Sunday, 21 August 2011

, ,

Free Mobile Security Toolkit

http://www.sophos.com/medialibrary/Images/Content/News%20and%20Trends/Toolbox%20Small.ashxIT security and data protection firm Sophos have published findings of independently commissioned research by TNS* which reveals consumer attitudes towards mobile security and data loss prevention.
Although almost a quarter of consumers (22%) have lost a mobile phone in the past, and a further 12% have had a phone stolen, 67% don’t have passwords set up on their mobile phones to protect stored data.
60% of those surveyed acknowledged that device theft or loss was the biggest security threat to mobile devices, however only 57% have password protection enabled even on their laptops, with 18% admitting to using the same password for everything.
As well as affecting an individual’s data, lost mobile devices are also a growing issue for businesses since increasingly we are using the one device for both work and personal. In fact, users are one of the biggest weakspots in an organisation’s security, making education a key focus for IT managers. To help businesses educate their employees on the threats associated with mobile technology, Sophos has launched a free mobile security toolkit containing top tips for users for creating secure passcodes, a user-targeted video and presentation, whitepapers and a sample security policy,
“More and more people are using personal laptops, smartphones and tablets when they’re working remotely.  While this helps to improve productivity and innovation in a business, it is essential to address the security and operational issues relating to mobile devices now, rather than getting caught out later,” said James Lyne, director of technology strategy at Sophos.  “If an employee’s unprotected personal laptop falls into the wrong hands, it can be easy for someone to access, not just personal information, but any work related documents saved on the laptop’s hard drive, or even to use the laptop as a way to gain access to the corporate network.”
Mobile devices have revolutionised the way we access, store and transport information.  In order to manage the increased risk of data loss that this presents, companies must adopt wide platform support to cover the vast range of operating systems that are used to access corporate information.  The proliferation of smartphones and tablets, and the variation in operating systems that these devices use, means that the potential attack surface is greater than ever before.  Businesses therefore have to ensure that a policy is in place to protect corporate data, regardless of the devices being used to access it.
“Most data breaches on mobile devices are typically due to basic security failures such as weak or no passwords being in place, failure to encrypt data or falling victim to phishing or other social engineering attacks,” continued Lyne.  “If devices are used for business, it’s important that IT teams get the basics under control.  By making sure that they can purge devices when they go missing, businesses can both minimise the risk of data loss and can also satisfy regulators.”
* Survey conducted in March 2011 by TNS Omnibus.  Survey sample – 1075 consumers from Great Britain, 702 working full or part time.
The Sophos mobile tool kit, which includes advice and a video on the importance of password protecting your phone, can be found on the Sophos website here:
, ,

What is fake antivirus?

http://www.sophos.com/medialibrary/Images/Bumps/Marquees/bnrs_home_960x400_antivirus.ashxFakeAV or Fake AntiVirus, also known as Rogue AntiVirus, Rogues, or ScareWare, is a class of malware that displays false alert messages to the victim concerning threats that do not really exist. These alerts will prompt users to visit a website where they will be asked to pay for these non-existent threats to be cleaned up. The FakeAV will continue to send these annoying and intrusive alerts until a payment is made

ESET NOD32 has never missed an In-the-Wild virus

Superior Detection

"In-the-Wild" viruses are real viruses that have been reported to the Wildlist Organization by at least two independent reporters. When it comes to In-the-Wild virus detection, no one even comes close to ESET as the following chart illustrates.

ESET NOD32 has never missed an In-the-Wild virus
Virus Bulletin tests, May 1998 through June 2011 – www.virusbtn.com

http://www.eset.com/us/images/graphs/missed-in-the-wild-viruses.jpg
ESET's ThreatSense® heuristics closes the window of vulnerability by proactively identifying and stopping malware attempting to enter or run on your system.

ESET protects you better against unknown threats
Proactive Threat Detection by AV-Comparatives – May 2011

http://www.eset.com/us/images/graphs/graph_proactive_threat_detection.jpg
,

ESET Smart Security 4

http://static5.int.esetstatic.com/uploads/tx_banners/banner_ess_home_grid_02.jpg 

Discover Smarter, Lighter PC ProtectionESET Smart Security 4 integrates powerful antimalware scanner, a two-way firewall and intelligent antispam to effectively eliminate all types of security threats

               Free trial