware

Ransomware has the potential to cause massive disruption to an organization’s productivity. So it’s vital to understand how to build the best possible defense against it. 186 more words

Corporate

Sophos Central Adds Support for SIEMs (Splunk, ArcSight, etc)

Sophos Central has integrated many of the products a business needs to stay secure. However, we realize that many organizations have products from multiple vendors and leverage a SIEM (security information and event management) to try to make sense of all the security events produced by all those disparate products. 209 more words

Corporate