Insider threats

Research shows businesses see employees and other insiders as the most likely culprits of data theft (ahead of competitors or third parties), so we reveal how it's possible to immediately improve security by completely removing excess privileges without hindering productivity.

Insider threats

Defeating the
inside hacker

Live webinar
The latest webinar in Avecto's 'Know your threats' series puts the focus on malicious and accidental insider attacks.

Register for the webinar
Sam Laiho

Microsoft Vulnerabilities Report 2016

Report
For the fourth consecutive year, we've analyzed the findings of the known vulnerabilities published by Microsoft.

Download the report
Microsoft vulnerabilities report
Social engineering

Social engineering

Social engineering attacks are becoming more common and sophisticated. Figures show the number of phishing sites and associated email traffic increased 250% in the first quarter of 2016, in comparison with the final quarter of the previous year.

We examine some of the most commonly used techniques, including phishing, to give you a better understanding of the current threat and look to the future with expert predictions.

Ransomware

Instances of ransomware are becoming more common, and increasingly costly for the victims. Such has been its impact in recent years that ransomware is now the most profitable malware type in history, generating $209 million for criminals in the first three months of 2016 alone.

Ransomware often requires very little effort on the part of the criminal, and detection-based software is not keeping pace with the growth. We’ve put the focus on the threat, to make sure you’re fully informed about the risks and know how to protect yourself.

Ransomware