How to prevent illness on your network - with the right medicine

The winter season is peak time for infection and disease across the UK.  But the old saying “prevention is better than cure“ is not only relevant to our personal health, but also to our networks and IT systems.

In corporate networks, the classic defence against malware and other external attacks is usually split-up between two solutions: a firewall and a traditional antivirus program. The firewall is similar...

By Ronald Sens, 05 December 2018, 0 comments. Categories: Data & Analytics, Enterprise Mobility, Malware, Security.

Ransomware is the ‘number one’ threat for small and medium businesses, argues Datto

Ransomware continues to be the primary attack vector small businesses face, according to a new report from business continuity and networking provider Datto.

The findings appear in the company’s latest Global State of the Channel Ransomware Report, which polled 2,400 managed service providers. According to the report, more than 55% of those polled said their clients had experienced a ransomware attack in the first six...

By James Bourne, 23 November 2018, 0 comments. Categories: Applications, Malware, Security.

Commoditising cybercrime: The rise of ransomware-as-a-service

Recent years have seen a growing number of high-profile ransomware attacks such as WannaCry hit the headlines for their ability to hijack a huge number of computers in a short space of time and extort victims into paying ransoms in order to get their information back. In the case of WannaCry, over 200,000 computers were infected across 150 countries in just four days, with the ransoms being demanded ranging from $300-$600 per computer. Estimates put the...

By Naaman Hart, 21 November 2018, 0 comments. Categories: Data Loss, Malware, Security.

The real deal on cybercrime, breach timelines, and mounting a proactive defence

Here’s something that may seem obvious but is more true today than ever: Organisations that take security breaches seriously (which should be all of them) can’t afford to sit back and take a reactive approach to their defensive strategy. Although a considerable amount of damage can be done in a shockingly short period of time, simple proactive steps can often thwart cybercriminals and defend organisations against a wide variety of attacks.

By Ted Ross, 19 November 2018, 0 comments. Categories: CIO, Data Loss, Malware, Security.

Connecting IoT and personal devices to enterprise networks invites massive security risk, finds Infoblox

Research by network control company Infoblox found that connecting IoT and personal devices to enterprise networks expose the networks to massive security risk including malware injection, phishing and social engineering hacks.

In the research, 35% of enterprises in the US, UK and Germany stated that every day their networks see over 5,000 personal device connections. On the contrary, only 16% of enterprises in the UAE report to have over 500 personal devices connected to their networks. On a typical day,...

By Enterprise CIO, 14 May 2018, 0 comments. Categories: Data & Analytics, Data Loss, IoT, Malware, Security.

Cryptojacking moves to the top of cyber criminals’ toolkit, says Symantec

As the ransomware market becomes ever more overpriced and overcrowded, cryptojacking is fast becoming the method du jour for cyber criminals, according to Symantec.

The findings, in the latest volume of the company’s Internet Security Threat Report (ISTR), argues this represents a personal threat to both cyber and personal security. Over the past year, the enormous increase in the value of cryptocurrencies has led to a cryptojacking ‘gold rush’; in 2017, the detections of coinminers on...

By Enterprise CIO, 26 March 2018, 0 comments. Categories: Data & Analytics, Malware, Security.

WhatsApp and WinZip among most blacklisted enterprise iOS apps, says Appthority

WhatsApp, WinZip, and Pokémon GO were the top iOS apps blacklisted by mobile security teams, according to a new report from enterprise mobile threat protection provider Appthority.

The study, the company’s latest quarterly Enterprise Mobile Security Pulse Report, found iOS apps were most likely to be given the boot due to data leakage for sending SMS messages, tracking location, and sending data unencrypted.

For Android – whose biggest casualties were Where’s My Droid Pro and an...

By James Bourne, 03 October 2017, 0 comments. Categories: Applications, Data Loss, Enterprise Mobility, Malware, Security, Social.

The enterprise manager’s checklist: Getting to grips with DDoS attacks and the botnet army

Distributed denial of service (DDoS) attacks jumped into the mainstream consciousness last year after several high-profile cases - one of the largest and most widely reported being the Dyn takedown in October 2016. While not necessarily a new threat - they have in fact been around since the late ‘90s - the Dyn takedown is an interesting example as it used poorly secured IoT devices to coordinate the attack.  

When you consider that by 2020 it is predicted...

By Ingo Schneider, 26 April 2017, 0 comments. Categories: IoT, Malware, Security.

DDoS attacks grew at CAGR of 68% over past five years, says Arbor Networks

(c)iStock.com/daoleduc

Here’s news we already suspected: DDoS attacks are getting larger and becoming more frequent and complex with it, according to a report released by Arbor Networks. 

The company, the security division of application and performance management firm NetScout, has released its 12th annual worldwide infrastructure security report, and of the 356 respondents, from a mix of service providers, hosting, mobile, enterprise, and network operators, the threat landscape has been...

By Enterprise CIO, 30 January 2017, 0 comments. Categories: Data & Analytics, Data Loss, Malware, Security.

Skycure gets AT&T on board for mobile security partnership

(c)iStock.com/RiverNorthPhotography

Mobile threat solutions provider Skycure has announced that AT&T will resell the Skycure Mobile Threat Defense Platform, helping secure personal and business data on the millions of devices of AT&T business customers.

The company cited research from Information Security, an IT security community on LinkedIn, back in April which argued that one in five organisations analysed had suffered a mobile security breach primarily driven by malware and malicious Wi-Fi, while...

By James Bourne, 19 October 2016, 0 comments. Categories: Enterprise Mobility, Malware, Security.

Lookout and Microsoft enterprise mobility partnership now generally available

(c)iStock.com/AndreyPopov

Mobile security provider Lookout has announced the general availability of its Microsoft-flavoured Lookout Mobile Endpoint Security product, which integrates with the Redmond firm’s Enterprise Mobility + Security (EMS) suite.

The two companies’ partnership was first announced in June, with the message from both sides being clear: companies need to...

By James Bourne, 10 October 2016, 0 comments. Categories: Enterprise Mobility, Malware, Security.

Malware and ‘connection hijacking’ remain biggest BYOD risks, report warns

(c)iStock.com/eabff

A new report from data centre provider CyrusOne outlines malware, device theft and phishing as among the key risks for organisations looking to implement a bring your own device (BYOD) policy.

The findings, located in the report entitled ‘The Top Four BYOD Security Risks and How Enterprise Firms Combat Them’, are not especially surprising, yet still bear consideration. Malware was considered the number one risk, with CyrusOne citing a Blue Coat report from 2015.

The report...

By James Bourne, 05 September 2016, 0 comments. Categories: BYOD, Employee Education, Enterprise Mobility, Malware, Security.

Appthority examines Android mobile threat landscape – but it’s not all bad news

(c)iStock.com/maislam

A new report from mobile security provider Appthority concludes the mobile threat landscape continues to evolve and singles out three recent vulnerabilities in the Play Store which could be a serious issue for enterprises.

The report, the firm’s latest quarterly Enterprise Mobile Threat Update, examines Godless, LevelDropper, and Overlay. Godless, discovered by Trend Micro researchers, potentially affects almost 90% of Android devices, and is able to silently install apps on...

By James Bourne, 12 August 2016, 0 comments. Categories: Android, Enterprise Mobility, Malware, Security.

Microsoft and Lookout seal partnership deal to “secure enterprise mobility together”

(c)iStock.com/Julia_Sudnitskaya

Redmond giant Microsoft and mobile security firm Lookout have announced a new partnership which integrates Lookout’s Mobile Threat Protection product with Microsoft’s Enterprise Mobility Suite (EMS).

Lookout’s Mobile Threat Protection was released almost a year ago to the day, after the company gained a big reputation in uncovering various...

By James Bourne, 08 June 2016, 0 comments. Categories: Enterprise Mobility, Malware, Security.

Mobile threats: Every tool is a weapon if you hold it right

(c)iStock.com/Balavan

A good friend of mine is fond of saying: “The first thing to do in any crisis is panic, but once you’ve got that out of the way you need to figure out what you’re going to do next.” That phrase has always resonated with me because, while alarmism might be our natural instinct, it’s usually not very helpful.

Mobile malware is perplexing because we can’t seem to collectively decide whether it warrants actual panic or is just a minor irritant. The

By MobileIron, 04 January 2016, 0 comments. Categories: Data Loss, Enterprise Mobility, Malware, Security.

Microsoft puts up shutters to stop rogue enterprise apps

(c)iStock.com/JasonDoiy

Microsoft has announced the availability of a new opt-in which claims to stop potentially unwanted applications (PUAs), such as adware from seemingly harmless software bundles, in their tracks.

Enterprise Windows users running System Center Endpoint Protection or Forefront Endpoint Protection will have PUAs blocked at download and install time, according to a company blog post.

The Redmond giant also outlined a series of best practice tips for rolling out PUA protection. Companies need...

By James Bourne, 03 December 2015, 0 comments. Categories: Applications, Malware, Microsoft, Security.

Collaboration features highly in blacklisted apps, claims MobileIron

(c)iStock.com/LPETTET

Dropbox, Angry Birds, and Facebook are the top three consumer apps blacklisted by organisations, according to research from enterprise mobility management (EMM) provider MobileIron.

Not surprisingly, enterprise file sync and share features highly in the top 10 banned apps; with OneDrive (#4), Google Drive (#5), Box (#6), and SugarSync (#10) all registering. The other blacklisted apps listed were WhatsApp, Twitter, and Skype.

It’s worth noting that with many of these banned apps,...

By James Bourne, 04 November 2015, 0 comments. Categories: Applications, Enterprise Mobility, Malware, Security.

Mobile security 101: Eight must-haves to protect mobile data

(c)iStock.com/1PhotoDiva

The new EU Data Protection regulation will hold any company or individual that processes data responsible for its protection, including third parties such as cloud providers. While expected to be implemented in 2017, several countries are getting a head start and are already issuing their own regulations. For example, the Federal German Data Protection Act, includes strict guidelines on how company data should be stored, used, and accessed from...

By Stephan Romeder, 02 October 2015, 0 comments. Categories: Enterprise Mobility, Malware, MAM, MDM, Security.

Appthority warns of spear phishing through Quicksand enterprise iOS vulnerability

(c)iStock.com/Onfokus

Mobile security provider Appthority has disclosed a previously unknown sandbox violation in iOS that was liable to affect enterprise users which has since been patched.

Named ‘Quicksand’, the vulnerability exploited mobile device management (MDM) clients, as well as mobile apps distributed via an MDM which use the ‘managed app configuration’ setting.

For ease of use in setting up MDM clients and apps, IT departments will normally push through the credentials...

By James Bourne, 24 August 2015, 0 comments. Categories: Authentication, Enterprise Mobility, iOS, Malware, Security.

Security awareness and spear phishing: How to stay out of danger

(c)iStock.com/hailshadow

Have you ever received an e-mail that urges you to act quickly and provide your username and password, or one that asks for your birth date and Social Security number through a legitimate-looking (but fraudulent) website to verify your identity? How about a computer request to update your bank details and personal information with the warning that your account was compromised and might be closed if you do not comply?

The first instinct is to click on the provided link or open the...

By Daniel Brecht, 24 August 2015, 0 comments. Categories: Enterprise Mobility, iOS, Malware, Security.