King Street Townhouse

You’re invited to our evening Ransomware seminar in Manchester on 19th October

Ransomware remains a clear and present threat to all businesses and organisations, but what is it, how does it operate and how can you protect your company’s vital data and endpoints? Together with Endpoint Security specialists SentinelOne, AVR will discuss over drinks and canapes at the sumptuous King Street Townhouse, how you can secure against this pernicious threat.

(more…)

SentinelOne Endpoint Protection

We can stop every type of endpoint attack

Almost half of UK businesses were hit by a cyber attack in 2016. Seven out of ten large firms identified a breach and those businesses holding electronic data were twice as likely to be attacked (UK Government Cyber Breaches Survey 2017).  All of those attacked will have anti-virus and firewalls in place, but today’s advanced malware can breach those defences.  Next Generation Endpoint Protection will stop every type of attack at every stage in the threat life-cycle.  So what’s stopping you giving your business this vital security?

(more…)

McAfee Endpoint Security

Join AVR for breakfast at IP Expo

Europe’s leading IT exhibition takes place on 4th and 5th October at London’s ExCel. AVR is hosting a pre-Expo breakfast on the morning of Thursday 5th and we’d love you to be there! Hear from AVR and McAfee on how you can lock down your endpoint security and keep your network and data secure. Register for IP Expo and our Breakfast event here.

(more…)

businessman mobile

Is workforce mobility putting you at risk?

Smartphones, iPads, tablets and laptops are ubiquitous across our personal and commercial lives, changing the way we communicate. This workforce mobility provides great flexibility and increased productivity but it does leave you open to a cyber attack or data breach.  So how do you balance the risk?  Join our webinar on Thursday 7th September and hear how you can safely use your mobile devices with protection from Lookout Mobile Security.

(more…)

small business information security

I’m too small to be a target

‘I’m too small to be a target’ must be one of the most common phrases we hear when talking to companies about cyber attacks and data breaches.  It’s understandable when the media is quick to broadcast news of large scale computer virus or Ransomware attacks on well-known businesses.  The reality is quite different. Statistics from Small Business Trends shows that 43% of cyber attacks target small businesses, with just 14% being effective at mitigating attacks and sadly 60% of small companies go out of business within six months of a cyber attack.

(more…)

Penetration testing

How do you know where the weak points are in your network?

So if we are to accept as many of the information security experts are now telling us that cyber-attacks are inevitable on virtually every business and organisation then what are you going to do about it?

Data has become the most precious commodity and those companies that hold sensitive, confidential and personal information, which is pretty much everybody, are targets for the bad guys who want to trade or exploit it for financial gain.

We have in the past, talked about stopping or preventing attacks but with the new strains of malware, this is becoming much more difficult, so now’s the time to switch attention to detection and remediation.  However, before you can start to assess which solution would be the most appropriate for your business, you have to understand where the vulnerable or weak points are in your network. Simulating an attack with Pen Testing is the most effective way of identifying the gaps in your defences.

(more…)

Ransomware attack

Join our Petya-NotPetya Ransomware webinar – Wednesday 28th June at 4.00pm

Here we go again!  Another major, global Ransomware attack has launched that is causing havoc and disruption to businesses and organisations across the world.  The cyber-attackers are demanding ransoms to release or unlock data, which in most cases will never be recovered.  There is an answer.  There is total and complete managed Endpoint Protection that will protect and detect against the threat.

AVR is running a Custodian360 webinar at 4.00pm GMT today, Wednesday 28th June, where we will talk about the current threat and examine the forensics of the attack that some are calling Petya and some are not! To register for the webinar, complete the form below and we will confirm your registration immediately.

(more…)

Mobile Device Security

How vulnerable are your mobile devices?

What is the Spectrum of Risk for your business mobile devices? Smartphones, iPads, tablets and laptops are ubiquitous across our personal and commercial lives, changing the way we communicate. This mobility gives us flexibility and increased productivity but it does leave us more open to a cyber attack or data breach?  So how do you balance the risk? Do you know if your mobile device network could be vulnerable? Would you like a complimentary, no-obligation Enterprise Mobile Risk Assessment for your business to help identify where you might be vulnerable?

(more…)

AVR at InfoSec

Meet AVR and Custodian360 at InfoSec

InfoSecurity, Europe’s premier Information Security Conference and Expo arrives at Olympia London on Tuesday 6th to 8th June where AVR and Custodian360 will be there!  AVR will be guiding people through the maze of hundreds of exhibitors, identifying the right solution providers.  Custodian360 will be exhibiting on the show floor, demonstrating its unique Total Managed Endpoint Protection solution.  We’d love you to join us!

(more…)

Wannacrypt

WannaCry Ransomware – the story so far

Friday the 12th of May 2017 saw the first Ransomware worm that we have seen in the wild wreak havoc across the globe, striking indiscriminately at those running Windows XP, Windows Server 2003 or un-patched Windows 7 Operating Systems. This worm has exploited the vulnerability MS17-010 allowing it to spread through a network at alarming speed and with no user interaction.

This week we are running webinars at 3.00pm and 4.00pm GMT every day where we will talk about the current threat landscape and show WannaCry in action before taking a deep dive into the forensics of the attack. To register for one of these, complete the form below and we will confirm the joining details immediately.

(more…)