Complying with the Defence Cyber Protection Partnership
The Ministry of Defence requires all suppliers to adhere to the requirements set out in the Defence Cyber Protection Partnership’s (DCPP) Cyber Securi…
Adopting a least privilege approach with Windows 7
In this use case paper, we take a look at Windows 7 challenges in detail and share a real life example of how Avecto's software was effectively deploy…
Achieving regulatory compliance
This paper discusses the concept of layered security for desktop computers; why it’s needed to meet compliance requirements set out by regulatory bodi…
Hear from a hacker: The hidden flaws in Windows
Join Microsoft MVP Sami Laiho as he demonstrates how today's hackers can take advantage of the flaws in Windows technologies to breach your organizati…
Defending against advanced targeted threats with the SANS Critical Controls
In this on-demand webinar led by the SANS Institute, you will learn how combining privilege management, application control and sandboxing results in …
Security secrets - Does Windows 10 change the game?
Learn what's new in Windows 10 and 8.1 and learn from someone else's mistakes! Join Security expert and Microsoft MVP, Paula Januszkiewicz in this ene…
A hacker's guide to ransomware
Join world-renowned independent security expert Paula Januszkiewicz for a hacker's guide to ransomware. In this on-webinar you'll learn about code exe…
Containing the outbreak: The healthcare security pandemic
In this lively webinar Avecto Senior Security Engineer James Maude offers advice to help you avoid becoming a victim of ransomware attack.