Proofpoint Essentials

Essential threat protection from Proofpoint

As small and medium sized businesses are under threat of cyber attack as much as larger organisations, they need the same high standard of threat protection. Not all solution providers can deliver this, but Proofpoint Essentials does. Combining key security elements to protect across email, web and social media, the Proofpoint Essentials solution blends extensive threat protection expertise with an in-depth knowledge of the demands of smaller organisations.

AVR and Proofpoint are hosting an email security survey here and we invite you to participate. In return for just two minutes of your time, you will receive a £10 Starbucks Coffee voucher with our compliments.

(more…)

Lookout Mobile Security

How much risk are you taking with your mobiles?

Mobile infection rates rose in the last twelve months and will continue to do so as cyber criminals are increasingly turn their focus to mobile devices as these endpoints have little or no protection on them. The assumption is mobile devices are safe, have built in security or are enrolled in an MDM (Mobile Device Management) solution securing the device. This assumption is wrong. There are a wealth of threats targeted at mobile devices, such as man-in-the-middle attacks, data leakage, malicious apps, out of date OS. To protect against these you need to understand what risks your mobile devices are prone to.

To help assess how vulnerable your business may be, AVR, in association with mobile security specialists Lookout, is offering for a limited period, a complimentary Mobile Risk Assessment with the opportunity to win a Spa Weekend break in our exciting prize draw.

(more…)

SentinelOne Hacking Workshop

You’re invited to the AVR and SentinelOne Ultimate Hacking workshop

There is at least a 50% chance your business or organisation will face a cyber attack and sadly it’s only going to get worse. If you’ve avoided an attack or breach so far then you can count yourselves lucky the odds of remaining cyber secure are fast reducing. On the plus side, there is a truly effective answer and we’d like to give you the opportunity to get hands-on with the ultimate in threat protection at our powerful, interactive workshop.

Join us for the SentinelOne Ultimate Hacking workshop at AVR’s Twyford office, near Reading, on the afternoon of Thursday 15th November and experience personally how you can defeat a live cyber attack. Register below for this invaluable experience below.

(more…)

Symantec Web Isolation from AVR

Keep surfing safely with the best web security solution

How safe is it to surf the Web? The internet is such a vital tool for personal and business use yet the threat of cyber attack or data breach from web based malware or phishing threats is higher than ever. How confident are you that you and your colleagues can go online safely and not inadvertently provide access to malware that could cause disastrous consequences to your network or data? Consider a comprehensive Web Security solution from AVR which will give you complete protection with totally uninhibited, transparent user access.

(more…)

King Street Townhouse

Join our Ransomware seminar in Manchester on 24th January

Ransomware remains a major threat to ALL businesses and organisations, but what is it? How does it operate and how can you protect your company’s vital data and endpoints? Together with Endpoint Security specialists SentinelOne, AVR will explain how over drinks and canapes at the elegant King Street Townhouse on the evening of Wednesday 24th January. We would love you to join us!

(more…)

small business information security

I’m too small to be a target

‘I’m too small to be a target’ must be one of the most common phrases we hear when talking to companies about cyber attacks and data breaches.  It’s understandable when the media is quick to broadcast news of large scale computer virus or Ransomware attacks on well-known businesses.  The reality is quite different. Statistics from Small Business Trends shows that 43% of cyber attacks target small businesses, with just 14% being effective at mitigating attacks and sadly 60% of small companies go out of business within six months of a cyber attack.

(more…)

Penetration testing

How do you know where the weak points are in your network?

So if we are to accept as many of the information security experts are now telling us that cyber-attacks are inevitable on virtually every business and organisation then what are you going to do about it?

Data has become the most precious commodity and those companies that hold sensitive, confidential and personal information, which is pretty much everybody, are targets for the bad guys who want to trade or exploit it for financial gain.

We have in the past, talked about stopping or preventing attacks but with the new strains of malware, this is becoming much more difficult, so now’s the time to switch attention to detection and remediation.  However, before you can start to assess which solution would be the most appropriate for your business, you have to understand where the vulnerable or weak points are in your network. Simulating an attack with Pen Testing is the most effective way of identifying the gaps in your defences.

(more…)