sophos Archives - Les Olson IT https://lesolson.redpeppersoftware.net/blog/tag/sophos/ Your Office Technology Partner Thu, 24 Sep 2020 14:51:20 +0000 en-US hourly 1 https://wordpress.org/?v=6.1.6 https://lesolson.redpeppersoftware.net/wp-content/uploads/2021/11/cropped-LO_ITfavicon-1-1-32x32.png sophos Archives - Les Olson IT https://lesolson.redpeppersoftware.net/blog/tag/sophos/ 32 32 8 Questions to Ask Before Buying an Endpoint Security Solution https://lesolson.redpeppersoftware.net/blog/8-questions-to-ask-before-buying-an-endpoint-security-solution/ Mon, 17 Aug 2020 14:47:02 +0000 https://lesolson.com/?p=14542 If you're weighing your options for endpoint security solutions, there are many options out there. However, solutions vary greatly in terms of how effectively they can protect your network. We want to help you make the best decision possible, so here are our top 8 questions to ask before buying an endpoint security solution, and why they are important.

The post 8 Questions to Ask Before Buying an Endpoint Security Solution appeared first on Les Olson IT.

]]>
[cz_image id=”cz_87972″ image=”14545″][/cz_image][cz_gap height=”25px”][cz_title id=”cz_85281″ cz_title=””]If you’re weighing your options for endpoint security solutions, there are many options out there. However, solutions vary greatly in terms of how effectively they can protect your network. We want to help you make the best decision possible, so here are our top 8 questions to ask before buying an endpoint security solution, and why they are important.

 

1) Does the solution employ Foundational Techniques (traditional), modern techniques (next-gen), or even a combination of both?

Solutions that have been around for a while, and rely on foundational techniques, are very effective against known threats. The issue is the inability for foundational techniques to effectively address unknown threats. As solutions have become more effective at combating known threats, hackers adapt at a rapid rate. This means it’s imperative to employ a next-gen solution that can respond to threats it has never encountered before, and also utilize proven foundational tactics.

 

Foundational Techniques include signature-based detection of known malware, application lockdown to prevent malicious behaviors of applications, behavioral monitoring/host intrusion prevention system to protect computers from unidentified viruses and suspicious behavior, web protection for URL lookup and blocking of known malicious websites, web control for endpoint web filtering, and data loss prevention to prevent the last stages of attacks that initially go unnoticed.

 

Next-gen techniques are the other piece of the puzzle, giving you machine learning to detect both known and unknown malware without relying on signatures, anti-exploit technology to prevent attackers from using the tools and techniques they rely on in their attack chains, ransomware-specific solutions to prevent the malicious encryption of data, technology designed to prevent the theft of authentication passwords, privilege escalation, process protection to prevent the use of techniques like code cave and AtomBombing, endpoint detection and response for providing detailed information when hunting down evasive threats, and incident response/synchronized security to automatically respond to incidents and communicate with other security tools.

 

2) How does the solution detect unknown threats. Does it have machine learning capabilities?

Malware includes both known and never-before-seen threats. While it’s easy to address a known issue, it’s obviously another thing to fight a problem you don’t even know exists. It’s no surprise that many solutions struggle to detect unknown malware threats. It’s highly important to find a solution that fights unknown threats because they are far more common than known threats. SophosLabs reports seeing approximately 400,000 pieces of unknown malware each day. The way you address unknown threats is to utilize machine learning.

 

3) If the solution does claim to utilize machine learning, what type of machine learning is used?

There are multiple methods of machine learning, including deep learning neural networks, Random Forest, Bayesian, and Clustering. Whatever the method, machine learning engines should be built to detect known and unknown malware, without relying on signatures. The advantage of machine learning is that it can detect malware that has never been seen before. You should be sure to evaluate the malware detection rate, false positive rate, and performance impact of any machine learning-based solution you consider.

 

4) What technology is deployed to prevent exploit-based and file-less attacks?

Not all attacks rely on malware. Exploit-based attacks take advantage of software bugs and vulnerabilities in order to gain access and control of your devices. Weaponized documents and malicious code hidden in legitimate programs and websites are common techniques used in these attacks. Other techniques include man-in-the-browser attacks, in which malware is used to infect a browser so attackers can view and manipulate traffic, and using web traffic for malicious purposes. It is important to determine what capabilities your solution has for preventing such attacks.

 

5) Is the solution specifically designed to stop ransomware?

Ransomware is an extremely common threat. There are two primary types of ransomware, file encryptors, which encrypt the victim’s files and holds them for ransom, and disk encryptors, which locks up their entire hard drive, or wipes it completely. Some solutions are specifically designed to prevent the malicious encryption of data by ransomware. Ransomware-specific solutions are also usually able to remediate impacted files.

 

6) Does the solution’s creator have third-party results that validate their approach?

Many endpoint security solution vendors make big claims about their products. It’s important that you can validate their claims and compare them to other solutions via a third-party evaluator. Some resources include MRG Effitas and their 360 Degree Assessment & Certification report, Gartner Magic Quadrant for Endpoint Protection Platforms, The Forrester Wave for Endpoint Security Suites, ESG Labs reviews, and AV Comparatives Business Security Test, among others.

 

7) Can the solution ask detailed threat hunting and IT security operations questions?

Are you able to ask questions about what has happened in the past and what is happening now on your endpoints so you can detect active adversaries and maintain security hygiene? Some questions you may want to ask include:

  • Are Processes trying to make a network connection with non-standard ports?
  • Which devices have known vulnerabilities, unknown services, or unauthorized browser extensions?
  • What is the scope and impact of security incidents?
  • Have any attacks gone unnoticed?
  • Are there any indicators of compromise across the network?
  • Are we able to prioritize events for further investigation?
  • Will we be able to accurately report on our organization’s security posture at any given moment?

 

8) What visibility is provided into attacks and can the solution respond automatically.

At a minimum, your endpoint security solution should provide insight into the incidents that occur to help you avoid future incidents. Ideally though, they would automatically respond to issues without the need for analysis or manual intervention.

 

As cyber threats continue to grow in complexity and volume, it’s more important than ever to have an effective endpoint security solution in place. We recommend Sophos Intercept X, an endpoint security solution that combines the best of traditional and next-gen techniques for security that is proven to be effective. Sophos Intercept X is top-rated by dozens of third-party evaluators. Les Olson Company is your source for IT Services in Utah and Las Vegas. Our team of network security experts can help your business get the right solution in place.

 

Intercept X Third Party Test Results and Top Analyst Reports:

SE Labs
  • AAA Rated for Enterprise – 100% total accuracy rating
  • AAA Rated for SMB – 100% total accuracy rating
  • AAA Rated for Consumer – 100% total accuracy rating
AV-Comparatives
  • Ranked #1 for Malware Protection (99.9% detection, zero false alarms)
  • Ranked #1 for Malware Protection
  • Ranked #1 for Exploit Protection
  • 100% block rate, 0 false positives 360 Degree Assessment
  • Editor’s Choice
  • Top Product: 6/6 Protection, 6/6 Usability, 5.6/6 Performance
  • #1 macOS protection: 6/6 Protection, 6/6 Usability, 6/6 Performance
  • AV-Test (Android): Perfect Score
Gartner
  • Leader: 2019 EPP Magic Quadrant
  • Leader: 2018 Endpoint Security Wave

[/cz_title]

[cz_gap height=”60px”][cz_title id=”cz_15915″ cz_title=””]

Get a Demo or Quote on Sophos Intercept X

[/cz_title][cz_gap]

[cz_gap][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_26273″ sk_overall=”background-repeat:no-repeat;background-position:right top;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/11/Artboard-1NetworkAnalysis.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-bottom:35px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection” link=”|||”][cz_gap height=”35px”][cz_title title_pos=”cz_title_pos_left” id=”cz_27621″ link=”url:%2Fwp-content%2Fuploads%2F2019%2F04%2FGood-Copier-Vendor-Checklist.pdf|||” sk_overall=”background-color:rgba(255,255,255,0.84);”]

GET A FREE,

COMPREHENSIVE

NETWORK ANALYSIS

[/cz_title][cz_gap][cz_button title=”Request Your Free” btn_position=”cz_btn_block” text_effect=”cz_btn_txt_move_down” id=”cz_21447″ subtitle=”NETWORK ANALYSIS” link=”url:%2Fservices%2Fit-services%2Fnetwork-analysis%2F|||” sk_button=”font-size:18px;text-align:center;line-height:20px;background-color:#ba0230;padding-right:30px;padding-left:30px;border-radius:0px;” sk_hover=”color:#ffffff;background-color:#e8283b;” sk_subtitle=”font-size:17px;color:rgba(255,255,255,0.6);font-weight:400;” sk_icon=”border-radius:4px;padding:10px 10px 10px 10px;margin-left:-8px;margin-right:12px;background-color:#ffffff;”][cz_gap height=”35px”][/cz_content_box]

The post 8 Questions to Ask Before Buying an Endpoint Security Solution appeared first on Les Olson IT.

]]>
Sophos Intercept X Rated Top Endpoint Security Software on TrustRadius 2020 https://lesolson.redpeppersoftware.net/blog/sophos-intercept-x-rated-top-endpoint-security-software-on-trustradius-2020/ Mon, 20 Jul 2020 13:10:15 +0000 https://lesolson.com/?p=14191 Sophos Intercept X has been named one of the top rated Endpoint Security Software solutions of 2020 on TrustRadius. Businesses are overwhelmed by the number of Endpoint Security options out there, but TrustRadius created a shortlist for 2020 to help you narrow your decision. Their Top Rated solutions include Sophos Intercept X, Forticlient, Bitdefender GravityZone, and Symantec Endpoint Protection. Sophos Intercept X tops the list with the highest number of positive reviews.

The post Sophos Intercept X Rated Top Endpoint Security Software on TrustRadius 2020 appeared first on Les Olson IT.

]]>
[cz_image id=”cz_87599″ image=”14194″][/cz_image][cz_gap height=”25px”][cz_title id=”cz_63440″]Sophos Intercept X has been named one of the top rated Endpoint Security Software solutions of 2020 on TrustRadius. Businesses are overwhelmed by the number of Endpoint Security options out there, but TrustRadius created a shortlist for 2020 to help you narrow your decision. Their Top Rated solutions include Sophos Intercept X, Forticlient, Bitdefender GravityZone, and Symantec Endpoint Protection. Sophos Intercept X tops the list with the highest number of positive reviews.[/cz_title][cz_gap height=”25px”][cz_image id=”cz_88699″ image=”14198″][/cz_image][cz_gap height=”25px”][cz_title id=”cz_14228″ cz_title=””]TrustRadius awards their Top Rated designation to solutions in the top tier of their respective categories, and is based entirely on customer feedback. Solutions need to have a TrustRadius or trScore of at least 7.5 in order to be considered for a Top Rated award, which indicates the solution has above-average user satisfaction. The trScore is a weighted average of customer reviews and ratings.

 

Why Intercept X?

Sophos Intercept X goes far beyond traditional antivirus with its comprehensive endpoint protection that utilizes deep learning to defend against a wide range of cybersecurity threats. That’s why Sophos consistently blocks more malware and exploits than other solution in independent, third-party testing.[/cz_title][cz_gap height=”25px”]

[cz_title id=”cz_103702″ cz_title=””]

  • Advanced Endpoint Detection and Response
  • Anti-ransomware protection
  • Deep Learning Technology
  • Exploit Prevention
  • Active Adversary Mitigation

Les Olson Company is your source for expert IT Services in Utah and Las Vegas. Let us help you find the right Endpoint Security Solution to protect your organization’s network, devices, and data.[/cz_title][cz_gap height=”60px”]

[cz_gap height=”60px”][cz_title id=”cz_106050″ cz_title=””]

Get a Demo or Quote on Sophos Intercept X

[/cz_title][cz_gap]

The post Sophos Intercept X Rated Top Endpoint Security Software on TrustRadius 2020 appeared first on Les Olson IT.

]]>
Protecting Your Network from Cloud Snooper https://lesolson.redpeppersoftware.net/blog/protecting-your-network-from-cloud-snooper/ Mon, 09 Mar 2020 15:48:30 +0000 https://lesolson.com/?p=12778 Sophos, a leader in next-gen cybersecurity, recently published a report on this new and sophisticated attack. According to their report, Cloud Snooper uses a unique combination of techniques to evade detection, allowing malware on servers to communicate freely with its command and control servers (C2) through firewalls that would normally prevent these types of communications.

The post Protecting Your Network from Cloud Snooper appeared first on Les Olson IT.

]]>
[cz_image id=”cz_96587″ image=”12781″][/cz_image]
[cz_gap height=”25px”]
[cz_title id=”cz_48598″ cz_title=””]

Have you heard of Cloud Snooper?

Sophos, a leader in next-gen cybersecurity, recently published a report on this new and sophisticated attack. According to their report, Cloud Snooper uses a unique combination of techniques to evade detection, allowing malware on servers to communicate freely with its command and control servers (C2) through firewalls that would normally prevent these types of communications. The detailed SophosLabs report deconstructs the TTPs (tactics, techniques, and procedures) used in the attack, which they suspect was the work of an advanced actor – possibly nation-state sponsored.

 

The tactics, techniques, and procedures used in the Cloud Snooper attack include a rootkit circumventing firewalls, a technique to gain access to servers disguised as normal traffic, and a backdoor payload that shares malicious code between both windows and Linux operating systems. This approach is known, but very uncommon. Though each TTP has been seen previously in other attacks by skilled cyber-attackers, they have not been seen in combination.

 

So how does this affect your business?

Sophos expects that this combination of TTPs will “trickle down” and become more commonplace throughout the cybercriminal hierarchy, becoming the blueprint for future firewall attacks.

 

Sergei Shevchenko, Threat Research Manager at SophosLabs, said “This is the first time we have seen an attack formula that combines a bypassing technique with a multi-platform payload, targeting both Windows and Linux systems. IT security teams and network administrators need to be diligent about patching all external-facing services to prevent attackers from evading cloud and firewall security policies. IT security teams also need to protect against multi-platform attacks. Until now, Windows-based assets have been the typical target, but attackers are more frequently considering Linux because cloud services have become popular hunting grounds. It’s a matter of time before more cybercriminals adopt these techniques.”

 

If you’re a business owner or manager, now is the time to talk to your IT security team about their plans to respond to this potential threat. If you are responsible for your organization’s network security, here’s some advice for defending against Cloud Snooper and similar attacks:

 

  • Create a full inventory of all devices connected to the network, and update all security software used on these devices.
  • Ensure all external-facing services are fully patched. Cloud hosting services often provide firewall security, but this should not be substitute for an organization’s own cloud security measures.
  • Check and double check all cloud configurations. User misconfiguration and lack of visibility are the top causes of attacks in the cloud.
  • Enable multi-factor authentication on any security dashboards or control panels used internally to prevent attackers from disabling security products during an attack.
  • Remember, there is no single silver bullet for security, and a layered, defense-in-depth, next generation security model that includes components designed specifically to protect data and networks in the cloud (like Sophos Intercept X for Server) is an essential best practice.

 

If you need help hardening your network against cyber threats, our expert IT team is here to help. We can work with you and even your existing IT security team to make any necessary changes so your network is prepared for the worst.

 

This article is based on the February 25, 2020 Sophos Press Release.[/cz_title]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_107623″ sk_overall=”background-repeat:no-repeat;background-position:left bottom;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/10/artArtboard-1interceptx2.png),linear-gradient(90deg,#e4e4e4,#e4e4e4);padding-top:50px;padding-bottom:35px;padding-left:50px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection” link=”url:https%3A%2F%2Flesolson.com%2Fproducts%2Fnetwork-solutions%2Fsophos-intercept-x-endpoint-security%2F|||”][cz_gap height=”30px” id=”cz_62034″][cz_social_icons position=”tar” fx=”cz_social_fx_10″ id=”cz_85228″ social=”%5B%7B%22icon%22%3A%22fa%20fa-arrow-circle-right%22%2C%22title%22%3A%22Watch%22%2C%22link%22%3A%22https%3A%2F%2Flesolson.com%2Fproducts%2Fnetwork-solutions%2Fsophos-intercept-x-endpoint-security%2F%22%7D%5D” sk_icons=”font-size:50px;color:#ba0230;” sk_con=”padding-top:0px;padding-right:0px;padding-bottom:0px;margin-top:0px;margin-right:-25px;margin-bottom:0px;”][cz_title title_pos=”cz_title_pos_right” id=”cz_47845″ link=”url:https%3A%2F%2Flesolson.com%2Fproducts%2Fnetwork-solutions%2Fsophos-intercept-x-endpoint-security%2F|||” sk_overall=”background-color:rgba(255,255,255,0.86);”]

LEARN ABOUT
SOPHOS INTERCEPT X
PRODUCT PAGE

[/cz_title][cz_gap height=”30px” id=”cz_62034″][/cz_content_box][cz_gap height=”30px” id=”cz_62034″]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_73269″ sk_overall=”background-repeat:no-repeat;background-position:left bottom;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2020/03/Artboard-2cloudsnooperinfographic.png),linear-gradient(90deg,#e4e4e4,#e4e4e4);padding-top:50px;padding-bottom:35px;padding-left:50px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection” link=”url:http%3A%2F%2Flesolson.com%2Fwp-content%2Fuploads%2F2020%2F03%2Fcloud-snooper.pdf|||”][cz_gap height=”60px” id=”cz_62034″][cz_title title_pos=”cz_title_pos_center” id=”cz_17074″ link=”url:http%3A%2F%2Flesolson.com%2Fwp-content%2Fuploads%2F2020%2F03%2Fcloud-snooper.pdf|||” sk_overall=”background-color:rgba(255,255,255,0.86);” cz_title=””]

PROTECT AGAINST CLOUD
SNOOPER INFOGRAPHIC

[/cz_title][cz_button title=”Download Now” btn_position=”cz_btn_block” text_effect=”cz_btn_txt_move_down” id=”cz_93289″ subtitle=”Cloud Snooper Infographic” link=”url:http%3A%2F%2Flesolson.com%2Fwp-content%2Fuploads%2F2020%2F03%2Fcloud-snooper.pdf|||” sk_button=”font-size:24px;text-align:center;line-height:20px;background-color:#ba0230;padding-right:30px;padding-left:30px;border-radius:0px;” sk_hover=”color:#ffffff;” sk_subtitle=”font-size:13px;color:#ffffff;font-weight:400;” sk_icon=”border-radius:4px;padding:10px 10px 10px 10px;margin-left:-8px;margin-right:12px;background-color:#ffffff;” alt_title=”Download Infographic” alt_subtitle=”Fight Cloud Snooper” cz_button=””][cz_gap height=”65px” id=”cz_62034″][/cz_content_box][cz_gap height=”30px” id=”cz_62034″]

The post Protecting Your Network from Cloud Snooper appeared first on Les Olson IT.

]]>
The Rise of Office 365 and Why You Still Need to Secure It https://lesolson.redpeppersoftware.net/blog/the-rise-of-office-365-and-why-you-still-need-to-secure-it/ Thu, 02 Aug 2018 22:02:11 +0000 https://lesolson.com/?p=6116 Many businesses are making the switch to Microsoft Office 365, and for good reason. It eliminates the costs associated with management and upgrades, allowing businesses greater flexibility as their teams grow and their needs change

The post The Rise of Office 365 and Why You Still Need to Secure It appeared first on Les Olson IT.

]]>
[cz_image id=”cz_89559″ image=”6121″][/cz_image][cz_gap height=”25px”]

Many businesses are making the switch to Microsoft Office 365, and for good reason. It eliminates the costs associated with management and upgrades, allowing businesses greater flexibility as their teams grow and their needs change. If you’re unfamiliar with Office 365, let’s review. Office 365 refers to subscription plans for Microsoft’s classic Office applications like Word, Excel, Outlook and PowerPoint, as well as other productivity solutions like Skype and OneDrive.

It is designed to work seamlessly across all your devices and from anywhere. This is ideal for businesses that have employees who telecommute or work remotely, and for teams that collaborate, even across locations. It also allows everyone in your office to have the most up-to-date versions of the Office programs at all times. Rather than paying up front for the Microsoft Office suite for every workstation – and then paying again when it’s time to upgrade – you pay for a subscription on a monthly basis. Businesses are loving this flexibility, in fact, today one in every five business users work with Office 365.

Microsoft Office 365 is great! There’s just one tiny little thing. Many businesses overlook the fact that they still need to secure it. Yes, even a cloud-based email platform can go down. Then what? You’ll need delivery coverage so that none of your emails are lost, emergency access to business-critical emails, and automatic incident alerts.

The fact is, humans are…human. Employees make mistakes that can cause security risks more often than you’d think. According to a 2015 Verizon Data Breach Investigations Report, 23% of users open phishing emails and human error causes 25% of all data breaches. Users can put your business at risk doing everything from uploading files and browsing the web, to opening emails and traveling with their devices.

A good solution for securing Microsoft Office 365 will allow your organization to restrict file types and block access to compromised websites. You’ll need email security and continuity, the latest malware and ransomware protection, and encrypted HDD to keep data secure. We recommend Sophos Central. This powerful solution that gives you a whole host of benefits, including; endpoint protection, mobile protection, server protection, encryption, wireless, web gateway, email security and firewall management.

With Sophos Central you get a lot of the benefits that draw businesses to a cloud solution like Office 365 in the first place. There’s no maintenance or management costs, no upgrades, no on-site security systems and the ability to protect new users as your team grows. It is incredibly easy to set up and manage, boasting impressive email protection – with the latest antivirus, spam and phishing protection, as well as the ability to block suspicious attachments, content and URLs. It also safegards your email in the event of Office 365 going down.

[cz_title id=”cz_75880″ cz_title=””]

Les Olson Company is a Microsoft Office 365 and Sophos Central provider

Request a consultation and let us help you work more efficiently and securely, with these two solutions that work hand in hand.[/cz_title]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_94746″ sk_overall=”background-repeat:no-repeat;background-position:right bottom;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/11/artAsset-4MICROSOFT36INFOGRAPHIC1.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-bottom:35px;padding-left:50px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection”][cz_title id=”cz_108739″ cz_title=”” link=”url:%2Finfo%2Fwhy-you-still-need-to-backup-office-365%2F|||” sk_overall=”background-color:rgba(255,255,255,0.87);”]

WHY YOU STILL

NEED TO BACKUP

OFFICE 365

[/cz_title][cz_social_icons fx=”cz_social_fx_10″ id=”cz_37054″ social=”%5B%7B%22icon%22%3A%22fa%20fa-arrow-circle-right%22%2C%22title%22%3A%22Watch%22%2C%22link%22%3A%22%2Finfo%2Fwhy-you-still-need-to-backup-office-365%2F%22%7D%5D” cz_social_icons=”” sk_icons=”font-size:50px;color:#ba0230;” sk_con=”padding-top:0px;padding-bottom:0px;margin-top:0px;margin-bottom:0px;”][/cz_content_box][cz_gap height=”30px” id=”cz_62034″]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_87550″ sk_overall=”background-repeat:no-repeat;background-position:left bottom;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/11/Artboard-1office365.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-right:50px;padding-bottom:35px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection”][cz_title title_pos=”cz_title_pos_right” id=”cz_84996″ cz_title=”” link=”url:%2Fservices%2Fcloud-services%2Foffice-365%2F|||” sk_overall=”background-color:rgba(255,255,255,0.87);”]

TRANSFORM THE

WAY YOU WORK

WITH OFFICE 365

[/cz_title][cz_social_icons position=”tar” fx=”cz_social_fx_10″ id=”cz_60430″ social=”%5B%7B%22icon%22%3A%22fa%20fa-arrow-circle-right%22%2C%22title%22%3A%22GO%22%2C%22link%22%3A%22%2Fservices%2Fcloud-services%2Foffice-365%2F%22%7D%5D” cz_social_icons=”” sk_icons=”font-size:50px;color:#ba0230;” sk_con=”padding-top:0px;padding-bottom:0px;margin-top:0px;margin-bottom:0px;”][/cz_content_box][cz_gap height=”30px” id=”cz_20875″]

The post The Rise of Office 365 and Why You Still Need to Secure It appeared first on Les Olson IT.

]]>
The Problem with Traditional Antivirus Software https://lesolson.redpeppersoftware.net/blog/the-problem-with-traditional-antivirus-software/ Wed, 25 Jul 2018 16:12:41 +0000 https://lesolson.com/?p=6294 So your business uses Antivirus Software, you’re all set, right? Not so. The problem with traditional Antivirus Software is that it can only defend against known threats. In this article we’ll discover the monumental shift in the threat landscape and why mom and dad’s Antivirus Software just isn’t cutting it anymore.

The post The Problem with Traditional Antivirus Software appeared first on Les Olson IT.

]]>
[cz_image id=”cz_107785″ image=”11270″][/cz_image][cz_gap height=”25px”]

So your business uses Antivirus Software, you’re all set, right? Not so. The problem with traditional Antivirus Software is that it can only defend against known threats. In this article we’ll discover the monumental shift in the threat landscape and why mom and dad’s Antivirus Software just isn’t cutting it anymore.

Years ago the primary form of attacks were “generic malware,” a type of threat that is easily stopped by blocked by basic antivirus software. The thing is, today generic malware only makes up about 12% of cyberattacks. Wait…what’s the other 88%? As you see in the graph below, ransomware, email malware, and other advanced malware have become most common.

[cz_image id=”cz_46622″ image=”11277″][/cz_image][cz_gap height=”25px”]

If you’re thinking maybe you’ll take your chances and hope you just get hit with Generic Malware, you might want to think again. According to the State of Endpoint Security Today Survey, 54% of organizations were hit an average of two times in 2017, and most organizations admit they have no exploit prevention capabilities.

Let’s break down what we mean by known vs. unknown threats:

Known:

Traditional security products are designed to act once they encounter something they know to be malicious. These are attacks that are already known to exist and measures have been taken to block that attack in the future. Unfortunately with traditional antivirus, there is always a gap between when threats begin causing trouble and when the vendors update their software to block against the attack moving forward.

Unknown:

To avoid being detected by antivirus software, hackers need to create a completely new threat. And they’re really good at it too. Sophos Labs has said they receive and process 400,000 previously unseen malware samples every day. They also say that three quarters of the malicious files they encounter are unique to a single organization.

How can you fight back against attacks that have never been seen before, and may never be seen again?

Predictive securityThat’s where predictive security comes in. Predictive security utilizes deep learning technology to go much further than simply reacting to threats. If you ever talk to Siri, Alexa or Cortana – you’ve had personal experience with deep learning. In fact, it’s all around us from facial and voice recognition to self-driving cars and language translation. Deep learning is an advanced form of machine learning that was originally inspired by the way the human brain works. It can make predictions about data it has never seen based on the data it is trained on.

When deep learning is applied to the detection of malware and potentially malicious programs, it goes so much farther beyond what traditional antivirus is capable of. One of the solutions that utilizes predictive security is Intercept X by Sophos. Intercept X extracts millions of attributes about a file it’s analyzing and runs it through its deep learning model to determine whether the file is good or bad. This intelligent solution is highly effective at protecting against the unknown, stopping malware before it executes and denying the attacker their opportunity to leverage your data.

In January 2018, ESG Labs tested the latest version of Intercept X with real world advanced attacks. The results? “Intercept X stopped 100% of the exploit techniques that were missed by the traditional antivirus application.” – ESG Labs, A New Approach to Endpoint Security for Today’s Threats

“We haven’t found another product that can boast the high detection and low false positive levels of Intercept X” said Denney Fifield, Direction of Technical Services at Strong and Hanni.

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_55633″ sk_overall=”background-repeat:no-repeat;background-position:right bottom;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/10/artArtboard-1deeplearning.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-bottom:35px;padding-left:50px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection”][cz_title id=”cz_14996″ cz_title=”” link=”url:%2Finfo%2Fhow-intercept-x-uses-deep-learning%2F|||” sk_overall=”background-color:rgba(255,255,255,0.87);”]

HOW INTERCEPT X

USES DEEP

LEARNING TO FIGHT

SECURITY THREATS

[/cz_title][cz_social_icons fx=”cz_social_fx_10″ id=”cz_40875″ social=”%5B%7B%22icon%22%3A%22fa%20fa-arrow-circle-right%22%2C%22title%22%3A%22Read%20Article%22%2C%22link%22%3A%22%2Finfo%2Fhow-intercept-x-uses-deep-learning%2F%22%7D%5D” cz_social_icons=”” sk_icons=”font-size:50px;color:#ba0230;” sk_con=”padding-top:0px;padding-bottom:0px;margin-top:0px;margin-bottom:0px;”][/cz_content_box][cz_gap height=”30px” id=”cz_62034″]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_17573″ sk_overall=”background-repeat:no-repeat;background-position:left bottom;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/09/artAsset-1ransomware-phishing.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-right:50px;padding-bottom:35px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection”][cz_title title_pos=”cz_title_pos_right” id=”cz_96892″ cz_title=”” link=”url:%2Finfo%2Fhow-ransomware-critically-impacts-businesses%2F|||” sk_overall=”background-color:rgba(255,255,255,0.87);”]

HOW RANSOMWARE

CRITICALLY IMPACTS

BUSINESSES

[/cz_title][cz_gap height=”33px” id=”cz_20875″][cz_social_icons position=”tar” fx=”cz_social_fx_10″ id=”cz_63802″ social=”%5B%7B%22icon%22%3A%22fa%20fa-arrow-circle-right%22%2C%22title%22%3A%22GO%22%2C%22link%22%3A%22%2Finfo%2Fhow-ransomware-critically-impacts-businesses%2F%22%7D%5D” cz_social_icons=”” sk_icons=”font-size:50px;color:#ba0230;” sk_con=”padding-top:0px;padding-bottom:0px;margin-top:0px;margin-bottom:0px;”][/cz_content_box][cz_gap height=”30px” id=”cz_20875″]

The post The Problem with Traditional Antivirus Software appeared first on Les Olson IT.

]]>
2017 Sophos New Partner of the Year https://lesolson.redpeppersoftware.net/blog/2017-sophos-new-partner-of-the-year/ Thu, 18 May 2017 17:59:50 +0000 https://lesolson.com/?p=12238 Les Olson Company was recently honored by Sophos with their New Partner of the Year, Americas award. The Partner of the Year awards recognize the achievements of outstanding partners to celebrate their success.

The post 2017 Sophos New Partner of the Year appeared first on Les Olson IT.

]]>
[cz_image id=”cz_101358″ image=”12241″][/cz_image][cz_gap height=”25px”][cz_title id=”cz_103580″ cz_title=””]Les Olson Company was recently honored by Sophos with their New Partner of the Year, Americas award. The Partner of the Year awards recognize the achievements of outstanding partners to celebrate their success.

 

Although Les Olson Company has only been partnered with Sophos a short time, this award is a reflection of their Sophos expertise and commitment to offering their customers the best in next-gen network and endpoint protection. The award was presented to members of Les Olson Company’s Managed IT executive team in April 2017 at the Partner Conference held in Las Vegas, Nevada at Caesars Palace.

 

John Keenan,Regional VP of Sales at Sophos, said, “It is always a great pleasure to be able to meet our partners face to face at these events as they play a crucial role in our success as a business. It’s a fantastic opportunity to gather feedback, to hear our partners’ validation of our strategy across the endpoint and network and to see it helping to make their businesses a success. I am delighted Les Olson Company has won the award for Partner of the Year, Americas. They have had a fantastic year and it’s very well deserved.”

 

John Huston, Les Olson Company’s Managed I.T. Sales Manager said, “Sophos not only creates fantastic IT security products, they are a true partner focused on helping Les Olson Company do the best job for our customers. With the state of the art Ransomware fighting product called Intercept X, their amazing XG firewalls, Central device encryption, Central endpoint protection, and Sophos Central,  Les Olson Company has the protections in place to ensure our customers have their security needs met. This synchronized security platform is designed to work together to isolate attacks and secure important company data and systems. I couldn’t be more excited about the Sophos product and partnership.”

 

About Les Olson Company

Les Olson Company has always been on the cutting edge of technology throughout their over 60 year history. With the evolution of the copier from a stand-alone unit to a networked-connected multi-functional tool, Les Olson Company organically progressed into a leading provider of Managed I.T. Services.

 

Today, virtually anything that communicates with a network can now be monitored and managed through Les Olson Company’s expert team through their award-winning Managed I.T. Services program. Les Olson Company strives to be a partner to all of their clients, offering the best in office technology, including security solutions.

 

About Sophos

More than 100 million users in 150 countries rely on Sophos’ complete security solutions as the best protection against complex threats and data loss. Simple to deploy, manage, and use, their award-winning encryption, endpoint security, web, email, mobile and network security solutions are backed by SophosLabs – a global network of threat intelligence centers.[/cz_title]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_58742″ sk_overall=”background-repeat:no-repeat;background-position:right bottom;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/10/artArtboard-1encryptionimplementationguide.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-bottom:35px;padding-left:50px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection” link=”url:%2Finfo%2Fencryption-implementation-guide%2F|||”][cz_title id=”cz_97854″ link=”url:%2Finfo%2Fencryption-implementation-guide%2F|||” sk_overall=”background-color:rgba(255,255,255,0.84);left:-16px;”]

ENCRYPTION

IMPLEMENTATION

GUIDE

[/cz_title][cz_gap height=”30px” id=”cz_62034″][cz_social_icons fx=”cz_social_fx_10″ id=”cz_81764″ social=”%5B%7B%22icon%22%3A%22fa%20fa-arrow-circle-right%22%2C%22title%22%3A%22Watch%22%2C%22link%22%3A%22%2Finfo%2Fencryption-implementation-guide%2F%22%7D%5D” sk_icons=”font-size:50px;color:#ba0230;” sk_con=”padding-top:0px;padding-bottom:0px;margin-top:0px;margin-bottom:0px;”][/cz_content_box][cz_gap height=”30px” id=”cz_62034″]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_13803″ sk_overall=”background-repeat:no-repeat;background-position:left bottom;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/10/artArtboard-1deeplearning.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-right:50px;padding-bottom:35px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection” link=”url:%2Finfo%2Fhow-intercept-x-uses-deep-learning%2F|||”][cz_title title_pos=”cz_title_pos_right” id=”cz_42534″ link=”url:%2Finfo%2Fhow-intercept-x-uses-deep-learning%2F|||” sk_overall=”background-color:rgba(255,255,255,0.83);”]

DEEP LEARNING

ENHANCES

ENDPOINT SECURITY

ARTICLE

[/cz_title][cz_social_icons position=”tar” fx=”cz_social_fx_10″ id=”cz_60704″ social=”%5B%7B%22icon%22%3A%22fa%20fa-arrow-circle-right%22%2C%22title%22%3A%22Download%22%2C%22link%22%3A%22%2Finfo%2Fhow-intercept-x-uses-deep-learning%2F%22%7D%5D” sk_icons=”font-size:50px;color:#ba0230;” sk_con=”padding-top:0px;padding-bottom:0px;margin-top:0px;margin-bottom:0px;”][/cz_content_box][cz_gap height=”30px” id=”cz_20875″]

The post 2017 Sophos New Partner of the Year appeared first on Les Olson IT.

]]>