Sophos

Displaying 1-40 of 45 results

  • White Papers // Sep 2013

    Which Mobile Device Is the Most Secure?

    Gone is the day of the corporate-issued BlackBerry device. With its finely ingrained policies, BlackBerry was once the go-to mobile device for security-savvy enterprises. Research from IDC shows that iPhone and Android now hold over 80% of market share, with Windows Phone 8 and BlackBerry completing for the third spot....

    Provided By Sophos

  • White Papers // Sep 2013

    Your Company Data, Their Personal Device — What Could Go Wrong?

    Employee use of smartphones and tablets to access corporate information and services is exploding. And that means IT organizations need to get beyond widely-held myths about improving their mobile security profile. Warning: Failure to do so is not an option.

    Provided By Sophos

  • White Papers // Sep 2013

    Not Just for PCs Anymore: The Rise of Mobile Malware

    Mobile malware is not new. Today, however, mobile malware is far more widespread, and far more dangerous—especially since smartphones and tablets are now widely used for critical business tasks. Get a close look at the fast-moving threat of mobile malware: how and why it’s arisen, what forms it takes, where...

    Provided By Sophos

  • Webcasts // Aug 2013

    On-demand Webcast: Which Mobile Device is Most Secure?

    BlackBerry was once the go-to mobile device for security-savvy enterprises. The iPhone has since taken its place, with Android and Windows Phone 8 adoption steadily on the rise. The increasing trend of mobile consumerization has reached a point where it is increasingly difficult for IT organizations to settle on a...

    Provided By Sophos

  • White Papers // Jun 2013

    Network protection and UTM Buyers Guide

    Using a UTM solution for your network protection used to be a compromise—while you gained in resource savings and ease of use, there was a payoff in terms of protection capabilities. This buyers guide looks at the factors you should consider when evaluating solutions to ensure you have the protection...

    Provided By Sophos

  • White Papers // Jun 2013

    Mobile Device Management Buyers Guide

    Mobile device management (MDM) solutions allow IT organizations to centrally manage, monitor and support mobile devices from smartphones to tablets. By using an MDM solution to control and protect the data and configuration settings on users’ mobile devices, you can reduce support costs and security risks. In this guide, you'll...

    Provided By Sophos

  • White Papers // Jun 2013

    How to Secure Your Wireless Network

    It isn’t hard to set up security for the wireless router in your basement: change the SSID, pick a strong password and perhaps install VPN software for remote access. But securing wireless networks in a business environment is much more demanding. Learn best practices that can help administrators go beyond...

    Provided By Sophos

  • Podcasts // Feb 2012

    Cookie-Gate, Laptop Security Advice, Stratfor Malicious Emails and Facebook Hacker Advice

    In this podcast, the speakers started out discussing a topic that the speaker have been quite passionate about, the "Cookie-gate" incident involving Google and other advertising companies placing cookies on people's computers who surf the web using Safari by exploiting a security flaw in Safari's privacy settings.

    Provided By Sophos

  • Podcasts // Feb 2012

    Patch Tuesday, Apple App Privacy and RSA

    In this podcast, the speakers discussion with Patch Tuesday and the fixes released by Microsoft, Adobe and Oracle. The speaker provided some clarity for Mac users on the confusing mix of Java versions and availability, depending on which version of OS X one may be using.

    Provided By Sophos

  • White Papers // Feb 2012

    2012 Buyers Guide to Web Protection

    The web is the number one source for malware distribution today. While many organizations have replaced first-generation URL filters with secure web gateways, even these advanced solutions do not provide web protection everywhere. This paper identifies today's most critical web threats and provides checklists for you to identify and evaluate...

    Provided By Sophos

  • Podcasts // Feb 2012

    Why is a 14-Month-Old Patched Microsoft Vulnerability Still Being Exploited?

    In this podcast, the speaker focuses on a specific Microsoft patch, namely MS10-087, released to address the vulnerability CVE-2010-3333 (RTF Stack Buffer Overflow Vulnerability). The patch was released way back in November 2010, and his paper tracks the constantly evolving exploits that have been hammering away at unpatched systems.

    Provided By Sophos

  • Podcasts // Feb 2012

    Sophos Security Threat Report, DMARC and Mobile Phone Number Leaks

    In this podcast, the speakers discussion about the Sophos Security Threat Report 2012. They talked about a few of the highlights like the commonality of exploit kits like Black Hole, the latest trends in mobile malware and the current state of security regarding the cloud.

    Provided By Sophos

  • Podcasts // Jan 2012

    NCSA and Data Privacy Day

    In this podcast, the speaker explains the history of Data Privacy Day and the importance of understanding privacy on the modern internet. They chatted a bit about the role businesses play in consumer privacy, including his favorite phrase. Another important message shared by the speaker is that privacy online isn't...

    Provided By Sophos

  • Podcasts // Jan 2012

    Mobile Security Podcast With Vanja Svajcer

    In this podcast, the speakers discussed the risk to businesses versus consumers and the impact of the Bring Your Own Device (BYOD) trend that took off in 2011. The speaker also shared some tips with their listeners on some best practices for safer usage of their smartphones.

    Provided By Sophos

  • Podcasts // Jan 2012

    Smart Meter Privacy Concerns, WiFi Insecurity Due to WPS and Password Hashes Explained

    In this podcast, the speakers discussing the privacy implications of smart meters after the recent presentation at the Chaos Computing Congress. Another story, they covered this week was the attempt at making security easy in WiFi routers which results in total insecurity.

    Provided By Sophos

  • Podcasts // Dec 2011

    Data Leaks at Stratfor and Care2 Mark the End of a Year Riddled With Data Theft

    In this podcast, the speakers describe about the most important stories in information security, data theft. The data theft may not have been the most important story of 2011, but it certainly impacted more regular people and raised their awareness about the problem of all of their data being "In...

    Provided By Sophos

  • Podcasts // Dec 2011

    IE 9 Upgrades, Android Malware, Carrier IQ and Hospital Shut Down From Malware

    In this podcast, the speaker talks about the very serious problem of safety in medical computer systems after a recent malware outbreak at a hospital in Georgia, USA. Things are not as simple as they might like to think and the best minds in their business should work together to...

    Provided By Sophos

  • White Papers // Dec 2011

    The four rules of complete web protection

    As an IT manager you've always known the web is a dangerous place. But with infections growing and the demands on your time and budget rising, it's time to revisit your strategy. This whitepaper discusses the major web threats and provides four rules to help you stay protected. When you...

    Provided By Sophos

  • Podcasts // Nov 2011

    Thanksgiving Patching, SCADA, Google WiFi Mapping and Android Security

    In this podcast, the speaker talks about Android security and Chris DiBona's recent Google+ post on security vendors on Android being scammers and charlatans. SCADA hacking has been in the news after an alleged hack on a water treatment plant in Illinois and another hacker trying to raise awareness by...

    Provided By Sophos

  • White Papers // Nov 2011

    Endpoint Buyers Guide

    It takes more than antivirus to stop today’s advanced threats. An endpoint protection solution is an important part of your IT security strategy to protect corporate assets. Evaluating the many components that make up an endpoint security solution may seem overwhelming. Get independent research and test results to help you...

    Provided By Sophos

  • Podcasts // Oct 2011

    Michael Kaiser, NCSA and Rob Strayer Chat About Cyber Security

    In this podcast, the speakers discussed the goals of the National Security Preparedness Group and why they think there is so much work to be done for better information sharing between the public and private sectors.

    Provided By Sophos

  • Podcasts // Oct 2011

    VB 2011, Apple updates, Microsoft Patch Tuesday and German R2D2 Trojan

    In this podcast, the speakers discussed the release of iOS 5 and OS X 10.7.2 and the importance of the security fixes in Apple's latest releases. They also made note of Microsoft's October 2011 Patch Tuesday releases and the importance of expediency when patching. To wrap up, they discussed the...

    Provided By Sophos

  • White Papers // Oct 2011

    Eight threats your antivirus won't stop: Why you need endpoint security

    News headlines are a constant reminder that malware attacks and data loss are on the rise. This paper outlines eight common threats that traditional antivirus alone won't stop, and explains how to protect your organization using endpoint security.

    Provided By Sophos

  • White Papers // Oct 2011

    3 Simple Steps to Better Patch Security

    Security experts estimate that 90% of successful attacks against software vulnerabilities could be prevented with an existing patch or configuration setting. Still, many computers in organizations remain unpatched and unprotected. In this whitepaper, we'll explain three best practices for improving your security and compliance with patch assessment.

    Provided By Sophos

  • White Papers // Sep 2011

    Stopping Fake Antivirus: How to Keep Scareware off Your Network

    This paper provides insight into where fake antivirus comes from and how it is distributed, what happens when a system is infected with fake antivirus, and how to stop this persistent threat from infecting your network and your users.

    Provided By Sophos

  • White Papers // Sep 2011

    Mobile Device Security: What's Coming Next?

    Mobile devices and their rapid innovation and development are enabling busy professionals to conduct business and manage their lives on the move. But what are the key technologies driving evolution of the mobile, what happens next, and what are the security implications?

    Provided By Sophos

  • White Papers // Jun 2011

    Using application control to reduce risk with endpoint security

    Unwanted applications, like games, result in productivity loss. This is often the primary consideration when applying application control. But unauthorized applications also increase your company's risks of malware infection and data loss. This paper details how endpoint security solutions that incorporate application control provide the most efficient, comprehensive defense against...

    Provided By Sophos

  • White Papers // Jun 2011

    Seven Tips for Securing Mobile Workers

    Seven Tips for Securing Mobile Workers is intended to offer practical guidance on dealing with one of the fastest growing threats to the security of sensitive and confidential information. It is the increasing sophistication and convenience of such mobile devices as laptops, Androids, iPads and USB sticks that contribute to...

    Provided By Sophos

  • White Papers // May 2011

    Seven for 7: Best Practices For Securing Windows 7

    In February 2011, Microsoft released its first major update to Windows 7, Service Pack 1. And now that this operating system holds more than 20% of marketshare, there's no question that more enterprises will plan major migrations to Windows 7 in 2011. As businesses retire older versions of Windows, it's...

    Provided By Sophos

  • White Papers // May 2011

    The State of Data Security: Defending Against New Risks and Staying Compliant

    Since 2005, security breaches have compromised more than 500 million US records. As an IT manager, you must take a look at the risks of potential data loss and create a security plan that helps you stay compliant with data protection rules and regulations. In this report,you'll learn about what...

    Provided By Sophos

  • White Papers // Mar 2011

    Attack of the PDF Documents: How Adobe's PDF Format has become one of the top carriers of malware

    PDFs have become one of the most common methods for infecting systems with malware. The PDF standard now supports JavaScript, along with tighter connections into user systems from the Adobe Reader program. This makes it very easy for virus writers to utilize scripting within PDF documents and security holes in...

    Provided By Sophos

  • White Papers // Mar 2011

    Malicious JavaScript Attacks: What Can You Do?

    As an IT manager, you need to be able to effectively secure all of the websites you manage to avoid attack and the subsequent infection of site visitors. You also need to protect the users within your organization from becoming victims of malware. Organizations can use specific technologies and layered...

    Provided By Sophos

  • White Papers // Sep 2010

    Safer web browsing in four steps: Technology to help you reduce risk

    The web is now the cybercriminal's favored means of attack, with a newly infected website discovered every few seconds. Hijacked trusted sites, poisoned search results, fake anti-virus software and phishing websites are a sample of the exploits that hit users' browsers every day. That leaves your business in a bind:...

    Provided By Sophos

  • White Papers // Sep 2010

    'Want My Autograph?': The Use and Abuse of Digital Signatures by Malware

    Encryption has always been a part of malware, from basic ROT13 string encoding to multi-layered packing algorithms. However, malware authors have discovered ways to exploit the existing strengths and weaknesses of public key cryptography in addition to their home-grown crypto. With the many layers that make up the Public Key...

    Provided By Sophos

  • White Papers // Jul 2010

    Eight threats your anti-virus won't stop: Why you need endpoint security

    News headlines are a constant reminder that malware attacks and data leakage are on the rise. High-profile incidents that make big news might seem out of the ordinary. Yet businesses of every size face similar risks in the everyday acts of using digital technology and the internet for legitimate purposes....

    Provided By Sophos

  • White Papers // Jun 2010

    The 10 myths of safe web browsing

    Are you suffering from misconceptions about safe web browsing? You might think you're being safe, but with a newly infected webpage discovered every few seconds, it's next to impossible to stay up to date on infected sites?no matter how educated or aware of the risks you are. Do you and...

    Provided By Sophos

  • White Papers // Jun 2010

    Protecting personally identifiable information: What data is at risk and what you can do about it

    Virtually every organization acquires, uses and stores personally identifiable information about its customers, employees, patients, students and other individuals. These organizations are expected to manage this private data appropriately and take every precaution to protect it from loss, unauthorized access or theft. Misusing, losing or otherwise compromising this data can...

    Provided By Sophos

  • White Papers // Mar 2010

    Poisoned Search Results: How Hackers Have Automated Search Engine Poisoning Attacks to Distribute Malware

    This paper describes recent research by Sophism Labs into how attackers are using black hat Search Engine Optimization (SEO) techniques to stuff legitimate websites with content designed to rank highly in search engine results, yet redirect users to malicious sites. These websites are being used to distribute rogue security products...

    Provided By Sophos

  • Case Studies // Jan 2010

    Sophos Case Study: Thorne & Carter

    Thorne & Carter are an independent multi-disciplined estate agency and surveying practice in Cullompton, Devon. Thorne & Carter have a growing reliance on email and electronic storage of confidential records - securing their systems is a priority. Sophos Anti-Virus SBE is specially designed to make life easier for small businesses,...

    Provided By Sophos

  • Downloads // Dec 2009

    Sophos Free Encryption - Free Tool

    Sophos Free Encryption is a free tool lets you secure your data easily and quickly without any central infrastructure in place. Individuals and businesses alike can easily protect selected files for email communication without building up a costly back-end PKI infrastructure.

    Provided By Sophos

  • White Papers // Sep 2013

    Which Mobile Device Is the Most Secure?

    Gone is the day of the corporate-issued BlackBerry device. With its finely ingrained policies, BlackBerry was once the go-to mobile device for security-savvy enterprises. Research from IDC shows that iPhone and Android now hold over 80% of market share, with Windows Phone 8 and BlackBerry completing for the third spot....

    Provided By Sophos

  • White Papers // Jun 2013

    Mobile Device Management Buyers Guide

    Mobile device management (MDM) solutions allow IT organizations to centrally manage, monitor and support mobile devices from smartphones to tablets. By using an MDM solution to control and protect the data and configuration settings on users’ mobile devices, you can reduce support costs and security risks. In this guide, you'll...

    Provided By Sophos

  • White Papers // Jun 2013

    How to Secure Your Wireless Network

    It isn’t hard to set up security for the wireless router in your basement: change the SSID, pick a strong password and perhaps install VPN software for remote access. But securing wireless networks in a business environment is much more demanding. Learn best practices that can help administrators go beyond...

    Provided By Sophos

  • White Papers // Sep 2013

    Your Company Data, Their Personal Device — What Could Go Wrong?

    Employee use of smartphones and tablets to access corporate information and services is exploding. And that means IT organizations need to get beyond widely-held myths about improving their mobile security profile. Warning: Failure to do so is not an option.

    Provided By Sophos

  • White Papers // Sep 2013

    Not Just for PCs Anymore: The Rise of Mobile Malware

    Mobile malware is not new. Today, however, mobile malware is far more widespread, and far more dangerous—especially since smartphones and tablets are now widely used for critical business tasks. Get a close look at the fast-moving threat of mobile malware: how and why it’s arisen, what forms it takes, where...

    Provided By Sophos

  • Webcasts // Aug 2013

    On-demand Webcast: Which Mobile Device is Most Secure?

    BlackBerry was once the go-to mobile device for security-savvy enterprises. The iPhone has since taken its place, with Android and Windows Phone 8 adoption steadily on the rise. The increasing trend of mobile consumerization has reached a point where it is increasingly difficult for IT organizations to settle on a...

    Provided By Sophos

  • White Papers // Sep 2011

    Stopping Fake Antivirus: How to Keep Scareware off Your Network

    This paper provides insight into where fake antivirus comes from and how it is distributed, what happens when a system is infected with fake antivirus, and how to stop this persistent threat from infecting your network and your users.

    Provided By Sophos

  • Webcasts // May 2009

    Webcast: Top Tips To Keep Data Under Your Control

    You already know the growth and changes in government, industry and internal regulations designed to protect data is becoming harder and more expensive to manage. Join this live TechRepublic Webcast to learn about how you might simplify the task. Hosted by Moderator James Hilliard and featuring Compliance and Security...

    Provided By Sophos

  • Downloads // May 2009

    Sophos Endpoint Assessment Test

    Is your computer a security risk? Free scan to assess your security Find out if you're missing OS patches Discover if your security applications are up to date and active Use this free test to check your computer security. Download now!

    Provided By Sophos

  • Downloads // May 2009

    Sophos Threat Detection Test

    Is your anti-virus catching everything it should? Free virus, spyware, and adware scan Test your existing anti-virus protection Find threats your anti-virus missed Use this free test to check your anti-virus protection. Download now!

    Provided By Sophos

  • Downloads // May 2009

    Sophos Security Assessment Tools

    Put the diagnostic power of these FREE security tools to work in your enterprise today. From endpoint assessment and threat detection to identifying rootkits and unauthorized applications, these complimentary tools from industry leader Sophos will pinpoint any areas of vulnerability that exist on your network. Download and run these four...

    Provided By Sophos

  • Case Studies // Jan 2010

    Sophos Case Study: Thorne & Carter

    Thorne & Carter are an independent multi-disciplined estate agency and surveying practice in Cullompton, Devon. Thorne & Carter have a growing reliance on email and electronic storage of confidential records - securing their systems is a priority. Sophos Anti-Virus SBE is specially designed to make life easier for small businesses,...

    Provided By Sophos

  • White Papers // Sep 2009

    The Partnerka - What Is It, and Why Should You Care?

    Scareware, 'Canadian Pharmacy' spam, adult sites, comment spam on forums and blogs - the authors have seen these plaguing the web and email experience over the past few years. What links them together? What makes them grow in volume and complexity? Who is behind them? What business model drives their...

    Provided By Sophos

  • White Papers // Mar 2010

    Poisoned Search Results: How Hackers Have Automated Search Engine Poisoning Attacks to Distribute Malware

    This paper describes recent research by Sophism Labs into how attackers are using black hat Search Engine Optimization (SEO) techniques to stuff legitimate websites with content designed to rank highly in search engine results, yet redirect users to malicious sites. These websites are being used to distribute rogue security products...

    Provided By Sophos

  • White Papers // Sep 2010

    'Want My Autograph?': The Use and Abuse of Digital Signatures by Malware

    Encryption has always been a part of malware, from basic ROT13 string encoding to multi-layered packing algorithms. However, malware authors have discovered ways to exploit the existing strengths and weaknesses of public key cryptography in addition to their home-grown crypto. With the many layers that make up the Public Key...

    Provided By Sophos

  • Podcasts // Feb 2012

    Sophos Security Threat Report, DMARC and Mobile Phone Number Leaks

    In this podcast, the speakers discussion about the Sophos Security Threat Report 2012. They talked about a few of the highlights like the commonality of exploit kits like Black Hole, the latest trends in mobile malware and the current state of security regarding the cloud.

    Provided By Sophos

  • Podcasts // Feb 2012

    Why is a 14-Month-Old Patched Microsoft Vulnerability Still Being Exploited?

    In this podcast, the speaker focuses on a specific Microsoft patch, namely MS10-087, released to address the vulnerability CVE-2010-3333 (RTF Stack Buffer Overflow Vulnerability). The patch was released way back in November 2010, and his paper tracks the constantly evolving exploits that have been hammering away at unpatched systems.

    Provided By Sophos

  • Podcasts // Feb 2012

    Patch Tuesday, Apple App Privacy and RSA

    In this podcast, the speakers discussion with Patch Tuesday and the fixes released by Microsoft, Adobe and Oracle. The speaker provided some clarity for Mac users on the confusing mix of Java versions and availability, depending on which version of OS X one may be using.

    Provided By Sophos

  • Podcasts // Feb 2012

    Cookie-Gate, Laptop Security Advice, Stratfor Malicious Emails and Facebook Hacker Advice

    In this podcast, the speakers started out discussing a topic that the speaker have been quite passionate about, the "Cookie-gate" incident involving Google and other advertising companies placing cookies on people's computers who surf the web using Safari by exploiting a security flaw in Safari's privacy settings.

    Provided By Sophos

  • Podcasts // Jan 2012

    NCSA and Data Privacy Day

    In this podcast, the speaker explains the history of Data Privacy Day and the importance of understanding privacy on the modern internet. They chatted a bit about the role businesses play in consumer privacy, including his favorite phrase. Another important message shared by the speaker is that privacy online isn't...

    Provided By Sophos

  • Podcasts // Jan 2012

    Mobile Security Podcast With Vanja Svajcer

    In this podcast, the speakers discussed the risk to businesses versus consumers and the impact of the Bring Your Own Device (BYOD) trend that took off in 2011. The speaker also shared some tips with their listeners on some best practices for safer usage of their smartphones.

    Provided By Sophos

  • Podcasts // Jan 2012

    Smart Meter Privacy Concerns, WiFi Insecurity Due to WPS and Password Hashes Explained

    In this podcast, the speakers discussing the privacy implications of smart meters after the recent presentation at the Chaos Computing Congress. Another story, they covered this week was the attempt at making security easy in WiFi routers which results in total insecurity.

    Provided By Sophos

  • Podcasts // Dec 2011

    Data Leaks at Stratfor and Care2 Mark the End of a Year Riddled With Data Theft

    In this podcast, the speakers describe about the most important stories in information security, data theft. The data theft may not have been the most important story of 2011, but it certainly impacted more regular people and raised their awareness about the problem of all of their data being "In...

    Provided By Sophos

  • Podcasts // Dec 2011

    IE 9 Upgrades, Android Malware, Carrier IQ and Hospital Shut Down From Malware

    In this podcast, the speaker talks about the very serious problem of safety in medical computer systems after a recent malware outbreak at a hospital in Georgia, USA. Things are not as simple as they might like to think and the best minds in their business should work together to...

    Provided By Sophos

  • Podcasts // Nov 2011

    Thanksgiving Patching, SCADA, Google WiFi Mapping and Android Security

    In this podcast, the speaker talks about Android security and Chris DiBona's recent Google+ post on security vendors on Android being scammers and charlatans. SCADA hacking has been in the news after an alleged hack on a water treatment plant in Illinois and another hacker trying to raise awareness by...

    Provided By Sophos

  • Podcasts // Oct 2011

    Michael Kaiser, NCSA and Rob Strayer Chat About Cyber Security

    In this podcast, the speakers discussed the goals of the National Security Preparedness Group and why they think there is so much work to be done for better information sharing between the public and private sectors.

    Provided By Sophos

  • Downloads // Dec 2009

    Sophos Free Encryption - Free Tool

    Sophos Free Encryption is a free tool lets you secure your data easily and quickly without any central infrastructure in place. Individuals and businesses alike can easily protect selected files for email communication without building up a costly back-end PKI infrastructure.

    Provided By Sophos

  • White Papers // Jun 2010

    The 10 myths of safe web browsing

    Are you suffering from misconceptions about safe web browsing? You might think you're being safe, but with a newly infected webpage discovered every few seconds, it's next to impossible to stay up to date on infected sites?no matter how educated or aware of the risks you are. Do you and...

    Provided By Sophos

  • White Papers // Jun 2010

    Protecting personally identifiable information: What data is at risk and what you can do about it

    Virtually every organization acquires, uses and stores personally identifiable information about its customers, employees, patients, students and other individuals. These organizations are expected to manage this private data appropriately and take every precaution to protect it from loss, unauthorized access or theft. Misusing, losing or otherwise compromising this data can...

    Provided By Sophos

  • White Papers // Mar 2011

    Attack of the PDF Documents: How Adobe's PDF Format has become one of the top carriers of malware

    PDFs have become one of the most common methods for infecting systems with malware. The PDF standard now supports JavaScript, along with tighter connections into user systems from the Adobe Reader program. This makes it very easy for virus writers to utilize scripting within PDF documents and security holes in...

    Provided By Sophos

  • White Papers // Mar 2011

    Malicious JavaScript Attacks: What Can You Do?

    As an IT manager, you need to be able to effectively secure all of the websites you manage to avoid attack and the subsequent infection of site visitors. You also need to protect the users within your organization from becoming victims of malware. Organizations can use specific technologies and layered...

    Provided By Sophos

  • White Papers // May 2011

    Seven for 7: Best Practices For Securing Windows 7

    In February 2011, Microsoft released its first major update to Windows 7, Service Pack 1. And now that this operating system holds more than 20% of marketshare, there's no question that more enterprises will plan major migrations to Windows 7 in 2011. As businesses retire older versions of Windows, it's...

    Provided By Sophos

  • White Papers // May 2011

    The State of Data Security: Defending Against New Risks and Staying Compliant

    Since 2005, security breaches have compromised more than 500 million US records. As an IT manager, you must take a look at the risks of potential data loss and create a security plan that helps you stay compliant with data protection rules and regulations. In this report,you'll learn about what...

    Provided By Sophos

  • White Papers // Jun 2011

    Seven Tips for Securing Mobile Workers

    Seven Tips for Securing Mobile Workers is intended to offer practical guidance on dealing with one of the fastest growing threats to the security of sensitive and confidential information. It is the increasing sophistication and convenience of such mobile devices as laptops, Androids, iPads and USB sticks that contribute to...

    Provided By Sophos

  • White Papers // Jun 2011

    Using application control to reduce risk with endpoint security

    Unwanted applications, like games, result in productivity loss. This is often the primary consideration when applying application control. But unauthorized applications also increase your company's risks of malware infection and data loss. This paper details how endpoint security solutions that incorporate application control provide the most efficient, comprehensive defense against...

    Provided By Sophos

  • White Papers // Sep 2011

    Mobile Device Security: What's Coming Next?

    Mobile devices and their rapid innovation and development are enabling busy professionals to conduct business and manage their lives on the move. But what are the key technologies driving evolution of the mobile, what happens next, and what are the security implications?

    Provided By Sophos

  • Podcasts // Oct 2011

    VB 2011, Apple updates, Microsoft Patch Tuesday and German R2D2 Trojan

    In this podcast, the speakers discussed the release of iOS 5 and OS X 10.7.2 and the importance of the security fixes in Apple's latest releases. They also made note of Microsoft's October 2011 Patch Tuesday releases and the importance of expediency when patching. To wrap up, they discussed the...

    Provided By Sophos

  • White Papers // Jul 2010

    Eight threats your anti-virus won't stop: Why you need endpoint security

    News headlines are a constant reminder that malware attacks and data leakage are on the rise. High-profile incidents that make big news might seem out of the ordinary. Yet businesses of every size face similar risks in the everyday acts of using digital technology and the internet for legitimate purposes....

    Provided By Sophos

  • White Papers // Sep 2010

    Safer web browsing in four steps: Technology to help you reduce risk

    The web is now the cybercriminal's favored means of attack, with a newly infected website discovered every few seconds. Hijacked trusted sites, poisoned search results, fake anti-virus software and phishing websites are a sample of the exploits that hit users' browsers every day. That leaves your business in a bind:...

    Provided By Sophos

  • White Papers // Oct 2011

    Eight threats your antivirus won't stop: Why you need endpoint security

    News headlines are a constant reminder that malware attacks and data loss are on the rise. This paper outlines eight common threats that traditional antivirus alone won't stop, and explains how to protect your organization using endpoint security.

    Provided By Sophos