Not too long ago my wife and I went out to a nice restaurant for dinner. When it was time to pay, the waiter took my credit card and swiped it using a portable credit card processing device. Being in the security industry, I couldn’t help but wonder if the transaction was secure.
It has been almost impossible to escape the news around high profile security breaches over the past couple of years. The world’s biggest brands are under attack by organized and heavily funded cyber-criminal organizations, and it seems as though they are losing the battle. SonicWall Security has written blogs about new, innovative, and highly effective methods of attacking due to memory scraping, attacks leveraging email and more.
In the time it takes you to read this blog, you will have been cyberattacked over five times. That’s the average number of intrusions that the SonicWall Global Response Intelligent Response (GRID) network detects on each of its one million firewalls every two minutes, 24 hours a day, 365 days a year.
If you’re like the majority of internet users, you mostly access the internet from your mobile devices. And by the way, so do your customers. In fact, 2014 was the year that mobile traffic exceeded legacy PC traffic on the internet. Business success, now more than ever, requires that you provide a great, mobile user experience, Email continues to be a key communication tool for business.
Las Vegas welcomed thousands of technology professionals last week for the annual Interop IT show to discover the most current and cutting-edge technology innovations and strategies to drive their organizations’ success. SonicWall Security participated in force, launching the new SonicWall TZ firewall line and demonstrating our innovative enterprise computing, networking and security product portfolios.
Protecting sensitive or confidential data is not just good business. For some, it’s legally required and subject to audit. For example, HIPAA regulations require organizations to take reasonable steps to ensure the confidentiality of all communications that contain patient or customer information. Health service providers and their business associates and contractors who touch or handle Protected Health Information (PHI) are subject to these rules.
No one needs reminding that 2014 was one of the most profitable years for cyber-criminals. The timeline graphic below takes us back to memory lane of what happened to large retailers such as Target, Home Depots and others. Despite efforts to comply with the Payment Card Industry – Data Security Standards (PCI-DSS) and other security measures for protecting electronic transactions and consumer data, U.S.-based retailers were hit hard by data breaches last year.
Email security is critical to protect your email from threats including spam, phishing attacks and malware. What’s more, government regulations now hold businesses and organizations accountable for protecting confidential data, ensuring it is not leaked and ensuring the secure exchange of email containing sensitive customer data or confidential information.
Contech Engineering Frees up IT Resources with SonicWall Hosted Email Security
Contech Engineered Solutions needed a better way to control spam and viruses, which IT spent too much time managing.
When SonicWall published its 2015 Annual Threat Report, a standout statistic was the jump in attacks on SCADA (supervisory control and data acquisition) facilities. Telemetry data showed attacks increasing from 91,000+ in January 2012 to 675,000+ attacks in January 2014. I’ve been asked whether these are always attacks on the control systems themselves.
You’ve decided to make the move to high-speed wireless. Maybe you’re upgrading to 802.11ac or you’re building a new wireless network from scratch. Either way, you’ve got to decide whether the access points you’re going to purchase will have a single radio or dual radios. If price is an issue, choosing an access point with only one radio will save you a little money.