Pine Cove Pulse

3 Major Types of Cyber Attacks | Descriptions, Examples, Prevention

Posted by Jace Holyoak

Your organization has either; BEEN attacked, is currently BEING attacked or WILL BE attacked by cyber criminals.  Our mission is to provide you the knowledge, the vision, and the solutions to secure your assets. With cyber-attacks becoming more and more prevelent in recent months (Petya, WannaCry, Google Phish), businesses, schools, and organizations alike are scrambling to find the right way to secure their assets. Not all cyber attacks are created equal and in this post we hope to shed some light on the "Big 3" types of cyber attacks, malware, ransomware, and phishing attacks. We will show you examples of each attack and share with you a few tips from on how you can prepare yourself for the next major cyber attack.  

Major Types of Cyber Attacks



What is it: Malware is a general term for malicious software. Malware includes viruses, worms, Trojans and spyware. Many people use the terms malware and virus interchangeably. Malware is more of an umbrella term used to describe a lot of different cyber attacks. 

How does it work: One example of malware is a trojan horse. A trojan horse is a virus that poses as legitimate software. As you launch the program it may appear to be working in the way you hoped, but what you don't realize is that it is slowly infecting your computer until it loses functionality.  

Prevention: Due to the expansiveness and diversity of malware attacks it's hard to pinpoint one specific way to protect against all malware attacks. Often companies find themselves having to go to multiple security providers to protect from all of the different malware attacks. It is rare to find all of the protection in one place, but with Sophos' Synchronized Security you can be protected from it all. Synchronized Security protects you from your firewall to your endpoint and everything in between. For more information see: Sophos Intercept X Protects against Malware.

Example: Let's say one of your employees or co-workers reads this article and thinks "wow, I better install an anti-virus program!" They go online and find one that looks legitimate only to find out it is infected with a trojan horse virus. You may not realize this at first but you will as the virus slowly duplicates itself until your computer is so slow and infected there is essentially nothing left you can do except hope to copy your data in time before you computer loses functionality.  

Example of Malware



What is it: Ransomware is software that denies you access to your files or computer until you pay a ransom. 

How does it work: Ransomware always requires that the user complete a call to action. A call to action is when someone clicks on an infected link online, or would enable editing on a infected document such as the one shown below.  

Prevention: Keep your system updated. That little notification in the bottom right corner of your screen can be important to protecting yourself from ransomware attacks. Cyber criminals often target users who haven't updated their computers. Another important means of protection is backing up your documents. Make sure you have copies of all your important documents in case you ever get infected and can't retrieve them. Employees will never fail at downloading/opening suspicious content so you should look into a more robust system of protection as well. In the article, Sophos Intercept X Stops Ransomware, we show you Sophos' solution to ransomware protection. 

Example: An employee or co-worker downloads the document below off of a website. If the user were to enable editing on this document, the action would trigger a code which would encrypt valuable documents on your computer and would only give you access to these documents again upon paying a ransom, usually through anyonomis crpytocurrency such as bitcoin. The user is then faced with the decision of losing valuable documents, or essentially writing the cyber criminal their paycheck for an average of a few hundred dollars. 

Ransomware example




What is it: Phishing refers to the process of deceiving recipients into sharing sensitive information with an unknown third party (cyber criminal).

How does it work: A cyber criminal will strategically pick companies susceptible to cyber attacks. It doesn't matter if you are a large corportation, small business, school, or non-profit, they will target you. After picking an organization, the hacker will do some research about the company so they can create a convincing email to send to employees. Once they are ready to send the email, they will make the final touches by either asking for sensitive information or embeding a dangerous link in the email, allowing them to encrypt your documents. After the cyber criminal sends the email, the criminal waits and watches as employees of the targeted organization respond to their email with the sensitive information the criminal is looking for.   

Prevention: Prevention first starts with educating the members of your organization on how phishing works. Encourage employees and co-workers to be suspicious of emails from unfamiliar recipients or emails asking for sensitive information. However, education is not enough. There will always be that one employee who can't help but click on the bait in the email to see what is going on. According to Brandon Vancleeve, Vice President at Pine Cove Consulting,  "30% of recipients open phishing email links." What you really need is a comphrensive cyber-security solution. To learn more about our cyber-security solution, contact us.

Example: Below is a common example of what a phishing email looks like. It usually looks like it is coming from someone you know, however, upon examination of the email address, you may find that it is unfamiliar. The email will direct you to click on a link which will then ask for sensitive information. If an employee continues, the hacker will have access to that information and will then use it to steal your assets. Common phishing attacks lead to loss of extremely personal information such as social security numbers and credit card information.  

Phishing example


These are the major types of cyber attacks you need to know about. Cyber criminals are smart though and are continually coming up with new ways to get their work done. No longer can organizations turn a blind eye to the threat of cyber security. It is time to for organizations to protect themselves and fight back against cyber crime. 

Want more information? View our webinar on Sophos' Synchronized Security solution.

Chromebook vs Laptop | Chromebook Classroom Management

Posted by Jace Holyoak

Chromebook vs Laptop | Chromebook Classroom Management

In our previous post, Chromebook vs Laptop - Which is Right for your Classroomwe gave you a few reasons why Chromebooks are a better choice for your classroom. There is an argument to be had that Chromebooks are not the best option in every case, and we agree that special circumstances might merit your school use laptops. We also acknowledge that laptops allow you to download/install any application and Chromebooks limit you to online based applications. However, given the demands and use of technology in the classroom, we recommend Chromebooks in the classroom for simplicity, durability, and ease of management. Don't only take our word for it though. Chromebooks are gaining more market share year after year. According to FutureSource Consulting, in the K-12 education sector, Chromebooks had a 58% market share in 2016 which was up from a 50% market share in 2015 and a 38% market share in 2014 (see graph below). 

chromebook vs laptop graph     

Why the sudden growth of Chromebooks in education? There are several reasons. Google has heavily invested in the education sector, Chromebooks sell at low costs and with Google's simple to use management console, and Google has really catered their sales package to schools in a very appealing way.

In this post I want to expound a little more on our previous point which was that Chromebook classroom management eases the burdens of the management while meeting all of the demands that are required from the technology. 

Chromebook Classroom Management

Google's chromebook classroom management console

What makes a Chromebook better to manage in the classroom comparable to a laptop? Google has implemented a simple, web-based, Chromebook classroom management console that allows management of 10s, 100s, or even 1000s of Chromebooks with ease. Some of the features of this management console include the ability to track assets, pre-install and block applications, create user groups, control user access, configure network access, and customize user features. Basically, it gives you all the ability you'd need to successfully manage your school's Chromebook technology.

Microsoft and Apple have not yet released a comparable management system for their laptops but both have plans to announce their management systems in the near future. Microsoft is currently working on their version of Google Management Console called 'InTune.' Apple has also tackled the challenge of the Chromebook by releasing several applications including the 'Classroom' app' which connects teachers and students through iPads.

While Microsoft and Apple play catch-up to Google's already proven management console, Google's influence in education has grown tremendously. A lot can change quickly in technology but for now it seems Google's Chromebooks are the best option for your classroom management system.

Final Thoughts

When weighing the pros and cons in the Chromebook vs laptop debate, the ease of Chromebook classroom managment is one of the factors that lifts the Chromebook above the laptop. Google currently has a stronghold in the education industry and, while Microsoft and Apple are innovating new ways to improve their market share, it seems that there is no forseeable change in Google's domination of the education sector.   

Fore more information on technology in the classroom read:

Chromebook vs Laptop - Which is Right for your Classroom?

How Important is Technology in Education? Pine Cove’s Top 10 Reasons

Sign up for a FREE Chromebook consultation for your school district: 


Another Worldwide Ransomware attack, Petya, Spreading Now

Posted by Jace Holyoak

Petya Ransomware Eternal Blue

The Petya ransomware. Courtesy of

(Follow this page as we will keep it updated as we know more)

Just one month after the WannaCry attack in May, the world is now experiencing another worldwide ransomware attack. The WannaCry attack spread quickly across the world as hackers infected hundreds of thousands of computers and demanded a ransom from those infected. This new ransomware attack is expected to have similar, or even greater, damage.

What is Petya ransomware?

Upon infection of the Petya ransomware, the computer that is being used shuts off and restarts. Instead of directing your computer to Windows, as it normally would, it instead directs your computer to a custom screen (see picture above) that demands the user pay a $300 ransom in order to access Windows again. At this point users must decide whether or not to pay the $300 ransom via bitcoin, or lose access to their precious files on their computer. Unlike previous attacks such as WannaCry, this ransomware appears to be infecting the MFT (Master File Table) meaning the Windows Operating System will not be able to locate files and also looks like it's infecting the Master Boot Record, causing issues with the computer booting up properly until the ransom is paid.

Are you safe from the attack?

Pine Cove Consulting’s Chief Information Officer, Dan Russell, warns that the new attack is a threat to all individuals and businesses. “Regarding the latest Ransomware attack, it started over in Europe, but there have already been cases reported here in the U.S.  At the end of the day, everyone has a computer with an IP address, meaning everyone is a target, “said Russell.

The New York Times has reported that there have been confirmed attacks from the Petya ransomware here in the U.S. 

However, users that are equipped with Sophos Next-Generation endpoint protection from Sophos have not experienced anything other than a popup at the bottom of the screen saying that an exploit was prevented. 

How are they accessing my computer?

The ransomware appears to be a form of Petya family which was a prevalent strain of ransomware months back.  It appears to be using the Eternal Blue vulnerability (And a few other techniques) which we saw a month or so ago with WannaCry.

Various media reports suggest the attacker took inspiration from last month’s WannaCry outbreak, which infected hundreds of thousands of computers across the globe by exploiting NSA code leaked by Shadow Brokers. Specifically, it used a variant of the Shadow Brokers’ APT EternalBlue Exploit (CC-1353), which targeted a flaw in the Windows Server Message Block (SMB) service. View Sophos' Naked Security for more information.

What can I do to prevent myself from infection?

“Ransomware and exploits are nothing new, they have been around for many years.  However, as cyber-crime has become more and more monetized, we are starting to see an uptick in cases around the globe and will continue to see these attacks become more prevalent.  Some things you can do to stay protected are, patch your systems as often as possible, backup your files regularly and keep a copy offsite, avoid opening attachments in emails from recipients you don’t know, invest in a Next-Generation endpoint protection, “said Russell.

Follow Pine Cove Consulting on Twitter for more updates:@PINECC 

To view Pine Cove Consulting's press release regarding Petya Ransomware click here: Pine Cove Consulting's Press Release


Update (6/27/2017 3:18pm)

Update (6/27/2017 3:32pm)

Sophos is aware of the Petya ransomware (also known as Petrwrap/Petyawrap) attacks today. "Sophos Intercept X users were proactively protected with no data encrypted, from the moment this new ransomware variant appeared.  Petya ransomware (also known as Petrwrap/Petyawrap)

 Update (6/28/2017 8:15am)

Here is a current list of confirmed industries and specific businesses affected by the Petya attack:


  • Cadbury Chocolate in Australia
  • Chernobyl radiation detection system
  • Kiev metro
  • Ukraine nationwide power company
  • DLA Piper major legal firm
  • Maersk – Danish shipping company, has caused shipping ports worldwide to shut down
  • Russian oil giant Rosneft


  • Most every state agency in Ukraine (government departments, the central bank, a state-run aircraft manufacturer,  the airport in Kiev and  the metro network have all been paralyzed by the hack)
  • Banks – International and regional
  • Airports
  • One U.S. hospital, thus far
  • Pharmaceutical companies
  • Reports world-wide (Ukraine, France, Spain, Australia, and U.S. to name a few, and list is growing)


Update (6/28/2017 8:30am)

•  May have started via corrupted updates on a piece of accountancy software in Ukraine

•  Mainly affected unpatched Windows 7 machines, but once in your network, can attack all computers of all Operating Systems, patched or not

•  Ukraine hardest hit will 80% of all attacks and Italy second with 10% is possible good news for the U.S.  However, the U.S. had several attacks and this is still spreading

See BBC for more information on this update:

•  Wanna Cry had a kill switch that was discovered and helped stop the attack pretty quickly.  Petya has no such kill switch, thus the length of this attack has no finite cap at this time.

•  Petya inflicts more damage on machines than WannaCry as it targets the hard drive rather than individual files. "This attack doesn't just encrypt data for a ransom - but instead hijacks computers and prevents them from working altogether," said Ken Spinner, vice president of Varonis. "The implications of this type of cyberattack spread far and wide: and can affect everything from government to banks to transportation."


Chromebook vs Laptop - Which is Right for your Classroom?

Posted by Jace Holyoak

Chromebooks vs. Laptops

There is no doubt that technology has had a significant impact in education. In our previously published post, How Important is Technology in Education, we highlight some of the reasons why technology is not only unavoidable, but also a good thing. 

Acknowledging that technology is important in education then opens a floodgate of other questions and opportunities. With so many options available, it can get quite confusing. Today, I hope to cut through some of the fog by addressing one the the major questions which is, "should I get Chromebooks or laptops for my classroom?" Let's start by answering the question, what are the differences between Chromebooks and laptops? 

Chromebook vs Laptop

Lenovo chromebook

Lenovo laptop

While Chromebooks look like laptops, they operate very differently. The primary difference is the operating system. According to Google, laptops run on operating systems such as Windows, Linux, or OS X while Chromebooks run off of a faster and simpler operating system, Chrome OS.

Laptops provide a more upgradable and complex computing experience while Chromebooks provide a standard,  what you buy is what you get, experience.  

Laptops can run applications while Chromebooks run solely off of web based programs. 

There are more technical differences, but I think highlighting the differences above suffice for comparing the two for educational reasons.  Pine Cove Consulting recommends our clients use Chromebooks in the classrooms for two main reasons: 

Reason 1: Chromebook Classroom Management

The first and foremost reason we suggest Chromebooks over laptops to our clients, is the fact that they are much easier to manage. When a laptop isn't functioning properly it can be attributed to a lot of different problems due to their complexity. Diagnosing the computer, determining the solution, and implementing a fix all take a lot of time and can be extremely expensive. On the other hand, because of the simplicity of Chromebooks, if something isn't working properly it is almost always because the machine was dropped or physically broken.  This is advantageous for the classroom because it saves time, money and labor. 

Bottom line:  In the Chromebook vs laptop debate, Chromebooks provide for easier management for administration.

For more information about Chromebook Classroom Management visit our recently published article ,Chromebook vs Laptop | Chromebook Classroom Management.

Reason 2: Price

Schools operate on tight budgets. If you work in administration or as a teacher then you don't need me telling you this. If you are looking for ways to cut back costs, then Chromebooks just may be your solution. 

Schools that use laptops in the classroom end up paying anywhere between $600-$1000 per laptop. 

Schools that use Chromebooks in the classroom end up paying between $200-$400 per Chromebook. 

If this initial investment isn't enough to convince you that you're saving money, then check out this tool from Google that can show you the cost difference between chromebooks and laptops for things like hardware maintenance, IT software and infrastructure, management and administrative overhead, and end-user costs. 

If you're currently servicing your students with laptops, you're looking at saving hundreds of thousands of dollars in just a few years by making the switch to Chromebooks. 

Bottom line: Sacrificing the time spent diagnosing technology problems and headaches for your IT specialist, in exchange for saving a lot of money seems like a good bet for your classroom.


You can do a lot with laptops. You can download any app you want and upgrade it anyway you want. Do you really need it though? With Chromebooks you can easily integrate your system into either/both Microsoft 365 or Google Suite while completing every application based program you rely on, in a web based substitute. We recommend schools use Chromebooks in the classroom for simplicity, ease of use, ease of management, and of course, saving money. 

Want to learn more about how Pine Cove Consulting can help your school? Download the Savage Public Schools case study HERE.


Sign up here for your FREE Chromebook consultation for your school district: 


Why Sophos Security? | Pine Cove's Top 5 Reasons

Posted by Jace Holyoak

Pine Cove Consulting has been a Sophos partner for 15 years because we understand the threat of cyber attacks and know that Sophos has the solutions. Together, Pine Cove Consulting and Sophos protect users across the northwest United States from approximately 80,000 cyber attacks a day. In fact, Pine Cove Consulting won Sophos' award for "National Partner of the Year" in 2016. Sophos Partner of the Year AwardSo, you're wondering why Sophos Security? Why is cyber security important? What types of cyber security are there? Let us give you a few reasons to consider Sophos for all your cyber security needs.

Reason 1: The Threat is Growing

Let's start with a few numbers to mull over:

- More than 70% of cyber attacks target small businesses

- 60% of all small businesses go out of business within 6 months of a cyber attack

 The average cost of a cyber attack on a small business is over $36,000

Don't wait for an attack to happen to you. You can protect yourself now and prevent the damage that harms so many small businesses.

Reason 2: Sophos makes Security Simple

Sophos Security

Sophos' slogan reads "Security made simple." Simplicity is a key feature for each Sophos security user. Sophos provides their users with a central platform that can be used to manage all of your Sophos products from one cloud-based console.

Reason 3: Sophos offers Robust Protection from Threats

While Sophos does provide simplicity in its use, its protection is robust and reliable. You may be familiar with the recent WannaCry ransomware attack or the Google email phishing attack. The world was in panic as precious data was encrypted or stolen by these hackers. Meanwhile, users of Sophos Security were protected and all their data was kept secure. Hackers are becoming more and more sophisticated with their attacks and Sophos is prepared for it all. 

Reason 4: They Protect Everything

Sophos security protects you from your firewall to your server and everything in between. Hackers are constantly finding new ways to attack your organization and what a joy it is to not have to worry about staying up to date on all things security and instead put your trust in the cyber crime fighters at Sophos to do it for you. 

Sophos Synchronized Security

Reason 5: Peace of Mind

As a decision maker for your organization, you've got a lot of things on your mind. Your cyber security doesn't have to be one of them. If you've been in business for a while you probably know someone who has experienced a cyber attack or maybe you've experienced one for yourself. Cyber attacks can destroy any business or organization.  Sophos security gives you peace of mind knowing that your assets are protected from the growing threat of cyber attacks. 

Want more information?

Fill out this form to access a Sophos white paper on their Synchronized Security Solution:


WannaCry Ransomware Attack sends Businesses into Frenzy

Posted by Jace Holyoak


What happened?

"The story of the WannaCry ransomware attack began sometime between 2013 and 2016, when the NSA’s exploit tools were stolen. In August 2016, Shadow Brokers revealed itself, and six months later announced the auctioning of NSA tools it had acquired.

Learning that the exploits targeted Windows SMB, Microsoft released a patch in March. When the outbreak hit two months later, it was clear that organizations and individuals had either neglected to apply the patch or were using outdated versions of Windows."screen-shot-2017-06-06-at-6-00-35-pm.png

"The investigation revealed a three-stage attack, starting with remote code execution and the malware gaining advanced user privileges. From there, the payload was unpacked and executed. Once computers were hijacked, it encrypted documents and displayed ransom notes."screen-shot-2017-06-06-at-6-02-13-pm.png

Lessons Learned from WannaCry:

"James Lyne, Sophos head of security research, offered this advice yesterday at InfoSec:

  • Don’t get distracted by the “big, sexy talks” like government-sponsored attacks and nation-state cybercrime. They are interesting topics to be sure, but …
  • Stay grounded in the opportunistic attacks that target businesses every day, like ransomware and the recent WannaCry outbreak.
  • Focus on the security basics — the simple things like using endpoint security, staying on top of patching and using strong passwords.

That advice could have saved organizations from a lot of pain last month. Paying attention now could help them prepare a much stronger defense against attacks to come."

What can Pine Cove do to protect your business moving forward?

Pine Cove Consulting provides organizations with premier cyber-crime fighting protection through Sophos. Clients who work with Pine Cove to protect their organizations had no issues with this massive ransomware attack. In fact, we help our clients fend off thousands of ransomware attacks every single day. Many companies across the nation are now setting aside money to pay off hackers as part of their budget. We recommend that your organization instead invest in security which can prevent the loss of capital and precious personal data from the beginning. If this is a solution you would like to explore more we would recommend attending our webinar this month on Synchronized Security through Sophos or contacting us online.

Read more at:

Sophos Intercept X Protects against Malware

Posted by Jace Holyoak

Intercept X

"Sophos has made what was a very difficult, if not impossible, task of stopping ransomware very simple and effective with Intercept X.  We have stopped hundreds of ransomware and exploit attacks already, throughout our customer base, with Intercept X." -Dan Russell, Chief Information Officer, Pine Cove Consulting

Stop ransomware with new Sophos Intercept X

Ransomware cost organizations over $1 billion in 2016 alone. Sophos Intercept X gives you the best anti-ransomware protection on the market. It automatically stops ransomware attacks as soon as they’re detected and rolls back damaged files to known and safe states.

A new era of endpoint protection

Sophos Intercept X ushers in a new era of endpoint protection for modern threats. It features signatureless anti-exploit, anti-ransomware, and anti-hacker technology, plus beautiful visual rootcause analysis and advanced malware cleanup. 

Stop zero-day threats before they stop you

Sophos Intercept X gives you unrivaled protection against advanced zero-day threats – with minimal impact on performance. This next-gen endpoint solution features signatureless anti-exploit, anti-ransomware, and anti-hacker technology, plus visual root-cause analysis and advanced malware cleanup.

Take your endpoint protection to a whole new level

Sophos Intercept X gives you unrivaled protection against advanced zero-day threats. No other solution on the market offers so many features in a single package: signatureless anti-exploit, anti-ransomware, and anti-hacker technology; beautiful visual root-cause analysis; and advanced malware cleanup. Sophos Intercept X works alongside endpoint solutions from all leading vendors to extend and enhance your protection.

The easy way to stop complex IT threats

New Sophos Intercept X gives you unrivalled protection from today’s complex, sophisticated attacks. This next-gen endpoint solution lets you stop ransomware, block zero-day threats, remove all lingering traces of malware from your system, and understand attacks with root-cause analysis. It runs alongside endpoint solutions from Sophos and other vendors to provide a powerful additional layer of security.

Save time and money with Sophos Intercept X and Root Cause Analysis

Get to the bottom of complicated attacks fast with the Root Cause Analysis feature found in Sophos Intercept X. See how attacks got in, what they’ve infected, and anything else they’ve touched so you can be sure to thoroughly neutralize them – all with an easy to use, easy to understand interface.

Webinar: Stop the Phish; Protecting your Weakest Link

Posted by Jace Holyoak

Topics: Cyber Security

How important is technology in education?  Let's ask this rural Montana school district.

Posted by Brandon Vancleeve


Lynne Peterson | Savage Public Schools Superintendent


Located in the eastern area of Montana, near the North Dakota border on MT highway 16. Savage is a small, isolated farming community. Savage School District is all too familiar with the technology challenges rural communities face: location, resources, and funding. 

Competing for access to resources, funding and the professionals that can implement, support and manage an idea can be much more difficult for rural communities. This is especially true of all things IT related, as the appeal of city living and compensation often pull homegrown talent away from the communities they grew up in. Pine Cove Consulting recognized this trend at its inception and has strived to partner with and support rural communities, bringing top tier technology so that their students have equal access and exposure to learning opportunities. 

Lynne Peterson took over as the superintendent for Savage School District in 2013, Lynne learned first-hand how far behind her district was. She began looking for solutions and partners to upgrade Savage’s teaching and learning experience.

What are some of challenges you face being the superintendent of a district in a rural community?

“Geographically, we’re in the Bakken oil field and the oil companies snatched up all the techs. We have not had a technology person for probably six years. Previous superintendents came in and thought they had a little bit of tech knowledge which is always dangerous.

How did you hear about PCC?

“I first met Matt at a tech meeting in Sidney where they were talking about the SBAC testing and I knew that there was no way my school could support what was being mandated by the state. He saw the look of panic on my face and set up a meeting.”

What was your first impression of the Pine Cove approach?

“I felt Pine Cove looked at Savage School's challenges, did a needs assessment, and fit a solution to us.”

How did you start this tech overhaul?

“We basically had to start from ground zero. Network cabling services first but Matt had to come to a few board meetings to talk them into it.

How did you fund this project?

“We got the network cabling services done with some oil money and Matt helped me organize my thoughts on a Mill Levy for technology. We passed a ten-year mill tech to cover the Hardware as a Service (HaaS) cost of the endpoints and servers.  It was a lot of help that Matt was a presence here with my board members; walked around with Char, my board chair and had constant dialogue with them. Through the board members, the teachers and the kids expressing their frustrations about how the system was always letting us down and how we could never count on it we got it across that we had out grown our system.”  

How do you feel about Pine Cove service since the install?

“I love it. I have monthly meetings with Brandon Bassett (Pine Cove's head of account management) where I can discuss what is going on.  Brandon is awesome and gets things done.

What would you tell someone who asked about your Pine cove experience?

“Call Pine Cove and sit down and talk to them.  They will take you by the hand and guide you through what you need.


Download the Whole Case Study Here:



Topics: Showcase

Sophos Intercept X stops Ransomware

Posted by Dan Russell

Sophos Intercept X Overview from Sophos on Vimeo.

We are excited for the upcoming launch of Sophos Intercept X, a next generation of endpoint protection for today’s threats.  Intercept X is Sophos’ new signatureless anti-exploit, anti-ransomware, and anti-hacker technology that includes enhanced reporting and visibility (root-cause analytics) as well as advanced malware cleanup.  All of this managed from Sophos Central.

Ransomware has been a hot topic in the Cyber Security world for several years now, costing businesses and organizations hundreds of millions every year.  With the release of Sophos Intercept X, you can stop Ransomware right in its tracks.  As part of Intercept X, Ransomware protection (Cryptoguard) is built in to stop Ransomware attacks as soon as they are detected and roll back any files to their original state if them become encrypted.  

Along with Cryptoguard, Intercept X also has many other exciting and new technologies that include anti-exploit technology that blocks zero-day threats without needing to scan files or the need of signatures/definitions the way it was traditionally done.  Sophos Intercept X also includes deep-cleaning technology, which can track down spyware that traditional Anti-Virus misses and cleans up deeply embedded malware to make remediation extremely simple.   With all this, Sophos has added forensic reporting that traces attacks back to their origin and pinpoints addition infection points while cleaning up the malware and providing guidance for strengthening your organizations security posture.

 Whether you’re a business or school, Sophos Intercept X is a must have add-on to your current Anti-Virus solution.  Regardless of whether you are a Sophos Endpoint customer already, or use a 3rd party Anti-Virus solution, Sophos Intercept X can be installed alongside existing endpoint protection solutions to give you ultimate protection – all with minimal impact to system performance.  Watch the video below to get a first hand look at Intercept X’s Cryptoguard technology in action. 

Watch the Technical Demo:


Topics: security