You may already be aware that a new Apache vulnerability has been detected which exploits a Java-based logging framework in Apache called Log4j2. Just to be clear this vulnerability is applicable to anything that runs Apache Log4j2 2.14.1 and earlier versions. Many security vendors, such as Fortinet, Cisco, Checkpoint and PaloAlto are creating signatures to
Today’s NHS Trusts face a significant and growing challenge. With physician mobility and BYOD usage on the rise, and new smart medical and monitoring devices proliferating, security is increasingly top of mind for IT and information security leaders. On the one hand, all these new connected devices and users increases the potential number of attack
Recently the National Cyber Security Centre (NSCS) warned of increasing number of ransomware attacks in the education sector. This may be in part to the shift to online learning – many schools and colleges quickly had to provide email mailboxes to access the online curriculum. Ransomware is malicious code typically spread through email, which encrypts
Today, one of our engineers is heading to Plymouth armed with a Fortigate to kick off a Cyber Threat Assessment for a customer in the Education sector. What’s a cyber threat assessment? The cyber threat assessment (CTAP) is one of the tools we have in our kitbag to help our customers determine how well their
A robust data backup strategy is a fundamental part of any IT manager’s plan and the 3-2-1 rule is the key to safely protecting data. What is the 3-2-1 rule for data backup? Quite simply this is: 3 copies of your data 2 different types of media 1 off-site copy So, let’s look at each
Already a FortiAnalyzer user?  You should consider the Indicators of Compromise subscription from Fortinet: Indicators of compromise (IOCs) are artifacts observed on a network or in an operations system where we have a high confidence that said artifact indicates a computer intrusion. FortiGuard’s IOC service helps security analysts identify risky devices and users based on