Next Layer Protection Against Known and Unknown Cyber Threats
THE CHALLENGE: Although enterprises spend millions of dollars on cyber security, the attacks, which are constantly updated, will easily bypass firewall, Sandbox, Mail Relay / Mail Gateway and Anti-Virus systems in use within organizations. How is protection against unknown cyber threats assured? How is the safety of files exchanged on the LAN-WAN assured? Is the…Read More
Is Phishing getting better of worse?
Phishing as an E mail attack is not new. Attackers are well aware that humans are typically the weakest link in any organization and the constant rise of phishing attacks confirms it to be true. The more success phishing attacks have, the more they are perpetrated. There are a constant array of new tools to…Read More
MSSP’s – Are you sure your current Email protection technology is sufficient to protect your customer’s e mail box?
So, let’s talk about it. What is involved in great Email protection, and what does an MSSP need in order to provide improved Content Disarm and Reconstruction (CDR) protection to their customers? Files that enter the internal sensitive network, via any medium, especially Emails with attachments, can be infected with a wide range of threats.…Read More
Series: Password Protected Files Filtering; Threats, Gaps, Challenges
Popular password protected files can be as simple as Microsoft Office files (Word, Excel, PowerPoint), PDF, or Archive files (.zip, .7zip, .rar). The risks are clear, in these popular files security threats can be significant. We are talking about Macro in Microsoft Office files, Script in PDF files, executable files in Archive files. The…Read More
#Petya #WannaCry; Lessons Learned?
Here we go again. Just a different name. #Petya, #Wannacry not much difference in the mass damage they have caused. We are all abundantly aware. #wannacry Ransomware has now been reported in more than 150 countries around the globe, affecting hundreds of thousands of machines and more than 10,000 companies. WannaCry spreads by taking advantage…Read More
Dear CISO: One way to make attachments as fast and as safe as E-mail…
Regarding your response written on the Symantec website https://www.symantec.com/connect/forums/sanitizing-email-attachements-what-i-would-have?list_context_id=1611&list_context_type=sc_forum regarding your plea of what you would like to have when sanitizing E-mail attachments. It’s true everybody needs E-mails. And let’s be really frank, everybody needs those E-mails to have clean attachments. You cannot separate between the E-mails and their attachments. Standard formats even word, excel,…Read More