Thursday
Jan182024

Sophos - Leader for the 14th Time

 

Threats change. Sophos continues to be recognized.

For the 14th consecutive time, Sophos has been named as a Leader in the 2023 Gartner® Magic Quadrant™ for Endpoint Protection Platforms.

We believe this ongoing recognition is a testament to our relentless innovation, deep threat expertise, and continuing adaptation that enables us to defend customers from even the most sophisticated adversaries.

Endpoint protection that works for you and with you

Sophos Endpoint delivers unparalleled threat protection and powerful EDR and XDR tools. Designed for real-world environments and real-world threats, highlights include:

 

  • CryptoGuard anti-ransomware protection that detects and rolls-back both local and remote ransomware attacks
  • 60+ exploit mitigations that are deployed automatically – no configuration required
  • Adaptive Attack Protection which automatically applies more aggressive protection when a device is under attack
  • Critical Attack Warning that identifies an active estate-wide attack and proactively notifies customers so they can take immediate preventative action

 

 

Wednesday
Jan172024

Sophos wins BIG in CRN's ARC Awards

Scott Barlow, VP of Global MSP, Cloud Alliances at Sophos, spoke about the company’s impressive performance in the 2023 CRN Annual Report Card Awards. Sophos emerged as the top winner in five security categories, including data security, extended detection and response (XDR), cloud security, and SMB and enterprise network security.
In a video interview with CRN, Barlow attributed the company’s success to its commitment to the channel and its partner programs. Sophos’ MSP program, cloud security program, and the Sophos Partner Program have been well-received by partners, who appreciate the ability to manage all their security solutions from a single portal.
Congratulations to Sophos on their well-deserved wins!

Learn More

Friday
Nov032023

Planned Power Outage, West Penn Power, Sunday 12a-6a, Eastern Westmoreland Area 

Per West Penn:

There will be a planned power outage during this coming weekend. West Penn Power will be performing work Sunday night, between 12:00 am and 6:00 am. Areas to be affected are New Alexandria, Latrobe, Derry and Blairsville.

 

Monday
Oct302023

DUCKTAIL Spread via Compromised LinkedIn Profiles

By Cluster25 Threat Intel Team
October 25, 2023

Linkedin has been targeted as reported above using LinkedIn messages as a vector for executing identity theft attacks.

If it’s not enough for North Korean and Iranian hackers using this ultra-popular professional networking web site for cyber espionage, other groups are using it to distribute malware. Cybersecurity experts have tracked a malware strain known as ‘Ducktail’ on the platform that is targeting Italian company employees. Hackers are leveraging fraudulent profiles that offer lucrative job via the platform’s messaging system. The email proclaims that an attached .PDF file contains job details - but contains the Ducktail malware to infect the recipient’s system(s).Worth a quick read to be aware!

Click Here to read the article.

Friday
Oct272023

Microsoft List-Field Types

Microsoft List supports various field types and options that enable users to customize their lists according to their needs. Some of the field types and options that are available are:

  • Text: This field type allows users to enter any text value, such as names, descriptions, comments, etc. Users can also specify the maximum number of characters allowed for this field type.
  • Number: This field type allows users to enter any numeric value, such as quantities, prices, ratings, etc. Users can also specify the minimum and maximum values allowed for this field type, as well as the number of decimal places to display.
  • Date and Time: This field type allows users to enter a date and/or a time value, such as deadlines, start dates, end dates, etc. Users can also choose to display only the date or only the time, or both.
  • Choice: This field type allows users to select one or more options from a predefined list of choices, such as categories, statuses, priorities, etc. Users can also specify whether the choices are displayed as a drop-down list, radio buttons, or checkboxes.
  • Yes/No: This field type allows users to indicate a yes or no answer, such as completed, approved, active, etc. Users can also choose to display this field type as a toggle switch or a checkbox.
  • Person or Group: This field type allows users to select one or more people or groups from the organization's directory, such as owners, assignees, members, etc. Users can also choose to display the name only or the name and email address of the selected person or group.
  • Hyperlink or Picture: This field type allows users to enter a URL or upload an image file, such as links to websites, documents, images, etc. Users can also choose to display the URL as a hyperlink or an image preview.
  • Lookup: This field type allows users to select one or more values from another list in the same site, such as products, customers, orders, etc. Users can also choose which column from the source list to display in the lookup field.
  • Calculated: This field type allows users to create a formula that calculates a value based on other fields in the same list, such as totals, averages, percentages, etc. Users can also choose the data type and format of the calculated value.
  • Location: This field type allows users to enter a physical address or a geographic coordinate, such as locations, venues, coordinates, etc. Users can also choose to display the address as a map or a text.
Thursday
Oct262023

What is Microsoft List and How can I use it?

Microsoft List is a powerful tool that allows you to create and manage lists of data, tasks, events, and more. You can use Microsoft List to organize your work and personal life, collaborate with others, and access your lists from anywhere. Here are some of the benefits of using Microsoft List:

 

  • You can customize your lists with different views, filters, sorting, and formatting options.
  • You can integrate your lists with other Microsoft 365 apps, such as Teams, SharePoint, Outlook, and Power Automate.
  • You can use templates to create lists quickly and easily, or start from scratch and build your own.
  • You can share your lists with others and control their permissions and access levels.
  • You can use smart rules and alerts to automate workflows and get notified of changes or updates.

 

Microsoft List is a versatile and flexible solution that can help you manage your information and projects more efficiently and effectively. To learn more about Microsoft List, visit https://www.microsoft.com/en-us/microsoft-365/microsoft-lists/lists-app

Wednesday
Oct112023

Two-Factor Authentication (2FA) in Office 365: A Shield for Your Data

In the digital age, data security is paramount. Office 365’s Two-Factor Authentication (2FA) provides an extra layer of protection to ensure the safety of your personal and work files.

When you set up 2FA, you add an extra layer of security to your Microsoft 365 account sign-in. After entering your password, you’re prompted to provide a second form of authentication, such as a verification code provided by an authenticator app or sent to your phone.

The benefits of implementing 2FA in Office 365 are manifold1. It offers an additional layer of protection from unauthorized access, mitigates phishing threats, and is more efficient than traditional passwords. A maximum passcode entry limit prevents cybercriminals from hacking and accessing sensitive data.

Moreover, the process is manageable and user-friendly. There’s no need for a hardware token generator, and SMS authentication is the most common method of implementation.

In conclusion, setting up 2FA in Office 365 not only simplifies the user experience but also significantly enhances data security. It’s a small step towards safeguarding your digital assets but a giant leap in fortifying your online security.

Friday
Oct062023

Comparison Scores for the Account Health Check

The Account Health Check capability makes it easy for Sophos Endpoint and Server users to optimize their security posture and has already proved hugely popular. We continue to extend this feature, and customers can now compare their own health scores with the average scores of other organizations with a similar number of devices, providing context and motivation for improvement.

In the example below, the customer has an overall score of 49 which is well below the average score of 97. Customers can also compare each of the individual health check scores (e.g., protection installed, policies) to identify where to focus. The drop-down on the right enables users to select their desired comparison cohort.

Thursday
Oct052023

Continued Industry Recognition

Sophos Endpoint continues to garner high praise from experts across the industry, and recent recognition includes:

  • 100% Total Protection Score and two AAA awards in the SE Labs Q2 Endpoint Protection report. Sophos detected and stopped  both commodity, real-world cyberattacks and simulated targeted attacks with 100% accuracy
  • Sophos named a Leader by Frost & Sullivan in their inaugural XDR Radar Report
  • Sophos awarded Best Endpoint Security in the CRN® Tech Innovator Awards
  • Sophos named a Leader in the 2022 Gartner®️ Magic Quadrant™️ for Endpoint Protection Platforms

To learn more about Sophos Endpoint and start a free trial for yourself, visit our website or speak to your Sophos representative or partner.

Gartner, Magic Quadrant for Endpoint Protection Platforms, Peter Firstbrook, Chris Silva, 31st December 2022

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, Magic Quadrant is a registered trademark of Gartner, Inc. and/or its affiliates and are used herein with permission. All rights reserved.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Wednesday
Oct042023

Introducing the Sophos Incident Response Services Retainer

With tangible ‘readiness’ now a key component for cyber resilience, I’m excited to announce the launch of the Sophos Incident Response Services Retainer. It provides all organizations (whether an existing Sophos customer or not) with speedy access to Sophos’ industry-first fixed-cost incident response service in the event of a breach.

The retainer also includes external vulnerability scanning and critical preparedness guidance, enabling organizations to proactively improve their security resilience by pinpointing and resolving issues that reduce the likelihood of a breach in the first place.

Every Minute Counts

The need for go-to incident response support that can activate immediately has never been higher, as revealed in the latest analysis of Active Adversary behavior by Sophos X-Ops:

  • The median dwell time in ransomware attacks fell from nine days in 2022 to five in the first half of 2023
  • Attackers take just 16 hours on average to reach Active Directory (AD)
  • 90% of ransomware attacks occur outside standard weekday business hours

The Sophos retainer cuts red tape, allowing Sophos incident responders to quickly jump into active cyberattacks to investigate and remediate them, minimizing business impact.

The Importance of Preparedness

Planning and preparedness are complementary elements of an incident response strategy. Having a plan is essential, but you also need to be prepared to implement that plan at short notice – and as the research shows, more likely than not outside standard working hours. The Sophos Incident Response Services Retainer gives you on-demand access to a team of incident response experts that will rapidly stop active attacks and get you back to normal operations.

Reducing Cyber Risk for All Organizations

The Sophos Incident Response Services Retainer is available to non-Sophos organizations as well as customers already using Sophos’ endpoint, XDR, network, email, and other security products, or Sophos MDR Essentials. Endpoint configuration health checks and device audits are also included in the retainer for existing Sophos customers.

Organizations that prefer broader services in one package can purchase Sophos MDR Complete, which automatically includes full-scale incident response.

To learn more about this exciting new service, read the Service Brief and speak to your Sophos representative or partner.

Tuesday
Oct032023

Coming Soon: Critical Attack Warning in Sophos Central

Adaptive Attack Protection came to Sophos Endpoint earlier this year, automatically deploying an elevated level of protection if adversary activity is detected on a particular device. Coming soon, the new Critical Attack Warning extends Sophos Endpoint’s context-sensitive defenses with an estate-wide approach that alerts if adversary activity is detected across multiple devices in the customer’s environment.

When the Critical Attack Warning threshold is met, an alert will be sent to all admins in the Sophos Central account to inform them of the situation and provide attack context and details. Customers can respond themselves using Sophos XDR, seek assistance from their partner, or engage the Sophos Incident Response team, all from within Sophos Central

We’re planning to make Critical Attack Warning available to all customers running Sophos Intercept X Advanced and Sophos XDR via a staged roll-out, due to begin later this month.

Thursday
Sep212023

New Layout option in Microsoft Edge

 

 published 

 

Tuesday
Sep192023

Celebrating National IT Day: A Tribute to the Tech Heroes

Today, September 19, 2023, is National IT Day, a day to appreciate and thank the IT professionals who keep our digital world running smoothly. Whether it’s network engineers, system administrators, database admins, ethical hackers, or any other type of IT expert, they all deserve our recognition and gratitude for their hard work and skills.

IT professionals are the backbone of any modern organization, as they ensure that the computer systems, networks, databases, and software are functioning properly and securely. They also troubleshoot problems, provide technical support, implement new solutions, and constantly update their knowledge and skills to keep up with the ever-changing technology.

IT professionals are not only essential for businesses, but also for society as a whole. They enable us to communicate, learn, work, shop, play, and access information online. They also contribute to innovation, research, education, health care, entertainment, and many other fields that rely on technology.

IT professionals often work behind the scenes, without getting much recognition or appreciation for their efforts. They may have to deal with stressful situations, tight deadlines, complex challenges, and demanding customers. They may also have to work long hours and adapt to changing environments and expectations.

That’s why National IT Day is a great opportunity to show some love and appreciation to the IT professionals in our lives. Here are some ways you can celebrate National IT Day:

  • Send a thank-you note or email to an IT professional you know or work with. Express your gratitude for their service and support.
  • Share a positive review or testimonial about an IT professional or an IT company on social media or online platforms. Highlight their achievements and skills.
  • Buy a gift card or a treat for an IT professional you know or work with. Surprise them with something they like or need.
  • Learn something new about IT or technology. Watch a video, read an article, take a course, or attend a webinar. Expand your knowledge and skills.
  • Support IT students and aspiring IT professionals. Mentor them, offer them advice, connect them with opportunities, or donate to scholarships or programs that help them pursue their education and career goals.

National IT Day is a day to celebrate the tech heroes who make our lives easier and better. Let’s show them how much we value and respect them. Happy National IT Day!

Wednesday
Aug302023

Mom’s Meals issues “Notice of Data Event”: What to know and what to do

If you are a subscriber to Mom's Meals You will want to read this article from Sophos naked security website.

Wednesday
Aug302023

Business OneDrive Storage change

The size of storage subscriptions, however, just significantly shrank, at least for OneDrive users. Microsoft no longer options unlimited cloud storage as part of OneDrive for Business plans. Instead, the default limit is 1TB per user.

There are some options for up to 5TB of storage per user, but those are limited to certain customers. In order to qualify, an organization needs to have five or more users with a OneDrive for Business subscription, specifically plan 2. Even then, there is an initial limit of 1TB per user, but admins can increase that to 5TB per user.

"In response to customer demand, Microsoft has streamlined the purchasing process for customers who use OneDrive for Business standalone plans,” said Microsoft to TechRadar. “Customers currently on these plans will still be able to add seats and renew their license.”

Microsoft's statement explains that organizations with a current OneDrive for Business (Plan 2) subscription can continue to keep that option. Those organizations will even be able to add seats and renew their license. The change appears to only affect new subscribers, who will no longer be able to sign up for a plan with unlimited cloud storage.

TechRadar spotted that the change occurred at some point between July 14 and July 28 this year. Microsoft's website for OneDrive for Business subscriptions now only lists OneDrive for Business (Plan 1). There are also Microsoft 365 subscriptions that include cloud storage, but those are also limited to 1TB per user.

Thursday
Aug102023

How to make a video using Microsoft Stream

Samantha Bahrini, a product manager at Microsoft, walks through the steps of using Microsoft Stream to create and share a how-to video at work. This video shows you how to open Stream and then set up the recording so that you are in the corner speaking to, or referencing, the content on your shared screen. Next it walks you through adding text onscreen to the recording, saving the video, and lastly, adding a title, description, chapters and a transcript. Recording a how-to video in Stream is simple and helps you quickly transfer knowledge at work.
Thursday
Aug102023

S3 Ep147: What if you type in your password during a meeting?

Thursday
Aug102023

Windows 11 August Patch Tuesday update fixes display and brightness issues

What you need to know

  • Microsoft released Patch Tuesday updates for Windows 11 this week.
  • PCs running Windows 11 version 22H2 will receive an update to Build 22621.2134.
  • The update includes several improvements and security fixes, but it does not have any new features.

To learn more click here.

Tuesday
Aug082023

CryptoRom Fraudsters Utilizing AI Chat Tool to Scam Users: Sophos

In a concerning development, cybersecurity firm Sophos has reported that CryptoRom fraudsters are adopting new tactics, including incorporating an AI chat tool similar to ChatGPT, to deceive unsuspecting users into scams.

To learn more click here.

Friday
Aug042023

Electronic Signatures for Government Contracts

Paperless practices have increased the efficiency levels of many government departments and agencies. Much digital data is being transmitted today between government agencies, businesses, and citizens. With all this data being shared and all the privacy issues it could affect, the government must ensure that all transactions are secure to avoid the possibility of fraud and data loss.

Have Electronic signatures for Government contract been proven effective?

Electronic signature solutions have been proven to be effective in government contracts. In the past, it’s been difficult to send documents between agencies and departments. Paperless processes combined with electronic signature solutions, however, can help reduce time and costs while streamlining workflow.

Electronic signature solutions have facilitated government contracting processes. Electronic signatures can be used by governments for many types of contract work such as tender agreements and procurement. They can be used to sign action orders and tender agreements, in addition to federal and state contracting. Using digital signatures not only streamlines the process but also offers greater security and trust for government agencies.

While electronic signatures are not an absolute necessity, they do offer secure, auditable, and convenient ways to process vital documents. While they can improve government workflows, they can also make operations more efficient.

E-signature solutions are generally a good choice for government agencies. They make receiving and sharing documents much easier. Unlike pen and paper, digital signature solutions are simple to use and are stored in electronic form. The best part is that you can even access government websites to view, complete, and sign forms. And because they don’t require hard copies anymore, this becomes less of a security concern for citizens to worry about.

The 2000 ESIGN Act established electronic signatures as legal. Previously, courts had not applied the requirements for “writing” consistently to the law. However, in ESIGN, the law stated that consumers consented to the use of electronic signatures because they knew they were signing a document with their digitally signed identity. That’s a big deal for the consumer, and it also means that a digitally signed document is more secure than a physical one.

What government agencies should look for in an e-signature solution

When your government agency chooses an e-signature platform, you should be on the lookout for:

  • A reliable vendor with a track record of success. Select a strong platform designed for enterprise-level requirements that invests in digital transformation and meets the needs of mobile citizens.
  • A simple-to-use solution that can be used out of the box. Pick an easy solution to implement as your organization will get more use out of it.
  • A solution that integrates with your existing software with no additional cost. Additional fees or coding may be required. Some integrated solutions may not be suitable for all users. Again, when in doubt, simpler is always better.
  • Support for a wide range of legal issues and requirements. Look for a vendor that can offer legal assistance. Compliance requires a thorough understanding of the laws.
  • A trusted vendor with a track record of security. Your data and documents should be kept safe by your solution anywhere they go.