Sophos
Displaying 1-40 of 46 results
-
BYOD Risk and Rewards
Whether you’re an end user or an IT administrator, Bring Your Own Device (BYOD) is becoming the rule rather than the exception in today’s workplace. Although BYOD may be a convenience to your employee...
Sponsored By Sophos
-
Ransomware: Hijacking Your Data
Since 2011, users have increasingly seen messages warning that their computer is locked and demanding money in exchange for access to their PCs, purportedly from the FBI and police agencies. These are...
Sponsored By Sophos
-
Eight Trends That Are Changing Network Security
New mobile operating systems, growing use of personal devices, and SaaS (software-as-a-service) delivery make securing the network a growing challenge. We’re seeing ever faster network connections, mo...
Sponsored By Sophos
-
How to Secure Your Wireless Network
It isn’t hard to set up security for the wireless router in your basement: change the SSID, pick a strong password and perhaps install VPN software for remote access. But securing wireless networks in...
Sponsored By Sophos
-
Network protection and UTM Buyers Guide
Using a UTM solution for your network protection used to be a compromise—while you gained in resource savings and ease of use, there was a payoff in terms of protection capabilities. This buyers guide...
Sponsored By Sophos
-
Mobile Madness or BYOD Security?
The BYOD paradigm has rapidly moved from novelty to near inevitability. Even IT organizations with deep concerns about manageability and security are increasingly accommodating user-owned devices. BYO...
Sponsored By Sophos
-
Mobile Device Management Buyers Guide
Mobile device management (MDM) solutions allow IT organizations to centrally manage, monitor and support mobile devices from smartphones to tablets. By using an MDM solution to control and protect the...
Sponsored By Sophos
-
Endpoint Buyers Guide
This buyers guide provides independent research and test results to help you determine your endpoint protection requirements and identify the security vendor that best meets your needs.
Sponsored By Sophos
-
Cookie-Gate, Laptop Security Advice, Stratfor Malicious Emails and Facebook Hacker Advice
In this podcast, the speakers started out discussing a topic that the speaker have been quite passionate about, the "Cookie-gate" incident involving Google and other advertising companies placing cook...
Provided By Sophos
-
Patch Tuesday, Apple App Privacy and RSA
In this podcast, the speakers discussion with Patch Tuesday and the fixes released by Microsoft, Adobe and Oracle. The speaker provided some clarity for Mac users on the confusing mix of Java versions...
Provided By Sophos
-
2012 Buyers Guide to Web Protection
The web is the number one source for malware distribution today. While many organizations have replaced first-generation URL filters with secure web gateways, even these advanced solutions do not prov...
Provided By Sophos
-
Why is a 14-Month-Old Patched Microsoft Vulnerability Still Being Exploited?
In this podcast, the speaker focuses on a specific Microsoft patch, namely MS10-087, released to address the vulnerability CVE-2010-3333 (RTF Stack Buffer Overflow Vulnerability). The patch was releas...
Provided By Sophos
-
Sophos Security Threat Report, DMARC and Mobile Phone Number Leaks
In this podcast, the speakers discussion about the Sophos Security Threat Report 2012. They talked about a few of the highlights like the commonality of exploit kits like Black Hole, the latest trends...
Provided By Sophos
-
NCSA and Data Privacy Day
In this podcast, the speaker explains the history of Data Privacy Day and the importance of understanding privacy on the modern internet. They chatted a bit about the role businesses play in consumer ...
Provided By Sophos
-
Mobile Security Podcast With Vanja Svajcer
In this podcast, the speakers discussed the risk to businesses versus consumers and the impact of the Bring Your Own Device (BYOD) trend that took off in 2011. The speaker also shared some tips with t...
Provided By Sophos
-
Smart Meter Privacy Concerns, WiFi Insecurity Due to WPS and Password Hashes Explained
In this podcast, the speakers discussing the privacy implications of smart meters after the recent presentation at the Chaos Computing Congress. Another story, they covered this week was the attempt a...
Provided By Sophos
-
Data Leaks at Stratfor and Care2 Mark the End of a Year Riddled With Data Theft
In this podcast, the speakers describe about the most important stories in information security, data theft. The data theft may not have been the most important story of 2011, but it certainly impacte...
Provided By Sophos
-
IE 9 Upgrades, Android Malware, Carrier IQ and Hospital Shut Down From Malware
In this podcast, the speaker talks about the very serious problem of safety in medical computer systems after a recent malware outbreak at a hospital in Georgia, USA. Things are not as simple as they ...
Provided By Sophos
-
The four rules of complete web protection
As an IT manager you've always known the web is a dangerous place. But with infections growing and the demands on your time and budget rising, it's time to revisit your strategy. This whitepaper discu...
Provided By Sophos
-
Thanksgiving Patching, SCADA, Google WiFi Mapping and Android Security
In this podcast, the speaker talks about Android security and Chris DiBona's recent Google+ post on security vendors on Android being scammers and charlatans. SCADA hacking has been in the news after ...
Provided By Sophos
-
Michael Kaiser, NCSA and Rob Strayer Chat About Cyber Security
In this podcast, the speakers discussed the goals of the National Security Preparedness Group and why they think there is so much work to be done for better information sharing between the public and ...
Provided By Sophos
-
VB 2011, Apple updates, Microsoft Patch Tuesday and German R2D2 Trojan
In this podcast, the speakers discussed the release of iOS 5 and OS X 10.7.2 and the importance of the security fixes in Apple's latest releases. They also made note of Microsoft's October 2011 Patch ...
Provided By Sophos
-
Eight threats your antivirus won't stop: Why you need endpoint security
News headlines are a constant reminder that malware attacks and data loss are on the rise. This paper outlines eight common threats that traditional antivirus alone won't stop, and explains how to pro...
Provided By Sophos
-
3 Simple Steps to Better Patch Security
Security experts estimate that 90% of successful attacks against software vulnerabilities could be prevented with an existing patch or configuration setting. Still, many computers in organizations rem...
Provided By Sophos
-
Mobile Device Security: What's Coming Next?
Mobile devices and their rapid innovation and development are enabling busy professionals to conduct business and manage their lives on the move. But what are the key technologies driving evolution of...
Provided By Sophos
-
Stopping Fake Antivirus: How to Keep Scareware off Your Network
This paper provides insight into where fake antivirus comes from and how it is distributed, what happens when a system is infected with fake antivirus, and how to stop this persistent threat from infe...
Provided By Sophos
-
Using application control to reduce risk with endpoint security
Unwanted applications, like games, result in productivity loss. This is often the primary consideration when applying application control. But unauthorized applications also increase your company's ri...
Provided By Sophos
-
Seven Tips for Securing Mobile Workers
Seven Tips for Securing Mobile Workers is intended to offer practical guidance on dealing with one of the fastest growing threats to the security of sensitive and confidential information. It is the i...
Provided By Sophos
-
Seven for 7: Best Practices For Securing Windows 7
In February 2011, Microsoft released its first major update to Windows 7, Service Pack 1. And now that this operating system holds more than 20% of marketshare, there's no question that more enterpris...
Provided By Sophos
-
The State of Data Security: Defending Against New Risks and Staying Compliant
Since 2005, security breaches have compromised more than 500 million US records. As an IT manager, you must take a look at the risks of potential data loss and create a security plan that helps you s...
Provided By Sophos
-
Attack of the PDF Documents: How Adobe's PDF Format has become one of the top carriers of malware
PDFs have become one of the most common methods for infecting systems with malware. The PDF standard now supports JavaScript, along with tighter connections into user systems from the Adobe Reader pro...
Provided By Sophos
-
Malicious JavaScript Attacks: What Can You Do?
As an IT manager, you need to be able to effectively secure all of the websites you manage to avoid attack and the subsequent infection of site visitors. You also need to protect the users within your...
Provided By Sophos
-
Safer web browsing in four steps: Technology to help you reduce risk
The web is now the cybercriminal's favored means of attack, with a newly infected website discovered every few seconds. Hijacked trusted sites, poisoned search results, fake anti-virus software and ph...
Provided By Sophos
-
'Want My Autograph?': The Use and Abuse of Digital Signatures by Malware
Encryption has always been a part of malware, from basic ROT13 string encoding to multi-layered packing algorithms. However, malware authors have discovered ways to exploit the existing strengths and ...
Provided By Sophos
-
Eight threats your anti-virus won't stop: Why you need endpoint security
News headlines are a constant reminder that malware attacks and data leakage are on the rise. High-profile incidents that make big news might seem out of the ordinary. Yet businesses of every size fac...
Provided By Sophos
-
Protecting personally identifiable information: What data is at risk and what you can do about it
Virtually every organization acquires, uses and stores personally identifiable information about its customers, employees, patients, students and other individuals. These organizations are expected to...
Provided By Sophos
-
The 10 myths of safe web browsing
Are you suffering from misconceptions about safe web browsing? You might think you're being safe, but with a newly infected webpage discovered every few seconds, it's next to impossible to stay up to ...
Provided By Sophos
-
Poisoned Search Results: How Hackers Have Automated Search Engine Poisoning Attacks to Distribute Malware
This paper describes recent research by Sophism Labs into how attackers are using black hat Search Engine Optimization (SEO) techniques to stuff legitimate websites with content designed to rank highl...
Provided By Sophos
-
Sophos Case Study: Thorne & Carter
Thorne & Carter are an independent multi-disciplined estate agency and surveying practice in Cullompton, Devon. Thorne & Carter have a growing reliance on email and electronic storage of confidential ...
Provided By Sophos
-
Sophos Free Encryption - Free Tool
Sophos Free Encryption is a free tool lets you secure your data easily and quickly without any central infrastructure in place. Individuals and businesses alike can easily protect selected files for e...
Provided By Sophos
-
Endpoint Buyers Guide
This buyers guide provides independent research and test results to help you determine your endpoint protection requirements and identify the security vendor that best meets your needs.
Sponsored By Sophos
-
BYOD Risk and Rewards
Whether you’re an end user or an IT administrator, Bring Your Own Device (BYOD) is becoming the rule rather than the exception in today’s workplace. Although BYOD may be a convenience to your employee...
Sponsored By Sophos
-
Ransomware: Hijacking Your Data
Since 2011, users have increasingly seen messages warning that their computer is locked and demanding money in exchange for access to their PCs, purportedly from the FBI and police agencies. These are...
Sponsored By Sophos
-
Eight Trends That Are Changing Network Security
New mobile operating systems, growing use of personal devices, and SaaS (software-as-a-service) delivery make securing the network a growing challenge. We’re seeing ever faster network connections, mo...
Sponsored By Sophos
-
How to Secure Your Wireless Network
It isn’t hard to set up security for the wireless router in your basement: change the SSID, pick a strong password and perhaps install VPN software for remote access. But securing wireless networks in...
Sponsored By Sophos
-
Mobile Madness or BYOD Security?
The BYOD paradigm has rapidly moved from novelty to near inevitability. Even IT organizations with deep concerns about manageability and security are increasingly accommodating user-owned devices. BYO...
Sponsored By Sophos
-
Network protection and UTM Buyers Guide
Using a UTM solution for your network protection used to be a compromise—while you gained in resource savings and ease of use, there was a payoff in terms of protection capabilities. This buyers guide...
Sponsored By Sophos
-
Mobile Device Management Buyers Guide
Mobile device management (MDM) solutions allow IT organizations to centrally manage, monitor and support mobile devices from smartphones to tablets. By using an MDM solution to control and protect the...
Sponsored By Sophos
-
Protecting personally identifiable information: What data is at risk and what you can do about it
Virtually every organization acquires, uses and stores personally identifiable information about its customers, employees, patients, students and other individuals. These organizations are expected to...
Provided By Sophos
-
Safer web browsing in four steps: Technology to help you reduce risk
The web is now the cybercriminal's favored means of attack, with a newly infected website discovered every few seconds. Hijacked trusted sites, poisoned search results, fake anti-virus software and ph...
Provided By Sophos
-
Eight threats your antivirus won't stop: Why you need endpoint security
News headlines are a constant reminder that malware attacks and data loss are on the rise. This paper outlines eight common threats that traditional antivirus alone won't stop, and explains how to pro...
Provided By Sophos
-
3 Simple Steps to Better Patch Security
Security experts estimate that 90% of successful attacks against software vulnerabilities could be prevented with an existing patch or configuration setting. Still, many computers in organizations rem...
Provided By Sophos
-
The four rules of complete web protection
As an IT manager you've always known the web is a dangerous place. But with infections growing and the demands on your time and budget rising, it's time to revisit your strategy. This whitepaper discu...
Provided By Sophos
-
2012 Buyers Guide to Web Protection
The web is the number one source for malware distribution today. While many organizations have replaced first-generation URL filters with secure web gateways, even these advanced solutions do not prov...
Provided By Sophos
-
Webcast: Top Tips To Keep Data Under Your Control
You already know the growth and changes in government, industry and internal regulations designed to protect data is becoming harder and more expensive to manage. Join this live TechRepublic Webcast t...
Provided By Sophos
-
Attack of the PDF Documents: How Adobe's PDF Format has become one of the top carriers of malware
PDFs have become one of the most common methods for infecting systems with malware. The PDF standard now supports JavaScript, along with tighter connections into user systems from the Adobe Reader pro...
Provided By Sophos
-
Malicious JavaScript Attacks: What Can You Do?
As an IT manager, you need to be able to effectively secure all of the websites you manage to avoid attack and the subsequent infection of site visitors. You also need to protect the users within your...
Provided By Sophos
-
Seven for 7: Best Practices For Securing Windows 7
In February 2011, Microsoft released its first major update to Windows 7, Service Pack 1. And now that this operating system holds more than 20% of marketshare, there's no question that more enterpris...
Provided By Sophos
-
The State of Data Security: Defending Against New Risks and Staying Compliant
Since 2005, security breaches have compromised more than 500 million US records. As an IT manager, you must take a look at the risks of potential data loss and create a security plan that helps you s...
Provided By Sophos
-
Sophos Free Encryption - Free Tool
Sophos Free Encryption is a free tool lets you secure your data easily and quickly without any central infrastructure in place. Individuals and businesses alike can easily protect selected files for e...
Provided By Sophos
-
The 10 myths of safe web browsing
Are you suffering from misconceptions about safe web browsing? You might think you're being safe, but with a newly infected webpage discovered every few seconds, it's next to impossible to stay up to ...
Provided By Sophos
-
Patch Tuesday, Apple App Privacy and RSA
In this podcast, the speakers discussion with Patch Tuesday and the fixes released by Microsoft, Adobe and Oracle. The speaker provided some clarity for Mac users on the confusing mix of Java versions...
Provided By Sophos
-
Cookie-Gate, Laptop Security Advice, Stratfor Malicious Emails and Facebook Hacker Advice
In this podcast, the speakers started out discussing a topic that the speaker have been quite passionate about, the "Cookie-gate" incident involving Google and other advertising companies placing cook...
Provided By Sophos
-
Sophos Endpoint Assessment Test
Is your computer a security risk? Free scan to assess your security Find out if you're missing OS patches Discover if your security applications are up to date and active Use this free test to chec...
Provided By Sophos
-
Sophos Threat Detection Test
Is your anti-virus catching everything it should? Free virus, spyware, and adware scan Test your existing anti-virus protection Find threats your anti-virus missed Use this free test to check yo...
Provided By Sophos
-
Sophos Security Assessment Tools
Put the diagnostic power of these FREE security tools to work in your enterprise today. From endpoint assessment and threat detection to identifying rootkits and unauthorized applications, these compl...
Provided By Sophos
-
Sophos Case Study: Thorne & Carter
Thorne & Carter are an independent multi-disciplined estate agency and surveying practice in Cullompton, Devon. Thorne & Carter have a growing reliance on email and electronic storage of confidential ...
Provided By Sophos
-
The Partnerka - What Is It, and Why Should You Care?
Scareware, 'Canadian Pharmacy' spam, adult sites, comment spam on forums and blogs - the authors have seen these plaguing the web and email experience over the past few years. What links them together...
Provided By Sophos
-
Poisoned Search Results: How Hackers Have Automated Search Engine Poisoning Attacks to Distribute Malware
This paper describes recent research by Sophism Labs into how attackers are using black hat Search Engine Optimization (SEO) techniques to stuff legitimate websites with content designed to rank highl...
Provided By Sophos
-
'Want My Autograph?': The Use and Abuse of Digital Signatures by Malware
Encryption has always been a part of malware, from basic ROT13 string encoding to multi-layered packing algorithms. However, malware authors have discovered ways to exploit the existing strengths and ...
Provided By Sophos
-
Sophos Security Threat Report, DMARC and Mobile Phone Number Leaks
In this podcast, the speakers discussion about the Sophos Security Threat Report 2012. They talked about a few of the highlights like the commonality of exploit kits like Black Hole, the latest trends...
Provided By Sophos
-
Seven Tips for Securing Mobile Workers
Seven Tips for Securing Mobile Workers is intended to offer practical guidance on dealing with one of the fastest growing threats to the security of sensitive and confidential information. It is the i...
Provided By Sophos
-
Using application control to reduce risk with endpoint security
Unwanted applications, like games, result in productivity loss. This is often the primary consideration when applying application control. But unauthorized applications also increase your company's ri...
Provided By Sophos
-
Mobile Device Security: What's Coming Next?
Mobile devices and their rapid innovation and development are enabling busy professionals to conduct business and manage their lives on the move. But what are the key technologies driving evolution of...
Provided By Sophos
-
Stopping Fake Antivirus: How to Keep Scareware off Your Network
This paper provides insight into where fake antivirus comes from and how it is distributed, what happens when a system is infected with fake antivirus, and how to stop this persistent threat from infe...
Provided By Sophos
-
Eight threats your anti-virus won't stop: Why you need endpoint security
News headlines are a constant reminder that malware attacks and data leakage are on the rise. High-profile incidents that make big news might seem out of the ordinary. Yet businesses of every size fac...
Provided By Sophos
-
NCSA and Data Privacy Day
In this podcast, the speaker explains the history of Data Privacy Day and the importance of understanding privacy on the modern internet. They chatted a bit about the role businesses play in consumer ...
Provided By Sophos
-
Mobile Security Podcast With Vanja Svajcer
In this podcast, the speakers discussed the risk to businesses versus consumers and the impact of the Bring Your Own Device (BYOD) trend that took off in 2011. The speaker also shared some tips with t...
Provided By Sophos
-
Smart Meter Privacy Concerns, WiFi Insecurity Due to WPS and Password Hashes Explained
In this podcast, the speakers discussing the privacy implications of smart meters after the recent presentation at the Chaos Computing Congress. Another story, they covered this week was the attempt a...
Provided By Sophos
-
Data Leaks at Stratfor and Care2 Mark the End of a Year Riddled With Data Theft
In this podcast, the speakers describe about the most important stories in information security, data theft. The data theft may not have been the most important story of 2011, but it certainly impacte...
Provided By Sophos