Profile cover photo
Profile photo
Nuvias Cyber Security
30 followers -
Wick Hill provide best-in-class solutions for network security.
Wick Hill provide best-in-class solutions for network security.

30 followers
About
Posts

Post has attachment
"If 2017 already hadn’t had its fair share of cyber-attacks, the world was introduced to another major cyber-attack on Tuesday, 24th October 2017. The virus which has been nicknamed “Bad Rabbit”, first unleashed itself with full force on Russian and Ukrainian infrastructure, taking down governmental and transportation organisations.

2017 so far has been an unfortunate year for the cybersecurity universe. Businesses and corporations have been severely targeted. Bad Rabbit is just an addition to the extensive list of security meltdowns to happen in this calendar year. In this article we discuss the most high-profile security breaches which have materialised so far, this year."
Add a comment...

Post has attachment
"A more secure organisation is something we all strive for. With the larger number of cyber criminals and other threats to your online security, there is always a new security practice that can be implemented"

Guest blogger Uchenna Ani-Okoye, former IT manager, discusses the ten security practices that you may not have considered, but definitely should.
Add a comment...

Post has attachment
"Though there has been a seismic shift in the amount of money earmarked for IT security over the last few years, there is still a large gap in the amount of money available for investment available for IT security professionals within their organisations.

There is no doubt that IT security has risen the agenda at board level because of the ever-growing number of big-brand scalps that fall victim to nefarious cyber-attacks.

However, the money is not being invested internally but, more often than not, is being used to fund partnerships with managed security service providers (MSSPs). Why?"

Barracuda Networks.
Add a comment...

Post has attachment
"Computer networks are more important today that they have ever been. So much of business continuity involves the smooth running of supporting IT systems. For Network managers, there appears to be an endless availability of IT Security vendors with an even larger supply of security tools available for deployment across their networks; protections such as Firewalls, IPS, Web & Content Filtering, CASB, UEBA VPN, Vulnerability & Patch Management among others.

As far as end-user side vulnerabilities are concerned (in contrast to vendor side), there are the obvious technical issues but also equally important although often overlooked, are non-technical issues. By “End-user”, the focus is on the managers and network administrators who have direct oversight for the network and security systems and not every day users."
Add a comment...

Post has attachment
"The worrying trend over the last 18 months in the world of malware has been twofold: an increase in ransomware as a threat and significant evidence that the number of perpetrators of this kind of malware is increasing.

It’s no surprise that ransomware is on the increase. Requiring less effort and expertise to run and resulting in faster pay-outs in the form of a ransom, the process is often entirely automated and can result in huge returns"

Anthony O’Mara, VP Sales EMEA, Malwarebytes
Add a comment...

Post has attachment
"Protecting the modern network with the traditional Proxy and IDS mentality of the late 1990’s and early 2000’s is not appropriate anymore. More and more attacks now use encrypted connections to try and conceal data exfiltration. The Dark and Deep (encrypted) webs as we know them now were not as prevalent in the past. Modern cyber-attacks are increasingly utilising the application layer as a vector over HTTPS connections"

Michael Adjei (MSc), Nuvias Cyber Security.
Add a comment...

Post has attachment
Join Nuvias and a host of our leading vendors at IP EXPO Europe on 4-5th October 2017, Stand DD20.

Joining us from the Cyber Security practice will be Arbor, HID, Check Point, Tenable and VASCO. From Advanced Networking will be Prolabs, Nokia and Unitrends and Lifesize will be joining from the Unified Communications practice.

Register to meet with one of our specialists and find out more about our vendors seminars in the link provided.
Add a comment...

Post has attachment
"Short for SMS Phishing, SMiShing is a targeted attack aimed at the users of smart phones. Users are generally tricked into downloading some form of virus or Trojan which infects the phone with some form of malicious software. Often disguised as coming from legitimate organisations such as banks, SMiShing attacks are often intended to capture confidential information such as credit card or bank account details via the use of a malicious URL link"

- Check Point Technologies Mobile Threat Research Team.
Add a comment...

Post has attachment
‘Secure’ networks protected by vast sums of investment in IT security systems can still be penetrated and data breaches in all sectors are still common and largely viewed as an inevitable eventuality. Posing a grave risk to the Internet of Things sits ransomware, the Black Widow in this great web.

The consequences of losing control of some of these services to a criminal who holds that control to ransom are a dark though indeed. So, what protection can be afforded to defend against the ‘inevitable’? - Christine Barry, Chief Blogger and Social Content Manager, Barracuda Networks.
Add a comment...

Post has attachment
Nuvias Cyber Security are finalists in the Computing Security Awards for Security Distributor of the Year. We have had great success in the past with these awards, having won for the last 7 consecutive years. A big thank you to everyone who nominated us for the 2017 awards.

We need your support to ensure Nuvias CS wins for the 8th time. As a token of our appreciation for voting for us, you will be entered into a prize draw to win a pair of Bose Wireless Headphones!
Add a comment...
Wait while more posts are being loaded