+971 4 254 1982
sales@securepoint.ae
 

Blogs

For now, it’s just a lab experiment, but the researchers behind the first industrial control system ransomware believe it’s just a matter of time before criminals take note.   Imagine a group of hackers was able to infect the tiny computers that control critical infrastructure, such as power plants or water treatment facilities, also known as Programmable Logic Controllers or PLCs. The hackers could then lock these...

Read More

Phishing is more than just the obvious scams you find in your spam folder. Reliable security solutions are a big help. They can certainly cut down on the classic “spam and scam” threats. And even if something does get through, surely everyone knows that poorly written emails asking for your bank account info or passwords are scams. Right?     If phishing were that simple, it would be extinct. But...

Read More

With less than two weeks to go until 2017, we’ve taken a look back at the past year in cyber security. In this post we discuss lessons learned from 2016, and what these developments mean for security professionals and the whole industry in 2017.   In short, what we’re seeing is that cyber security never stops. And it is exactly what makes cyber security so endlessly interesting and ruthlessly...

Read More

Endpoint protection – not the sexiest of subjects? However, a vital one for your business security. And one that most businesses spend a lot of time and resources on. Yet, as we have seen several times in the news, all types of companies get breached, with severe consequences. Why is this? There are several reasons: You’re dealing with an explosion of endpoints and software: New users, mobile workstations,...

Read More

Ransomware is big news today. In fact, during Q3 in 2016, ransomware attacks more than doubled. And no wonder – it is big business. The FBI estimated the profits related to ransomware at one billion dollars in 2016.   Paying the possible ransom will of course hurt. But what will probably hurt more are the other repercussions to your business from a successful ransomware attack.   First, you have...

Read More