Five essential steps in your endpoint security strategy

With 70% of successful breaches starting at the endpoint, it’s imperative that security teams take a comprehensive, preventative approach to protecting all of the endpoints in the organization.

Sophos tracks Nefilim and other ransomware attacks to “Ghost” account credentials

The target hit by Nefilim had more than 100 systems impacted. Sophos responders traced the initial intrusion to an admin account with high level access that attackers had compromised more than four weeks before they released the ransomware.

Sophos named Common Vulnerability and Exposure Numbering Authority

With this status, Sophos is authorized to assign CVE identification to unique vulnerabilities within the scope of its products. Security researchers can now work directly with Sophos to open CVEs

Thales, Google Cloud collaboration empowers enterprises to control data in the cloud

This collaboration marks a significant moment for organisations to finally seize full control of their data and encryption keys, especially as they pursue hybrid, multi-cloud strategies.

5 steps you can take to secure your connected devices

The simplest way that could be achieved is by setting up a Virtual Private Network (VPN), which will work as an encrypted tunnel for your internet traffic.