penetration test

Why a Pen Test will keep your business secure

Many of the recent comments on cyber and ransomware attacks centres around when an attack is going to happen and not if. Opinion seems to be that no business or organisation is immune from attack and as the data and information held by every company has a value, all companies are targets for cyber criminals. The damage that can be done by hackers accessing your network and obtaining data can be disastrous, affecting the stability and future well-being of the organisation. So identifying where your business may be vulnerable becomes an important consideration. A Pen or Penetration Test will find all the gaps and access points, giving you the opportunity to increase your security and stop intrusions.

(more…)

AVR Mobility e-book

10 Steps to Mobility Success

What would we do without our mobile phones and tablets? None of us wants to think we are dependent on them but mobile devices have totally revolutionised the way we live and work. Mobiles are vital to businesses but are yours as effective as they could be? Do you have processes that ensure all mobiles are secure and access to valuable business data is controlled? AVR’s 10 Steps to Mobility Success E-Book can help and guide you to creating a mobile device management programme that can help take your business to the next level.

(more…)

King Street Townhouse

Join our Ransomware seminar in Manchester on 24th January

Ransomware remains a major threat to ALL businesses and organisations, but what is it? How does it operate and how can you protect your company’s vital data and endpoints? Together with Endpoint Security specialists SentinelOne, AVR will explain how over drinks and canapes at the elegant King Street Townhouse on the evening of Wednesday 24th January. We would love you to join us!

(more…)

AVR International

Where did that year go?

Writing this post today 20th November, I calculate there are just 25 working days until the end of the year. It’s quite staggering how quickly time passes.  How those lovely warm summer days have fast faded into the memory as the cold, damp, dark days of winter approach. So have you achieved all you wanted to in 2017?  Can we help you with any outstanding threat protection, data compliance or mobile device management issues?  Always happy to chat and provide an alternative quote with no obligation.  

(more…)

McAfee Endpoint Security

Join AVR at IP Expo

Europe’s leading IT exhibition takes place on 4th and 5th October at London’s ExCel. AVR will be attending the exhibition and would be delighted to meet with you, discuss your information security issues and guide you around the wide range of exhibitors stands. You can register for IP Expo here.

(more…)

businessman mobile

Is workforce mobility putting you at risk?

Smartphones, iPads, tablets and laptops are ubiquitous across our personal and commercial lives, changing the way we communicate. This workforce mobility provides great flexibility and increased productivity but it does leave you open to a cyber attack or data breach.  So how do you balance the risk?  Join our webinar on Thursday 7th September and hear how you can safely use your mobile devices with protection from Lookout Mobile Security.

(more…)

small business information security

I’m too small to be a target

‘I’m too small to be a target’ must be one of the most common phrases we hear when talking to companies about cyber attacks and data breaches.  It’s understandable when the media is quick to broadcast news of large scale computer virus or Ransomware attacks on well-known businesses.  The reality is quite different. Statistics from Small Business Trends shows that 43% of cyber attacks target small businesses, with just 14% being effective at mitigating attacks and sadly 60% of small companies go out of business within six months of a cyber attack.

(more…)

Penetration testing

How do you know where the weak points are in your network?

So if we are to accept as many of the information security experts are now telling us that cyber-attacks are inevitable on virtually every business and organisation then what are you going to do about it?

Data has become the most precious commodity and those companies that hold sensitive, confidential and personal information, which is pretty much everybody, are targets for the bad guys who want to trade or exploit it for financial gain.

We have in the past, talked about stopping or preventing attacks but with the new strains of malware, this is becoming much more difficult, so now’s the time to switch attention to detection and remediation.  However, before you can start to assess which solution would be the most appropriate for your business, you have to understand where the vulnerable or weak points are in your network. Simulating an attack with Pen Testing is the most effective way of identifying the gaps in your defences.

(more…)

Mobile Device Security

How vulnerable are your mobile devices?

What is the Spectrum of Risk for your business mobile devices? Smartphones, iPads, tablets and laptops are ubiquitous across our personal and commercial lives, changing the way we communicate. This mobility gives us flexibility and increased productivity but it does leave us more open to a cyber attack or data breach?  So how do you balance the risk? Do you know if your mobile device network could be vulnerable? Would you like a complimentary, no-obligation Enterprise Mobile Risk Assessment for your business to help identify where you might be vulnerable?

(more…)

Secure your email against data loss

How would businesses and organisations run without email?  In truth they would struggle or grind to a halt.  Email is without doubt the most widely used business communications tool and we use it instinctively.  However it has become one of the most effective routes for cyber attacks to penetrate a network or a sensitive data leak to cause a breach.  Securing the email gateway is a vital requirement. Today. businesses must be able to manage the flow of sensitive information and appropriately secure it to protect the value and reputation of their brands. They must also comply with current and forthcoming data protection regulations, while enabling the business to be productive at the same time.  So a solution that could automatically protect critical data, remove only the content that breaks company policies and sends the rest of the email onward would be ideal, right?  We have the answer!

(more…)