25 Nov

5 Ways to Maintain Your ERP’s Data Security

High-profile network breaches in recent years have impacted the discussion of data security significantly. The ability of institutions to safeguard personal information has come into question, even to the point of government entities enacting new legislation that mandates increased effort towards individual data safety. As current data loss prevention methods are reevaluated, so too will the data security of enterprise software systems have to be.

read more

Share this
18 Nov

How Malware Is Using Your PC for Cyber Attacks

It’s not just botnets that can hijack PCs for nefarious ends. Microsoft and Cisco’s Talos researchers have identified a new malware strain, Nodersok (or Divergent), that uses web apps to turn systems into proxies for malicious internet traffic.

read more

Share this
11 Nov
04 Nov

Protect Yourself from Cyber Threats During Holidays

The holiday season often leads to an increased risk of cybersecurity threats. You may notice an increase in offers coming to you via email, or online ads with attractive promotions for gifts, travel, etc. Unfortunately, some of these offers don’t turn out exactly what you ordered and paid for, so instead of saving money, you can be fooled and get into a situation of data theft, identity, or personal items. Therefore, when it comes to online security, here are the things you can do to protect yourself during the holiday season.

read more

Share this
28 Oct

How Speakers Can Be Used as Cyber Weapons

Speakers are everywhere, whether it’s expensive, standalone sound systems, laptops, smart home devices, or cheap portables. And while you rely on them for music or conversation, researchers have long known that commercial speakers are also physically able to emit frequencies outside of the audible range for humans. At the Defcon security conference in Las Vegas held recently, one researcher is warning that this capability has the potential to be weaponized.

read more

Share this
14 Oct

How Secure Are We During Cyber War?

If the first war was fought with sticks and stones, the next one likely will be fought with data. Cyber threats both big and small are increasing around the world, and they come with serious implications for governments and businesses that struggle to stay a step ahead of digital criminals.

read more

Share this
07 Oct

3 Things to Know About Industrial IoT (IIoT)

The infrastructure around the world becomes more connected each day. We can thank the Industrial Internet of Things (IIoT) for this connectedness, which stretches far beyond fitness bands to connecting machines and devices in industries such as transportation, manufacturing, healthcare, construction and more.

read more

Share this
30 Sep

Why You Need an Antivirus Even If It Isn’t Enough

Traditional signature-based antivirus is notoriously bad at stopping newer threats such as zero-day exploits and ransomware, but it still has a place in the enterprise, experts say, as part of a multi-layer endpoint security protection strategy. The best antivirus products act as the first layer of defense, stopping the vast majority of malware attacks and leaving the broader endpoint protection software with a smaller workload to deal with.

read more

Share this
23 Sep

Threat Detection and Response Technologies Integration (Infographic)

Threat detection and response is difficult and only getting more complicated. One of the primary reasons is that many organizations approach threat detection and response through a maze of disconnected point tools. In fact, ESG research indicates that 66% of organizations agree that threat detection/response effectiveness is limited because it is based upon multiple independent point tools. But, by all accounts, integration is the key. See how in this infographic!

read more

Share this
26 Aug

Cyber Espionage: The Most Popular Form of Cyber Crime Today

According to Verizon’s 2017 Data Breach Investigations Report, espionage-related cyber attacks are growing in popularity, with malware and phishing still go-to tools for hackers as well.

read more

Share this

© 2017 Awontis. All rights reserved.