Sophos Whitepapers


Sort by: Date | Company | Title


Endpoint Security Buyers Guide
By Sophos | 13/7/2018

This guide will provide clarity by walking you through the key preventative technologies to ensure you have the right defences in place at the endpoint to protect your organisation. It will also enable you to see how different vendors stack up in independent tests, helping your make an informed choice.

Download this now


Exploits Explained: Comprehensive Exploit Prevention and Vendor Offerings
By Sophos | 6/3/2018

Exploits take advantage of weaknesses in legitimate software products like Adobe Flash and Microsoft Office to infect computers for criminal purposes. Read this paper to learn more about exploits and the various levels of exploit prevention found in prominent security products.

Download this now


How to Stay Protected Against Ransomware
By Sophos | 6/3/2018

This paper examines commonly used techniques to deliver ransomware, looks at why attacks are succeeding, and gives nine security recommendations to help you stay secure. It also highlights the critical security technologies that every IT setup should include.

Download this now


Don’t take the Bait
By Sophos | 6/3/2018

In this paper, we’ll dive into the evolution of phishing in recent years, how it works, and what it looks like. And as cybercriminals continue to prey on employees through their technology, we’ll make an argument for the importance of a multi-layered defence against phishing attacks: combining advanced security technologies with educated, phishing-aware employees.

Download this now


Firewall Best Practices to Block Ransomware
By Sophos | 25/9/2017

Recent ransomware attacks like Wanna and Petya have spread largely unchecked through corporate networks in recent months, extorting money to restore your data and regain control of your computers. Modern firewalls are purpose-built to defend against these kinds of attacks, but they need to be given an opportunity to do their job.

In this whitepaper we’ll discuss how these attacks work, how they can be stopped, and best practices for configuring your firewall and network to give you the best protection possible.

Download this now


How to stay protected against ransomware
By Sophos | 1/8/2017

Businesses large and small are under threat from increasingly aggressive and brutal ransomware attacks. Loss of access to critical files, followed by a demand for payment can cause massive disruption to an organization’s productivity.

Download this now


Ransomware: Is Zepto the new Locky?
By Sophos | 12/12/2016

This webcast covers:

- Anatomy of a ransomware attack

- The latest ransonware to rear its ugly head - introducing Locky and its friends

- Why these attacks are so successful

- Practical steps to protect your organisation from ransomware threats

- How Sophos can help

Download this now


How to Stay Protected Against Ransomware
By Sophos | 12/12/2016

Businesses large and small are under threat from increasingly aggressive and brutal ransomware attacks. Loss of access to critical files, followed by a demand for payment can cause massive disruption to an organisation’s productivity.

But what does a typical attack look like? And what security solutions should be in place to give the best possible defense?

This paper examines commonly used techniques to deliver ransomware, looks at why attacks are succeeding, and gives nine security recommendations to help you stay secure. It also highlights the critical security technologies that every IT setup should include.

Download this now


Exploits. Intercepted.
By Sophos | 12/12/2016

Exploits are one of the main techniques used by cybercriminals to spread malware. They take advantage of weaknesses in legitimate software products like Flash and Microsoft Office to infect computers for their criminal ends. A single exploit can be used by myriad separate pieces of malware, all with different payloads.

Read this paper to learn more about exploits and how to stop them. It explores how exploits work, the exploit industry, what makes a good exploit in the eyes of the cybercriminals, and also how anti-exploit technology is a highly efficient and effective way to secure your organisation against advanced and unknown threats.

Download this now


Top 5 Myths of Safe Web Browsing
By Sophos | 24/5/2012

There are a lot of misconceptions out there about safe web browsing. You might think you're being safe. But without the facts it’s next to impossible to stay protected against today’s changing threats. In this paper we describe the top five myths of safe web browsing, what the facts really are, and what you can do to stay secure.

Download this now
[]