security

The Rise of the Digital Makes the World More Vulnerable
06.08.20

Like to risk big? Then start saving on security. Businesses become more and more digital: companies go online, adopt remote work, etc. But becoming data-driven also makes them more susceptible to risks. You need nerves of steel to deal with it. However, there is also good news. Vladimir Lavrov, H...

Read more
How to Prevent DDoS Attacks on Educational Institutions
02.09.20

The transition to remote work and the rise of online education caused an expected growth in the number of DDoS attacks, including attacks on the resources of educational and administrative institutions. According to Kaspersky Lab, in the Q1 2020, these cases reached 19% out of the total number of...

Read more
Cybersecurity and the Pandemic: How to Organize Secure Remote Access
07.05.20

The COVID-19 pandemic has increased the importance of telecommuting: dozens of employers are transferring employees to home offices. This convenient format reduces the probability of infection, but at the same time, it entails many risks related to information security. Besides, the situation is ...

Read more
How to Secure your Home Office
11.06.20

The COVID-19 pandemic has made telecommuting essential: dozens of employers are transferring employees to home offices. This convenient format reduces the probability of virus infection but, at the same time, entails many cybersecurity risks. The rising trend has been also caught by criminals&mda...

Read more
UEBA Systems, or How to Expose a Wolf in Sheep's Clothing?
06.03.20

Back in the 19th century, Nathan Rothschild made an oracular utterance: "He Who Owns Information Owns the World." Now his words are as true and relevant as never before. With the right information, you can make incredible profits, raise your business to new heights, become the first in ...

Read more
Synergy Effect
12.03.20

Website is a showcase of every company, and web applications and web portal offer the critical functions and competitive edges. How did it all start 10–15 years ago, most corporate websites acted as “business cards.” They were written in HTML and displayed static informati...

Read more
Multi-Link Virtual WAN site connectivity
26.12.19

According to Gartner, running workloads in the cloud yields large efficiency gains and by 2020 83% of all enterprise workloads are expected to be hosted in the cloud. But many cloud migration projects fail to deliver on the goal of moving the services to the cloud that retain the same level of se...

Read more
Targeted Attacks: a Dangerous Kind of Cybercrime
31.03.20

A targeted attack is a sequence of hacking actions aimed at and tailored for a specific “victim” to steal its money or data. Softline experts note that usually, intruders do it for their profit. They have several variants of monetization: unauthorized access to online banking, encrypt...

Read more
SBI Bank Uses ISOC to Protect Customer Data
26.11.19

The Bank has been connected to a new information security monitoring system, which will provide comprehensive data protection while increasing the number of retail and corporate clients. SBI Bank has been connected to the ISOC (Security Operation Center), part of Softline Group. The existing m...

Read more
Threat Spotlight: Inefficient incident response
28.10.19

Inefficient incident response to email attacks is costing businesses billions in losses every year. For many organizations, finding, identifying and removing email threats is a slow and manual process that takes too long and uses too many resources. As a result, attacks often have time to spread ...

Read more
Smart Video Surveillance Powered by AI and Computer Vision
04.12.19

Video surveillance is a must-have to ensure facility security in manufacturing, logistics, and many other industries. Not only does it protect against external threats, but it also monitors the implementation of occupational health and safety measures and prevents injuries. Unfortunately, peopl...

Read more
Azure or hybrid infrastructure as an alternative to SQL Server, Windows Server 2008 and 2008 R2
14.10.19

In 2019, Microsoft has ended the support and monthly updates of SQL Server, Windows Server 2008, and 2008 R2. As a result, the systems are subject to the risks of security and non-compliance with the requirements of legislation and regulatory authorities. The question is, how to prevent data loss...

Read more
A World of Epic Fakes
27.05.20

Live like in a fairy tale but stay vigilant AI does not care whether it does good or evil. It is not going to do anything out of its inherent kindness or maliciousness: there is a human behind every AI action, a human willing to make money, avenge, have fun, satisfy their curiosity, or test so...

Read more
Three reasons why spear phishing is so effective
17.07.19

It seems you can hardly go a day without hearing about another data breach, money transfer scam, or some other crime that started out as a spear phishing attack.  Email-borne threats have always been a top priority for IT security, but spear phishing is one of the fastest growing attacks.&nb...

Read more
Are you Ready to Entrust Your Data to an Outsourcing Company?
04.07.19

Letting third parties access the infrastructure is a sensitive issue for any security service, and allowing third parties to read the internal correspondence of employees is even worse. For most companies, this sounds like a nightmare. However, Anna Popova, Head of the Data Leak Prevention System...

Read more
Disk Encryption at the Service of Confidentiality
19.06.19

Disk encryption is an information protection technology that converts disk data into a code unbreakable for an intruder. It is based on the AES-NI algorithm, and keys are managed as per the KMIP 1.1 standard. All VM disk operations are encrypted on the fly—this ensures high security and rel...

Read more
Security Operations Centers. How Do They Work?
18.06.19

How did the company’s information network security system look like some 10 years ago? “Prohibit and keep out” principle was drilled into IS specialists’ minds. As soon as Odnoklassniki, VKontakte appeared, the access should be immediately closed. Managers found a game in ...

Read more
Threat Spotlight: IoT application vulnerabilities leave IOT devices open to attack
13.06.19

IoT devices were popular gifts again this holiday season. An acronym for Internet of Things, IoT is more than a buzzword. The trend represents a huge shift in how products are made and used, as network connectivity is added to products that were not previously intended to have this functionality....

Read more
10 reasons to migrate to Microsoft SQL Server 2019
18.03.19

At the heart of the modern data platform In the last decade SQL Server has made its way from a solution for small and medium RDBMS to a powerful data platform for companies and business critical applications, highly reliable and failure-safe. Every new release of SQL Server looks more and more...

Read more
Penetration Tests: Can You Get Hacked Or Not?
04.03.19

The fact that sooner or later someone will try to hack you is a shocking piece of news for business. And the issue is not only about competitors aiming at new products, or intruders conceiving the idea of blackmail. Any company may become a target of random carpet bombing, for example fishing. Or...

Read more
Security Operations Center as a Service. How does it work?
26.02.19

In the age of digital economy, high-speed internet, and mobile devices, installing the security tools and preventing access to blacklisted websites is not enough. The cybersecurity tools should always be under control; otherwise, the measures taken will not only be ineffective but also create a d...

Read more
Information security as a part of digital transformation
14.01.19

A couple of decades ago, a computer program was used for application purposes for the first time, and that was the beginning of digitalization. We will use this word for everything associated with usage of software, binary code, IT. Initially, programs were used for calculations, but consequently...

Read more
A dozen predictions on cybersecurity trends for 2019
10.01.19

Security of critical infrastructure Of course, the hot topic of the year and even the next few years in Russia will be the security of critical infrastructures. This will be fostered primarily by compliance. Many companies will undertake categorization of their infrastructures. Those who ...

Read more
Mobile Tricks: a Few Ways to Cheat DLP Systems and to Prevent It
18.09.18

When DLP systems first appeared in Russia, they were designed only for workstation protection. However, due to the recent technological developments, adoption of the BYOD concept by businesses, wide use of smartphones and tablets, frequent business trips, and an increasing number of home-office w...

Read more
Cybersecurity in Cloud Environments. CASB and Other Technologies
07.09.18

Businesses experience a paradigm shift as they enter the age of digital transformation. Conventional models and business processes become inefficient; old communication methods no longer work. Employees get more and more personal gadgets and use them to work out of the office. To ensure productiv...

Read more
Out-of-the-Box Cloud Solutions by Softline
20.08.18

The IT processes of any company can be divided into two groups: unique processes specific for this company or the industry it operates in, and standard processes. Standard (basic) IT processes exist in one form or another in all companies. They include popular corporate services, such as antiviru...

Read more