You have critical data scattered throughout your organization-on back-office servers, desktops, mobile endpoints outside your firewall, and even in public clouds like Google Apps and Microsoft Office 365. What steps have you taken to ensure none of that critical data will be lost? If you are like many organizations, you have deployed a hodge-podge of heterogeneous data protection solutions over the years as new data sources were added. The result is that you now have an overall, organization-wide data protection system that is highly complex. Even worse, you really can’t be certain that you don’t have serious data protection gaps somewhere in your organization. You could maintain the status quo and hope disaster will not strike. But this white paper offers a better plan: a single, comprehensive data protection solution that gives you transparent visibility and complete control over all your corporate data sources.
K7 Computing, one of the world’s leading data security and threat management companies, announced on 19th February 2015 that that its flagship product K7 Total Security has received the VB100 award on Microsoft Windows 7 SP1 systems from The Virus Bulletin.
K7 Total Security is an award-winning next-generation security suite. The product steps ahead of traditional security software by combining malware protection, active web filtering, runtime behavior monitoring, intrusion protection, smart firewall and parental controls into an easily managed system. With its proactive and reactive defenses, K7 Total Security significantly outperforms traditional anti-malware products and other desktop security solutions.
The Virus Bulletin, a leader in testing and certifying anti-malware applications and organizations, is highly regarded in the anti-malware industry. It only awards the right to display the VB100 logo to anti-malware products that can detect all ”In-the-wild” malware during both on-demand and on-access scanning, and generate no false positives when scanning a set of known clean files using just the application’s default settings.
The Virus Bulletin testing team noted that, “Under the covers, a good level of configuration options is provided. Stability was once again flawless, with no problems noted. Scanning speeds were pretty good, overheads not bad at first and barely perceptible in the warm runs.”
This award for anti-malware excellence on Microsoft Windows 7 SP1 systems joins the VB100 awards K7 products had already earned since 2007 for Microsoft Windows 7, XP operating systems, and for Windows 2008 Server.
Jayaraman Kesavardhanan, CEO of K7 Computing, commented, “We believe that protecting our customers from cyber threats is our sole mission. We are driven by the belief that everyone in the world should be able to use the Internet safely, and without fear that criminals will steal their money or identity. That we did so well on The Virus Bulletin’s very strict certification tests shows again that K7’s engineering teams and specialists have built remarkable cyber protection products that anyone can rely on.”
This is the fourth part of the blog series on cyber security, continuing from its third part on Scareware, RogueAV and Ransomware, focussing on the dangers of choosing weak passwords and the consequences of recycling the same password across different online accounts, and a few tips on how to determine a suitably strong password.
In today’s digital age, people’s lives seem to revolve around passwords. Passwords to online portals play an important role in securing access to a user’s online information, whether financial, professional or personal. Hence, users are perennially advised to always secure their accounts with strong passwords.
Many online portals alert users about inadequate password strength when setting up the login credentials for a user account. Some online portals may even enforce strong password before the account is set up. Users must consider password depth while deciding on an account’s password to avoid their passwords being hacked easily.
From a security perspective, using the same password for a user’s multiple accounts is dangerous, both for personal accounts as well as in a professional environment. In this case a hacker need hack only one account to have the credentials to have access to the victim’s other accounts and the sensitive information held therein.
Read rest of this important and interesting article at: http://blog.k7computing.com/2016/02/passwords-hashes-to-ashes-2/
Your password is 30 days old. Please enter new password:
Password too short.
– red rose
Password has to have at least one numeric character.
– 1 red rose
Password cannot contain spaces.
Password has to contain at least 10 different characters.
Password has to contain at least one capital letter.
Password cannot contain successive capital letters.
Password has to have more than 20 characters
Password has already been used.
We have many questions about Cryptolocker, Cryptowall, CTB Locker …
Security experts from K7 Computing, showcased a generic anti-ransomware framework at last year’s Virus Bulletin International Conference. It garnered quite an excited bunch of fellow security enthusiasts at Prague, Czech Republic, where the conference was held, to listen to the duo talk about this prototype.
This presentation addressed majorly on file encrypting ransomware variants. A demo followed to display the capability of this generic anti-ransomware prototype in defending ransomware through samples obtained from valid sources.
K7 Computing is extremely proud of the team behind the idea to develop a simple solution to thwart complex ransomware menace. This generic framework is on the process of being incorporated into our products, and we are super excited.
This was at VB Conference 2015
We’re proud to announce that Asigra has been named the Silver winner of the Storage Magazine 2015 Products of the Year awards. Asigra won the award for its proprietary backup and recovery solution, Asigra Cloud Backup Version 13, based on a range of data protection capabilities including Docker Container support and AWS EBS Snapshot Manager.
Both Docker and AWS are highly popular computing platforms that are emerging as credible storage platforms for business information and Asigra is one of the first enterprise software vendors to add support for these platforms.
Asigra was praised by judges for being early to market with the new capabilities. One judge noted that in addition to being “very inexpensive,” the Asigra Cloud Backup software is unique in its automatic protection of Docker containers and its ability to manage AWS EBS snapshots.
This is the third year in a row where Asigra Cloud Backup™ has placed in the top three positions for the Storage Magazine Product of the Year award amongst a high caliber of the world’s top data protection solutions. Backup with Asiga: http://www.backup-data.net/index.php/data-backup/pricing
We are an independent, charitable organisation that supports disadvantaged and disabled children across the UK.
Established in 1987 we provide new opportunities for children and their families to share an enjoyable time together, free of charge.
We have seen time and again how a trip to the circus can change a child’s life and your donation will help bring the fun, excitement and magic of the circus to children who would not normally get chance to experience such an event.
With the funds raised from our world-class circus production, we aim to create long-term change within the towns we work by raising awareness of the issues facing disadvantaged children.
We rely heavily on the generosity of supporters like yourselves and without your donation could not continue to put smiles on the faces of more than 1,000 children in your community each year.
On behalf of all the staff at Circus Starr, a big ‘thank you’ for your support. May I also personally assure you that the children and families in your community will benefit directly from your donation.
Director, Circus Starr