Don’t get locked out! Avoiding the risk of ransomware

 Don't get locked out! Avoiding the risk of ransomware

Ransomware: most insidious malware threats

Ransomware: it might sound like the title of the next summer blockbuster, but this clever little portmanteau has become one of the most insidious malware threats. As you are probably already aware, this nasty malware strain takes advantage of lax security controls and does devastating damage. Nothing really new there, malware by its nature exploits vulnerabilities and is malicious and damaging. But what’s especially troubling with ransomware is that the ‘bad guys’ literally hold your business’s most important asset—your corporate data—hostage.

[Read more…]

Why Endpoint Security Is More Vital Than Ever.

Why Endpoint Security Is More Vital Than Ever. Enter DLP.

Data loss prevention (DLP) software is more important than ever

The intricacies and importance of data loss prevention (DLP) software are rarely part of overall public discussions. While IT experts and enterprise leaders are all too familiar with the need to have comprehensive and robust endpoint security in their networks, the average person probably doesn’t think twice about the effort that goes into the systems they use and access on a daily basis.

That is, until something goes wrong. [Read more…]

It’s time we re-examine virtual security practices

It's time we re-examine virtual security practices

We’ve been hearing about the potential benefits of using a security solution designed specifically for virtual environments for a few years.

Unfortunately, many infosec departments continue to protect virtual environments with traditional, or legacy, approaches. While this is certainly a step in the right direction, something many see as “good enough,” the fact is traditional security doesn’t cut it, and exposes you to risk. To put a finer point on it, not adopting VM-focused solutions has the added impact of taking away those hard earned efficiency gains, promised by a virtual environment.

With more data centers in the cloud than ever, waiting around to address this problem is no longer feasible. Just look at what happened with the VENOM exploit — a vulnerability that put millions of virtual machines at risk — and you’ll see that hackers have started to attack these ubiquitous virtual machines in sophisticated new ways.

Now that virtualization has become the norm  it’s time we re-examined the need for better, virtual-specific modes of keeping your servers safe and secure.

[Read more…]