Ransomware attack

Join our Petya-NotPetya Ransomware webinar – Wednesday 28th June at 4.00pm

Here we go again!  Another major, global Ransomware attack has launched that is causing havoc and disruption to businesses and organisations across the world.  The cyber-attackers are demanding ransoms to release or unlock data, which in most cases will never be recovered.  There is an answer.  There is total and complete managed Endpoint Protection that will protect and detect against the threat.

AVR is running a Custodian360 webinar at 4.00pm GMT today, Wednesday 28th June, where we will talk about the current threat and examine the forensics of the attack that some are calling Petya and some are not! To register for the webinar, complete the form below and we will confirm your registration immediately.

(more…)

Mobile Device Security

How vulnerable are your mobile devices?

What is the Spectrum of Risk for your business mobile devices? Smartphones, iPads, tablets and laptops are ubiquitous across our personal and commercial lives, changing the way we communicate. This mobility gives us flexibility and increased productivity but it does leave us more open to a cyber attack or data breach?  So how do you balance the risk? Do you know if your mobile device network could be vulnerable? Would you like a complimentary, no-obligation Enterprise Mobile Risk Assessment for your business to help identify where you might be vulnerable?

(more…)

Secure your email against data loss

How would businesses and organisations run without email?  In truth they would struggle or grind to a halt.  Email is without doubt the most widely used business communications tool and we use it instinctively.  However it has become one of the most effective routes for cyber attacks to penetrate a network or a sensitive data leak to cause a breach.  Securing the email gateway is a vital requirement. Today. businesses must be able to manage the flow of sensitive information and appropriately secure it to protect the value and reputation of their brands. They must also comply with current and forthcoming data protection regulations, while enabling the business to be productive at the same time.  So a solution that could automatically protect critical data, remove only the content that breaks company policies and sends the rest of the email onward would be ideal, right?  We have the answer!

(more…)

Wannacrypt

WannaCry Ransomware – the story so far

Friday the 12th of May 2017 saw the first Ransomware worm that we have seen in the wild wreak havoc across the globe, striking indiscriminately at those running Windows XP, Windows Server 2003 or un-patched Windows 7 Operating Systems. This worm has exploited the vulnerability MS17-010 allowing it to spread through a network at alarming speed and with no user interaction.

This week we are running webinars at 3.00pm and 4.00pm GMT every day where we will talk about the current threat landscape and show WannaCry in action before taking a deep dive into the forensics of the attack. To register for one of these, complete the form below and we will confirm the joining details immediately.

(more…)

Wannacrypt ransomware

Is Wannacrypt Ransomware worm the tip of the iceberg?

The media has been swamped with reports of the large scale Ransomware attack that broke on Friday 12th May. In the past, Ransomware was more about affecting single users but Wannacrypt (or Wannacry as it is also known) changed that and became the first Ransomware worm with the ability to search out other vulnerable computers and infect them.

Companies across the world were shut down and unable to work. Many today are working to restore systems from back-up and put their businesses back online. If you were not affected then that’s good news but without scaremongering, can you afford to remain unprotected against threats like this? Now is the time to act.

(more…)

AVR gets Down and Dirty for Children with Cancer UK

‘Where there’s muck there’s brass’ the old saying goes and that’s certainly true for the AVR Cyber Warriors who successfully completed the Tough Half Mudder challenge in Henley on Saturday 6th May 2017.

Nine brave members of the AVR team ran, jogged, limped, piggy-backed and crawled a distance of five miles through muddy terrain, clambering over 13 challenging obstacles, raising an incredible £4,300 for the Children with Cancer UK charity!  This truly magnificent effort was accomplished without any serious injury although there are a wide range of bruises, aching muscles and sore legs to show for their efforts!

(more…)

AVR IT Security Assessment

Your IT Security Assessment is waiting

AVR’s IT Security Assessment will check if you’re really protected.

So your business network has Anti-Virus software and a Firewall installed and you may have some form of threat protection solution too.  Or do you? The  BBC reports here on a survey by the British Chamber of Commerce that one in five UK businesses were attacked last year, yet only 25% have some form of protection.  Are you really confident your business is fully protected?  Take advantage of our free, no-obligation IT Security Assessment.

(more…)

Helen Hall AVR

AVR MD Helen Hall announces she is expecting a baby!

Times are changing in security and at AVR!

The Cyber Security world seems to have come around full circle in the past few years! Who would have thought that 15 years on from launching a business called Anti Virus Reseller we would be here again, all talking about Malware, Ransomware and (Next Generation) Anti Virus!

One thing that hasn’t changed is AVRs’ family feel and I am delighted to be able to tell you that we are adding to the family as I am expecting a precious baby girl in May! My partner Ross and I have wanted to start a family together for some time now so we are truly over the moon!

(more…)

AVR Mobility

Let AVR Manage your Business Mobile Devices

Your mobile devices – smartphones, tablets, laptops – add so much to your business, in fact you probably can’t do without them! Yet managing them efficiently can be a real resource headache. Mobile devices do so much; calls to clients colleagues and customers, surfing web sites, reading confidential data, accessing apps, ordering goods, sales presentations, product demonstrations and more. Keeping them working, up-to-date and secure is vital, but this can cause your valuable technical resource to be diverted from other critical, operational tasks.  AVR’s professional and expert Mobility Managed Service can turn this time-stealing overhead into an indispensable revenue generator.

(more…)

Mobile Device Security

Assess your Mobile Endpoint Security with AVR and Lookout

Why do you need security on a mobile device?  The increased use of mobile devices in business substantially increases the chance of a data breach or cyber attack.  Businesses and organisations without effective mobile endpoint threat protection are gambling with the security of their networks and the future of their companies .

So how much at risk are your company mobiles? Now you can conduct a simple self-assessment with the smart new Lookout AssessMy tool, a quick, easy-to-complete survey, which will produce a report that clearly identifies where your network could be vulnerable.

(more…)