Have an account?

  •   Personalized content
  •   Your products and support

Need an account?

Create an account

Threat of the month

Current threat analysis and defence techniques against the latest attacks

Read the latest

SMB and the return of the worm

"Watch the threat landscape long enough, and you’ll see that some things are cyclical. Threat types and attack methods fall in and out of fashion. As the use of one vector declines, another increases in popularity."

Cisco solutions to protect against Worms

Stealthwatch

Stealthwatch can detect connections to SMB shares, correlating this activity to alert administrators.

Advance Malware Protection

AMP’s continuous monitoring and patented retrospective security capabilities are ideally suited to keep you safe against attacks such as WannaCry and Nyetya.

Network Security Appliances

Network Security appliances like NGFW, NGIPS, and Meraki MX can detect malicious activity associated with SMB attacks.

Defending Your Network from Cryptomining

"Digital gold rush or cyber threat? Learn the ins and outs of cryptomining, and the security measures your organization needs to take against this popular money-making scheme."

Cisco solutions to protect against Cryptomining

Stealthwatch

See unusual network behaviour generated by cryptominer malware.

AMP for Endpoints

Detect and block malware on the endpoint.

Cisco Umbrella

Block connections to malicious domains used by cryptominers.

In Pursuit of Invisibility: Fileless Malware

"Fileless malware is so hard to detect that is almost invisible. This sneaky malware does damage while leaving hardly any trace of itself. Catch it if you can see it."

Cisco solutions to protect against Fileless Malware

Advanced Malware Protection (AMP) for Endpoints

Use memory protection and indicators of compromise to detect fileless malware.

Cisco Email Security

Detect and block email threats like phishing attempts.

Cisco Umbrella

Block connections to malicious domains that distribuite fileless malware.

Threats are multiplying

In fact Asia-Pacific companies receive 6 cyber threats every minute. An attack is no longer a matter of if, but when. It is only a matter of time. It is difficult enough detecting and blocking the attacks you can see. Imagine trying to stop an invisible threat.

89%

of midsize organisations will experience advanced attacks, such as fileless malware by 2022.

3 out of 4

enterprise organisations will also suffer advanced attacks by 2022.

6

Cyber threats every minute.

Threats are increasing

In fact, Asia-Pacific companies receive 6 cyber threats every minute. An attack is no longer a matter of if, but only a matter of time. It’s time to make security your business priority, once and for all.

Cisco 2018 Annual Cybersecurity Report

There are two kinds of companies: those who have been breached and those who don’t know they’ve been breached.

SMBs Cybersecurity Risk, Their Opportunity

Many SMBs are realizing they are exposed to similar threats as their enterprise peers. Often times, those realizations come after an attack.