AVR International

Where did that year go?

Writing this post today 20th November, I calculate there are just 25 working days until the end of the year. It’s quite staggering how quickly time passes.  How those lovely warm summer days have fast faded into the memory as the cold, damp, dark days of winter approach. So have you achieved all you wanted to in 2017?  Can we help you with any outstanding threat protection, data compliance or mobile device management issues?  Always happy to chat and provide an alternative quote with no obligation.  

(more…)

C360 at The Business Show

Small businesses count the cost of a cyber attack

One in five small businesses hit by a cyber attack report that the breach cost in excess of £10,000 with one in ten quoting £50,000 as the amount they had to spend to rectify the damage.  With over 875,000 small, and medium sized businesses (SME’s) across the UK being attacked in the last 12 months, can SME’s really afford to take a chance on outdated or inadequate protection?

(more…)

AVR

AVR celebrates our 15th Birthday!

Back in 2002 when businesses would traditionally purchase a suite of anti-virus signature detection based solutions from one vendor, Helen Hall started a business in the basement of her home, with the objective of offering her customers a diverse range of security solutions to better match their specific company requirements.  Anti Virus Reseller Ltd  was born on 22nd October 2002 and now in 2017, we are proudly celebrating AVR’s 15th birthday!

(more…)

SentinelOne Endpoint Protection

We can stop every type of endpoint attack

Almost half of UK businesses were hit by a cyber attack in 2016. Seven out of ten large firms identified a breach and those businesses holding electronic data were twice as likely to be attacked (UK Government Cyber Breaches Survey 2017).  All of those attacked will have anti-virus and firewalls in place, but today’s advanced malware can breach those defences.  Next Generation Endpoint Protection will stop every type of attack at every stage in the threat life-cycle.  So what’s stopping you giving your business this vital security?

(more…)

McAfee Endpoint Security

Join AVR at IP Expo

Europe’s leading IT exhibition takes place on 4th and 5th October at London’s ExCel. AVR will be attending the exhibition and would be delighted to meet with you, discuss your information security issues and guide you around the wide range of exhibitors stands. You can register for IP Expo here.

(more…)

businessman mobile

Is workforce mobility putting you at risk?

Smartphones, iPads, tablets and laptops are ubiquitous across our personal and commercial lives, changing the way we communicate. This workforce mobility provides great flexibility and increased productivity but it does leave you open to a cyber attack or data breach.  So how do you balance the risk?  Join our webinar on Thursday 7th September and hear how you can safely use your mobile devices with protection from Lookout Mobile Security.

(more…)

BYOD Maas360

BYOD? TBH AVR say KISS!

In today’s world of text speak, instant messaging, emoticons and emoji’s, less is more!  For most people, mobile phones are the primary form of communication and their use within business is now ubiquitous.  As capable as mobile devices – smartphones, tablet devices, laptops – are at easing communications and improving productivity, if there is not structure and control to their usage, there is a risk that they can open the organisation to a cyber attack or data breach, particularly if the mobiles are the employees own as in BYOD – Bring Your Own Device.  So businesses need TBH – To Be Honest and KISS – Keep It Simple Stupid! No offence!

(more…)

small business information security

I’m too small to be a target

‘I’m too small to be a target’ must be one of the most common phrases we hear when talking to companies about cyber attacks and data breaches.  It’s understandable when the media is quick to broadcast news of large scale computer virus or Ransomware attacks on well-known businesses.  The reality is quite different. Statistics from Small Business Trends shows that 43% of cyber attacks target small businesses, with just 14% being effective at mitigating attacks and sadly 60% of small companies go out of business within six months of a cyber attack.

(more…)

Penetration testing

How do you know where the weak points are in your network?

So if we are to accept as many of the information security experts are now telling us that cyber-attacks are inevitable on virtually every business and organisation then what are you going to do about it?

Data has become the most precious commodity and those companies that hold sensitive, confidential and personal information, which is pretty much everybody, are targets for the bad guys who want to trade or exploit it for financial gain.

We have in the past, talked about stopping or preventing attacks but with the new strains of malware, this is becoming much more difficult, so now’s the time to switch attention to detection and remediation.  However, before you can start to assess which solution would be the most appropriate for your business, you have to understand where the vulnerable or weak points are in your network. Simulating an attack with Pen Testing is the most effective way of identifying the gaps in your defences.

(more…)