Month: March 2019

Sapphire and Tenable – strength in partnership

25 March 2019 –– Sapphire today announced its promotion to a Platinum Partner of Tenable®, Inc., the Cyber Exposure company, demonstrating its ability to deliver complex projects involving multi-vendor integration for enterprise organisations.

As a leading Platinum Partner in the UK, Sapphire will further enhance its service to customers by continuing to excel in technical support and delivery of Tenable’s portfolio. Its technical team has a wealth of experience in designing, deploying and supporting Tenable environments.

SHARE

Continue reading

Cyber Attack Threats are Evolving – Are You Prepared?

In 2018, threat actors consistently improved their cyber weapons, quickly adopted new methods and adapted their attacks to emerging technologies. Today's threat trends increasingly point to more stealth-like cyber attacks with malware, ransomware, data breach, and cryptomining.

The Cyber Attack Trends Analysis report includes:

  • An in-depth look at today's cyber attack trends
  • Expert analysis of 2018's most damaging attacks
  • Key stats of major malware types

Arm yourself with all the facts in the first volume of the 2019 Security Report: Cyber Attack Trends

SHARE

MOBILE CYBERATTACKS IMPACT EVERY BUSINESS

As businesses around the globe increasingly adopt mobility programs to boost productivity and profitability, cyberattacks continue to grow in sophistication andfrequency. Yet today nearly two-thirds of security professionals doubt their organizations can prevent a breach to employees' devices, while 94% expect the frequency of mobile attacks to increase.

This report, prepared by Check Point's mobile threat research team, is the first to study the impact of mobile attacks in enterprise environments by assessing actual threat telemetry of corporate-owned and bring-your-own devices. The results are stark: enterprise mobility is under constant attack, affecting all regions and industries, on both major mobile platforms, Android and iOS. Threats to mobile users are myriad and powerful, and ultimately capable of compromising any device, accessing sensitive data at any time.

This report reveals the major trends in mobile malware and other attack vectors, where they operate, and which industries are the most frequent targets.

SHARE

ISO 27001:2013 compliance with the Egress Platform

The ISO 27001:2013 international standard specifies requirements for an Information Security Management System (ISMS), which is a set of policies for systematically managing risks to information. Becoming ISO 27001:2013-certified allows organisations to demonstrate to clients, customers and third-party stakeholders that information held by the organisation is being managed securely and appropriately.

The Egress platform can assist organisations as they become ISO 27001:2013-certified. This document describes ISO 27001:2013 requirements covered by the Egress platform, detailing the specific ways in which Egress can aid compliance when it comes to going through ISO27001 certification or the re-certification process.

Download this report and learn about the following:

  • Asset Management
  • Access Control
  • Cryptography
  • Operational Security
  • Communications Security
  • System Acquisition, Development and Maintenance
  • Compliance
SHARE

SandBlast Agent Endpoint Software earns NSS Labs 'Recommended' rating in 2019 AEP test

NSS Labs, Inc. released results for their Advanced Endpoint Protection test and recognized Check Point SandBlast Agent as NSS Recommended, our debut appearance in this report. This achievement marks our first NSS Recommended rating this year and our 18th NSS Recommended rating since 2010.

The results establish SandBlast Agent as a comprehensive endpoint protection solution and core component of our Check Point Infinity architecture.

This latest achievement helps reinforce the Check Point Infinity vision of delivering effective and efficient security to our customers across all vectors – network, mobile, cloud, and the endpoint.

AEP Test highlights:

  • 100% HTTP block rate
  • 100% Email block rate
  • 100% Offline threats block rate
  • 100% Evasions block rate
  • 0% False positives
SHARE

Many small to medium sized businesses make the mistake of assuming that they are not at risk from cyber scams and security. This is due to the fact that they believe their size means it is unlikely they would be a worthy target. While that may be true for some hackers, after all they do like to hit the spotlight in the news and target large companies. However, being an easy target is also easy money and helps to build their confidence and practice their techniques. Securing your assets and data is critical to the longevity of your business.

If you own a small or medium sized company, you need to take the threat of cyber criminality and vulnerability discovery very seriously. So, here are our top five security tips that could save your business from disaster.

SHARE

Continue reading