AVR at InfoSec

Will you see Red at InfoSec?

InfoSec is coming to town and AVR would love to be your personal guide! Infosecurity Europe is where the key players in IT security and data protection gather together. This year the expo takes place from 5th to 7th June at London Olympia and with over 400 exhibitors and 240 conference sessions, there is lots to see and do. To ensure you get the most value from your visit, AVR will guide you to the most relevant solution providers. Just tell us what your priorities are and we will create a personalised visit plan. We’ll even treat you to refreshments and lunch too!

(more…)

Cyber threat protection to laugh at

A cyber attack or data breach is no laughing matter. They could cost you big time and that’s even without the potential GDPR fines from the end of May 2018. But we’d like you to have a damn good laugh at our expense and invite you to join us for a fun evening of laughter, fine food and refreshments on the evening of Thursday 24th May at the 99 Comedy Club in London’s Leicester Square.

(more…)

Join AVR for Afternoon Tea

Now that Spring is finally here, you can stop hibernating and get out and about again! What better way to do so than to join AVR for Afternoon Tea at our Twyford office on Friday 27th April? Enjoy delicious sandwiches, cakes and refreshments, enter our prize draw and take home an AVR goodie bag!

(more…)

Complete protection with McAfee Endpoint Security

‘Protect your endpoints’ is the key message from all the IT security experts and with good reason. With all of us having so many devices – mobiles, smartphones, tablets, laptops, desktops, etc – the cyber attack or data breach threat is broader than ever and this fractured approach works in the cyber criminals’ favour. Many solution providers claim to have a product that can defeat or prevent an attack but few can claim total protection. One that can is McAfee©, arguably the most recognised IT security brand and market leader in Endpoint Security.

(more…)

BYOD Maas360

BYOD? TBH AVR say KISS!

In today’s world of text speak, instant messaging, emoticons and emoji’s, less is more!  For most people, mobile phones are the primary form of communication and their use within business is now ubiquitous.  As capable as mobile devices – smartphones, tablet devices, laptops – are at easing communications and improving productivity, if there is not structure and control to their usage, there is a risk that they can open the organisation to a cyber attack or data breach, particularly if the mobiles are the employees own as in BYOD – Bring Your Own Device.  So businesses need TBH – To Be Honest and KISS – Keep It Simple Stupid! No offence!

(more…)

small business information security

I’m too small to be a target

‘I’m too small to be a target’ must be one of the most common phrases we hear when talking to companies about cyber attacks and data breaches.  It’s understandable when the media is quick to broadcast news of large scale computer virus or Ransomware attacks on well-known businesses.  The reality is quite different. Statistics from Small Business Trends shows that 43% of cyber attacks target small businesses, with just 14% being effective at mitigating attacks and sadly 60% of small companies go out of business within six months of a cyber attack.

(more…)

Penetration testing

How do you know where the weak points are in your network?

So if we are to accept as many of the information security experts are now telling us that cyber-attacks are inevitable on virtually every business and organisation then what are you going to do about it?

Data has become the most precious commodity and those companies that hold sensitive, confidential and personal information, which is pretty much everybody, are targets for the bad guys who want to trade or exploit it for financial gain.

We have in the past, talked about stopping or preventing attacks but with the new strains of malware, this is becoming much more difficult, so now’s the time to switch attention to detection and remediation.  However, before you can start to assess which solution would be the most appropriate for your business, you have to understand where the vulnerable or weak points are in your network. Simulating an attack with Pen Testing is the most effective way of identifying the gaps in your defences.

(more…)