By Talos Group Macros have been used since the mid 1990s to spread malware and infect systems. Increased user awareness of the need to disable the macro function within Microsoft Word during the late 90s and early 2000s sent these malware into decline. However, a change in Microsoft (MS) Office file formats dating from 2007 is now being […]

Source:: Cisco Security Notice

Fortinet FortiGuard Labs Cites Increased Cyber Threat Activity in Brazil Deserving Special Attention in Coming Weeks

Source:: Fortinet

Fortinet FortiGuard Labs Cites Increased Cyber Threat Activity in Brazil Deserving Special Attention in Coming Weeks

Source:: Fortinet

Jetzt druckfrisch verfügbar (in englischer Fassung): Der Cisco Midyear Security-Report 2016 kann hier geladen werden.

Die größte Herausforderung bleibt die Zeit, in der erfolgreiche Angreifer ihr Unwesen im Kundennetzwerk treiben können. Sei es zum Bau eines virtuellen Brückenkopfes, um die Präsenz im fremden LAN zu festigen, oder einfach die größere Zeitspanne, um wichtige Daten aus dem kompromittierten Netzwerk abzuziehen.

Über 200 Tage bleibt ein Angreifer im Mittel unentdeckt, wenn er einen Weg ins Unternehmen gefunden hat. Da braucht es nicht viel Fantasie um sich vorzustellen, was für ein immenser Schaden dabei entsteht.

Um hier weniger Angriffsfläche zu bieten, können Sie mit uns über die Lösungen unserer Technologiepartner Cisco, Fortinet und G DATA sprechen, die alle spannende und wertvolle Ansätze bieten, Ihr Netzwerk ein gutes Stück sicherer zu machen. Von der Endpoint-Security über Patch-Management, Next-Generation-Firewalls, Intrusion Detection und -Prevention, Sandboxing, Web Application Firewalls  bis zur Anwendungskontrolle und vielem mehr spannt sich hier der Bogen der Lösungsmöglichkeiten.

Wir freuen uns auf Ihren Terminvorschlag:

DSC_2022 klein
Bastian Breidenbach

breidenbach@oberberg.net

DSC_2012 klein
Dennis Goslar

goslar@oberberg.net

Dirk Zurawski
02261 9155051
zurawski@oberberg.net

By David Ulevitch I’m excited to announce today that Cisco has completed the acquisition of CloudLock. CloudLock’s unique approach to security enables customers to manage and secure their transition to the cloud by providing powerful security insights and controls that are easy to deploy and simple to manage. In a new IT landscape marked by personal devices in […]

Source:: Cisco Security Notice

By David Ulevitch I’m excited to announce today that Cisco has completed the acquisition of CloudLock. CloudLock’s unique approach to security enables customers to manage and secure their transition to the cloud by providing powerful security insights and controls that are easy to deploy and simple to manage. In a new IT landscape marked by personal devices in […]

Source:: Cisco Security Notice

By Scott Bower Email continues to be the number one business communication method and is still the number one threat vector. This ubiquitous communication technology also provides an effective path for criminal actors. Today, customers are more concerned about targeted and other advanced attacks rather than spam capture rates. Well-funded, educated criminals employ a wide range of attack […]

Source:: Cisco Security Notice

By Scott Bower Email continues to be the number one business communication method and is still the number one threat vector. This ubiquitous communication technology also provides an effective path for criminal actors. Today, customers are more concerned about targeted and other advanced attacks rather than spam capture rates. Well-funded, educated criminals employ a wide range of attack […]

Source:: Cisco Security Notice

Fortinet FortiGuard Labs Cyber Threat Research Helps Uncover Fraudsters Behind Thousands of Online Scams Totaling More Than $60 Million

Source:: Fortinet

Fortinet FortiGuard Labs Cyber Threat Research Helps Uncover Fraudsters Behind Thousands of Online Scams Totaling More Than $60 Million

Source:: Fortinet