Join our webcast: Stop the Exploit. Stop the Attack.

WebcastWe know ransomware is one of the biggest threats facing organizations today but the security industry has traditionally struggled to keep up with this sophisticated, ever-changing attack. Until now.

Deploying a range of innovative next-gen technologies to block all kinds of advanced attacks, Sophos Intercept X is designed to stop ransomware in its tracks. It gives you comprehensive protection from rootkits, zero-day vulnerabilities, malicious traffic, and everything in-between.
Continue reading

Moving beyond EMET, Part 2

microsoftMicrosoft has now mapped out the future for the Enhanced Mitigation Experience Toolkit (EMET) in part one and it looks pretty bleak. The advice given to EMET users was also a little vague: Upgrade to Windows 10. It’s a more secure operating system.

Although that’s true, it doesn’t cover everything that EMET does for you. Over on the CERT/CC blog, Will Dormann provides an excellent post about why Windows 10 can’t protect insecure applications like EMET can. The table seen in Dormann’s post highlights the protection available with and without EMET on Windows 7 and Windows 10. As you’ll see, Windows without EMET looks a little risky.

Continue reading

Staying secure against ransomware

RansomwareRansomware has the potential to cause massive disruption to an organization’s productivity. So it’s vital to understand how to build the best possible defense against it.

The producers of ransomware aren’t just idly waiting for their bit of malware to hit its target. They work in professional teams, constantly updating and enhancing new variants of ransomware – and if you’re caught, the consequences can be severe.

Continue reading

Sophos Central Adds Support for SIEMs (Splunk, ArcSight, etc)

Central with EmailSophos Central has integrated many of the products a business needs to stay secure. However, we realize that many organizations have products from multiple vendors and leverage a SIEM (security information and event management) to try to make sense of all the security events produced by all those disparate products. With data flowing fast, IT teams face a big challenge when it comes to maintaining some semblance of coherent visibility into the vast amounts of information they’re constantly receiving from all their different vendor products.

Continue reading