logo

Exploit Prevention Stops Modern Threats

Exploit Prevention Stops Modern Threats

Provided by Sophos

Exploits are one of the main techniques used by cybercriminals to spread malware. They take advantage of weaknesses in legitimate software products like Flash and Microsoft Office to infect computers for their criminal ends. A single exploit can be used...

View Abstract

Encryption Implementation: Getting it Right the First Time

Encryption Implementation: Getting it Right the First Time

Provided by Sophos

You've gone back and forth on encryption, its benefits and challenges, and you've made the decision: to keep your data truly safe, your organization needs encryption. So what now? You've got options available, but what is the best, safest way to implement...

View Abstract

How to stay protected against ransomware

How to stay protected against ransomware

Provided by Sophos

Ransomware threats like Cryptowall, TeslaCrypt, and Locky are on the rise, targeting organizations of all sizes. This paper explains how these attacks work, and why a large number of new infections continue to surface despite existing protective measures....

View Abstract

How to stay protected against ransomware

How to stay protected against ransomware

Provided by Sophos

Ransomware threats like Cryptowall, TeslaCrypt, and Locky are on the rise, targeting organizations of all sizes. This paper explains how these attacks work, and why a large number of new infections continue to surface despite existing protective measures....

View Abstract

Search by Category