McAfee Endpoint Security

Join AVR at IP Expo

Europe’s leading IT exhibition takes place on 4th and 5th October at London’s ExCel. AVR will be attending the exhibition and would be delighted to meet with you, discuss your information security issues and guide you around the wide range of exhibitors stands. You can register for IP Expo here.

(more…)

businessman mobile

Is workforce mobility putting you at risk?

Smartphones, iPads, tablets and laptops are ubiquitous across our personal and commercial lives, changing the way we communicate. This workforce mobility provides great flexibility and increased productivity but it does leave you open to a cyber attack or data breach.  So how do you balance the risk?  Join our webinar on Thursday 7th September and hear how you can safely use your mobile devices with protection from Lookout Mobile Security.

(more…)

BYOD Maas360

BYOD? TBH AVR say KISS!

In today’s world of text speak, instant messaging, emoticons and emoji’s, less is more!  For most people, mobile phones are the primary form of communication and their use within business is now ubiquitous.  As capable as mobile devices – smartphones, tablet devices, laptops – are at easing communications and improving productivity, if there is not structure and control to their usage, there is a risk that they can open the organisation to a cyber attack or data breach, particularly if the mobiles are the employees own as in BYOD – Bring Your Own Device.  So businesses need TBH – To Be Honest and KISS – Keep It Simple Stupid! No offence!

(more…)

small business information security

I’m too small to be a target

‘I’m too small to be a target’ must be one of the most common phrases we hear when talking to companies about cyber attacks and data breaches.  It’s understandable when the media is quick to broadcast news of large scale computer virus or Ransomware attacks on well-known businesses.  The reality is quite different. Statistics from Small Business Trends shows that 43% of cyber attacks target small businesses, with just 14% being effective at mitigating attacks and sadly 60% of small companies go out of business within six months of a cyber attack.

(more…)

Penetration testing

How do you know where the weak points are in your network?

So if we are to accept as many of the information security experts are now telling us that cyber-attacks are inevitable on virtually every business and organisation then what are you going to do about it?

Data has become the most precious commodity and those companies that hold sensitive, confidential and personal information, which is pretty much everybody, are targets for the bad guys who want to trade or exploit it for financial gain.

We have in the past, talked about stopping or preventing attacks but with the new strains of malware, this is becoming much more difficult, so now’s the time to switch attention to detection and remediation.  However, before you can start to assess which solution would be the most appropriate for your business, you have to understand where the vulnerable or weak points are in your network. Simulating an attack with Pen Testing is the most effective way of identifying the gaps in your defences.

(more…)

Mobile Device Security

How vulnerable are your mobile devices?

What is the Spectrum of Risk for your business mobile devices? Smartphones, iPads, tablets and laptops are ubiquitous across our personal and commercial lives, changing the way we communicate. This mobility gives us flexibility and increased productivity but it does leave us more open to a cyber attack or data breach?  So how do you balance the risk? Do you know if your mobile device network could be vulnerable? Would you like a complimentary, no-obligation Enterprise Mobile Risk Assessment for your business to help identify where you might be vulnerable?

(more…)

Secure your email against data loss

How would businesses and organisations run without email?  In truth they would struggle or grind to a halt.  Email is without doubt the most widely used business communications tool and we use it instinctively.  However it has become one of the most effective routes for cyber attacks to penetrate a network or a sensitive data leak to cause a breach.  Securing the email gateway is a vital requirement. Today. businesses must be able to manage the flow of sensitive information and appropriately secure it to protect the value and reputation of their brands. They must also comply with current and forthcoming data protection regulations, while enabling the business to be productive at the same time.  So a solution that could automatically protect critical data, remove only the content that breaks company policies and sends the rest of the email onward would be ideal, right?  We have the answer!

(more…)

AVR Mobility

Let AVR Manage your Business Mobile Devices

Your mobile devices – smartphones, tablets, laptops – add so much to your business, in fact you probably can’t do without them! Yet managing them efficiently can be a real resource headache. Mobile devices do so much; calls to clients colleagues and customers, surfing web sites, reading confidential data, accessing apps, ordering goods, sales presentations, product demonstrations and more. Keeping them working, up-to-date and secure is vital, but this can cause your valuable technical resource to be diverted from other critical, operational tasks.  AVR’s professional and expert Mobility Managed Service can turn this time-stealing overhead into an indispensable revenue generator.

(more…)

Mobile Device Security

Assess your Mobile Endpoint Security with AVR and Lookout

Why do you need security on a mobile device?  The increased use of mobile devices in business substantially increases the chance of a data breach or cyber attack.  Businesses and organisations without effective mobile endpoint threat protection are gambling with the security of their networks and the future of their companies .

So how much at risk are your company mobiles? Now you can conduct a simple self-assessment with the smart new Lookout AssessMy tool, a quick, easy-to-complete survey, which will produce a report that clearly identifies where your network could be vulnerable.

(more…)

Antivirus

Antivirus works…but today your business needs more

Antivirus software has been protecting computer systems since the 1980’s and has helped to keep millions of businesses operating effectively.  Nothing lasts for ever so the saying goes and over the past few years the view that antivirus is dead has been widely promoted.  The main cause for these pronouncements has been the rise of new or next generation malware, including the infamous Ransomware, which evades detection by traditional antivirus.

(more…)