Infosec Cloud
Solutions. Services. Training.

November 2014 Update

Infosec Cloud Monthly Newsletter

We aim to provide you with a round-up of our latest offers and essential info to help increase your productivity and keep you secure.

How to steal access to over 500,000 bank accounts

A recently released Proofpoint report provides a rarely seen view inside a Russian cybercrime infrastructure.

Proofpoint security researchers have published an analysis that exposes the inner workings of a cybercrime operation targeting online banking credentials for banks in the United States and Europe.

The cybercrime operation has already actively compromised more than 500,000 PCs, using infected WordPress sites and a well-known banking Trojan to eavesdrop on online banking sessions and steal account login credentials.

These attackers are also using the compromised PCs to offer a sophisticated, paid proxying service to other organized crime groups. This service turns infected PCs into infiltration points for attackers and carriers for an illicit ‘private cloud.’

Details of the report include an attacker’s-eye view of malware control panels, as well as examples of code and techniques that the cybercriminals are using to compromise vulnerable websites and take over the PCs of unsuspecting visitors to legitimate URLs…invisibly and in seconds.

This news is more than a set of abstract statistics.

Click here to download the full report

Office 365 – New Business Plans

Microsoft has released three new Office 365 plans tailored to meet the needs of small and medium-sized businesses, ranging from one to 250 employees.

Not sure which plan is best for you? Click here to see our guide to Office 365 business plans.

We offer flexible, discounted prices, free migration and ongoing support.

Free Online Scan

iScan Online is a data breach prevention platform enabling organisations to proactively identify devices at risk before a data breach occurs.

Try iScan Online by running a free instant vulnerability scan for Laptops and Desktops.

Click here to complete a short form and you will be redirected to the launch scan page.

Attend an Aerohive webinar — claim your free WiFi Access Point.

Top reasons to consider Cloud managed Wi-Fi networking.
Thursday 13th November, 11am BST

Find out how Cloud managed WiFi networking:

– Lowers the budgetary point of entry — moves capex to opex
– Provides centralised, simple provisioning
– No rack space or power consumption in your organisation
– Easier and faster support — can manage from anywhere
– Lets you start small and expand gradually
– Increases network flexibility to provide network services anywhere, on-demand

Register here >>


Uncover the Hidden Malware in Your HTTPS Traffic. See E-Guide >>

A growing vulnerability at the heart of your network traffic.

According to Gartner, 50% of ALL network attacks will hide in SSL by 2017*. SSL Encrypted traffic is pervasive and can improve security of data but it also bypasses most policy enforcement points.

This is creating a significant data security, privacy and compliance risk for businesses. Get up to speed with the Blue Coat Interactive E-guide to Encrypted Traffic Management.

What you will learn:

* How Encrypted traffic is growing exponentially and how it is exploited
* The limitations of current security solutions
* How you can enhance your existing security while preserving privacy and compliance
* Useful recommendations and resources
* Eliminate the SSL Encrypted Traffic Blind Spot

See the E-Guide >>

*"Gartner, Security Leaders Must Address Threats
From Rising SSL Traffic, Jeremy D'Hoinne and Adam Hils,
9 December 2013."

New case study – Tokenless 2FA

Shetland Islands Case Study image

Shetland Islands Council needed a two-factor authentication solution that was quick to implement, easy to use and would become part of the day to day login process of staff.

Taking a tokenless approach has saved the council money and means they do not have to manage a physical token inventory.

Read the full case study

Comodo Endpoint Security Manager 3.0 – Free 600 user/60 day Trial

Comodo’s new CESM 3 platform provides a state-of-the-art anti-malware suite that proactively protects your servers, workstations, laptops and netbooks, while offering advanced, real-time management and control over critical system resources.

– Reduce administrative workload
– Minimise downtime
– Increase User productivity
– Strengthen network security
– Become virus free, guaranteed*

* Comodo is the ONLY Endpoint Security solution on the market that offers a £3000 warranty that you remain 100% virus and malware free.

If your machines are compromised while using the Comodo technology for endpoint protection then Comodo security experts will investigate and will pay up to £3000 for remediation.

Email us about our free swap-out — if you are using an existing technology and want more protection, we will cover the remainder of the remainder of the licence for up to 12 months, as long as you buy a Comodo licence between 12 and 60 months.

If you’d like futher information or would like to discuss your particular requirements with one of the team – please email us at [email protected] or call 01256 379970.


  • Employee GDPR Awareness Training

  •  Identity-as-a-Service (IDaaS) solution

  • Tokenless Strong Authentication (MFA)

  • Next Gen Endpoint Security

  • Enquiry LinkedIn Spiceworks