Blog

Leaf|Blog

2018 SonicWall Cyber Threat Report

Make no mistake, we are in a global cyber arms race. But it can’t be won alone: we are in this together.

That is why SonicWall is passing along findings, intelligence, analysis and research from our SonicWall Capture Labs to you today in our 2018 SonicWall Cyber Threat Report. By sharing actionable intelligence, we can help level the playing field against today’s most malicious cyber criminals.

2018 SonicWall Cyber Threat Report: Actionable Intelligence for the Cyber Arms Race

By Rachael Weir | Mar 8, 2018

BY BILL CONNER: CEO, SonicWall   Make no mistake, we are in a global cyber arms race. But it can’t be won alone: we are in this together. That is why SonicWall is passing along findings, intelligence, analysis and research from our SonicWall Capture Labs to you today in our 2018…

Read More

Suspect a virus? What do you do?

By Colin Patton | Sep 18, 2017

“I think my machine has a virus!” – The all-encompassing term that strikes fear into the heart of any IT admin. These days there are so many types of infection, from malware and spyware through to viruses designed to encrypt important files or redirect your web browser to a certain…

Read More

SonicWall wins GOLD – Best Security Hardware

By Rachael Weir | Aug 10, 2017

SonicWall is awarded Reader’s Choice 2017 Award Gold Medal in the Security Hardware category by The ChannelPro Network. The ChannelPro Network readers voted for SonicWall and are excited with the advancements SonicWall has made since it’s return to independence after being part of Dell. With SonicWall you can get the…

Read More

When is a disaster not a disaster?

By Colin Patton | Jul 26, 2017

Many of us will be familiar with it, that gut wrenching feeling that comes when you realise that you accidentally deleted an important file or folder. Disaster might seem like too strong a word, but depending on what’s missing it might just be right. Taking the long walk to your…

Read More

“My package wasn’t delivered”

By Colin Patton | Jul 4, 2017

It happens more and more often these days, an email comes into your mailbox that looks genuine advising you that a certain courier had attempted to deliver your parcel, but that you weren’t in. They either attach a PDF form or ask you to click a link to reschedule. What…

Read More

Webinar on-demand: Ensuring a complete security solution

By Rachael Weir | Jun 22, 2017

IT Security is more challenging than ever. IT departments need security solutions that are effective and easy to manage. Register for this webinar and learn how cloud-managed security can offer complete protection for your organisation. Watch the webinar recording below:

Read More

Office365 – How could we live without it?

By Colin Patton | Jun 20, 2017

Office365, particularly Exchange Online has been around for several years. It’s easy to take it for granted as more and more apps move to the cloud and Microsoft offerings increase. But really, how would we live without it? No, I’m not going to get all philosophical – I’m looking at…

Read More

Using a Mac? Think you’re safe from Malware?

By Justin Archer | Jun 14, 2017

Using a Mac? Think you’re safe enough from Malware? It may appear silly by name, but it’s surely not silly by nature… say hello, or hopefully not, to MacSpy. This is a new piece of Malware that has been specifically designed for Apple computers, and is very smart in what…

Read More

Discover and stop zero-day and other unknown attacks.

By Rachael Weir | Jun 5, 2017

What is a zero-day threat? A zero-day vulnerability refers to a hole in software that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it -this exploit is called a zero day attack.

Read More