Let’s face it, a cyber attack or data breach is no laughing matter! Most IT security experts believe attacks are inevitable and are urging us to ‘Protect your endpoints’ with good reason. With so many devices in use; mobiles, smartphones, tablets, laptops, desktops, etc., the threat of a cyber attack or data breach is sadly more likely than ever, but do you know how much your business or organisation might be at risk? World leading Endpoint Security company McAfee™ can help you assess your risk with an Endpoint Protection Survey or Free IT Health Check and you’ll receive a complimentary £10 shopping voucher too!
AVR is delighted to be the proud recipient of a 2018 Lookout Outstanding Contribution award. The award which is given to the highest achieving partners in each country, was presented to AVR MD Nick Kellaway at Lookout’s EMEA Partner Conference which took place in Marbella, Spain on 13th and 14th June.
‘Protect your endpoints’ is the key message from all the IT security experts and with good reason. With all of us having so many devices – mobiles, smartphones, tablets, laptops, desktops, etc – the cyber attack or data breach threat is broader than ever and this fractured approach works in the cyber criminals’ favour. Many solution providers claim to have a product that can defeat or prevent an attack but few can claim total protection. One that can is McAfee©, arguably the most recognised IT security brand and market leader in Endpoint Security.
A newly identified serious mobile cyber security threat has just been announced. Dark Caracal is an advanced persistent threat, which targets mobile devices (#mAPT) across multiple platforms on a global level. Attacking major institutions including government, legal, financial, utilities, manufacturing and defence, Dark Caracal has compromised many devices, accessing hundreds of gigabytes of data, enterprise intellectual property and personally identifiable information from professionals and executives.
What would we do without our mobile phones and tablets? None of us wants to think we are dependent on them but mobile devices have totally revolutionised the way we live and work. Mobiles are vital to businesses but are yours as effective as they could be? Do you have processes that ensure all mobiles are secure and access to valuable business data is controlled? AVR’s 10 Steps to Mobility Success E-Book can help and guide you to creating a mobile device management programme that can help take your business to the next level.
In today’s world of text speak, instant messaging, emoticons and emoji’s, less is more! For most people, mobile phones are the primary form of communication and their use within business is now ubiquitous. As capable as mobile devices – smartphones, tablet devices, laptops – are at easing communications and improving productivity, if there is not structure and control to their usage, there is a risk that they can open the organisation to a cyber attack or data breach, particularly if the mobiles are the employees own as in BYOD – Bring Your Own Device. So businesses need TBH – To Be Honest and KISS – Keep It Simple Stupid! No offence!
‘I’m too small to be a target’ must be one of the most common phrases we hear when talking to companies about cyber attacks and data breaches. It’s understandable when the media is quick to broadcast news of large scale computer virus or Ransomware attacks on well-known businesses. The reality is quite different. Statistics from Small Business Trends shows that 43% of cyber attacks target small businesses, with just 14% being effective at mitigating attacks and sadly 60% of small companies go out of business within six months of a cyber attack.
So if we are to accept as many of the information security experts are now telling us that cyber-attacks are inevitable on virtually every business and organisation then what are you going to do about it?
Data has become the most precious commodity and those companies that hold sensitive, confidential and personal information, which is pretty much everybody, are targets for the bad guys who want to trade or exploit it for financial gain.
We have in the past, talked about stopping or preventing attacks but with the new strains of malware, this is becoming much more difficult, so now’s the time to switch attention to detection and remediation. However, before you can start to assess which solution would be the most appropriate for your business, you have to understand where the vulnerable or weak points are in your network. Simulating an attack with Pen Testing is the most effective way of identifying the gaps in your defences.