State of encrypted traffic Hackers have expanded their craft to use SSL traffic to obfuscate their attacks and malware from security systems. 97% of surveyed enterprises are seeing an increase in encrypted web traffic. 130% increase in threats using TLS/SSL connections in 2016 over 2014. 41% of malware is hidden in SSL traffic. 80% of…
Discover MoreAlthough many firewall vendors claim to offer superior threat protection, few have been able to demonstrate the effectiveness of their solutions. Organizations that use inferior firewalls may believe their networks are protected, even though skilled criminals can sneak past the intrusion prevention system by using complicated algorithms to evade detection and compromise the system. Because…
Discover MoreAttacks come in from all vectors: in email, on mobile devices, in web traffic as well as via automated exploits. On top of this, the size of your company doesn’t matter. To a hacker you are an IP address, an email address or a prospect for a watering hole attack. Attackers use automated tools to…
Discover MoreWhile digital data is high on an organisation’s agenda it would be a mistake to assume that paper-based security risks have gone away. Paperwork still accounts for many common security breaches. How to avoid paper work breaches? One way of overcoming some of the risks associated with paper is to make sure your company has…
Discover MoreToday’s cyber-criminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual property or hold files for ransom. Their threats are often encrypted to evade detection. Once they have exploited a target, attackers will attempt to download and install malware onto the compromised system. In many instances, the…
Discover More