The editorial team at CSO were targeted by a phishing campaign recently. If it had been successful, the person(s) behind it would have tricked us into installing the Zeus Trojan, which is financial malware. Lucky for us, however, our user awareness training took hold, and we used some basic logic in order to spot the scam. Here's an overview of the phishing message itself, and the thought process used to determine that it was a scam.
Steve Ragan, Staff Writer , CSO, September 09, 2013
Today's intrusion prevention systems (IPS) provide advanced security intelligence and the ability to identify and block malware before it can enter your network so that you can defeat today's sophisticated evasion techniques.
Successfully backing up critical systems and data is key to disaster recovery and business continuity. Backup and data recovery failures can result in financial loss, damage to your company's reputation and loss of business continuity.
Best practices, business considerations and practical answers to better manage and protect data in virtualized environments. This eBook focuses on data management and protection in virtualized environments
The MAN Group is one of Europe's leading companies in transport-related engineering. "We easily had all the identified offices secured without any hardware." Tony Fergusson, IT Infrastructure Architecture, Man Diesel & Turbo