ESET named as the only Challenger in 2019 Gartner Magic Quadrant for Endpoint Protection Platforms for a second year running!

We believe this positioning further validates our ability to provide an easy-to-use, comprehensive and consistent endpoint protection product and is reflective of our increasing market share in all crucial segments – from Enterprise, SMB to Consumer.

We’ve prided ourselves on our high detection and small footprint, quality of customer service offering and believe this placement in the Gartner Magic Quadrant highlights our dedication to the highest possible service for all ESET clients.

The First Five Things You Should Do With Your New Computer

When you get a new computer from Green Apple IT, we do these for you.

Update Your Antimalware Program

Install Available Windows Updates

Install a File Recovery Program

Sign Up for an Online Backup Service

Uninstall Programs You Don’t Want

Read more:
https://www.lifewire.com/first-things-you-should-do-with-your-new-computer-2625779

New Android Malware for Banking Apps steal passwords by recording screens

With people’s security consciousness skewed towards the personal computer, cybercriminals are now turning to Android malware for financial fraud. Last year, Anubis banking trojan made headlines after getting onto Android devices through infected downloads from the Google Play Store. The banking apps malware would request for permission to use the accessibility service of the victim’s Android device, from which it would steal banking apps login credentials, payment cards, and e-wallets. Anubis was enabled by a “dropper,” BianLian that can sneak into the Play Store and plant malicious apps.

Read more Source: https://www.technowize.com/new-android-malware-for-banking-apps-steal-passwords-by-recording-screens/

Data Analytics and Big Data – What does it mean for me?

Few people can dispute that the amount of data that is generated and disseminated on any given day is increasing daily, with no slowing down in sight. According to business intelligence company, Bernard Marr & Co, every two days the population creates as much data as was recorded from the beginning of time until the year 2000.

With this continuing increase in data creation, the question remains – where does this data come from? Could this be what is referred to as Big Data? Where does all this data end up going and what purpose does it serve?

Read more Source: https://www.itnewsafrica.com/2018/06/data-analytics-and-big-data-what-does-it-mean-for-me/

More critical Remote Desktop flaws expose Windows systems to hacking

Microsoft finds and fixes multiple RDS and RDP vulnerabilities in Windows, but new research on BlueKeep patch rates suggests many machines could remain exposed.

Read more Source: https://www.itworld.com/article/3431665/more-critical-remote-desktop-flaws-expose-windows-systems-to-hacking.html

When Technology Makes Life Harder

The latest Windows 10 update from Microsoft hasn’t gone smoothly for many users due to a conflict with an outdated driver for Intel’s Rapid Storage Technology. This is somewhat ironic in that RST was designed to improve the performance of storage hardware. Certain versions have slowed the install process, and in some cases the program actually has made installation of the Version 1903 Windows 10 update impossible.

Some users have been able to download a later version of RST and get the update to work, but for many others even that won’t solve the problem. For now the best course of action may be simply to wait and hope the two companies can resolve the conflict.

Read more Source: https://www.technewsworld.com/story/When-Technology-Makes-Life-Harder-86175.html

The top five security threats in cloud computing

Data breaches are at the top of the list of security threats in the cloud, according to a new report released by Cloud Security Alliance.
For the “Top Threats to Cloud Computing: Egregious Eleven” report, 241 industry experts were interviewed and rated 11 salient threats, risks and vulnerabilities in their cloud environments in order of significance.
This is the fourth instalment of the report, which states that data breaches; misconfiguration and inadequate change control; lack of cloud security architecture and strategy; insufficient identity, credential, access and key management; and account hijacking are the top five threats in cloud computing.
Many cloud security issues that featured in the previous “Treacherous 12” report dropped off the list. These include denial-of-service, shared technology vulnerabilities and data loss.

Rad more Source: https://itweb.co.za/content/PmxVEMKX9glqQY85

ESET Internet Security® delivers rock-solid protection

ESET Internet Security® delivers rock-solid protection for everyday web users, built on ESET’s trademark best mix of detection, speed and usability. As well as giving you proven ESET Antivirus, it shields your webcam and helps you bank and pay more safely online.

 

Windows 10 update (and retirement) calendar: Mark these dates

Microsoft is releasing new versions of Windows 10 on a set schedule – and just as regularly retiring older versions from support. Here are all the dates you need to know about through Windows 7’s retirement in 2020 and beyond.

Read more Source: https://www.idginsiderpro.com/article/3234766/windows-10-update-and-retirement-calendar-mark-these-dates.html

Reasons To Backup Your Data

You have probably heard the mantra of “back everything up” – but not everyone does, and furthermore, not everyone is clear on why you should. The fact is, data loss can be a disaster for a business – or even an individual. Here are the top five reasons why you should, indeed, keep regular backups.

Read more Source: https://blog.newcloudnetworks.com/top-5-reasons-to-backup-your-data