7 Deadly IT Sins Banner

VLCM and Sophos can help cleanse you of these sins!

Know them. Fear them. Fix them

Sin 1 - Mobile Negligence

 Mobile Buyers  Guide

 

 

 

 

#1 Mobile Negligence

That flashy little device in your pocket is a big security risk. Hackers are increasingly targeting mobile devices to steal data (emails, contacts, corporate data, financial information) and send premium rate SMS, using up your bandwidth in the process. Android devices are most vulnerable to threat - last year SophosLabs saw an 1800% increase in Android malware. While there is less iOS malware these devices are still vulnerable to attack, particularly jailbroken devices.

 

#2 Mac Malice

Macs are gaining ground on Windows in corporate usage. However, many Macs aren’t properly protected against malware and data loss. Macs can be infected with malware just like PCs, and the threat is growing. Macs can also play host to Windows malware and spread it across your network to all your Windows computers. Your employees love their Macs. But you can’t afford to give Macs a pass on protection.

 

 

 

Sin2 - Mac Malice

 

End-Point  Buyers Guide

Sin3 - Unsecure Wi-Fi

 

Wireless White Paper

#3 Unsecure WiFi

Put an access point in your office and you’ll have a Wi-Fi hotspot in no time. Then along come all these devices that want to connect – smartphones and tablets belonging to your employees, laptops brought in by visitors. Do you know where those devices have been? And if your hotspot provides full access to your corporate network, that could mean access to more data than you intended. If you don’t protect your wireless network, it can open the door to threats.

Unsecure Wi-Fi Video 

 

#4 Un-encrypted Email

Your email typically traverses the Internet in plain text format. It’s like sending a postcard in the mail. Anyone with the means and motive – government agencies, ISPs, webmail providers, hackers, advertisers and even your competitors – can take advantage of this to steal sensitive data, facilitate identity theft, access credit card information, or provide more targeted advertising. We’re in the middle of an email snooping epidemic and unsecure email is a major liability.

  
 

Sin4 - Un-Encrypted Email

 

Email White Paper

Sin5 - Faulty Firewall

 

Firewall Buyers Guide

#5 Faulty Firewall

It may look like an unassuming box in the server room, but your firewall is your network’s first line of defense: blocking port scans, thwarting data-stealing malware, controlling Facebook access, prioritizing bandwidth for corporate applications … the list goes on. If your firewall can’t keep up with threats and bandwidth demands, or is too complex to use effectively, you’re not getting the full potential from your network.

Faulty Firewall Video

 

#6 Un-encrypted Files

Major corporations like Target, The Home Depot and JPMorgan Chase have suffered data breaches that are devastating to their brands. Smaller companies suffer the same fate with less fanfare. No matter what the size of the breach, your reputation and customer loyalty can be damaged beyond repair. If you’re not securing sensitive company data and your customers’ identities, your customers will flee even if your business escapes the wrath of regulators.

Un-encrypted Files Video

 

Sin6 - Un-encrypted Files

 

Encryption Buyers Guide

Sin7 - Delinquent Web Filtering

 

Web Filtering White Paper

 

#7 Delinquent Web Filtering

Web filtering used to be easy – block out the pornography, gambling and extremist content and you’re safe. But today that’s no longer enough to keep employees secure against dangerous websites - 80% of all web malware is now hosted on legitimate websites that have been compromised. Hackers compromise thousands of new sites every day, using sophisticated techniques to keep their malware from being detected. You can get infected with malware by browsing to a hacked website that might have been safe the day before, without even knowing it.

 

I'm Guilty! Tell Me More About How To Fix it