Schools need advanced antivirus and security products, but at affordable prices. With threats like ransomware posing a significant risk, even premium traditional antivirus software may be unable to fully protect your network.
Some free or bundled antivirus products will protect devices from common malware. However, it may be possible for new malware (or ‘zero-day’ malware, as it’s often called) to evade it.
We’ve worked closely with Phoenix Software and Sophos to bring schools the market-leading Intercept X solution at a heavily discounted price: save up to 70% and protect your school from £2.32 per device per year.
To stop the widest range of threats, Sophos Intercept X employs a comprehensive defence-in-depth approach to endpoint protection rather than simply relying on one primary security technique.
Using a combination of leading foundational (traditional) and modern (next-gen) techniques, Intercept X integrates the industry’s top-rated malware detection and exploit protection with built-in endpoint detection and response (EDR).
Intercept X blocks all known ransomware. It utilizes behavioural analysis to stop never-before-seen ransomware and boot-record attacks, making it the most advanced anti-ransomware technology available.
Number 1 for Endpoint Protection
Sophos received the highest score for protection accuracy, legitimate accuracy, and total accuracy, noting that “Sophos Intercept X Advanced blocked all of the public and targeted attacks”.
What is Ransomware?
Ransomware is a form of malware that interferes with data on your device, or your device itself. It enables criminals to encrypt or lock your data or your device from a remote location, and then informs you that they will not be unlocked unless you pay money (the “ransom”) for their release. Ransoms are often demanded in the form of cryptocurrency (e.g. Bitcoin) to protect the identity of the criminal.
For more information about ransomware, download the SWGfL Ransomware White Paper here.
Where does Ransomware come from?
The main sources of malware are:
- The Internet: visits to sites containing malicious software, downloading malicious software disguised as something useful and genuine, and downloading files through peer-to-peer networks;
- Email: malware can easily be trafficked through email, often as attachments. Opening or saving attachments can allow the payload to deploy. Email is also the primary attack method for spam and phishing;
- Software vulnerabilities: weaknesses in software (including operating systems, productivity tools, browsers, plug-ins are more) are a common target for criminal attackers;
- Removable storage: removable storage drives (including flash memory (e.g. USB) devices, memory cards and other removable drives) are at increased risk of infection as they can move easily from systems with high levels of protection to systems with low (or no) protection, become infected, and then carry the infection back inside other systems; and
- User action (or inaction): use of weak passwords, sharing of access credentials, clicking on attachments or opening files, and falling victim to ‘social engineering’ by attackers are all userbased vulnerabilities in systems that can be easy to exploit.
Ransomware can infect your device through the same sources that any other malware can come from, but is mainly spread through email.
The SWGfL Password Management & Security Guide contains useful information around creating and managing secure passwords.
Latest Security Articles
Trick or treat – tackling online horror stories
There are some scary sights online, with ghouls and demons lurking in dark corners hoping to steal your information or ruin your day. Proton packs at the ready, it's time to exorcise some digital ghosts.
28th October 2019
The UK Safer Internet Centre Family Summer Challenge
Our resident digital parenting expert Elizabeth Milovidov has put together this Family Summer Challenge as part of our work for the UK Safer Internet Centre.
22nd July 2019
The clock is ticking for Windows 7, Windows Server 2008 and Office 2010
Microsoft officially stops supporting Windows 7 on 14 January 2020. Windows Server 2008 and 2008 R2 also stop on 14 January 2020, and Office 2010 stops on 13 October 2020. If you’re running systems using any of these, there’s still time to act, but you’ll need to act quickly.
18th June 2019
Think. Check. Check again.
1 in 5 British schools and colleges experienced a cyber-attack, with 50% of those being targeted by a phishing scam according to research last year. For those attacked, the loss of data (82%) and the costs involved in putting things right (47%) were the two greatest concerns.
19th February 2019