" spam "

Panda-for-Mac

Panda Antivirus for Mac – Compatible with El Capitan

September 30th saw the launch of El Capitan, Apple’s new operating system for their Mac range. The good news is, Panda Antivirus for Mac is compatible with El Capitan!

os_x_el_capitan-t2

Advantages of Panda Antivirus for Mac

  • Blocks both malware for Mac OS X and malware for Windows.
  • It scans both files and emails.
  • It quarantines infected files.
  • It offers two kinds of scans: a real-time scan that continuously analyses Mac files, and another that performs monthly, on-demand scans.
  • You can even scan iPhones, iPads and iPod touch for malware.

Remember that Apple and its devices aren’t invincible. To avoid any unpleasant surprises such as XcodeGhost, you should consistantly update the operating system, download apps from the official store and use security software.

Learn more about about Panda Antivirus for Mac.

cybersecurity3

The Advantages of Having a Managed Security Service

In the corporate environment, cyber-threats are becoming more and more sophisticated, security standards more complex and budgets tighter and tighter.

The world of technology in the workplace is no longer just restricted to servers, workstations or email accounts – instead we need to consider mobile devices and the culture of BYOD (Bring Your Own Device). Companies also need to be aware of problems that may arise from new trends such as social media and the impact that all of this can have on the security of our corporate networks.

This places great stress on businesses when it comes to the monitoring and management of information security.

(more…)

Android-Marshmallow

Android Marshmallow Protects against Ransomware

It’s becoming more and more common for malicious applications on Android to use ransomware as a means of attack. It is one of the most worrying threats to mobile users as it renders the device unusable until the fee is paid and is sometimes difficult to eliminate completely. Google is aware of this issue and has finally decided to face it head on.

Android 6.0 Marshmallow, which is already available on selected terminals, makes it more difficult for cyber-criminals to hijack users’ phones. This is thanks to the company’s experts designing a more advanced operating system to manage the permissions asked by different applications.

Until now, users accepted all of the permission requests at once when they installed the apps. Due to this, seemingly inoffensive apps such as a simple flashlight were able to access features that were not related to its sole purpose. Not all of these apps were dangerous and for the most part companies were only trying to fine tune their advertising. However, by allowing access to other functions and domains on the mobile devices – users opened the door for malware to infect the device as well.

(more…)

Ransomware

Human Resource Departments a Target for Ransomware

Physically presenting your CV for a prospective job offer is fast becoming obsolete. The digital world has simplified correspondence between people by electronic or digital means. Applicants are able to send their CV’s to companies via email attachments.

In recent attacks cyber-criminals send malicious data disguised as CV’s, upon opening the attachment, the malware installs itself on the victim’s computer. It then encrypts the data on the PC/Network and requests a ransom in-turn for the decryption code. This type of attack is known as ransomware.

(more…)

holiday-bg

10 Tips to Stop Cyber-Criminals from Ruining Your Holiday

Often when we go on holiday we jeopardise our own personal information, either by using credit cards in foreign countries, announcing our travels on social media or using open networks while travelling. Below are 10 tips on how to be more cautious when on holiday.

1  Don’t shout it from the rooftops

Don’t broadcast your upcoming holiday on social media. And if you do, then don’t reveal too many details about your plans. This information could be useful for someone with a sinister motive and could leave your home and valuables exposed.

Make sure you deactivate your GPS. This way you don’t have to worry about it giving away clues of your whereabouts which might avert criminals to the fact that you’re out of town.

2  Back-up all your devices

If you have decided  to take your laptop, tablet or smartphone with you on holiday – don’t forget to make back-ups of the data and store it in a secure place.
(more…)

Employees-Only-sign.

45% of Ex-Employees Continue to Have Access to Confidential Corporate Data

It is essential for companies to take steps in order to maintain their security, especially when changes occur within the company’s staff.

Employees looking for a change of scene, suppliers who do not pay on time or companies that go out of business – there are numerous reasons as to why business relationships may come to an end and companies should control what information is retained by those who are leaving and obtained by those who are entering.

It seems that many companies don’t pay much attention to this matter. There are few organisations that take the necessary precautions to prevent ex-employees from keeping information that belongs to the company. According to a study carried out by Osterman Research, 89% of the ex-employees keep the login and the password which gave them access to at least one of their former company’s services.

(more…)