Category: Security

06

Jun, 18

Empowering Enterprise: Human behaviour the weak link in cyber defence

Since email users are usually the main target for phishing attacks, they need to be ultra-aware of any tempting baits. Higher ranking staffs of organisations were viewed as most likely to be targeted because of the access they have but frontline staff may be an easier target as they are not always aware of the […]

30

May, 18

Empowering Enterprise: How to Make Sure Cloud Deployments Are Secure

The global forecast is cloudy. In fact, rather than a forecast, it’s a reality – practically everyone, everywhere uses cloud technology today. Whether an organisation runs Office365 for email or virtualisation on-premises (private cloud), a public cloud provider such as AWS, Azure or GCP, or a combination of these in a hybrid setup, the cloud […]

19

Oct, 17

Empowering Enterprise: Is Your Business Being Held to Ransom?

As the threats posed by hackers constantly evolve, attacker behaviour is shifting to malware and ransomware that seek to destroy a network or hold its owners to ransom. Two new types of attacks have emerged as of late – ransom denial of service (RDos) and destruction of service (DeOS). “Their toolbox to achieve such devastation […]

21

Sep, 17

Empowering Enterprise: New Weapons to Counter Cybersecurity Threats

“We need [machine learning and artificial intelligence] to act as our force multiplier, as the systems that ingest all that data and then tell only about the things we should care about and act on, making our security analysts more productive,” urged Nick Savvides, security evangelist at Symantec Asia Pacific. As the largest cybersecurity company […]

20

Sep, 17

Empowering Enterprise: Be Prepared for More Cyber Attacks

“The widespread use of mobile devices, and the mainstream adoption of cloud and Internet of Things (IoT) technologies have opened whole new platforms for attacks,” warns Sherif El-Nabawi, Senior Director of Systems Engineering at Symantec Asia Pacific. Unlike a desktop computer or laptop, which will typically have security software installed and receive automatic security updates, […]

14

Sep, 17

Empowering Enterprise: How Secure Is Your Digital Security?

With 74 percent of businesses expected to be hacked each year globally, “the economic loss of cybercrime is estimated to reach US$3 trillion by 2020. Yet, as these costs continue to climb, the financial damage is overshadowed by new and broadening risks,” warns Brad Smith, president and chief legal officer at Microsoft. “Improving security is […]

11

Aug, 17

Empowering Enterprise: WannaCry-Linked Bitcoin Wallets Emptied: Analysts

“Empowering Enterprise” is an ongoing Ingram Micro series published in every Wednesday’s edition of The Business Times. It aims to provide news and thought leadership on the latest developments in cloud and security. The series is produced in partnership with the following vendors: Dropbox, Microsoft, VMware, Cisco, IBM, Progress, Symantec, Barracuda, Dell EMC, FireEye, Hewlett […]

10

Aug, 17

Empowering Enterprise: How Do You Protect Yourself From Ransomware?

“Empowering Enterprise” is an ongoing Ingram Micro series published in every Wednesday’s edition of The Business Times. It aims to provide news and thought leadership on the latest developments in cloud and security. The series is produced in partnership with the following vendors: Dropbox, Microsoft, VMware, Cisco, IBM, Progress, Symantec, Barracuda, Dell EMC, FireEye, Hewlett […]

09

Aug, 17

Empowering Enterprise: Facilitate, Don’t Dictate

“Empowering Enterprise” is an ongoing Ingram Micro series published in every Wednesday’s edition of The Business Times. It aims to provide news and thought leadership on the latest developments in cloud and security. The series is produced in partnership with the following vendors: Dropbox, Microsoft, VMware, Cisco, IBM, Progress, Symantec, Barracuda, Dell EMC, FireEye, Hewlett […]

15

May, 15

it_security

Choose the Best Endpoint Security Solution for You and Your Customers

The fact that malware has evolved to the point where it’s now being used to hold systems ransom is just one reason pointing to why IT solution providers are able to realize lucrative recurring revenue protecting clients from today’s cyber threats. With so many offerings to choose from, it can be difficult to know which endpoint security solution […]

COLOR SCHEME Unlimited color options are avaliable via Options Panel.