2018 SonicWall Cyber Threat Report
Make no mistake, we are in a global cyber arms race. But it can’t be won alone: we are in this together.
That is why SonicWall is passing along findings, intelligence, analysis and research from our SonicWall Capture Labs to you today in our 2018 SonicWall Cyber Threat Report. By sharing actionable intelligence, we can help level the playing field against today’s most malicious cyber criminals.
BY BILL CONNER: CEO, SonicWall Make no mistake, we are in a global cyber arms race. But it can’t be won alone: we are in this together. That is why SonicWall is passing along findings, intelligence, analysis and research from our SonicWall Capture Labs to you today in our 2018…Read More
“I think my machine has a virus!” – The all-encompassing term that strikes fear into the heart of any IT admin. These days there are so many types of infection, from malware and spyware through to viruses designed to encrypt important files or redirect your web browser to a certain…Read More
SonicWall is awarded Reader’s Choice 2017 Award Gold Medal in the Security Hardware category by The ChannelPro Network. The ChannelPro Network readers voted for SonicWall and are excited with the advancements SonicWall has made since it’s return to independence after being part of Dell. With SonicWall you can get the…Read More
Many of us will be familiar with it, that gut wrenching feeling that comes when you realise that you accidentally deleted an important file or folder. Disaster might seem like too strong a word, but depending on what’s missing it might just be right. Taking the long walk to your…Read More
It happens more and more often these days, an email comes into your mailbox that looks genuine advising you that a certain courier had attempted to deliver your parcel, but that you weren’t in. They either attach a PDF form or ask you to click a link to reschedule. What…Read More
IT Security is more challenging than ever. IT departments need security solutions that are effective and easy to manage. Register for this webinar and learn how cloud-managed security can offer complete protection for your organisation. Watch the webinar recording below:Read More
Office365, particularly Exchange Online has been around for several years. It’s easy to take it for granted as more and more apps move to the cloud and Microsoft offerings increase. But really, how would we live without it? No, I’m not going to get all philosophical – I’m looking at…Read More
Using a Mac? Think you’re safe enough from Malware? It may appear silly by name, but it’s surely not silly by nature… say hello, or hopefully not, to MacSpy. This is a new piece of Malware that has been specifically designed for Apple computers, and is very smart in what…Read More
What is a zero-day threat? A zero-day vulnerability refers to a hole in software that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it -this exploit is called a zero day attack.Read More