Our consultants can lead clients through their business improvement process and advise on the best solution.
At Consilium we can provide a range of IT support services to match your requirements. We provide IT Support in Glasgow, Edinburgh and across the UK
High speed broadband means cloud computing makes more sense. For the business that’s ‘always open’, cloud computing is the answer.
Next Generation Anti Virus
Traditional AV is no longer effective at stopping today’s cyberattacks.
In fact, to prevent security breaches in your organisation, you must protect yourself not only from known and unknown threats but also from the failures of any traditional AV solutions deployed in your environment.
It’s time to replace your traditional antivirus solution with a real breach prevention tool.
Traps uses multiple methods of prevention. Traps checks everything that is run on an endpoint against a whitelist in the cloud called Wildfire. When Traps encounters code it hasn’t seen it detonates that code in Palo Alto Network’s cloud and either denies if it is deemed a threat or adds it to the whitelist going forward. That whitelist is shared with all Traps customers amounting to a huge repository used by all Traps installations.
The two biggest threats are from Malware and Exploits
Consilium are the only managed service provider of Traps in the UK. Palo Alto is a leading enterprise provider of security solutions and a recognised Gartner Leader for the last five years consecutively. They are at the absolute cutting edge of endpoint protection.
Simply put we don’t believe that organisations can afford not to act. Below is just a small sample of some of the high profile infections that have made the news. In most instances the organisations had AV.
Malware is usually delivered through an executable on a PC. It may look benign but will actually contain malicious code capable of causing huge issues within and out with your IT environment.
Exploits take advantage of bugs and flaws in normal day to day applications that provide a method for the attacker to launch malicious code on an endpoint; often under the radar of traditional anti virus applications.
Traditional AV checks against a list of known threats through real time scanning when you run an application.
Traps works the other way round. It checks your application against a whitelist and if it isn’t listed it verifies the safety of the application before it’s run.
Traditional AV’s first, and main, line of defence assumes that anything not on the threat list (AV signature) is safe. This isn’t good enough as attackers release malware and exploits in large scale attacks; before AV providers discover and protect against the threat.
Lincolnshire County Council was forced to shut down all of its computers after a ransomeware infection spread throughout its systems effecting at least 300 end user machines.
Read Full Article
A SCOTS hairdressing firm owner was forced to pay a €1000 ransom to hackers who locked him out of the company database and deleted important files.
Of the 46 councils in England, 30% of councils in England suffered at least one ransomware attack during 2015, one council suffered 13 separate infections.
In June 2016 Millions of Microsoft Office 365 users received phishing emails containing a Cerber ransomware attack. Cloud-security firm Avanan estimates that at least 57 percent of all Office 365 customers on their platform were affected.
A survey in June 2016 has revealed that 54% of UK organisations have been effected by ransomware attacks. 20% of the infections were serious enough to force the company to immediately halt all business operations
Out of 71 UK universities surveyed in August 2016 32% said the had been infected with Ransomware the last yea. Bournemouth University, which boasts a cybersecurity centre, has been hit 21 separate times in the last 12 months.
© 2015 Consilium UK Ltd. All rights reserved.