Palo Alto Networks - a weapon in the fight against new threats

The catalog of threats that IT system administrators have to take into account has changed significantly in recent years. Attack vectors, against which up to a point could be protected using traditional firewall and anti-virus protection of workstations, have undergone a significant transformation. Criminals quite quickly learned to bypass traditional security measures and developed techniques thanks to which the hijacking and surveillance of an IT system often takes place unnoticed. APT (Advanced Persistent Threat) threats have become very real. Known and high-profile attacks of this type are sometimes detected after months, and sometimes years, when criminals have already extracted all the data from the systems.

Defending against this type of threat using traditional tools is little that ineffective, it creates a false sense of security, which allows intruders to conduct their activities with complete freedom. The lack of appropriate alerts from security systems means that everyone seems to be safe and there is no need to look at it closely. Most serious security incidents happen not in security-deficient environments, but in security-defective environments. Often, as part of handling a security incident, new tools are launched that immediately detect a whole range of threats and generate a large number of alerts, while traditional antivirus systems and firewalls present in the network do not see anything.

Continue ...

How to avoid cybercriminals? - UpGreat training at WZP "Lewiatan"

On May 28 this year. The Wielkopolska Association of Employers Lewiatan invites you to a training entitled "How to avoid cybercriminals?" run by our IT security specialist.

 The training will cover the following issues:

  1. Where is the growing popularity of computer crimes coming from?
  2. Why are the rank and file of the organization the most frequent target of attacks?
  3. What are social engineering techniques and why are they effective and popular?
  4. Examples of social engineering attacks.
  5. Effects of cybercriminals' actions on individuals and organizations.
  6. Security incidents and legal regulations.
  7. What preventive measures should be implemented in the organization?

At the end of the presentation, a link to a more detailed study on security policies and risk analysis will be provided.

Training date: May 28, hours. 16.00–18.30.
Place of training: Wielkopolski Związek Pracatorów Lewiatan, ul. Grunwaldzka 104, local 216, 2nd floor

Registration for members of the Association at the address asystent@wzp.org.pl

We invite!

Report from the meeting dedicated to PaloAlto Networks technologies on April 11, 2019

On April 11, another of our meetings devoted to IT technologies took place. This time, the topic of the business breakfast was security for PaloAlto Networks networks and workstations. The title of the lecture is "PROTECTION AGAINST CYBER CRIME - PALO ALTO NETWORKS SAFETY SOLUTIONS".

O firmie UpGreat - Piotr Flis
NGFW & TRAPS - Marcin Szewczuk

In a relaxed atmosphere, we talked about next-generation firewalls (NGFW) and securing workstations using TRAPS software.

There are presentations at the following links:

Thank you for your presence and we invite you back. Next meeting on June 13 this year. will be devoted to building campus networks with Extreme Networks.