IT security

Business

Security and the Cloud

There’s been a lot of talk in recent years surrounding security and the cloud and it was something that delayed initial traction in the market until reasonably recently. However, as more and more businesses have made the transition, it’s clear that faith in cloud services has grown.

Despite a recent Ponemon Institute study, which found that moving to the cloud could triple the cost of a data breach, there’s still plenty of evidence to suggest that the cloud is much safer than many business premises.

45% of Network Attacks Due to Malware

A recent study by NTT Group found that businesses are still not doing enough when it comes to securing the company network. In fact, it was found (somewhat worryingly) that many businesses don’t even have the most basic protection, such as antivirus software and vulnerability scanning, in place.

Security

Windows 8: An Open Door for Cybercriminals?

Windows 8 represents a huge step forward for Microsoft’s operating system, especially for touchscreen devices. Microsoft has also made bold claims that the new system would be less appealing to hackers, thanks to the increased security measures that include built-in antivirus software.

Progress rarely comes without a price, however, and Microsoft may have again underestimated the determination of the hacking community. There are a lot of shiny new features in the new OS and substantial improvements in almost every area, but there are also disturbing weaknesses that cybercriminals could exploit to the full.

The Ongoing Windows Experience

This is not exclusive to Windows 8: every generation of Windows operating system has faced this baptism of fire.  A whole new wave of architecture means there are inevitably holes that an army of hackers take great joy in exposing to the world.

 It’s an international sport for some, with hackers exchanging bragging rights on forums around the world. For others, it’s big business. Cybercriminals have turned hacking systems in to one of the big growth industries of the new Millennium. So it was not a big surprise that within days of receiving Windows 8, French agency Vupen had found its first virus. That’s how fast this ‘market’ moves.

Security

Choosing a Unified Threat Management Vendor

While eachorganization will have its own criteria for choosing a Unified Threat
Management vendor, performance and reliability are likely to rank highly on
their list of criteria.  At the end of
the day when choosing a Unified Threat Management vendor many companies will
simply be looking for a product which does the job and does it reliably.  

The first
and most obvious point to check when choosing a Unified Threat Management
vendor is whether or not they are capable of supporting the core security features
you require.  Typically these would
include: a firewall, URL filtering and malware-detection capabilities.

 

Scroll to Top