Sophos Whitepapers
This guide will provide clarity by walking you through the key preventative technologies to ensure you have the right defences in place at the endpoint to protect your organisation. It will also enable you to see how different vendors stack up in independent tests, helping your make an informed choice.
Exploits take advantage of weaknesses in legitimate software products like Adobe Flash and Microsoft Office to infect computers for criminal purposes. Read this paper to learn more about exploits and the various levels of exploit prevention found in prominent security products.
This paper examines commonly used techniques to deliver ransomware, looks at why attacks are succeeding, and gives nine security recommendations to help you stay secure. It also highlights the critical security technologies that every IT setup should include.
In this paper, we’ll dive into the evolution of phishing in recent years, how it works, and what it looks like. And as cybercriminals continue to prey on employees through their technology, we’ll make an argument for the importance of a multi-layered defence against phishing attacks: combining advanced security technologies with educated, phishing-aware employees.
Recent ransomware attacks like Wanna and Petya have spread largely unchecked through corporate networks in recent months, extorting money to restore your data and regain control of your computers. Modern firewalls are purpose-built to defend against these kinds of attacks, but they need to be given an opportunity to do their job.
In this whitepaper we’ll discuss how these attacks work, how they can be stopped, and best practices for configuring your firewall and network to give you the best protection possible.
Businesses large and small are under threat from increasingly aggressive and brutal ransomware attacks. Loss of access to critical files, followed by a demand for payment can cause massive disruption to an organization’s productivity.
This webcast covers:
- Anatomy of a ransomware attack
- The latest ransonware to rear its ugly head - introducing Locky and its friends
- Why these attacks are so successful
- Practical steps to protect your organisation from ransomware threats
- How Sophos can help
Businesses large and small are under threat from increasingly aggressive and brutal ransomware attacks. Loss of access to critical files, followed by a demand for payment can cause massive disruption to an organisation’s productivity.
But what does a typical attack look like? And what security solutions should be in place to give the best possible defense?
This paper examines commonly used techniques to deliver ransomware, looks at why attacks are succeeding, and gives nine security recommendations to help you stay secure. It also highlights the critical security technologies that every IT setup should include.
Exploits are one of the main techniques used by cybercriminals to spread malware. They take advantage of weaknesses in legitimate software products like Flash and Microsoft Office to infect computers for their criminal ends. A single exploit can be used by myriad separate pieces of malware, all with different payloads.
Read this paper to learn more about exploits and how to stop them. It explores how exploits work, the exploit industry, what makes a good exploit in the eyes of the cybercriminals, and also how anti-exploit technology is a highly efficient and effective way to secure your organisation against advanced and unknown threats.
There are a lot of misconceptions out there about safe web browsing. You might think you're being safe. But without the facts it’s next to impossible to stay protected against today’s changing threats. In this paper we describe the top five myths of safe web browsing, what the facts really are, and what you can do to stay secure.