Category: How to

Web-filtering-protecting-your-staff-from-malicious-content
Business

Web filtering – protecting your staff from malicious content.

Another key component of cyber security is Web filtering (also known as Content filtering). Web filtering is similar to e-mail screening, in the sense that both technologies look to block threats before the end-user is exposed to them. So, when e-mail screening and web filtering are doing their job, you don’t have to rely on

Read More »
Business

Endpoint Protection

Malwarebytes Endpoint Detection and Response (EDR) provides cross-platform threat prevention and remediation for Windows, Mac and Linux computers. Easy Malwarebytes Endpoint Detection and Response for Windows and Mac can easily replace or augment other endpoint security solutions, including Microsoft Defender. Non-disruptive, role-based access, deploy within minutes. Lightweight endpoint agent, robust integrations. Intuitive cloud-native management console.

Read More »
email-screening-thumbnail
Business

Email Screening: Protecting Staff from Malicious Threats

Many scam attacks are attempted via e-mail, therefore it is essential to block as many of these as possible before they are delivered to staff. Whilst Microsoft and Google include e-mail scanning, their systems are generic and often easy for scammers to circumvent. We recommend implementing an external “e-mail gateway” that scans all e-mail prior

Read More »
What is Patch Management and why is it important?
How to

What is Patch Management and why is it important?

Patch Management is the process of applying updates to “software”. Where “software” includes: Patches are necessary to correct errors in the software, these errors are often referred to as “bugs” or “vulnerabilities”. “Bugs” are typically a logic flaw or error that results in the software not performing as it was intended, perhaps the way that

Read More »
How to

How to protect against e-mail (and other) scams

Scammers are using increasingly varied and sophisticated attempts to get your money or personal details. Scams succeed because they look like the real thing and catch you off guard when you’re not expecting it. For example below is a scam e-mail – the link to ‘View full invoice details’ connects to a malicious payload. Scam

Read More »
How to

How to prevent a Ransomware attack

The cost of remediating a ransomware attack will always be significant, therefore it is worth spending time to ensure that you have the defences in place to prevent an attack or to mitigate data loss in the event that your defences are breached. What is Ransomware? Ransomware is a piece of malicious software that once

Read More »