Now that Halloween has passed and Thanksgiving is on the near-term horizon, the holiday shopping season is kicking in. Almost as soon as the trick-or-treating ended the Black Friday ads starting pouring into my email box. This season some of the major retailers are announcing their Black Friday deals early even though they won’t be available for purchase until Thanksgiving.
• New Initiative Empowers All SonicWall Partners to Offer Services to Customers Worldwide
• Partner Enabled Services Program Helps Customers Realize Greater Value from Their Security Investments
PRESS RELEASE – November 14, 2017
SANTA CLARA, Calif. – SonicWall, the trusted security partner protecting more than 1 million networks worldwide, today announced the launch of a new lineup of professional security services to help customers implement and operate security solutions that protect them from today’s relentless cyber attacks.
I can only imagine the pressure that comes with the job of being responsible for a company’s network security. These individuals are not only entrusted with protecting company and customer data, but the reputation of the company and its brand. In the case of smaller businesses, the stakes are particularly high, where a network breach and data loss can threaten the very existence of the company.
Last month, I wrote how we found nearly 26,500 new forms of malware and shared some general stats. Let’s take a look at the new threats found by SonicWall’s network sandbox, Capture Advanced Threat Protection (ATP).
While the general number of new threats dropped, there were some interesting figures and trends to point out.
What Is Bad Rabbit Ransomware?
On Tuesday, Oct. 24, a new strand of ransomware named Bad Rabbit appeared in Russia and the Ukraine and spread throughout the day. It first was found after attacking Russian media outlets and large organizations in the Ukraine, and has found its way into Western Europe and the United States.
Information and recommendations on protecting your wireless deployment
On October 16, 2017, Belgian security researchers made public their findings that demonstrated fundamental design flaws in WPA2 that could lead to man-in-the-middle (MITM) attacks on wireless networks.
Named KRACKs, or key reinstallation attacks, this technique can theoretically be used by attackers to steal sensitive information from unsuspecting wireless users leveraging these flaws in the WiFi standard.
It was a Tuesday afternoon. Liz, a local attorney with 26 years of experience, had given up.
She was easily over 20 hours in to trying to free her computer, with all of her files, from a ransomware attack. She just spent a few thousand dollars on a local IT team to break the encryption and remove the malware.
Over the past few months, Verizon has launched a series of television ads in which the main character utters the line, “Right plan, wrong network.” The actor saying the line is talking to another character who is clearly having an unhappy experience with his/her cellular connection. If you own a mobile phone, it’s likely you’ve gone through something similar at one point.
Keeping organizations running safely, while improving business and user productivity in today’s accelerating threat environment, continues to be a non-trivial task for IT leaders. At the current pace of cyber attacks, we understand all too well that the effects of recent events, such as the Equifax, WannaCry and NotPetya attacks, have demonstrated their capacity to change the global business environment from normal to total hysteria in the blink of an eye.
- Wireless Devices Explosion – The demand for increased bandwidth from wireless networks is constantly on the rise with the growing number of wireless devices used per person.