Hi [[ session.user.profile.firstName ]]

Sophos EMEA

  • Date
  • Rating
  • Views
  • Stopping Targeted Attacks with Sandbox Technology Stopping Targeted Attacks with Sandbox Technology Peter Craig, Senior Product Specialist, Sophos. Recorded: Sep 8 2016 44 mins
    Targeted threats using zero-day malware embedded in file downloads and email attachments are increasingly used to attack organizations like yours. Unfortunately these bleeding-edge attacks are often undetectable by traditional anti-virus engines.

    So what can you do to keep yourself secure?

    Join us to see why sandboxing is the perfect solution to these advanced threats and despite what you may have heard – IS affordable and simple to use.

    In the session we’ll cover:
    • Why organizations like yours need sandboxing
    • How Sophos Sandstorm keeps you secure against the latest threats
    • Getting started with sandbox protection that’s simple to use and affordable

    With over 17 years’ experience in information security, Peter currently specializes in Sophos advanced threat and Web security solutions.
  • Social Engineering - Are you the weakest link? Social Engineering - Are you the weakest link? Greg Iddon, Technologist, Sophos Recorded: Aug 30 2016 57 mins
    Social Engineering has been around for as long as the crooks have but in a modern online world, running a con game has never been easier. And that’s why we need to be savvy.

    A social engineer can research you on Facebook and LinkedIn; read up about your company on its website; and then target you via email, instant messaging, online surveys…and even by phone, for that personal touch. Worse still, many of the aspects of a so-called “targeted attack” like this can be automated, and repeated on colleague after colleague until someone crumbles.

    Greg Iddon will take you into the murky world of targeted attacks, and show you how to build defences that will prevent one well-meaning employee from giving away the keys to the castle.
  • Ransomware - To pay or not to pay? Ransomware - To pay or not to pay? Peter Mackenzie Recorded: Jul 5 2016 60 mins
    Flying spiders, snakes, and ghosts are long gone. Ransomware is now the stuff of nightmares and it’s easy to see why.

    Ransomware has become one of the most widespread and damaging threats internet users now face. Since the infamous CryptoLocker first appeared in 2013, we’ve seen a new era of file-encrypting ransomware variants delivered through spam messages and Exploit Kits, extorting money from home users and businesses alike.

    Join Sophos ransomware pro, Peter Mackenzie, as he shows us how ransomware attacks work, explains why so many new infections keep surfacing, and what practical precautions you can take to protect your organisation.
    If this webinar doesn’t help an IT Hero sleep at night, we don’t know what will.
  • Sophos Mobile Control: Don’t get caught out by the phoneys Sophos Mobile Control: Don’t get caught out by the phoneys James Burchell, Senior Engineer, Sophos Recorded: Jun 30 2016 55 mins
    Enabling the latest mobile technology while keeping your organisation’s data safe can be a challenge. Secure, monitor and control mobile devices with Sophos solutions. The self-service portal makes mobile management easy and stops Bring Your Own Device (BYOD) or Choose your own device (CYOD) from becoming an IT nightmare.

    This webinar addresses the major mobility challenges for IT managers and their teams and demonstrate effective solutions with Sophos Mobile Control.

Embed in website or blog