Category: Security

Security Breaches on the Rise with Remote Work

Security Breaches on the Rise with Remote Work

Remote work has come to stay, so it remains a topical issue when it comes to cyber security. Small and midsize businesses are more mobile than ever. When one of your users leaves the safety of your perimeter you lose a significant amount of visibility and control over their security. The problem becomes worse when they

Read More
How to improve cybersecurity in the healthcare sector

How to improve cybersecurity in the healthcare sector

Over the last two years, the healthcare sector has been the number 1 target for hackers who have attempted to attack health centers or even the health department of an entire country. The industry faces threats such as ransomware that blocks the whole healthcare system, deceptive techniques such as phishing, or breaches of sensitive data.  MSPs and

Read More
The 6 most intelligent endpoint security features

The 6 most intelligent endpoint security features

Endpoint malware threats, like all kind of cyber threats these days, continue to rise up and target companies regardless of the size. Especially with the Cloud adoption boom we are experiencing, endpoint devices become more vulnerable. Traditionally when we refer to endpoint detection and response, we are looking at basic detection and matching attack features

Read More
Vulnerability Management

Vulnerability Management

SafeFort, a leading cyber security solution provider in Cyprus, announced an additional service that aims to provide high quality security and meet the customer’s needs and requirements in the best possible way. Vulnerability Management Vulnerability management is the ongoing, regular process of identifying, evaluating, reporting on, managing and remediating security vulnerabilities across endpoints, workloads, and systems. 

Read More
Protect your Backup from Ransomware Attacks with Nakivo

Protect your Backup from Ransomware Attacks with Nakivo

Even the best anti-ransomware software can fail as cybercriminals find new ways of infiltrating protected systems. Τhere are challenges specific to ransomware protection that can complicate data protection efforts. These challenges include protecting backup data from getting infected and having enough restore options to meet short- and long-term recovery needs. As a solution for ransomware protection and recovery for physical,

Read More
Why you need to backup your O365 Exchange, Sharepoint and OneDrive

Why you need to backup your O365 Exchange, Sharepoint and OneDrive

Does Microsoft backup Office 365 data? Well, Yes and no – Office 365 allows you to recover deleted items. However the native Office 365 recovery tools are quite limited. Retention time of Office 365 is 14 days by default and you can extend it up to 30 days. No point-in time recovery: In case your mailbox has

Read More
Let us traing your users!

Let us traing your users!

Let’s create a strong Human Firewall! Safefort launches a new service focused on the training of users regarding Cybersecurity. Employess should be educated in the realm of cybersecurity (and trained accordingly) because a security threat cannot be avoid or reported if it is not recognized! This seems obvious but you’de be suprised.  The most common threat is

Read More
Συμβουλές για την διατήρηση ενός ασφαλούς κωδικού πρόσβασης

Συμβουλές για την διατήρηση ενός ασφαλούς κωδικού πρόσβασης

Μια νέα έρευνα από την Panda Security αποκαλύπτει ότι σχεδόν ένας στους δώδεκα χρήστες στο Ηνωμένο Βασίλειo παραδέχεται ότι έχει μόνο έναν κωδικό πρόσβασης, ενώ σχεδόν ένας στους πέντε επιβεβαιώνει ότι ο κωδικός του έχει παραβιαστεί στο παρελθόν. Εν τω μεταξύ, το 42% δηλώνει ότι αλλάζει τους κωδικούς πρόσβασης μόνο όταν του ζητηθεί και το 15% στην πραγματικότητα δεν τους αλλάζει ποτέ. Οι ειδικοί της Panda Security στην

Read More
Πώς οι marketers σας παρακολουθούν ακόμα και όταν είστε εκτός σύνδεσης

Πώς οι marketers σας παρακολουθούν ακόμα και όταν είστε εκτός σύνδεσης

Ο όγκος των δεδομένων που συλλέγονται από προγραμματιστές εφαρμογών έχει γίνει καυτό θέμα τους τελευταίους μήνες. Η Apple ανακοίνωσε πρόσφατα ότι σχεδιάζει να αναγκάσει τους προγραμματιστές να δηλώσουν πόσες προσωπικές πληροφορίες συλλέγονται από τις εφαρμογές τους πυροδοτώντας μια έντονη συζήτηση. Σχεδόν όλες οι εφαρμογές συλλέγουν προσωπικά δεδομένα με κάποιο τρόπο. Ιδιαίτερα εκείνες που παρέχουν δωρεάν λήψη και χρήση. Στη συνέχεια,

Read More
Exchange Servers Vulnerabilities: Actively exploited

Exchange Servers Vulnerabilities: Actively exploited

As the cybersecurity community continues to reel with the sweeping effects of the SolarWinds attack, the Microsoft Threat Intelligence Center (MSTIC) has released information about another widespread campaign targeting Exchange servers. It has been found that a state-sponsored threat actor operating out of China, which they are calling HAFNIUM, has been exploiting 0-day vulnerabilities in

Read More