banner-blog.jpg

blog

James Locus

Recent Posts

Provide Secure Access for Everyone

Posted by James Locus on Mar 12, 2020

Introducing cloud-based data loss prevention with Menlo Security

 

Safeguarding Internet access is a significant problem for most businesses. In a recent Verizon Study, 6.2 percent of all data breaches result from browser-based attacks. These attacks, including watering-hole and drive-by downloads, can be costly and might lead to massive damage to an organization’s reputation.

Read More

Tags: web isolation, Cloud Proxy, SaaS Cloud Security, Endpoint Access

Secure O365 and Secure G Suite for Your Enterprise

Posted by James Locus on Mar 9, 2020

Bad actors never rest

Creating legitimate-looking fake communications from Google or Microsoft is easy and inexpensive. Novice attackers with little or no coding experience can purchase phishing packs on the dark web that they can customize and then send emails to specific targets based on social engineering intelligence. Free and compromised accounts can also be used as an attack vector , hosting documents that contain malware or links to fake web forms or other malicious sites.

Read More

Tags: email attachments, email threats, malicious links, Isolation Core

Stop Data Exfiltration with Cloud DLP

Posted by James Locus on Mar 5, 2020

Introducing cloud-based data loss prevention with Menlo Security

Sensitive data leaving a company via the web is a major concern for many networks. Bad actors perpetrate 69 percent of external data breach attacks and represent the largest threat to organizations that are not using cloud isolation. For our customers, however, we prevent these attacks.

Because external actors frequently rely on phishing and malware insertion, Menlo Security customers are largely protected through our browser and email isolation. The remaining threat vector then moves to the company’s own employees.

Read More

Tags: Isolation Core, Cloud Proxy, Cloud DLP

Browsers Protected by Menlo Security will now Prioritize the Active Browser Window and Deprioritize the Inactive Ones

Posted by James Locus on Dec 3, 2019

As any office worker knows, browser tabs have a way of multiplying during the work day. Sure - it begins innocently enough flipping back between two news articles. 

 

However, after a while, the tabs will have increased six-fold as the user inevitably gets distracted between YouTube, Spotify, and Salesforce. When done on a large scale, all those inactive tabs can eat up valuable network resources. 

Read More

Tags: Web Security, Secure Web Access, Bandwidth

Connect with us

Lists by Topic

see all

Recent Posts