One of the greatest advantages of the dark web is the anonymity and encryption it offers while allowing users to access everything on the world wide web. This also makes it the hotbed of some of the most notorious cyberattacks. Much of the dark net’s activities are focused around marketplaces that offer ammunition, pornography, drugs, […]
Security tips by Dave Malarky, CEO: Supercomputers
https://www.youtube.com/watch?v=Oysh35-zAdA You don’t need a (possibly evil) supercomputer to guard against cyber threats like hackers. Let Sophos protect you instead Click HERE to learn more about Sophos’ security solutions!
Security tips by Dave Malarky, CEO: Kung Fu
https://www.youtube.com/watch?v=jOj7R6_9tzs You don’t need a Kung Fu Master Click HERE to learn more about Sophos’ security solutions!
Reduce the Risk of Data Breach by Focusing on Compromised Credentials
The bad guys can’t do anything on your network without access. That’s why they focus their efforts on gathering as many sets of credentials as possible. You should focus there too. The cybercriminals don’t just want to get onto a user’s endpoint and simply stop there; their goal is most commonly to monetize the attack […]
Security tips by Dave Malarky, CEO: Shredding vs Encrypting
https://www.youtube.com/watch?v=lRabfR41z3U Don’t lose anymore ties to shredding. Click HERE to learn more about Sophos’ security solutions!
Security tips by Dave Malarky, CEO: Siri
https://www.youtube.com/watch?v=-D66NqBJk4Q Don’t rely on Siri to eliminate ransomware. Click HERE to learn more about Sophos’ security solutions!
Security tips by Dave Malarky, CEO: Time Machine
https://www.youtube.com/watch?v=yOanjvMb8X4 You won’t need a time machine to get out of a ransomware attack, but you will need Sophos. Click HERE to learn more about Sophos’ security solutions!
Are you wasting money on this common cybersecurity investment?
A wasted investment is the last thing any organization needs, yet the cost of a cybersecurity solution doesn’t necessarily equate to value. Consider Security Information and Event Management, or SIEM tools for example. Dark Reading points out that the tool itself is not the key factor in the effectiveness – it must be properly configured […]
Could you have the same vulnerability that led to the Equifax breach?
Regardless of the size of your organization, it’s very likely that you could. Vulnerabilities including the bug reportedly responsible for Equifax’s data breach are still common elements of open-source systems used by developers for creation of business applications and web portals. While this saves time and money on the development side, unless they perform regular […]
Canada has a new cybersecurity strategy – does it impact you?
Do you do business with companies in Canada? A recent government survey showed that although 94% of Canadian business collect personal data from their customers, they still have a long way to go to in protecting it, with three quarters of the business executives and owners having never reviewed their responsibilities and one third not […]