Category: Endpoint Security


Analysing the Latest Mitre Engenuity EDR/MDR Evaluations: MDR Vendors Compared

The latest Mitre Engenuity ATT&CK® Evaluations for EDR (Endpoint Detection and Response) and MDR (Managed Detection and Response) services have provided critical insights into how well various vendors security offerings compare including the softwares prevention and detection capability, but mo ...Read More →

#cybersecurity #endpoint-security #managed-services #vendors Read More

Cybersecurity Essentials for Small to Medium-sized Businesses

In an era where digital transformation is key to business success, small to medium-sized businesses (SMBs) find themselves both empowered by technology and vulnerable to cyber threats. Cybersecurity is not just a concern for large corporations; it is equally crucial for SMBs. In this blog, we\'l ...Read More →

#data-security #endpoint-security #managed-services #network-security #services #uncategorised Read More

ITB strengthen their Managed Service offering with Bitdefender

At ITB, we utilise our security engineers expertise to provide various levels of managed services for our customers, including basic support contracts through to our MDR Lite service. We can now extend this out to a full MDR service with 24/7x365 coverage, threat hunting and incident response from o ...Read More →

#endpoint-security #security-operations #services #vendors Read More

Back to Cybersecurity Basics – Part 9: Malware Protection

Malware, or malicious software to give it it’s full name is any software that’s sole intention is to cause harm to a computer/network or to use its influence to extract sensitive data or money in the form of cryptocurrency. To protect yourself from Malware, you must first understand what Malw ...Read More →

#endpoint-security #general Read More

Back to Cybersecurity Basics – Part 8: Secure Configuration

For those of you that have gone through the Cyber Essentials scheme, like us, you will know that Secure Configuration is one of the five key controls spoken about by the UK Government in the guidelines. Configuring systems securely at the point of being developed will ensure that vulnerabilities ...Read More →

#endpoint-security #general #risk-management Read More

Back to Cybersecurity Basics – Part 1: Mobile and Home Working

‘Complexity is the enemy of IT Security’, it’s a phrase we hear time and again in this industry and rightly so. With each new way a hacker tries to target an organisation, there seems to be a new product that springs up to protect the network. Now whilst these are very much required, we somet ...Read More →

#endpoint-security #general Read More