reba_wpadmin

About reba_wpadmin

This author has not yet filled in any details.
So far reba_wpadmin has created 20 blog entries.

Newsletter July 24

Rebasoft Partner Newsletter | 17th July 2024 Generate new leads and opportunities with us Rebasoft has compiled the first of a series of three email shots, that will be co-branded for our partners that allows our partners to mail their clients and prospects and help generate new leads and opportunities. Out-of-the-box campiagns can be tailored to each of our valued partners. We are 100% committed to helping our partners to grow and be even more profitable. Please speak to [...]

2024-07-19T07:29:25+00:00July 19, 2024|

You should update your servers now.

A vulnerability has just been discovered in OpenSSH with a CVSS score of 7.0 (High). The National Institute of Standards and Technology (NIST) have said "As a consequence of a successful attack, in the worst case scenario, the attacker may be able to perform a remote code execution (RCE) within unprivileged user running the sshd server" (CVE-2024-6409). OpenSSH is a suite of secure networking utilities based on the SSH protocol and is crucial for secure communication over unsecured networks. It [...]

2024-07-12T12:56:55+00:00July 12, 2024|

DORA – What is it and why should you care?

The Digital Operational Resilience Act (DORA) is an EU regulation that entered into force on 16 January 2023 and will apply as of 17 January 2025. Its goal is to enhance the cyber resilience of the financial sector, ensuring that financial institutions, including banks, investment firms, and insurance companies, can withstand and recover from various types of digital disruptions and cyber threats. What's behind DORA? In February 2016, the world saw it's first cyber bank heist, proving that there was [...]

2024-07-15T13:49:26+00:00July 12, 2024|

Newsletter June 24

Rebasoft Newsletter | 4th June 2024 Rebasoft Hires a New Sales Lead As part of our continued growth, we are pleased to announce that Ash Hussain is joining the Rebasoft team as Sales Director. Ash brings decades of experience in the partner IT security marketplace, having previously led teams in leading VARs, MSPs, and MSSPs. Partners remain at the heart of Rebasoft’s sales strategy. Ash will enhance our partner engagement, partner-led marketing, and joint lead generation efforts. Ash deeply [...]

2024-07-03T15:22:37+00:00July 3, 2024|

NIS2 – Why should you care?

Part of the well known meme: “the EU regulates” comes to mind with the latest directive from the EU. NIS 2. Following hot on the heel of NIS 1, NIS 2 is a directive, rather than a regulation, that encompasses Cyber Security. EU member states need to incorporate the directive into law by 18th October 2024 - which is not far away. The “state” will become more active in reducing the impact cyber risks as society continues to become [...]

2024-06-04T15:28:07+00:00June 4, 2024|

Embracing the Future of Vulnerability Management: Insights for IT Security Leaders 

In the ever-evolving landscape of cybersecurity, the surge in vulnerabilities continues to accelerate, demanding a strategic and adaptive approach from organisations. As a leader responsible for IT security, you understand the critical importance of managing and prioritising vulnerabilities effectively in alignment with your organisational priorities. In this article, we delve into three pivotal trends that are shaping the future of Vulnerability Management and discuss how Rebasoft is at the forefront of addressing these challenges.  Trend 1: Asset Management and [...]

2023-09-04T09:35:16+00:00September 4, 2023|

Press Release: The Future is Asset Based Vulnerability Management

Rebasoft, a UK systems developer, is extending its real-time, agent-less cybersecurity platform with integrated vulnerability management. This integration of vulnerability management with real-time asset management enables small and medium-sized businesses to improve their cybersecurity without the high costs and complexity associated with traditional systems. Rebasoft's asset and vulnerability solution provides comprehensive coverage for the entire IT infrastructure without installing agents, including endpoints, network devices, infrastructure, and IoT devices. This agentless approach simplifies the installation process and allows businesses to [...]

2023-08-24T11:57:53+00:00August 24, 2023|

Newsletter June 23

Note from the Managing Director – Philip Harragan As we reached the end of May, nearly 7,500 vulnerabilities have already been reported (source: Statista), which means we are on track to surpass the record-breaking number from 2022. Threat actors continued to exploit older vulnerabilities in unpatched systems, causing the IT team’s headache to get bigger and increasingly difficult to manage. So, what core actions can they take to help mitigate the risk posed? Know your assets, know your vulnerabilities. [...]

2024-07-03T15:44:50+00:00June 27, 2023|

IT Hardware, Software & Vulnerability Audit: Not just for Christmas

IT Hardware, Software & Vulnerability Audit: Not just for Christmas This blog explores the concept of IT hardware, software and vulnerability audit. It highlights their crucial role in an organisation's IT security strategy, compliance with regulations, cyber security framework accreditation, and business insurance policies related to cyber security coverage. It emphasises the benefits and outcomes of such audits and argues for adopting real-time, always-on audits as a standard practice for IT teams. Introduction In today's digital landscape, businesses rely heavily [...]

2023-06-07T12:46:41+00:00June 7, 2023|

The Critical Role of Vulnerability Management in Network Security Strategy

The Critical Role of Vulnerability Management in Network Security Strategy   In today's digital landscape, a robust network security is paramount for organisations to protect their sensitive data and maintain customer trust. An effective network security strategy requires a proactive approach that addresses vulnerabilities before they can be exploited. This is where vulnerability management comes into play. In this blog post, we will delve into the importance of vulnerability management in network security and its crucial role in achieving [...]

2023-06-09T11:48:32+00:00June 5, 2023|