Minimizing the risk of supply chain attacks – best practice guidelines

Credit to Author: Doug Aamoth| Date: Wed, 28 Apr 2021 10:00:29 +0000

The recent cyberattack on IT-monitoring company SolarWinds pushed supply chain weaknesses into the spotlight by highlighting just how unprepared many organizations are when it comes to defending against supply chain attacks. These attacks often happen because they don’t know where to start or don’t believe themselves important or high-profile enough to be targeted. In our [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/21_LQ5JquEQ” height=”1″ width=”1″ alt=””/>

Read more

IOC Hunting: Leverage MISP threat intel with Sophos Central Live Discover

Credit to Author: Mark Lanczak-Faulds| Date: Tue, 16 Mar 2021 14:17:49 +0000

Quickly identify hosts with IOCs using Sophos Central Live Discover API. Having an ear to the ground just got a little easier.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/SCuY1nlm558″ height=”1″ width=”1″ alt=””/>

Read more

Five cybersecurity prescriptions for healthy healthcare in 2020

Credit to Author: indrajeetpradhan| Date: Tue, 12 May 2020 07:00:58 +0000

To help your healthcare organization gain ground on modern cyber threats, read Sophos’ five security tips.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/NIfCKtFbMco” height=”1″ width=”1″ alt=””/>

Read more

How to remove unused devices from Sophos Central

Credit to Author: Mark Lanczak-Faulds| Date: Tue, 28 Apr 2020 18:17:03 +0000

We take you through the steps to clear your old devices from Sophos Central, so you’ve got more time to focus on the devices that matter.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/WmNHPk2zSH4″ height=”1″ width=”1″ alt=””/>

Read more

Protecting your company during COVID-19: guidance for CIOs and CISOs

Credit to Author: Ross McKerchar| Date: Wed, 01 Apr 2020 13:42:00 +0000

An unplanned and rapid shift to remote working is inadvertently forcing companies to relax cybersecurity controls. CIOs and CISOs must work quickly to counter the risks before the criminals capitalise on them.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/_vdQUqr8bs8″ height=”1″ width=”1″ alt=””/>

Read more