Cloud Backup

We`re just sending through your details

Please give us a few moments whilst we get your account ready.


Why Anti-virus Software Doesn’t Always Guarantee Safety

Why Anti-virus Software Doesn’t Always Guarantee Safety

posted in Product ● 16 Feb 2017

When we say “anti-virus” software we really mean anti-malware. Anti-virus software packages nowadays are bundled with numerous malware detection and elimination features to keep your computing environment safe. Safety, regarding malware, is unfortunately a relative term. The traditional practice is that you install your preferred anti-virus softwareon each computer in your business and voila! You are protected from a security breach and a subsequent data loss – almost.

Relatively safe from malware 

The faster the speed of new virus and malware varieties are being developed, the slower the solutions seem to come to light. The reason for this lies in the exponential replication and distribution of several types of malware like worms, Trojan horses and self-perpetuating viruses.
The Microsoft Security Intelligence Report (Volume 17) of mid-2014, indicated an encounter rate as high as 25.9 per cent in Turkey and 28.4 per cent in India. The UK sits at 3.3 per cent of Trojan encounters and 1.1 per cent of worms and viruses. Fortunately, an encounter rate is not the same as an infection rate. Encounters are successfully averted infections.
The people hard at work trying to combat these infections are constantly being put to the test. An independent anti-virus software tester evaluated twenty-three providers and found that most of them had room for improvement when it came to malware removal. Most scored high marks for malicious file detection. The high scorers were Bitdefender, Kaspersky Lab, ESET, AVIRA and Emsisoft. Strangely enough, other popular providers like Avast, McAfee and Trend Micro scored well in file detection but lower in actual malware removal.

Vulnerabilities to be exploited 

Apart from malware actively causing disruption and loss to computer resources and data, there is a more passive contender to deal with. Vulnerabilities. A flaw in the design or programming of a software product can make it vulnerable to exploitation. This exploitation essentially creates backdoors through firewalls, loopholes through security authenticators and blind spots in internet confidentiality.
A vulnerability can only be repaired or protected if it is known which is why the Common Vulnerabilities and Exposures database is open to collaboration across the globe and keeps people informed in these possible exploitations. By the middle of 2014, a third of these disclosures were of high-severity vulnerabilities (an 8-10 out of a score from 1-10). This means that a vulnerability is easily exploited with a high impact if successful.

How to protect yourself 

Coupling a software vulnerability with an automated and aggressive malware attack can bring an infected business to its knees. A Gartner report on worldwide information security predicts that by 2015, nearly 10 per cent of enterprise-level IT security will be delivered in the cloud. This is due to the cost advantage of cloud services and more scalable solutions adding pressure to the market, coupled with increased pressure to comply with Data Protection Act in the UK and the EU’s General Data Protection Regulation.
With this added value to cloud services, it is becoming more feasible to also use it as a data backup storage facility for the purpose of disaster recovery. Traditional backup is on its way out with technologies that allow you to mount a set of backup data as a virtual drive without literally restoring any of it. Data recovery solution providers also mention combining this with a method that restores your data as-and-when you access it. These solutions facilitate an instant resumption of business operations by leveraging your off-site cloud backups thereby providing instant access to it from any location with internet access.

Cyber-attack on The Works is a warning to others

The recent cyber-attack on discount retailer The Works, emphasises the need for organisations of all sizes to invest in ransomware prevention measures.

Continue reading

Redstor Appoints Channel Leader Mike Hanauer as CRO to Spearhead Global Sales Expansion

Reading, April 28, 2022 – Redstor, the cloud-first backup platform of choice for MSPs, today announced the appointment of accomplished channel sales executive Mike Hanauer in a newly created role of Chief Revenue Officer (CRO). Known across the market for his revenue-generating successes with top data protection, recovery and security companies, Hanauer will spearhead global expansion plans for Redstor’s category-leading SaaS platform.

Continue reading

What is the Digital Operational Resilience Act?

The Digital Operations Resilience Act (DORA) is the European Union’s attempt to streamline the third-party risk management process across financial institutions.

Continue reading

Download The Ultimate MSP Growth Guide

  • This field is for validation purposes and should be left unchanged.