The Trap of a Seemingly ‘Innocent’ File
Files are not just simply files. There are several layers and derivatives that make up an innocent ‘file’. Do you have any idea how many? Each and every file is considered a container of malicious content. Files can be hidden inside macro’s, zip – sometimes even up to 10-12 derivatives within the original file. A…Read More
Next Layer Protection Against Known and Unknown Cyber Threats
THE CHALLENGE: Although enterprises spend millions of dollars on cyber security, the attacks, which are constantly updated, will easily bypass firewall, Sandbox, Mail Relay / Mail Gateway and Anti-Virus systems in use within organizations. How is protection against unknown cyber threats assured? How is the safety of files exchanged on the LAN-WAN assured? Is the…Read More
Is Phishing getting better of worse?
Phishing as an E mail attack is not new. Attackers are well aware that humans are typically the weakest link in any organization and the constant rise of phishing attacks confirms it to be true. The more success phishing attacks have, the more they are perpetrated. There are a constant array of new tools to…Read More
In 2018, Ensuring E mail security can only be with a CDR Solution
https://www.csoonline.com/article/3250086/data-protection/7-cybersecurity-trends-to-watch-out-for-in-2018.html It certainly makes sense to us that since Malware and Phishing threats are some of the most common to enter the network via e mail that the adoption of more sophisticated security technologies in 2018 will need to be a CDR solution. This is not withstanding the soon to come into effect GDPR legislation…Read More