Apache Log4j Vulnerability Warning
Tuesday, 14 December 2021
You may already be aware that a new Apache vulnerability has been detected which exploits a Java-based logging framework in Apache called Log4j2. Just to be clear this vulnerability is applicable to anything that runs Apache Log4j2 2.14.1 and earlier versions. Many security vendors, such as Fortinet, Cisco, Checkpoint and PaloAlto are creating signatures to
- Published in Cyber Security
The Security vs. Usability Challenge Facing Healthcare Organisations
Tuesday, 19 October 2021
Today’s NHS Trusts face a significant and growing challenge. With physician mobility and BYOD usage on the rise, and new smart medical and monitoring devices proliferating, security is increasingly top of mind for IT and information security leaders. On the one hand, all these new connected devices and users increases the potential number of attack
- Published in Advatek news, Cyber Security, Latest news
How can UK schools, colleges and Universities protect themselves from increasing ransomware attacks by cyber criminals?
Thursday, 14 October 2021
Recently the National Cyber Security Centre (NSCS) warned of increasing number of ransomware attacks in the education sector. This may be in part to the shift to online learning – many schools and colleges quickly had to provide email mailboxes to access the online curriculum. Ransomware is malicious code typically spread through email, which encrypts
- Published in Advatek news, Cyber Security
Cyber Threat Assessment For Education
Thursday, 22 July 2021
Today, one of our engineers is heading to Plymouth armed with a Fortigate to kick off a Cyber Threat Assessment for a customer in the Education sector. What’s a cyber threat assessment? The cyber threat assessment (CTAP) is one of the tools we have in our kitbag to help our customers determine how well their
- Published in Cyber Security
Data Backup: Mastering the golden rule of 3-2-1 Rule
Thursday, 22 July 2021
A robust data backup strategy is a fundamental part of any IT manager’s plan and the 3-2-1 rule is the key to safely protecting data. What is the 3-2-1 rule for data backup? Quite simply this is: 3 copies of your data 2 different types of media 1 off-site copy So, let’s look at each
- Published in Cyber Security, Data Centre
Indicators of Compromise Service
Tuesday, 25 May 2021
Already a FortiAnalyzer user? You should consider the Indicators of Compromise subscription from Fortinet: Indicators of compromise (IOCs) are artifacts observed on a network or in an operations system where we have a high confidence that said artifact indicates a computer intrusion. FortiGuard’s IOC service helps security analysts identify risky devices and users based on
- Published in Cyber Security