Your cyber intelligence source

Library

You need to be a big organisation to protect against every threat in-house these days. And even if you’re a big firm, you need the right people in place and access to the right advice – as well as flexible, agile cyber security infrastructure. In this Sophos’ MDR Buyers’ Guide, it'll navigates you through the choppy waters of first deciding to out-source security operations, part or whole – then actually doing it.

The NHS is slowly replacing old, vulnerable technology, a new report reveals. And it’s an issue we all face. How do you keep complex systems up-to-date? How do you balance the importance of patching with the risk of disruption? And when does fit-for-purpose become dangerously outdated?

Billions of Bluetooth devices are vulnerable to attack according to new research, leaving business data on mobile devices and IoT systems open to compromise by attackers. Being aware of this is one thing, successfully protecting is a whole other challenge…

Watch

The world may have changed with the vast majority of organisations deploying the work-from-home arrangements as default, but the pressure on cyber security teams to defend the employees from cyber crime is as strong as ever. Has the approach to cyber security training changed to reflect the new way of working too? 

  • image
    Ben Langrill Director of Product Integrations, RangeForce
  • image
    William Munroe VP of Marketing, RangeForce
  • image
    Rene Millman Freelance writer (host)

Heavily downloaded, built at speed in the middle of a pandemic… should you feel comfortable recommending to staff they download the new track-and-trace app – or does the cyber-risk outweigh the virus gain? SC Media sent Davey Winder to investigate…