Tag: endpoint security

endpoint security

Decoding Security Episode 104: Endpoint Security

In this week’s episode, we’re celebrating Halloween and National Cybersecurity Awareness Month with a scary question: what happens when cybercriminals attack the technology we rely on? Recent cyberattacks have targeted power grids and  Wi-Fi networks, but everyone, from organizations to individuals, can fight back with a complete cybersecurity suite that includes both website and endpoint security.

In our latest Decoding Security podcast, Website Security Research Analysts Jessica Ortega and Michael Veenstra share how to complete your security portfolio by protecting your business’s physical workstations and website applications with both endpoint and website security solutions. They also discuss recent Bad Rabbit infections and last week’s WordCamp Phoenix event. 

Missed our last episode: Securing Your Website? Don’t worry, you can now subscribe to Decoding Security on YouTube, as well as  your preferred podcasting service, including iTunes and Google Play!

And if you’re looking to complete your own cybersecurity suite, check out SiteLock INFINITY for a complete website scanning package!

Web Application Security

Tolly Test Highlights Web Application Security Need

 24/7

Who works 24/7? Not you, I hope – but hackers around the globe are busy trying to compromise systems 24 hours a day, seven days a week. “Next-gen” is not just a convenient marketing term, it is very accurate label for new types of threats and new types of solutions designed to counter those threats.

The basic nature of PC and server (aka “endpoint”) security and threats to same had not changed in many years. For years, the enemy would be the rogue program (.EXE) or Word macro that would find its way on to our system and either destroy our data or perhaps surreptitiously take control of our system either to steal our data or add our system to its army of drones – or both.

The traditional endpoint security solution would rely on its researchers to learn the digital fingerprints – usually referred to as the signature – of the virus. Upon detection, the entire offending program or macro would be isolated (quarantined) and, ultimately, deleted.

Read More

Powered by WordPress // © 2018 SiteLock