MDR Articles

Removing The Speed Limit From Cybersecurity
Removing The Speed Limit From Cybersecurity
  • December 11, 2023
  • Author: William Terdoslavich

The new Sophos Active Adversary Report for Security Practitioners reveals cyber attackers are speeding up their game. They know it takes less time for defenders to uncover their penetrations. To this end, defenders must find ways to slow down attacks, making it harder for the bad guys to encrypt data and demand a king's ransom. 

New Sophos Firewall V20
Advance Active Adversary Defenses With New Sophos Firewall
  • December 4, 2023
  • Author: Alan Strakey

Stay one step ahead of cyberthreats with new Sophos Firewall v20 software. The highly anticipated update introduces Active Threat Response, empowering security teams to automate defensive measures. Discover how Sophos Firewall v20 quickens response time to block attackers from infiltrating the network.

High-Value Targets: Key Takeaways from the Sophos State of Ransomware in Retail 2023 Report
  • November 27, 2023
  • Author: William Terdoslavich

Retailers are appealing targets for ransomware attacks for various reasons. They handle tremendous amounts of money and consumer data, and, like organizations in other sectors, likely have employees lacking cybersecurity training. According to Sophos’ State of Ransomware in Retail 2023 report, over two-thirds of retail organizations were hit by ransomware in the last year, and almost three-quarters of attacks resulted in their data being encrypted.

Guarding Patient Data: Key Takeaways from the Sophos State of Ransomware in Healthcare 2023 Study
Guarding Patient Data: Key Takeaways from the Sophos State of Ransomware in Healthcare 2023 Study
  • November 20, 2023
  • Author: Alan Strakey

The healthcare industry handles large amounts of sensitive patient data, making it a prime target for cyberattacks. Successful encryptions are up despite attacks being down. The recently published Sophos State of Ransomware in Healthcare 2023 report delves into the frequency of attacks, identifying their root causes and showing the costs associated with data recovery.

Related Content