All Research Sponsored By:Sophos UK

Ponemon Institute - Seven Tips for Securing Mobile Workers
WHITE PAPER: This paper offers practical guidance on dealing with one of the fastest growing threats to the security of sensitive and confidential information. It is the increasing sophistication and convenience of mobile devices that contribute to both their popularity in the workplace and their risk to an organisation's networks, data and reputation.
Posted: 07 Jun 2011 | Published: 02 May 2011


Security Threat Report: 2010
ANALYST REPORT: The first decade of the 21st century saw a dramatic change in the nature of cybercrime. Hackers have evolved from teenage boys spreading graffiti for kicks and notoriety to organised, financially motivated gangs. Read this white paper for a better understanding of the history of malware and learn to craft a better, safer future for internet users.
Posted: 25 May 2010 | Published: 25 May 2010


Solving Four Primary Security Challenges of Microsoft SharePoint
WHITE PAPER: This white paper examines SharePoint's benefits and risks and recommends best practices for protecting an organisation's digital assets.
Posted: 25 May 2010 | Published: 01 Nov 2009


Threatsaurus: The A-Z of Computer and Data Security Threats
BOOK: Whether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.
Posted: 25 May 2010 | Published: 01 Dec 2009


Presentation Transcript: The Economics of Endpoint Security
PRESENTATION TRANSCRIPT: Check out this presentation transcript to learn about a great endpoint security solution while balancing budgetary requirements.
Posted: 25 Jun 2009 | Published: 24 Jun 2009


Laws, regulations and compliance: Top tips for keeping your data under your Control
WHITE PAPER: The challenges of complying with government, industry and internal regulations designed to protect data is becoming harder and more expensive to manage. This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology can provide the solution.
Posted: 20 Mar 2009 | Published: 01 Dec 2008