ITAMSoft Blog

The latest posts about IT Asset Management, Software License Management, ITIL based ITSM, Customer Support, SAM & GDPR

Webinar: Cyber Security Myths and Reality

2018-02-13T16:21:04+01:00

Why focus on potential zero day attacks, when the vast majority of successful attacks use known vulnerabilities?  This short presentation includes a brief analysis of a successful attack on the US Government and then describes a number of common cyber security myths and their real world solutions.  It ends by recommending a standard set of security [...]

Webinar: Cyber Security Myths and Reality2018-02-13T16:21:04+01:00

Webinar: Why Antivirus software is not enough?

2017-11-23T15:01:15+01:00

There was a time when anti-virus software was the height of computer security, especially if you were a Windows user. But the landscape of threats has changed, and we live in a world where new threats like the ransomware “WannaCry” infection and the more recent Ukraine-focused “NotPetya” attack are hot topics. What role does antivirus and [...]

Webinar: Why Antivirus software is not enough?2017-11-23T15:01:15+01:00

How to protect yourself from the Equifax data breach

2017-09-08T21:14:40+02:00

How to protect yourself from the Equifax data breach Equifax has reported that hackers compromised data for up to 143 million US consumers, including Social Security numbers and driver’s license numbers. Equifax is one of the 3 main consumer credit reporting agencies in the US together with TransUnion and Experian. As a result of this breach [...]

How to protect yourself from the Equifax data breach2017-09-08T21:14:40+02:00

Identity Theft and your right to Privacy in a Democracy

2017-08-21T15:49:20+02:00

In a shape of things to come and a follow on effect from Apple removing VPN apps from the App Store in China last week, Russia has just signed into a law a similar ban which takes effect on Nov 1. We expect this will spread to other countries very quickly. While there is no surprise [...]

Identity Theft and your right to Privacy in a Democracy2017-08-21T15:49:20+02:00

Gartner IT Financial, Procurement & Asset Management Summit 2017

2017-08-07T15:07:24+02:00

The Juggling Act: Balancing Cost, Risk and Speed. For today’s digital business, there’s no one size fits all. When assessing risks and opportunities, striking a balance between cost, risk and speed requires asking the right questions of the right stakeholders at the right time. Join leaders in Financial, Procurement, ITAM & Vendor management at this year’s [...]

Gartner IT Financial, Procurement & Asset Management Summit 20172017-08-07T15:07:24+02:00

SAMS Europe 2017 – Increasing SAM Maturity | Reducing Software Costs

2017-07-21T17:13:05+02:00

The 6th annual Software Asset Management Strategies Europe 2017 combines distinguished expert keynotes and interactive world café round tables, private discussion rounds, networking sessions and vendor-free audit debates. SAMS Europe 2017 brings together more than 200 software asset managers and IT procurement managers from Europe’s top companies at the biggest all-European end-user driven networking SAM event [...]

SAMS Europe 2017 – Increasing SAM Maturity | Reducing Software Costs2017-07-21T17:13:05+02:00

Cyber Security Myths & Reality – the case for cyber hygiene

2017-07-03T16:04:10+02:00

Why does the security industry place so much emphasis on stopping zero-day attacks, when the evidence shows that these are rarely if ever used? Belarc's briefing uses this and other cyber security myths to show that the best way to prevent successful attacks from outside the network is to implement good cyber hygiene.

Cyber Security Myths & Reality – the case for cyber hygiene2017-07-03T16:04:10+02:00

Petya cyberattack hits Europe and is quickly spreading

2017-06-28T09:28:02+02:00

On the heels of the recent WannaCry attack, Europe has been hit with a new ransomware variant known as Petya. Ukraine reported ransom demands targeting the government and key infrastructure, and the Danish Maersk conglomerate said many of its systems were down. This ransomware uses both social engineering via email to download the malicious file, either as a ZIP [...]

Petya cyberattack hits Europe and is quickly spreading2017-06-28T09:28:02+02:00

Title

Go to Top