Tag Archives: Cyber security

Silobreaker awarded ISO 27001 certification

Security and threat intelligence technology company, Silobreaker, has today announced it has achieved ISO 27001 certification, underscoring its market credibility and ongoing commitment to service excellence, while recognising its adherence to the highest standards of information security.

As an international benchmark for Information Security Management Systems (ISMS), ISO 27001 ensures that organisations implement and maintain rigorous security controls and procedures, in order to protect their customers’ sensitive data and ensure business continuity. Part of Silobreaker’s ongoing strategy to continually bolster its security position, this latest certification demonstrates the company’s ability to withstand attack and deliver the best possible service to its customers.

“At Silobreaker, we enable our customers to identify and mitigate risks to their operations at scale, and in the quickest possible timeframe; it’s paramount that our services are always available and working optimally,” said Andy Grayland, CISO, Silobreaker. “This new ISO 27001 certification reflects our ongoing dedication to cyber security and service excellence, and shows that our customers can depend on us to provide the intelligence they need to safeguard their businesses from all types of threats, each and every day.”

Check Point Software Technologies Achieves Highest Ranking in Miercom Next Generation Firewall Benchmark Report

Check Point Software, a leading provider of cybersecurity solutions globally, today announced that its Check Point Quantum Cyber Security Platform achieved a near perfect score with a 99.7% malware block rate and 99.9% phishing prevention rate in Miercom’s Next Generation Firewall (NGFW) Security Benchmark 2023 report. The average malware block rate for tested competitors was 54.1%. Miercom, a leading independent network and security testing organization, put the industry’s top four firewalls through a series of intense malware and phishing prevention tests to rate the security efficacy of each product.

The first 24 hours of a malware campaign are the most critical. Preventing an attack at this point can immediately stop widespread damage. A security system with a higher block rate during the first day of discovery means an organization will spend less resources and energy responding to and remediating infected servers and endpoints. Check Point achieved the highest position across all key firewall tests against competitors Palo Alto Networks, Fortinet, and Cisco. When put through the Zero+1 Day* Malware Test, Check Point prevented over 99.7% of new malware downloads from a large set of files and file types, surpassing all other tested vendors’ solutions.

“Miercom conducted rigorous testing to determine the strengths and weaknesses of each enterprise firewall. It is apparent that some key competitor solutions have significant gaps in their ability to prevent malware, even after the malware was known to the industry for at least three days. In some cases, they did not block the malware that they detected.” Eyal Manor, VP of Product Management at Check Point Software said. “The report validates the effectiveness of our prevention-first, collaborative approach to Cyber Security. Check Point Quantum Cyber Security Platform Titan solution and its position in the market, revolutionizes threat prevention and security management.”

Check Point Software’s performance in the competitive test earned Check Point Quantum Next-Gen Firewall Miercom’s Certified Secure Award. This is Miercom’s highest award for achievement in competitive, hands-on testing.

“Based on our test findings and observations, we can see that Check Point Quantum excels in all the security efficacy testing categories. Check Point Quantum Next-Gen Firewall was superior in advanced threat prevention and offers the best protection against the latest generation of cyberattacks including Zero+1 Day Malware Malware based on recent competitive testing,” said Rob Smithers, CEO at Miercom. “The solution demonstrated the highest detection and prevention efficacy against a blend of malicious samples, indicating well-rounded protection from multiple attack vectors. As a result, we proudly award Check Point with the Miercom Certified Secure certification in recognition of their superior competitive performance and exceptional value.”
Other Check Point highlights from the report include:

• Best Block Rate at 99.7%: In the Zero+1 Day Malware Prevent (First to Block) Results Check Point led with a 99.7% prevention rate while competitors were as low as 43%.
• Lowest False Positive Rate at 0.13%: In False Positive Malware Detection Tests, where content is falsely reported as malicious, Check Point had the highest accuracy versus competitors that were up to 2 times lower.
• Top phishing prevention at 99.9% with the lowest miss rate at .01%: In Phishing Prevention Tests, Check Point led with the lowest miss rate of 1 per 1,000. Tested competitors miss rate were over 10 times higher, with some missing as many as 720 per 1000 phishing emails.

Check Point Research has determined that the volume of global cyberattacks increased by 38% in 2022 compared to 2021. This is due to a combination of geopolitical unrest with the Russo-Ukrainian war, the increased exploitation of legitimate tools by cybercriminals and the widening cyber skills-gap leaving organizations more vulnerable. Enterprise Firewalls with advanced threat prevention offer the best protection against the latest generation of cyberattacks.

Check Point® Software Technologies Enhances Endpoint Security with Intel vPro Platform

Bolstering Check Point Harmony Endpoint with Intel® Threat Detection Technology enables customers to take advantage of expanded protection surface and processor level security

Check Point Software, a leading provider of cyber security solutions globally, today announced an extended collaboration with Intel Corporation to offer enhanced anti-ransomware capabilities for Check Point Harmony’s customers. As ransomware attacks increase in scale and sophistication, integrating the Intel vPro(R) platform’s Threat Detection Technology (TDT) within Check Point Harmony Endpoint helps provide enterprises with processor level anti-ransomware security at both the hardware and software levels, at no extra cost.

Cyber criminals are becoming more creative in their attacks. Data from CPR’s mid-year security report revealed a 42% global increase in cyberattacks placing ransomware as the number one threat. Prevention-first continues to be the best cyber security strategy, as once an attack happens, it can be challenging to repair the damage to both the company and its reputation. The extended collaboration will lead to a new integration which will be available to customers in early 2023.

“Through our collaboration with Intel, customers will benefit from processor level security that starts at the silicon level and provides anti-ransomware capabilities allowing for earlier prevention and expansive attack surface coverage,” said Ofir Israel, VP of Threat Prevention at Check Point Software Technologies. “Together with Intel we have the technology and expertise to prevent operational and financial damage caused by the influx of ransomware attacks.”

Check Point Harmony Endpoint prevents endpoint threats with capabilities that identify, block, and remediate the full attack chain. Intel’s TDT technology, available on the Intel vPro platform, allows Harmony Endpoint to employ AI and ML to analyze CPU telemetry and recognize ransomware encryption commands early in the attack flow, raising the barrier against advanced threats.

Together, they will strengthen prevention and security measures for customers around the world. “It’s essential for organizations of all sizes to invest in technology to prevent cyber-attacks,” Carla Rodríguez, Vice President and General Manager, Ecosystem Partner Enabling at Intel. “The Intel vPro platform contains hardware-based security features, including Threat Detection Technology specifically designed to detect ransomware and other advanced threats. When paired with Check Point’s security solutions, customers can be confident knowing their endpoints are better protected at both the hardware and software layers.”

Additional details about the enhanced anti-ransomware capabilities this partnership brings will be announced in the coming weeks.

Check Point Software Technologies Named a Leader in the Gartner® Magic Quadrant™ for Network Firewalls

Check Point is a Leader for the 23rd time for its Ability to Execute and Completeness of Vision.

Check Point Software, a leading provider of cybersecurity solutions globally, today announced it has been recognized as a Leader in the Gartner® Magic Quadrant™ for Network Firewalls. Check Point Software is the only vendor that has been listed as a Leader for the 23rd time. Gartner® also positioned Check Point furthest towards the right on the Completeness of Vision axis, which we feel is yet another testament to Check Point’s long term vision of prevention and consolidation. We believe these recognitions highlight Check Point’s comprehensive security portfolio that features Check Point Quantum firewall appliances, Firewall-as-a Service, Maestro Hyperscale security, cloud-based centralized management, and cloud native security and this makes Check Point one of the strongest candidates for organizations seeking a security platform solution that protects enterprises against the most sophisticated cyber-attacks.

“It’s an honor to be recognized as a Leader in the Gartner Magic Quadrant™ for Network Firewalls for the 23rd time. In my opinion this accomplishment validates Check Point’s vision and commitment to providing best-in-class security,” said Dorit Dor, Chief Product Officer at Check Point Software Technologies. “Every day we strive to create industry leading security that pre-emptively protects organizations from any cyber-attack. With solutions such as Check Point Quantum, CloudGuard and Harmony, organizations can leverage machine learning, deep learning and automation to prevent the most sophisticated cyber-attacks including supply chain, malware, DNS, phishing and IoT attacks.”

We believe the continuous recognition of Check Point’s network security is driven by:

  • Advanced threat prevention with AI Deep Learning engines: Check Point’s ThreatCloud provides real-time threat intelligence derived from hundreds of millions of sensors worldwide, over networks, endpoints and mobiles. The intelligence is enriched with artificial intelligence (AI) based engines and data from Check Point Research
  • Check Point’s Quantum Titan machine learning and deep learning powered AI engines stops 5 times more DNS attacks, as well as 4 times more zero-day phishing vulnerabilities compared to traditional signature-based technologies.
  • Comprehensive Data Center and Cloud Security: Check Point Quantum Maestro appliances enable businesses to have greater flexibility to securely move workloads between the data center and the cloud on demand.
  • Innovative Platform Strategy: Check Point’s vast product portfolio provides protection across cloud, networks, endpoints, mobile and IoT. We believe Check Point is continuously pioneering cyber security innovation with the most advanced AI-based threat intelligence and prevention technologies, unified security management, and cloud security automation. The centralized management suite gives holistic control of security policies across an organization’s network and cloud environments, increasing operational efficiency, lowering complexity, and decreasing costs.

Is Cloud Native Security Good Enough?

By Deryck Mitchelson, Field CISO EMEA, Check Point Software Technologies

Global organisations are digitally transforming via cloud native applications and services. Use of cloud native can drive innovation, accelerate speed to market, and can bring about cost savings that fuel new growth. Cloud native technologies enable organisations to tap into the agility required to keep up in the current competitive landscape and to create new business models. But achieving efficient, flexible, distributed and resilient cloud native security is tough.

All major public cloud providers -Amazon Web Services (AWS), Microsoft Azure and Google Cloud- of course offer security features and services, which are designed to address significant threats to cloud-based data. However, in spite of this, public cloud providers’ security tools commonly fail to meet operational needs, and their limitations should prompt organisations to consider or reconsider how they are protecting public cloud environments.

Cloud providers’ efforts to ensure security are barely adequate. In the following section, I go into why that’s the case and how it could impact your organization:

1. Limited visibility: One of the major challenges associated with cloud-native is that, in contrast with on-prem deployment, owners cannot be sure of the security elements related to the cloud environment that the application is hosted on. As a result, it becomes the role of the IT team to track every resource and to add it to the application. Monitoring needs to proceed throughout application lifecycles. Lack of adequate visibility can needlessly compromise security.

2. Cloud native exposure to threats: The cloud is accessible to anyone with an internet connection, which means that threat actors are continually searching for ways to undermine systems’ security. As cyber attackers advance their strategies, cyber security prevention and defense methodologies also need to evolve. For example, enterprises need cloud security that can fend off brute-force attacks, phishing and SQL injections.

3. Policy centralisation: At present, the average cloud native environment includes a number of tools from an assortment of developers and service providers. In a multi-cloud infrastructure, information technology managers may face fragmented security access controls, and due to implementation in separate provider environments, an impossible-to-keep-up-with set of monitoring tools. Policy centralisation can make security management more uniform and more successful.

4. Slow security processes: Key reasons as to why enterprises are moving to the cloud include speed, agility and flexibility. But security can easily get left in the dust, so to speak. Given the speed of the continuous integration and deployment (CI/CD) pipeline, security can lag. Enterprises can solve for this issue by shifting security as far left as possible. You can create a Shift Left environment through a third-party security platform.

Ensuring Cloud – Native Protection
Here are three key improvements to drive your organisation’s cloud-native security to ensure protection against upcoming sophisticated cyberattacks:

1. Improve Your Visualisation and Regular Reporting: To understand the current state of their security posture, enterprises must have access to up-to-date reports and visualisations (e.g., dashboards) that account for their entire application infrastructure to overcome information overload and lack of clarity, to quickly and effectively assess their overall security posture to improve upon, where needed.

2. The Automation Game: Compliance rule sets and customised policies must be built into the development stages as well as carried over to runtime, which will require automation to ensure the deployment is compliant with internal and external rules.

3. Keeping up with Changes: Security professionals must keep pace with frequent changes to not only the resources within an expanding cloud sprawl, but security best practices and compliance regulations, which are being enacted at a rapid pace to keep up with the expanding cyberattacks taking place. Efforts should also be made to keep up with the speed and scale of the organisation with new security protection measures implemented accordingly.

For organisations who are facing such cybersecurity challenges, making every effort to reduce their enterprise risks and limiting their exposure to threats, will require prevention-first security instead of just leaving it at detection.

By 2023, more than 500 million digital applications and services will be developed and hosted through cloud native means. The findings and suggestions shared above, combined with the recent sharp increase in cyberattacks should lead organisations to consider whether or not they are making adequate effort to secure public cloud environments.

Veracode has acquired Crashtest Security to enhance its DAST capabilities

Veracode has acquired Crashtest Security to enhance the existing DAST capabilities available as part of Veracode’s Continuous Software Security Platform and broaden customer access globally.

Web applications are fast becoming the most exploited attack vector for cyber threat actors looking to infiltrate enterprises and critical infrastructure. In fact, web apps now account for 40 percent of breaches.

The Crashtest Security product makes it even easier to get started with web application scanning in runtime environments to find vulnerabilities that static analysis is not best suited for. This solution complements Veracode’s platform capabilities as part of a complete modern application security program that secures the entire software development life cycle (SDLC).

Brian Roche, Chief Product Officer at Veracode, said, “Our customers have never been under greater pressure to secure their web applications in response to heightened risk. They seek simple-to-use products that can be onboarded quickly and seamlessly. The Crashtest Security product offers just the solution—it is a highly innovative DAST tool and already has deep roots in the European market. This acquisition supports the growing demand for run-time scanning and allows customers to quickly and easily experience the latest developments in DAST.”

Crashtest Security dynamic analysis

The solution can be used to analyze JavaScript-based apps, REST (Representational state transfer) APIs, and traditional web apps, and automate security testing via integration in the software development pipeline.

Veracode will incorporate the Crashtest tool into its existing portfolio, allowing customers to use the same login credentials across both products. Users will be able to leverage the aspects of the integrated technology for a 360-degree view of scanning and reporting architecture across all applications utilizing a DAST product.

Felix Brombacher, CEO of Crashtest Security, said, “We are thrilled to extend advanced DAST capability to a broader market. We have invested heavily in our plug-and-play solution to meet the demands of customers in Europe and enable continuous testing throughout the development process. The acquisition of our dynamic analysis technology and resources by Veracode will enable us to deliver the next generation of DAST to customers globally.”

Don’t be fooled by Cyber Scrooges this Christmas

• Christmas is a time for gift giving and spending more time with loved ones, but that does not stop cybercriminals from trying to get your data.
• In the first half of 2022, attacks increased 44% over the same date in 2021, according to Check Point Software’s Mid-Year Report.
• On shopping dates such as Amazon Prime Day, attacks increase even more, reaching peaks of more than 35% compared to the average.

Christmas is a special time for millions of people around the world as heart-felt gifts are exchanged and families spend time with loved ones. But it is also a special season for cybercriminals as they take advantage of these shopping days to increase their phishing attacks, ransomware, and even dropping malware into emails.

During this time of frenzied shopping for the perfect last-minute Christmas gifts or grabbing Boxing Day and New Year bargains, cyberattacks are intensified. According to Check Point Software, on Amazon’s Prime Day, for example, attacks related to the US company increased by 37% compared to the average for June. In their Brand Phishing Report for Q3 2022, Check Point also found that DHL, the parcel delivery company, was the most impersonated company, setting up shoppers for cybercrime.

At a time when online shopping is busier than ever, consumers need to be especially careful. That is why Check Point is raising awareness for the telling signs of a scam, and how people can better protect themselves.

1. Always buy from an authentic and reliable source: Before making a purchase, it’s important to authenticate the site you are using to make the purchase. Instead of following a link sent through on email or text message, go directly to the retailer by searching for them on your selected browser and locating the promotion directly. Those extra few steps will ensure you are not clicking on any fraudulent links, and you can make your purchase with confidence.

2. Be alert to similar domain names: Many scam websites will often use a domain name similar to the brand they are trying to replicate, but with additional letters or misspellings. To ensure that you are not handing over your banking information to scammers, pay attention to the URLs to check if there anything usual or unfamiliar. By taking a minute to look for tell-tale signs that a website may be fraudulent, you can quickly determine its legitimacy.

3. Look for ‘too good to be true’ offers: Often phishing scams promise extremely good discounts on very popular items. If you receive an offer that does appear to be too good to pass up, don’t rush to buy it before it sells out. Chances are it is a scam. Instead, check that the seller is authentic by checking other websites to see if they are offering similar discounts.

4. Always look for the padlock: A quick way to see whether a website is secure is to look at whether the URL start with HTTPS. This is an indicator it is compliant with international security standards, and it is usually partnered with a padlock to reflect this. If these are missing, then it’s a strong indication the website is fraudulent and should be avoided.

5. Use endpoint security: While we do see an uplift in scam emails during popular shopping periods, phishing emails are used by cybercriminals all year round. That’s why everyone should be looking to implement email security solutions to prevent them landing in our inboxes in the first place.

6. Be wary of password reset emails: Hackers will always be looking for ways to get into people’s shopping accounts often by credential stuffing, where details have been obtained as part of a separate breach. As a result, consumers should be cautious of password reset emails that could be fraudulent. If you do receive one, always visit the website directly (do not click on the links) and change your password.

“Research suggests that cyberattacks increase around the festive season, with both ransomware and phishing the order of the day for companies and individuals,” says Ian Porteous, Regional Director, Security Engineering, UK&I at Check Point Software. “We all want to have a happy Christmas buying gifts for family and friends and maybe even grab a bargain ourselves. But cybercriminals do not take holidays, and that is why you have to be very cautious, even more so at this time of year.”

Softcat study reveals priority tech investments for smarter digital transformation

A new report by leading providers of IT infrastructure, Softcat, offers an exclusive look at the tech investments businesses are prioritising in the year ahead for smarter digital transformation.

The findings are based on the views of more than 1,800 customers in the UK and Ireland, across 27 corporate and public sectors.

The report, which is produced annually, reveals organisations are now prioritising Cyber Security above all other technology areas, with 62% of organisations saying that it is their focus over the next 12 months.

 

Adam Louca, Softcat’s Chief Technologist for Security, explained: “This figure is understandable. More organisations are recognising the vital role cyber security plays in enabling their tech adoption and unlocking further opportunities for innovation. Rising investment levels and C-suite buy-in reflect this evolving mindset, one that is moving away from an ad-hoc reactive threat response.

“It’s clear from the report’s findings that organisations understand that cyber security must underpin every part of digital transformation and investment needs to be a long-term strategy. This ensures that gains made are not lost as hybrid working and cloud approaches evolve.”

After Cyber Security, Devices is the second most cited technology investment area for the next year as organisations continue to invest in the digital workspace (46% of respondents).

At a time of skills shortages and the great resignation, equipping staff with the right devices and tools they need to work well from anywhere will deliver productivity gains and a high-quality and secure employee experience.

Hybrid Infrastructure is the third most important technology investment area, with 21% of customers citing Datacentre and Private Cloud as a priority area over the next 12 months, followed by Public Cloud (17%) and Managed Infrastructure and Support Services (16%).

Over the past few years of on-off disruption, cloud technologies have proven they’re enterprise-ready, offering organisations the scalability, flexibility, and greater efficiency. But modernising in the right way is key to releasing the true value when investing in cloud solutions.

In response, organisations are moving towards a hybrid approach to ensure the user and customer experiences are consistent, deliver value and achieve the required business outcomes.

It’s clear from the survey findings that sustainability is moving higher up the agenda for many businesses, large and small, with 19% of respondents citing it as a priority this year, up from 9.6% in 2021.

 

Richard Wyn Griffith, Chief Commercial Officer, commented on the findings:

“The past year has been one of transition and adjustment for our customers after the disruption and uncertainty of recent years.

“Today, organisations are focused on switching off ‘emergency’ digital transformation mode and turning on smarter digital transformation, setting a clear and concise roadmap for the deployment of new technologies.

“This will help them to remain agile in the face of new headwinds – from rising inflation to skills shortages and supply chain delays – as well as taking positive action towards our shared sustainability goals. 

“One thing is certain; it will be the digitally mature businesses who prosper in the future.”

 

The full findings from the 2022 Softcat Business Tech Priorities Report, including expert analysis, can be downloaded here. 

Check Point Software Celebrates Success of its Irish Channel Partners at Awards Gala with Guest Speaker Rob Kearney

Channel partners recognised for their outstanding achievements over the last 12-months at event in Dublin

Check Point Software, a leading provider of cybersecurity solutions globally, has once again celebrated the achievements of its partners at the annual Irish Partner Awards Gala, held in Dublin on the 20th October.

Speaking at the event, Seamus McCorry, Ireland Country Manager at Check Point said: “The volume of incidents in Ireland is alarming, with an organisation being attacked on average 822 times per week in the last 6 months. We understand the challenges that SMBs face in the fight against cybercrime with fewer resources and manpower dedicated to threat prevention. That is why our channel partners are so valuable as an extension of these businesses, building resilience and consolidating cybersecurity without the need for in-house SOC teams.

“There has been a countrywide drive from the National Cyber Security Centre (NCSC) and the Garda National Cyber Crime Bureau (GNCCB) to help business owners recognise and mitigate cyberattacks as hackers move away from bigger targets. It is our responsibility, and that of our partners, to support companies as they navigate this changing threat landscape.

“Our partners have worked tirelessly over the last twelve months to deliver another strong period of growth, and I want to personally thank them for their contribution in Ireland. We are proud to celebrate their success at our first in-person awards gala.”

 

The partner awards

The event took place at the Medley Private Dining and Events Space in Dublin. The Check Point Software Partner Day and Award Ceremony honours the input of Check Point’s affiliate companies and celebrates the growing partner community in Ireland.

During the evening, there was a fundraiser in support of Women’s Aid, with a total of over €1100 raised in donations. Guests were also treated to a talk by Rob Kearney, Ireland’s most decorated rugby player. His list of achievements for Leinster and Ireland includes being in Ireland’s top ten most-capped players of all time, two Six Nations Grand Slams and three Rugby World Cups. Rob was on hand to present the partner awards in various categories, including:

 

Award Winner
Partner of the Year Integrity360
Project of the Year IP Options
Growth Partner of the Year Presidio
Emerging Technology Partner of the Year Pentesec
Distribution Partner of the Year Data Solutions
Sales Champion of the Year Kevin Carragher – Integrity360
Marketing Champion of the Year Aisling Bolger & Anna Zdun – Presidio
Technical Champion of the Year Ernesto Cabello – Presidio
Channel Champion of the Year Stewart Grant – Integrity360

 

Check Point has been making significant steps in the Irish market, having recently partnered with Ireland’s Health Service Executive (HSE) to help upskill staff in cybersecurity, both within the HSE and across the broader health sector. The partnership with Check Point MIND’s SecureAcademy is part of a large-scale digital transformation program within Ireland’s health service to accelerate the adoption of digital technologies and solutions.

Check Point has also launched its new global Managed Security Service Provider (MSSP) Program which gives partners access to a fully integrated security portfolio and automated processes to remove administrative burden and empower a partner service-led approach. Under the new program, MSSPs can provide global SOC-as-a-Service without upfront investment and address major security incidents with streamlined onboarding and flexible pricing. The program includes Check Point’s prevention-first security operations suite Check Point Horizon, which partners can co-brand or white-label.

IT company reveals how to guard against hackers in Cyber Security Awareness Month

To mark Cyber Security Awareness Month an Oxford based company has issued key advice on how to protect against becoming a victim of digital fraudsters.

OX IT Solutions has issued five top ways for organisations and people to stop criminals hacking into websites, social media platforms and bank accounts. As part of Cyber Security Awareness Month, it is offering all businesses free, remote cyber security reviews to help them identify weaknesses within their IT infrastructure.

The Kidlington based company helps NHS trusts, schools and businesses across the UK protect against cyber security attacks.

Using unique passwords, additional security levels like two factor authentication, regularly backing up data and managing software updates are some of the areas people need to consider when using computers, tablets and smart phones.

Earlier this year the government’s latest Cyber Security Breaches Survey estimated 72% of large firms and 48% of small firms in the UK had been victim of a cyber security attack in the last 12 months. This month OX IT Solutions will post top tips on social media to remind people how to stay safe online.

Chris Cope, OX IT Solutions director said: “Most people are online daily both for work and leisure and lead busy lives, so it is easy to forget or be complacent about cyber security.

“But the smallest gap in the armour is how hackers break into websites, cloud storage, email, social media accounts and bank accounts to issue ransom notes, steal identities and data to sell on the dark web and even take money.

“They rely on security settings not being up to date – it is like leaving the front door of your home unlocked, open and unattended. Cyber Security Month is a good way of reminding people of the issue and some simple steps they can take to protect themselves to stay one step ahead of hackers.”

Here are OX IT Solutions top five tips to be cyber safe.

  1. Install anti-malware software

Malware is malicious software that looks to infect, corrupt and disable networks and devices. It can come in the form of a virus, ransomware or spyware. Installing anti-malware protection across all devices should significantly reduce the threat of a breach.

  1. Keep software up to date

Hackers look to gain access through old or out of date software by exploiting vulnerabilities. Staying up to date with patch management and the latest software will minimize weaknesses in infrastructure.

  1. Staff training

Email phishing is the single largest cause of cyber security attacks in the UK. Luckily, with the right training, most attacks are easy to spot. Promoting vigilance and education amongst staff seriously reduces the number of low-level breaches.

  1. Don’t share passwords

Up to 80% of data breaches involve stolen or weak passwords as the main vulnerability. Never use the same password across multiple accounts and, where possible, implement multi factor authentication.

  1. Back up data

Valuable data can be lost or destroyed as a result of a cyber security breach. Making regular backups through the cloud or external storage will reduce downtime in the event of an attack. “Data theft and cyber security attacks are growing at an alarming rate year on year and becoming increasingly sophisticated,” added Chris. “We hope Cyber Security Month can help ensure more people are better protected online.”

OX IT Solutions specialises in providing network, infrastructure and cyber security solutions. It works with major blue-chip companies, healthcare institutions, local authorities and SMEs. Its clients include the Royal College of Nursing, NW London NHS Trust and Molton Brown.