How to manage your mobile workforce with Sophos (and try our demo now!)

mobileMobile devices… everybody has them. We use them every day (sometimes for large parts of the day) for increasingly productive and amazing things – to take selfies, peruse the news, surf the web, compose music, send saucy text messages, make art, and other creative things.

Most also want to use them at work – to read work emails, view and share files, access the company intranet, check the latest revenue spreadsheets, make last-minute edits to the big presentation, and so on. But with the explosion of mobile device usage in business comes the inevitable headache of ensuring that all sensitive and confidential company information stays secure. Data protection regulations must be followed, security policies need to be adhered to and intellectual property must be kept confidential.

Continue reading

Sophos moves up 15 positions in the Top 100 Companies for Graduates list!

Sophos CareersThree years in a row, our graduates and interns have voted us as a top employer in The Job Crowd’s survey of the Top Companies for Graduates to Work For (Smaller Intake).

This year we rose to 40th on the list – more than 15 spots up from last year – beating out many household brands! Plus, we were ranked number 5 in the IT Development and Consulting sector of the survey. We’re really grateful for the recognition and excited to see the impact we are making for our interns and graduate employees.

Continue reading

Got malware? Get Sophos Clean

Sophos CleanIf you think your antivirus alone is enough to stay safe from today’s advanced malware threats, you might want to get a second opinion.

Today’s malware is difficult to detect, difficult to remove and difficult to recover from. We estimate that less than 10% of all the new samples analyzed by SophosLabs is previously known malware. You wouldn’t want to gamble with those odds, and you surely don’t want to gamble with your endpoint security.

Sophos Next-Generation Endpoint Security uses signature-less threat detection and response capabilities to better protect you against zero-day attacks, advanced threats and crypto-ransomware that can evade traditional, signature-based endpoint products.

Now we’ve added another tool to our arsenal. We’re calling it Sophos Clean, the next generation of malware detection and removal tools.

Continue reading

You still have time to get a free pass to IP EXPO Manchester

IP EXPO ManchesterIP EXPO Manchester, part of Europe’s number one Enterprise IT event series, is taking place this 18-19 May. And with over 4,000 visitors, hundreds of free educational seminars and 100+ exhibitors, IP EXPO Manchester is an event IT pros won’t want to miss.

IP EXPO takes place at the Manchester Central Convention Complex, where our experts will be sharing their knowledge in the Cyber Security Zone at stand N320. Register before 7 pm BST on 17 May, and you can get a free pass. As an added bonus, every 50th person to register through our registration page will also win a Sophos goody bag.

We have seminars scheduled for both days, presented by multidisciplinary security expert James Burchell.

Continue reading

Introducing Sophos MSP Connect

MSP ConnectToday I’m pleased to tell you about Sophos MSP Connect, a flexible program designed to connect managed service providers (MSPs) and their customers to one complete security solution – centralized and simplified through one vendor, with one dashboard and one monthly bill.

Sophos MSP Connect leverages Sophos Central, the easy-to-use, cloud-based dashboard. If you haven’t seen the new Sophos Central – Partner dashboard, it’s an intuitive, single pane of glass for managing everything Sophos has to offer, from XG Firewall to Next-Generation Enduser Protection.

The main dashboard surfaces all the alerts for your managed customers, where you can quickly drill down for more detailed reports and quickly respond to incidents.

Continue reading

Why malware authors keep using the same old Microsoft Office exploits

Office exploitsSophosLabs Principal Malware Researcher Gabor Szappanos has closely studied Microsoft Office exploits for the past few years. We’ve previously covered his investigation of the Microsoft Word Intruder exploit creation kit, and his recent paper exploring the most popular Office exploit kits.

In a new research report, Gabor takes a closer look at the top four Office exploit kits used in the last quarter of 2015. He also reports which exploits were most commonly used in malicious documents, and shows us what families of malware were distributed by the studied samples.

As Gabor explains, malware authors are increasingly attracted to document exploits as the initial entry point for their attacks. The attackers spread their booby-trapped Office documents through phishing emails spammed out to large numbers of random recipients (cybercrime groups), or to a more select list of targets (APT groups).

Notably, the majority of Office exploits malware authors have been using in malicious documents are now several years old. The most popular exploit, CVE-2012-0158, has been around for well over three years now.

Continue reading

Location-based threats: How cybercriminals target you based on where you live

Geo-malwareMuch like legitimate businesses, cybercriminal enterprises have to be dynamic – standing still means falling behind. A significant example of how cybercriminals are evolving is the growing trend of location-based targeting, through what we call “geo-malware” and regionalized email attacks.

Traditionally, we think of online threats in terms of highly targeted attacks on the one hand and opportunistic cash grabs on the other hand. Nation-state sponsored or advanced persistent threat (APT) attackers target specific individuals or organizations, and the more common, financially motivated digital thieves take an “infect them all” approach.

Our SophosLabs research shows that way of thinking is becoming outdated, as APT attackers and common cybercrooks learn and borrow techniques from one another.

Common online crooks have learned how to become more efficient and increase their yield per victim by targeting individuals based on their specific country, using a variety of methods. Here I will go into a few of them: geo IP lookups; traffic direction services; and email targeting. I will also explain how and why cybercrooks avoid certain countries.

Continue reading