Free delivery

McAfee SECURE sites help keep you safe from identity theft, credit card fraud, spyware, spam, viruses and online scams
Dynamic search > > >
UK Sales: 0333 2405667
• SonicWall Specialist
• Expert Advice
• Free next working day delivery if ordered before 4.00pm (Mon-Fri)*
• Live Stock Feed
• Secure Ordering
• No Credit Card Surcharges
• Established 2006

Latest News

by Admin Admin
Check the latest blogs and updates from SonicWall-Sales.

Upgrade your old Firewall for the latest SonicWall Firewall Software

by Admin Admin

Choosing the right firewall for you and your business is by no means an easy task. There’s not only a lot of people, so a lot of opinions to take into consideration, but there is also what is best for your business, your systems and network, your previous history with firewalls, and what has worked well and not so well for you and your networks.

Ultimately you want to prevent cyberattacks from happening full stop. So, having a firewall and sandbox in place that works with your current networks and doesn’t affect performance and your business operations in any way, shape, or form is ideal.

Latest Sonicwall Firewall

Ideally, you would like to control your entire system and platform from one single view. Accessible from anywhere, using an end-to-end platform that offers you a high-class solution all at the most competitive price!

Sounds like a lot to ask for right?

Not with SonicWall Firewall Software.

Offering you a cybersecurity platform which has the experience and the advanced skills to stop cyberattacks in their tracks. Rest assured that your business data and network systems are in safe and capable hands with a firewall you can trust.

SonicWall Firewall Best Practices

Helping to protect you and your business, always, is what SonicWall firewalls do best.


Because our firewall software offers a layered approach to cybersecurity. A layered approach that can be applied across entire business platforms, protecting you from start to finish. For example, the

Capture Cloud Platform uses real-time detection identifying all and any breaches, helping to prevent threats from occurring across wireless and wired networks, emails, as well as cloud and mobile.

SonicWall firewall is also one of the most highly ranked firewalls when it comes to fitting with the majority of budgets. Achieving the “Recommended” rating by NSS Lab for its innovative firewall solutions, the effectiveness of its security levels, and its value for money.

These firewalls also help with malware through `block until verdict` capabilities and anti-evasion.

Ensuring that even those advanced and more sophisticated malware and cyberattacks can be prevented.

Staying on our toes, the continuing advances in the software developed has allowed for an increased level of security against threats and online attacks that have never been seen before. With Real-Time

Deep Memory Inspection built-in as standard, businesses can now identify and mitigate all memory-based attacks.

Attacks that include Spectre, Meltdown, PortSmash, Foreshadow, corrupt PDFs, and Microsoft Office documents.

From a management side of things and making your reporting life easier, analytics can be carried out in one single view. Providing complete visibility as and when you require, the software is also agile and can manage all SonicWall security packages centrally. Providing greater clarity, at a faster pace and all with much more precision – all from one console.

Decrypting, inspecting, detecting, and mitigating those `hidden` cyber threats can all be carried out through SSL/TLS traffic and SonicWall DPI-SSL scans.

This isn’t always an option with some firewall providers.

But, SonicWall is different.

Providing dependable ransomware protection, protecting against attacks such as Petya, Notpetya, BadRbbit, Cerber, Wannacry, and Nemucod, before they even reach your systems, encrypting your data.

Offering endpoint protection for today's busy commercial environments, SonicWall Capture Client can provide your business with so much more when it comes to cybersecurity.

Protecting your business from cyberattacks should be your number one priority, as when these attacks strike, they can have a disastrous and more far-reaching impact than you can imagine.

For further information on the latest SonicWall firewall software call us today, we’d be happy to help.

Are you aware of the latest phishing attacks threatening your systems?

by Admin Admin

Email security has had to most certainly `up its game` over the years. Staying ahead of malware and ransomware attacks, growing in sophistication while still allowing your business to do what it needs to for it to work.

With reports continually in the news regarding threats and attacks on people’s data and private and confidential information, it's no wonder that SonicWall email security has seen a rise in demand.

latest phishing attacks threatening your computer system

Phishing is now the most common attack carried out by cybercriminals. Becoming more sophisticated in their approach and targeting, these email threats now demand recipients to act. To click on a malicious link, open a corrupt and virus-ridden file, providing personal details so access to information can be stolen, and so much more.

These threats continually try and work their way around email security software. With a recorded 26 million phishing attacks taking place worldwide (according to the 2019 SonicWall Cyber Threat Report), the average SonicWall customer faced a staggering 5,488 phishing attacks alone.

Common Phisher Tactics

As we become better at spotting and blocking unsolicited emails and links, etc., businesses are also now taking the necessary precautions in training staff to be able to detect such malicious threats too.

However, those carrying out the phishing attack are also changing their tactics, reducing the volume of emails they send out and instead, sending much more targeted phishing attacks.

Below, we’ve provided the top 5 tactics phishers will use to steal your identity, deploy malware, infiltrate your systems and networks, and damage your brand.

1. Compromised credentials

Compromised credentials spawn from account takeovers, using ID and password combinations to carry out attacks from the inside. It ultimately involves compromising employees work credentials by launching a credential phishing campaign or worse, by buying these credentials on the Darkweb. These stolen credentials are then used to access certain information, systems, data, etc. In January this year, Troy Hunt, security research, found approximately 773 million email addresses and over 20 million passwords available for sale on Hacker. How long they had been, there is anyone’s guess and is also the scariest part.

2. Fake websites

Malicious URLs are one of the more innovative approaches a cybercriminal can take. Creating phishing websites to gather login details and personal information.

It’s reported that over 1.5 million phishing websites are developed and deployed every month, with the detection of such sites becoming much harder because phishers will use multiple redirections and URL shorteners.

It’s also good to be mindful that some phishing sites even have HTTPS and SSL certificates in place, making it much harder to spot a fake at first glance.

Popular document sharing and collaboration sites are the most targeted. Creating fake login forms and using them as a platform to distribute malicious payloads.

3. Business Email Compromise (BEC)

BEC is a serious scam which targets those businesses working with foreign suppliers, or indeed those businesses who regularly carry out wire transfer payments. In each case email accounts are compromised through social engineering or computer intrusion techniques, conducting unauthorised transfers of funds.

Unfortunately, these types of attacks are difficult to spot and stop because they don’t actively contain any malicious links or corrupt files, rather just another email from a “trusted sender” requesting a transfer in funds.

SonicWall email security software works hard to counteract such attacks, as well as provide teams with the vital signs on how to spot a fake.

4. Targeting of Office 365 Applications

With Office 365 growing as the most popular choice when it comes to a cloud-based email platform, it shouldn't come as much of a surprise that Microsoft is now the most impersonated brand online.

As the Office 365 subscription platform is open to anyone with a credit card, cybercriminals are finding these security features very accessible and easy to target.

5. Corrupt/Malicious Files

Sending a corrupt attachment or PDF is the most popular form for malicious payloads such as ransomware and malware. Taking advantage of people’s trust that PDF files are safe, these new PDF fraud campaigns are increasing at pace.

Email security is your best defence against all and any attacks. Protecting your business, your employees’ credentials, and your reputation and brand all at the same time.

Don’t let phishing attacks threaten how you run and manage your business.

Contact us today to find out how we can help you.

20 proven techniques to improve cybersecurity in the workplace in the long run

by Admin Admin

techniques to improve cybersecurity in the workplace

In 2017 cybercrime affecting businesses rose to a staggering 63%. With 17 million people in Britain targeted by phishing, ransomware, online fraud, and hacking, and an estimated 4.6 million pounds stolen during this period,

Cybercrime report in 2017

can your business afford the critical downtime these cyber threats cause?

Losing confidential and private information is one of the main issues faced by businesses, with breaches occurring due to no formal written internet security policies for employees, as well as a lack of firewall best practices and email security software implementing; businesses are now more exposed than ever.

Below we've provided 20 proven techniques to improve cybersecurity in your workplace, preparing it for now and for the future.

Let’s get started...

  1. Educate your workforce on what cybersecurity actually is.
  2. Trust us, information from the top is allowed.
  3. Set reminders
  4. Review processes / Practices / Culture
  5. Tell it ASAP
  6. It’s everyone job to stay online to stay online
  7. Safeguard your digital growth
  8. Be ready to respond to a digital attack
  9. Value your work
  10. Make a cybersecurity strategy a priority
  11. Make a point about passwords
  12. Install the right software and keep it updated
  13. Always backup your backups!
  14. How private is private if the information isn’t encryptedencrypted
  15. Be careful what you post about yourself and others
  16. Install a firewall for better security
  17. Look for the “s” in HTTPs when online
  18. Learn from past mistakes
  19. Employ a hacker
  20. Stay up to date

1. Educate your workforce on what cybersecurity actually is.

It's naive of us to think that everyone knows and understands all of the different forms of cyber-attacks, what they look like and what they mean. But, why should we, surely, we have our IT departments to take care of all of that?


Your IT teams can only do so much, and what they can't do is stop employees clicking on links they shouldn't because they're unsure, visit sites they shouldn't because they don't know what's appropriate, or worse, sharing information online without using appropriate security encryption methods first.

dangerous sites that could affect your PC

Steps to take to ensure this doesn't sound like your workplace.

  1. Make sure you have IT workplace policies in place, in-depth, and in a language everyone can understand.
  2. Please make sure everyone, and we mean everyone, in the organisation reads these.
  3. Monitor behaviours and explain that as an organisation, you have to stop doing unsafe behaviours just to get a task finished quicker!
  4. Look to create better workflows to combat point 3 and avoid the clunkiness.
  5. Provide constant internet security information in bitesize chunks, as and when appropriate. Employees will follow if they know why.

2. Trust us, information from the top is followed.

Leading by example is a common phrase and one which your cybersecurity protocols should also follow.

Cybercrime protocol

From the CEO to floor staff, everyone needs to be singing from the same security hymn sheet for it to be taken seriously and for it to be taken on board.

Steps for implementation:

  1. Put cybersecurity on the risk management agenda (create a risk management agenda if you don't already have one!)
  2. Filter down your communications and the key highlights from discussions.
  3. Look to designate a security officer to maintain and control the flow of information up and down your businesses lines of hierarchy.

3. Set reminders.

setting reminder for best practice

Not only will all of this combined information be appreciated; it also makes people much more aware of internet security and how they play a vital role.

To help achieve this objective further:

  1. Make sure you schedule in regular communications
  2. Look to set weekly, even monthly reminders, and
  3. Place on team meeting agendas as a regular topic for discussion.

4. Review processes / Practices/ Culture

Reviewing what you currently have in place allows you to make the right and necessary changes to be flexible in your approach to cybersecurity.


  1. Create documents that discuss how to create strong passwords and how to update them.
    Password Guide
  2. Explain how to back up work safely and securely and what systems and software to use.
  3. Explain and show how to avoid malicious links in emails, what appropriate use and behaviour is required on social media, how to manage devices, what apps are ok, and you approve of during work, and how to work remotely, safely, etc.
  4. Review your current processes and look at what you need to incorporate and how best to communicate this to your workforce within your current culture.

5. Tell IT ASAP

Mistakes happen, this is inevitable. Especially as the complexity of phishing attempts grow in sophistication, bypassing even the most robust firewalls put in place. If you do fall victim to a potential attack, don't cover it up. This can only lead to matters getting worse and bigger problems presenting themselves.


  1. Look at what your current culture and processes are for contacting IT.
  2. Identify whom you need to speak to and call them asap.
  3. Provide as much information as possible, and they will provide you with advice over the phone as to the "next steps."

Knowing whom to call and how to inform the right people is the best step in being able to help fix the problem asap.

6. It's everyone's job to stay safe online

It's not just the responsibility of the IT department to keep people safe online, nor is it solely the responsibility of senior management to put the right infrastructures in place too.

Everyone must take responsibility for their role and activity using the internet and web-based applications.

But, do your employees know how to stay safe online?


  1. You need to provide the relevant training, identifying the most common threats such as phishing attacks and ransomware, showing what such things look like, what forms they come in and signs to look out for if you're at all unsure.
    Common online threats
  2. This needs to be backed up with formal policies and,
  3. Regular communications to reinforce what people should be looking for if they think they're PC is under attack.

7. Safeguard your digital growth

Advances in digital technology and innovation can drive growth; however, they can also create bigger opportunities for cybercriminals.


  1. Change business processes to incorporate digital transformation
  2. Secure applications
  3. Manage identities and,
  4. Monitor your suppliers – all on a regular basis.

8. Be ready to respond to a digital attack

In today's digital era, you can't rest on your laurels; you need to be prepared at all times for when a cyber-attack might strike.

Hacker cracking information

  1. Make sure you have the right tools and software in place (software such as SonicWall Firewall, SonicWall email security, and SonicWall online) to protect your business systems.
  2. Look at cyber insurance.
  3. Create a cyber plan, allowing you to cope with costs and deal with any negative impact.
    Cyber insurance

9. Value your work

You need to protect any, and all, information about you, your business, and your work – it has value, just like money, and cybercriminals thrive on this type of information.

Steps to take to protect your most valuable possession include:

  1. Being thoughtful as to where you store, send, and display this information.
  2. Think before you connect, look at wi-fi routers as well as public networks that aren't secure.
  3. Make sure to use strong passwords, and don't connect to unknown or generic wi-fi networks.
  4. If you do access public wi-fi use a VPN and,
  5. Make sure to turn wifi and Bluetooth off when your device is not in use.
    Turning bluetooth and wifi in public or when not in use

10. Make a cybersecurity strategy a priority

No one is invincible to a cyber-attack of some sort. To strengthen your resilience to such attacks:

  1. You need to build cybersecurity into your culture.
  2. Set up regular security strategy meetings.
  3. Form a strategy document that classifies and outlines the data that you handle and the level of security you need to protect it.
  4. Make sure you have the most effective email security software and firewall best practices in place, all appropriate to the sensitivity levels of your data.

11. Make a point about passwords

We've all heard it a hundred times, but we need to reiterate it once more (probably more but at this point just once). Employees need to know and understand the importance of their password choice.

Steps to achieve this

Put password guidance in place which covers:

Password Guidance

  1. how to use a password manager to create strong and unique passwords
  2. why passwords should be changed frequently
  3. why you should never reuse a password
  4. how employees should never use the same password on multiple devices
  5. and please please make sure to emphasize that passwords should never be written down, "somewhere safe."

12. Install the right software and keep it updated

Antivirus software is there for a reason. Protecting businesses against ransomware, trojan horse programs, botnets and more, companies need to be utilising antivirus programmes and add ons to protect from unscrupulous attacks continuously.


  1. Install the right software to your platform, updating this regularly (a great way is to set reminders as a recurring task) and follow your antivirus instructions.

13. Always backup your backups!

Cybercriminals steal your data and keep it hostage until you pay up. It sounds dramatic, but it's true. Data can also be compromised due to natural accidents too such as floods and fire etc. To help make sure your data is backed up safely and securely:

Backing up important files

  1. Instruct a disaster recovery plan identifying the exact steps you would need to follow if your company's data was found to be at risk.
  2. Just because you have the cloud doesn't mean you're all backed up; you need to have a contract in place that provides appropriate backup services.

14. How private is private if the information isn't encrypted?

Encryption is the best way to protect privacy and confidentiality, yet not everyone knows how to use it, set it up, and communicate it throughout the organisation.


  1. Make sure that as an organisation you're using end to end encryption. This is the highest level of encryption for all confidential documents and information.
  2. Information and attachments should be encrypted before they leave your device and remain encrypted until they reach the intended recipient.
  3. Work with your IT department to make sure this level of encryption is standard across all company devices.

15. Be careful what you post about yourself and others

Posting status updates and tweets online can seem harmless at the time, but it is also one of the biggest areas which land people in a whole host of trouble. Opening up you and businesses to being hacked, suffer from identity theft, etc., all because people monitor your activity and what you say online, and then use this information against you in some form or another.

stop sharing your location online

Steps to avoid such adverse events from happening:

  1. Don't leave yourself open; don't announce times and dates when your business will be left unattended, for example!
  2. Don't break NDA's
  3. Don't post personal information about others.

16. Install SonicWall firewall security

You want and need to prevent unauthorised access from a private network, at all times.

Firewalls are the perfect solution to increase your network's security.

However, for them to be effective:

  1. You first need to turn them on or install them as additional security features onto your network's platform.
  2. You can then look to create a set of rules, rules which will allow you to let the software know, what it should allow through its filters and what it should stop, what websites can be accessed and what ones it should block, even setting restrictions on incoming and outgoing emails if you would like.

Good firewalls monitor all incoming and outgoing data, consistently and to a high standard.

consistently and to a high standard

17. Look for the "s" in HTTPs when online

This is not a point that everyone knows about; however, it's an important one to inform workforces, as almost everyone within an office environment will use the web at work. We're also naive to think that this usage is 100% work-related 100% of the time.

Before jumping online and heading onto any old website, you need to:

  1. Look for the padlock icon in the websites address bar – if it doesn't have one the site is unsecured, and your details could be compromised.
  2. Look for the "s" in the HTTPs, if it looks like it's missing the site is again unprotected, and you shouldn't enter any information or details

Using https for site security

18. Learn from past mistakes

Learning from mistakes is the only way we as individuals as well as organisations can move on. Learning from highlighted practices reported in the news as well as competitor information is also essential.

To take heed of past learnings you need:

  1. To conduct a review of the situation that has occurred.
  2. Discuss the event and record and report this as part of your incident response plan.
  3. Make any necessary adjustments, communicating this with the rest of the business appropriately, and making sure you work hand in hand on these adjustments with IT!

19. Employ a hacker

Ok, so a little extreme but you've got to admit, interesting.

Not all hackers are bad and are out to steal your data to sell online; some actually want to help the world.

To make sure you find the right hacker, you need to:

  1. Look for what is known as a White Hat Hacker. White hat hackers come on board to combat Black Hat Hackers and ultimately place your company in a position of fighting fire with fire.

Black hat and white hat hacker

20. Stay up to date

Industries are becoming much more aware of cybersecurity, what it means to businesses, as well as what it costs if things go wrong. There is also numerous regulation and standards that companies must meet when it comes to protecting private and confidential information, and processes must be in place to avoid any unnecessary fines.

In this sense it's important:

  1. To stay up to date with:
  • best practices
  • Operators
  • suppliers, and
  • technologies.
  1. Updating your software regularly and being flexible enough to adapt to new tools and technologies as and when they come to market.
  1. Install the right and the best firewall and email security your business needs, and stay protected at all times.


Cybercrime is unfortunately very real. How we protect ourselves and how we protect our businesses is of the utmost importance.

These tips will improve cybersecurity in the workplace in the long run, and we'd encourage you to take at least two tips away immediately to implement into your work practices, of course, we'd love you to implement them all, but let's be realistic and tick two off today!

If you found this list useful and interesting, please feel free to share online.

​The Ultimate Guide on How to protect your PC from computer invaders

by Admin Admin

The Ultimate Guide on How to protect your PC from computer invaders

How to protect your PC from invaders

he internet and being online is one of, if not THE, ultimate resource for everyone in today’s modern and dare we say it, “digital world.”

We use it for everything! To communicate with others, to carry out research, to work, to shop, to play etc, - when it comes to the internet the list could go on and on.

It’s convenient; it’s there at the tip of our fingers, and now with wi-fi hotspots, we’re never really without a connection!

However, we’re also now much more vulnerable to identity theft as well as invasion of privacy.

We leave digital footprints everywhere and putting your data in the wrong place, or the wrong hands can prove extremely costly, to you.

This guide highlights the cyber crimes you need to be aware of, the common challenges that we find ourselves facing daily, and how we can overcome these challenges by making some simple adjustments to how we view and use the internet and its different platforms.

Table of Contents

Protect your PC - You are not safe online

Protect your PC - Attack of the invaders

Protect your PC - Keep your computer safe

Protect your PC - Firewalls

Protect your PC - Anti Virus Software

Protect your PC - Email Security Software

Protect your PC - Advanced internet protection technique

1. You are not safe online!

You are not safe online

Computer invaders aren’t going away; they’re simply changing focus and adapting their malicious developments to target and try to break even the toughest of anti-virus and firewalls!

1a) Common threats

Some of the most dominant and well-known cyber threats currently out there include:

Ransomware and Malware – both used as a tool to carry our targeted threats, infecting computer systems as they go, and costing customers highly.

Data Breaches – still one of the most prominent threats of today – stealing personal information or company-wide information poses a serious threat for fraud and identity theft.

With business data most commonly found to be used for blackmail purposes or indeed to sell on for money.

Distributed Denial of Service Attacks (DDoS) – these threats are driven not just by financial gain but also used to voice ideological, political or just malicious judgement and opinion.

Payment card fraud – be aware of fake companies who introduce themselves at point of sales online to access and abuse certain transactions, profiting from your compromised information.

Crypto jacking – linked with cryptocurrency, crypto jacking attacks aim to exploit a computer users’ bandwidth and processing power to mine for cryptocurrency. Such attacks can cripple a victim’s system by manipulating their processing power.

Phishing emails – the most common form of threats and attacks due to their realism. Phishing emails set out to obtain personal data, hijack accounts, steal identities, carry out malicious activity from your PC and more!

SPAM – spam is often used to gain access to very targeted networks.

1b) Their effects on a PC

The effects all of these threats have on your PC or computer network can be fatal, fatal for the computer.

Depending on the security you have in place, as well as the type of virus/malware, and the expertise of your IT team, will all depend on whether the virus and hack can be contained and removed completely before any further malicious activity is carried out.

Making operating systems run much slower than they should or stop working completely is just one of the effects these cyber crimes can have on a PC system.

That and all of your files can become encrypted and used to access personal or sensitive information, or worse your computer may also be used to carry out the malicious activity without you even knowing it is happening!

Your computer might also crash regularly, continuously show pop up error messages, and create problems when trying to connect to secure networks.

This last point is of high importance for remote workers, using their personal PC’s at home, which might be infected or hacked in some way, to go then on to log in to their workplace’s private network server, can open up more doors for the computer invaders to access!

1c) Staying safe

There are several ways to increase your security online. These include:

Reviewing your online activities – what sites are you shopping on? What content are you posting and where are you posting this? How safe are the sites you are visiting?

Install the latest anti-virus software and firewalls. With free and paid for protection now available, there is no excuse not to protect your PC. (SonicWall online is a great place to help you get started).

Make sure to use a personal private network. Not only will this compliment your anti-virus software by further protecting your privacy online, but it will also help to safeguard passwords, hide IP addresses, and allow you to remain anonymous online.

Be aware of the information you share on social media. Especially Facebook, whose business model is designed on using your personal information for advertising and marketing purposes.

Only use secure shopping sites

Use strong passwords (you will read this point a lot throughout this guide)

Delete or clear your tracking cookies. Deleting your online activity means it’s harder to follow you and collect personal information about you.

2. Attack of the invaders

Atttack of the invaders

With global cybercrime damages predicted to reach $6 billion in costs (annually) by 2021, the online threat is not only real, but it is also continually evolving.

2a) Cybercrime at its worst - stats, history, and challenges to overcome

The second most investigated crime accounting for 50% of crimes in the UK is….Cybercrime.

Hackers are invading PCs on average every 39 seconds!

The number of ransomware families has increased from 30 in 2015 to 98 in 2016 with the demand also increasing from $294 in 2015 to £1,077 in 2016.

Ransomware families increase

Records lost to hacking in 2017 stood at an average of 780,000 per day.

2015/16 saw identity takeover become the fastest growing type of fraud in Australia and New Zealand.

In the past year, nearly 200 million people across 21 different countries experienced some form of cybercrime!

The cost of online crime and activity is real:

  • The cost of data breaches annually now stands at a staggering $2.1 trillion
  • In 2017, the total revenue coaxed out of people and businesses from cybercriminals worldwide stood at $1.5 trillion!
  • $3.8 million, is the cost of data breaches to businesses (on average)
  • $600 billion – the global cost of cybercrime in 2017

Advanced issues found

Challenges come in many shapes and sizes…

Take, for example, the recent hacking of Facebook user accounts. Affecting nearly 50 million users worldwide, over 14 million people had their location and search history exposed for all to see!

On this occasion users of the site did nothing wrong and nor was there anything they could do to stop or pre-empt this from happening (besides not having a Facebook account at all), because the hackers behind the security breach took advantage of a Facebook privacy feature, leveraging it to steal digital “tokens”, which would provide them with full access to user’s accounts.

Now, as one of the largest breaches in Facebook's history, engineers for the firm got to work to fix the hack and advised a further 40 million additional users to log out of their accounts as a precaution. Logging out and logging back in, allowed Facebook to reset users’ access tokens, protecting their accounts.

Further investigations are still ongoing to the extent of how these “bugs” can be rectified.

This type of breach is not uncommon as we look further into cybercrime and in particular. WikiLeaks, who released over 8,000 CIA documents (of course classified) in 2017 and the same year, a team of hackers also released a series of sensitive emails from French Presidential candidate Emmanuel Macron.

Mobile platforms are acting as the fastest growing target areas for hackers, with 60% of online fraud carried out through mobile platforms and 80% of mobile fraud carried out through mobile apps.

These attacks are not only real, but they’re big!

3. Keep your computer safe

Keep your computer safe

With the severity of online threats at an all-time high, we’ve compiled a list of top tips on how to protect you and your PC from computer invaders.

Without needing to install a thing:

  • Avoid sites which you don’t trust or don’t look 100% genuine
  • Don’t open emails from unknown/not trusted senders
  • Don’t open attachments from just anyone!
  • Take your passwords more seriously! With more than 60% of people using the same password across multiple sites, make sure you use longer passwords, with a combination of characters, numbers, and upper and lower case, etc. Avoid obvious ones such as children’s names or birthdays!
  • Check your security settings in your browser. Reviewing and setting these at the level that you need and want, you can tell websites not to track your movements and location, and you can block pop-ups and malicious irrelevant ads, etc.
  • Network security – disabling autorun on Windows, for example, can stop up to 50% of malware threats!
  • Wi-Fi security at home – make sure to change your routers default settings by enabling a non-default password and network name.
  • Wi-Fi security, public – disable sharing and make sure to use a Virtual Private Network (VPN), conceal your IP address and secure your data by encrypting your internet traffic.

The need for software installation:

  • Install the right firewalls and anti-virus software depending on your needs and configuration settings required. Also, make sure to keep your firewall turned on!
  • Keep your windows operating system up to date, checking for the latest security updates and patches available (make sure windows automatic update is switched on too).
  • Install anti-virus and anti-spyware software. Providing real-time protection, helping to identify and block any unwanted mail and threats.
  • Backup your folders regularly, look to invest in cloud software or external hard drives, etc. making sure you have a backup plan if the worst wereto happen.

4. Firewalls


Most firewalls, over the years, have been developed in response to a security threat received. With action then taken to develop and produce more advanced firewall technology to stop the threat from happening again.

4a) How they work

When we think of firewalls, we need to think of them as invisible walls that monitor everything which passes through them, in both directions, making the wall solid if a threat is found, not allowing it to pass through.

A firewall will ultimately stop hackers from accessing your computer via Wi-Fi connections and the internet and can help in two ways:

  1. It can allow traffic to pass through, except for data that meets a predetermined set of criteria.
  2. It can stop all traffic unless it meets a predetermined set of criteria.

Firewalls are a piece of security software that monitors “traffic” to and from your PC, acting as the first line of defence when it comes to protecting your data and any sensitive information.

4b) Why you need them

It is this misuse of confidential information and stealing of personal data which is why we need firewalls.

For example, hackers use Trojan viruses and key logging software to access computers and data. Things like passwords, bank details can all be taken and used without you realising for days (if not longer), racking up huge bills in your name as they go.

They can also use your computer against you, taking complete control without you knowing or it affecting the system in any way, and using it to run illicit activities online.

Firewalls and upgraded firewalls like SonicWall firewalls, help to stop this from happening, placing a barrier between you and the hackers.

4c) Best Practice

Firewall best practice when it comes to business is to install complex firewall software to protect the most extensive networks, having a team in place to be able to manage such security measures.

Helping to:

  • Prevent staff from sending certain types of emails or transmitting sensitive information
  • Stop employees accessing certain sites
  • Prevent outside computers accessing computers inside the network
  • Provide a variety of configurations

When it comes to firewalls for personal use, we recommend to, keep it simple. The primary goal is to protect your computer and private network from malicious activity.

5. Anti-virus software

Anti Virus

Anti-virus software, in its purest form, protects against different types of malware, protecting your PC and your personal information.

5a) How they work

Good anti-virus software helps to block ransomware and everyday threats by finding them on your PC and before they reach you directly, pulling them away, locking them in a secure container where they can’t infect your computer!

Anti-virus software is similar to anti-spy software in that it provides real-time protection (if you make sure to keep it updated regularly). Scanning all incoming information and blocking any unwanted information or threats which it detects.

5b) Why you need them

Malware and malicious software attacking our PC are one of the biggest online threats. A virus of any sort can be transmitted via email and over the internet, quickly causing lots of damage to your PC and files held on your system.

Malware in this sense also includes Trojan Horse programmes and spyware; all used to acquire your personal information for identity theft and fraud.

The right antivirus software will help to prevent malware and spyware from getting onto your computer and invading your privacy, but it is important to set up and use sophisticated and secure passwords. Using long passwords including a combination of numbers, special characters, and upper- and lower-case letters is most recommended.

5c) Differences between firewalls and anti-virus software

Both developed to offer you and your PC increased security, the key differences between anti-virus software and firewalls are:

  • Anti-virus can only be implemented in software, whereas a firewall can be both hardware and software.
  • Anti-virus performs continuous scans on the PC in question, detecting, identifying and removing any threats found, whereas firewalls monitor and filter incoming and outgoing information.
  • Anti-virus software can deal with external and internal attacks, while firewalls can only deal with external.
  • You can apply set rules to firewalls for monitoring and securing PC’s and networks; this isn’t possible with an anti-virus which will run regular checks scanning for malicious files or programmes.
  • A firewall can prevent untrusted and unauthorised applications from gaining access to your computer and networks, but unlike antivirus, it does not perform detection, identification, and removal.

6. Email Security Software

Email Security Software

When it comes to protecting your PC and computer systems, you need to make sure to invest in the right security software for you and your PC. However, you also need to bear in mind the need to defend yourself against all known and emerging viruses and hacks.

6a) Integrated email security software

Attacks are becoming increasingly innovative and varied, and because of this, integrated email protection software should be opted for rather than managing a collection of different software installations.

Making life easier an integrated platform means you can manage, control and contain everything through one application. You can monitor all incoming and outgoing activity quickly and efficiently and you can have a bird’s eye view of the security of your PC.

Managing multiple applications is not only a minefield but because they’re all designed to carry out different tasks and not “talk” to each other, it can make for complicated and slow security processes.

When considering an integrated email security package, look for one that can protect against malware as well as spam, phishing, potential data leaks and more!

The SonicWall email security and sensitive data detection solution can help. Deployed as a virtual appliance or software, this security system offers you flexibility and complete peace of mind that your PC and operating systems are protected.

7. Advanced internet protection technique

Advanced Internet Protection Technique

In this final chapter, we want to let you in on some of our tips and unique techniques that we’ve picked up and implemented over the years to increase PC security.

Tips that we’ve never shared before.

7a) Keep things up to date!

Now before you think, you’ve heard all of this before, and there is nothing left to say on the matter, give us a second!

Yes, when we say “keep things updated”, we’re talking about things such as updating and keeping the latest version of Microsoft - and yes, we know not everyone likes it, but it has upped the level of security it now offers to operating systems, so will help to add another layer of security to your PC.

But, what we also mean is that it’s also important to keep the more uncommon elements like your routers and Java up to date too.

Java is something that most of us don’t really know to update in the first instance, let alone do this regularly, and it is a huge target when it comes to computer invaders, so it’s important to know more.

In your start menu, search for Java, clicking and bringing up the Java Control Panel. Any updates and new updates will then be available by the click of a button in the bottom right-hand corner of the panel.

Within this section, we’d also recommend clicking on the security tab at the top and disabling, the “Enable Java” box.


Because this is notorious for vulnerabilities and opens up more opportunities and threats than adding additional security.

When it comes to routers, keep these up to date by changing passwords asap, and follow this up with disabling WPS, or Wi-Fi Protected Setup.


Because if we’re 100%, honest WPS is really shaky on the security front!

7b) Change your controls

Most computers and PCs will automatically be set up with you as the administrator with admin privileges and the ability to access everything without question.

Herein lies the problem.

In your control panel make sure to switch your privileges from admin to standard.


Because if a virus or piece of malware does accidentally find its way onto your PC, being set up as admin will automatically give the invader the same privileges, and trust us, this is something you definitely don’t want.

7c) Keep some things to yourself!

In an era where social media rules, (an estimated 2.77 billion people from around the world are now considered as social media “users”) we tend to give too much information away about ourselves, our family, and our lives in general.


Let’s keep some things under wraps, as not placing yourself in a vulnerable position will only strengthen your security position when it comes to identity theft and online fraud!

7d) Quickfire tips

Make sure your antivirus software offers real-time protection

Be aware that even the most trusted of websites can be compromised

Back up everything. Using both local and online backup systems, and

Sign out of things before closing everything down!


Computer invaders are not going away but being armed with the right tools and information can keep you and your PC protected.

If you enjoyed reading this guide, please feel free to share and comment below with any questions or insight you might have when it comes to computer invaders, we’d love to hear from you.

Protecting your business with the new SonicWall Capture Cloud Platform

by Admin Admin

SonicWall continuously develops its offer to customers by keeping systems and networks protected at all times and evolving products and systems to offer even greater capabilities.

Best Sonicwall SOHO firewall

After carrying out substantial research into what customers wanted to see more of from the

The platform itself, five areas were identified and focussed on further.

These were:

  1. Could SonicWall help to support and protect businesses who operate cloud applications?
  2. Could the platform open up its target market and work with both medium and small businesses, as well as government agencies – offering more cost-effective network security options.
  3. Can Capture be developed in such a way that it offers even more endpoint protection ability, empowering teams, and administrators?
  4. Is it possible to ensure the smooth running of wireless security? As well as managing better planning and visibility?
  5. With the introduction of an app, could wireless security be expanded? Looking into zero-touch deployments and mesh networking?

A comprehensive and varied range of objectives, but objectives that businesses found necessary and that SonicWall knew it could develop.

Welcome, cloud applications, better-protected networks, endpoints, and protection to all individual data to coincide with this.

With new products and advanced features to the Capture Cloud Platform, please welcome the future of Firewalls

SonicWall SOHO Firewall 250 & TZ350 Firewalls

Classed as the next generation of firewalls, the SonicWall SOHO Firewall helps to consolidate security, performance, and networking. All while keeping the cost of ownership low. Ultimately, you can reduce your costs and save you and your teams’ time through a host of new integrated features. Features such as secure SD-WAN, Zero-Touch Deployment, and auto-provision VPN.

Cloud App Security 2.0

Explicitly designed to support cloud software, this app helps to protect against phishing attacks, email fraud and zero-day threats, all through its advanced threat protection. The software is also sophisticated enough that it can identify and stop destructive Microsoft Office files and PDFs held in cloud applications.

SonicWall Wi-Fi Planner

An easy to use Wi-Fi surveying tool, the SonicWall Wi-Fi planner helps to enhance workforce productivity and user experience due to how you design and deploy your wireless networks better. Taken into account, different office spaces, floor plans, power requirements, building materials, channel width, signal strength, radio bands, and much more, make decisions easier with SonicWall Wi-Fi planner.

SonicWall Wi-Fi Cloud Manager

Simplifying wireless access is what this scalable and centralised management network can support. With troubleshooting abilities across all size networks or locations, the SonicWall Wi-Fi app helps you to monitor your network and is available on iOS and Android. Set up wireless mesh networks and onboard wireless access points much easier and faster with SonicWall Wi-Fi Cloud Manager.

Capture Client 2.0

The SonicWall Capture Client lets you track a threats origin as well as its intended destinations all with advanced endpoint detection and response capabilities. Killing or putting into quarantine such threats and having the ability to roll back endpoints to a last known good state helps you to avoid any potential infections.

SonicWall SonicWave with Wireless Access points, 200 Series

The Wave 2 wireless is not only secure but extremely affordable. Delivering gigabit performance, range, and reliability, you can also use the advanced security settings to provide you with the ultimate user experience. With additional services covering content filtering and capture advanced threat protection sandbox, have complete peace of mind even when firewalls aren’t used.

Email Security 10.0

Now providing layers of protection, SonicWall’s email security includes time-of-click URL protection and attachment sandboxing. All targeted to stop in their tracks attempted phishing attacks, business email compromise, ransomware, and email fraud.

SonicOS 6.5.4

With significant improvements in authentication, network security, and wireless capabilities, the new version of SonicWall’s operating system is ideally matched with the new SonicWall hardware platforms. Some of the highlights include an increase in DPI-SSL connections and providing extensive reporting and logging features.

If you would like to learn about SonicWall and the products available to protect your business check out our website today or call us on 0333 2405667, we’d be happy to help.

June 2019 Updates to AGSS

by Admin Admin

Starting June 1st, 2019 Advanced Gateway Security Suite (AGSS) will receive more entitlements. All firewall hardware bundles including AGSS will receive the new entitlements. Any customer who registers AGSS on or after June 1, 2019 will receive the new entitlements.

AGSS bundles will include Capture Security Center risk meters, firewall management, and 7-day reporting. On top of these offerings, AGSS will add Shadow IT Visibility which is formerly known as Cloud App Security 1.0. Here is a new look at the bundle in the table below, note the new entitlements in bold text:

SOHO and TZ300 are going End of Sale

by Admin Admin

The SonicWall SOHO and TZ300 models are almost out of stock and no more are coming in since we have the SOHO 250 and TZ350.

How to create a professional cold email without going to recipients spam folder - The Ultimate Guide

by Admin Admin

How to create a professional cold email without going to recipients spam folder - The Ultimate Guide

How to create a professional cold email without going to recipients spam folder

At some point in our career lifetime, we have sent out or indeed been sent, a cold email.

Those emails where there is no relationship as such with the sender, and you are introducing yourself for the first time. Cold emails are still to this day, the most effective way for businesses to increase their lead generation.

But, and there is a but, these emails need to get through the numerous security filters and settings that businesses now operate.

Sometimes, you can have the world’s best content inside those emails, but ultimately it comes down to deliverability which will determine whether your email will be a success or failure.

Various factors now must be taken into consideration when sending out cold emails and this guide will demonstrate not only how to create a professional cold email, but how to make sure it doesn’t end up in the recipient’s spam folder!

The Ultimate Guide - A guide to cold emailingThe Ultimate Guide - Cold emailing deliverabilityThe Ultimate Guide - Red flagThe Ultimate Guide - Spam emails

The Ultimate Guide - Your Ultimate Mail Security Guide

The Ultimate Guide - Technical attacks - Viruses

The Ultimate Guide - Email Encryption

Contents Covered

1. A guide to cold emailing

a. How to successfully land in someone’s inbox

b. The most important dos and don’ts for cold emailing

c. Tips for producing compelling content

2. Cold emailing deliverability

d. The cold email checklist everyone needs to know

3. Red flag

e. Need to show them you’re human

f. Avoid similar content

g. Spam filters pay attention to things out of the ordinary

h. No groups, only individuals

4. Spam emails

5. Your ultimate email security guide

6. Technical attacks

i. Viruses

j. Phishing attacks

k. Denial of service

7. Email encryption

l. The benefits

m. Encryption should be...

1a. A guide to cold emailing – how to successfully land in someone’s inbox

There is no definitive way to successfully land in someone’s inbox and make them read your email and then act upon its content.

But, in this chapter we will explore some of the tried and tested tips which can increase your chances of making this cold email a more successful one.

Starting with, make it personal. Most marketers and content writers will emphasise this in all sales approaches; however, to reiterate the point, for a cold email to be successful you must tailor your messaging to your recipient.

Of course, this is harder than usual as you have no relationship with this person or feedback, etc, but it can be done. Research them, check out their LinkedIn profile, what interests them, what news is the following, what articles have they posted themselves, what is it that they want, how do they see the sector in which they work and the specific niche that they are specialised in?

You need to show them that you have put the work in. Make them feel special and not part of a cold emailing campaign where everyone has received the same message. Tell them why you are emailing them as opposed to anyone else, where do they fit in with your thinking etc.

Tell them about yourself. No boasting here, but you need to show them that you’re credible and that they can trust you. Do you have any direct connections or mutual friends, similar groups that you are part of, etc.? The aim here is to make it so you don’t feel like a stranger to them – remember we’re told from a very young age not to talk to strangers, so you need something compelling to change this.

Identify their pain points and give them something they want. Why should they care about your email? What are their pain points, make them appropriate and relevant to your content and the offer that you are providing them.

Keep emails to the point and actionable. Research has shown that short emails are much more likely to be read than long ones and those that request clear, specific action will also receive a higher response rate.

If you have a point in the email, get to it. And if you want the recipient to do something, tell them what that is, try to avoid getting them to choose as this involves thinking and processing, which consumes too much time.

Say thank you. Being appreciative as well as showing a little bit of vulnerability provides recipients with the feeling that they’re a good person if they help. Of course, it also gives them power and status too.

Finally, don’t use templates and write the email as if you were giving a speech. If the email when read aloud doesn’t flow smoothly then change it.

1b. The most important do’s and don’ts for cold emailing

For your email to be perfect 100% of the time, there are a few do’s and don’ts to take into consideration when constructing your approach.


  • Target smartly – don’t just email anyone, focus on whom you want to connect with, building a lead list and an understanding of your audience.
  • Segment! You will be guaranteed to receive a higher click-through rate if your target audience is segmented appropriately, customising your pitch. (Look to segment by industry, title, location, company size, products of interest, etc)
  • Have a compelling subject line. This is the reason why they choose to open it or not. It should convey a fantastic benefit or spark some curiosity. Short to the point and ideally five words and under.
  • Use the right sender name. Make sure to send the email from an actual person, not marketing@ for example; you will receive a much higher click-through when its person led.
  • Split test everything. Test the length of your emails, the Call to Action, colours used, times sent, subject lines, how links are formatted, tone of voice, tracking links and more!


  • Include too many pictures. Look to abide by the 80: 20 rule when it comes to text to picture ratio, especially as spammers are known to hide links in pictures, hence most security filters will reject emails with too many!
  • Rush to close your prospect. Remember they don’t even know you. You need to build up trust and a rapport, dig deep, build a relationship and then go for the sale kill.
  • Send all your cold emails all at once. This will only have them targeted as spam, pacing them at 20-30 second intervals between every send helps to avoid this trap.
  • Forget to follow up. Reports show that 80% of sales require at least five follow-ups after initial contact. However, 92% of sales reps report to give up before then, with the 8% that carry on following up, closing 80% of sales.

Sonic Wall Sales Rep Pie Chart

  • Make follow up emails generic. Make sure to inject a bit of humour where possible and keep things light-hearted, remember you’re looking to build rapport.
  • Track links. Tracking links within emails will increase your chances of hitting peoples spam filters.

1c. Tips for producing compelling content

Content is what sells people, products, places, services and more. It’s what we use to engage audiences with and get them to follow through on what we want them to do. This section looks at some top tips when it comes to creating such compelling content.

Mentioned earlier in this guide, is the point that within cold emails you need to communicate that you understand their pain points, you know what problems they/ there sector is facing, and what you’re going to tell them will help alleviate this.

Reminding them about the problems compels readers to read on, as they find common ground with someone who knows and shares their pain.

In some instances, research on cold email content has shown if you agitate these pain points a little further and then swoop in with a solution, it is much more likely to result in a positive outcome and follow-up call to action.

However, make it their decision. Make sure that they know that they are in charge. For example, “if you would rather not, I fully understand and thank you f

or taking the time to read this email so far” – this type of psychology doubles the chances that they’ll say yes!

Content creation is about telling a story with a successful outcome at the end. You want to grab their attention, engage their interest, build a desire for your products and services – telling them about your big ideas, the proof points you have, the facts, hooking them with a strong Call to Action where you ask them for a direct response.

You will find that the most successful cold emails are fact-packed ones, those that are concise, specific, contain few adjectives and overall spark curiosity.

In a switched-on digital world, no one has time anymore, so you need to make sure you get to the point.

We’re not re-inventing the wheel, but instead using combinations of tried and tested formulas within our business contexts.

2. Cold emailing deliverability

Writing compelling content for an email to be read is one thing. Making sure it is delivered into the intended recipient's inbox is quite another.

With email security higher than ever, how can you ensure your emails are delivered correctly?

Firstly, and one which not many people are aware of it, don’t send the very first cold email using your primary domain. Make sure to purchase a few domains that relate to your primary address, for cold email campaigns, so your primary domain doesn’t become a bigger target for spam filters.

It’s also recommended that you avoid using .com where possible as these are also email addresses that are more likely to be checked by security software.

Secondly, check your email list. When 6-8% of the emails you send, start bouncing, it will affect your overall email deliverability, with email providers assuming that you are a spammer, soon blacklisting you across different platforms (see why we recommended buying alternative domains at the very beginning).

Check the details you have and the data you house, as well as monitor the bounce back rate when you start receiving emails in return.

Thirdly, you can check your deliverability using services such as, working with the results you are then sent and taking on board their recommendations to improve your deliverability chances.

The Cold Emailing Checklist

3. Red Flag

So, what constitutes a red flag when it comes to cold emails? What factors do they raise and how can we overcome them?

3.a. Need to show them you’re human!

This is important, as spam filters and email security software can be so tight that if there is any doubt that your email could be spam, it is trapped in spam filters never to reach its intended destination.

A red flag in this area is when emails are all sent at the same time, without the time lag in between this can show you as a spamming machine rather than a human being.

Make sure to pace your emails with 20-30 seconds between each send. Tools such as Mixmax, Yesware, and Mailshake can all automate sending cold emails, providing recommendations where needed, on how to increase chances of deliverability. (These platforms can also generate sending out emails through your Gmail accounts too).

3b. Avoid similar content

All content within your emails should be unique; however we are prone to hijack funny marketing quotes or commonly used words and phrases in the industries we operate. If you are sending out cold emails similar to content that is already out there or indeed like the content you have already sent (think about your follow up emails), this will be red flagged and end up in spam folders or deleted altogether before even being read.

The key is not to repeat yourself, create unique and compelling content.

3c. Spam filters pay attention to things out of the ordinary

Things like additional links in the text or hidden in pictures. They also raise a red flag to link shortening links.

In this case, it’s important to write links in your email without making them a clickable link, or indeed disable link tracking systems, helping to avoid phishing attacks, so will pass through spam filters much easier.

3d. No groups only individuals

Make sure when checking your email lists there are no group email addresses mixed up in there. Things such as finance@, sales@, etc as emailing these will again raise red flags and report your domain address as spam for any future communications.

4. Spam emails

With reports suggesting that over 281 billion emails were sent in 2018 and approximately 333 billion potentially will be sent in 2022, email plays a big part in society as well as business.

Number of Emails Sent

Knowing how email work is ultimately how we develop our understanding of spam emails as well as being aware of potential threats and IT attacks.

Email is ingrained in how we communicate, sell, inform, develop. Offering us the opportunity to communicate with anyone, anywhere at any time. They are simple in nature, so everyone who encounters them understands how to use them.

However, messages and information are openly exposed to others and just because we can’t physically see it doesn’t mean this exposure isn’t happening.

For example, emails can be intercepted, read, edited or even have viruses and malware placed within them, before being passed on to their final recipient.

For example, public Networks mean just that!

Sending mail via public networks means that an email is visible to anyone. It travels through other people’s servers to get to its destination, and these organisations operating these servers can quickly stop it, do anything with it, and then send it on its merry way.

This is the temptation for hackers; the temptation of knowing what is sent in an email is too much and placing something untoward in the email causing problems to the recipient and potentially the entire business is too inviting.

5. Your ultimate mail security guide

There is a growing threat of hackers, viruses, spam emails, phishing attempts and identity thefts as the number of people online and using email has increased dramatically.

So, how can you secure your business and keep your information safe?

Email security

When it comes to email security software and systems, this is often multi-layered, with several types of security technology now available.

Using things like spam filters, software that can scan email attachments (9 out of 10 viruses that infect a computer and network come from attachments) as well as relying on resources such as; Microsoft exchange server hosted encryption, Sophos PureMessage for Microsoft Exchange (helps to scan all mail), Symantec Mail Security, SonicWall and Websense, to name a few, can all help to increase email security.

Good network security systems

Private network security systems within the business, increase email security as well as check for spam and phishing emails coming in through a secure server.

It’s important to consider introducing instant messaging protection, email spyware protection, personal firewall tools (some of which will come with operating systems and then with add on security suites), as well as identity protection and content blocking, which scans emails and ultimately helps to protect users’ desktops from malicious content and viruses getting into the network systems.

Good communication and training

Communicating and training staff in email security is key. Knowing what to look out for, and the signs of an unsolicited and potential spam email are essential to embedding into the company culture.

Building email policies and best practices to include things such as:

  • Don’t open emails from unreliable sources
  • Don’t click on web links within emails
  • Be careful when clicking on “reply all” within emails, as well as using the “forward” function
  • Make use of the “bcc.”
  • Have strong passwords, which are never shared and updated regularly

Make sure you have the appropriate compliance controls in place so that you meet the legal and regulatory compliance requirements surrounding emails and email security.

6. Technical attacks – Viruses

Viruses come in many forms and from several different sources, affecting computers and systems in different ways. Viruses are a way to install malware or malicious software onto your computer to delete information, steal data and information, even hold information and you hostage!

Time-consuming and annoying, viruses can take a painstaking process for them to be entirely removed from your machines and networks.

The best way to counteract viruses is to include anti-virus filters, filters which remove infected and potentially infected emails from the system before an employee even has a chance to open it, let alone click any links or attachments.

6b. Phishing attacks

Phishing attacks are a way for hackers and spammers to target users to try and get them to hand over and enter personal details. Usually entered onto a fraudulent site, phishing emails are much more sophisticated now than a couple of years ago, looking authentic in appearance and with many passing through email security and anti-virus settings.

It’s important to look at your email filtering services as well as train employees on what to look out for in a phishing email and how to spot a potential phishing attack.

Protecting customers, employees and your business from the latest phishing attacks out there is vital to protecting your personal and company data.

6c. Denial of service

This is independent of human error and designed to overload the company’s mail server with incoming mail and attachments. A DoS attack is both time consuming and an inconvenience, however, if it does happen, it’s important that you base your email security over several resilient data centres.

7. Email Encryption

Email encryption is used to protect sensitive information sent in emails. Encryptions services can help protect both the sender and the recipient and depending on the type of encryption used, it can act as a military guard key coding system, as it is so difficult to break.

7a. Benefits of email encryption

Mitigates risk

Human error is inevitable. Sharing information publicly when it’s a private document, forwarding the wrong email to the wrong person, sharing attachments that shouldn’t be shared – are all damaging in one way or another to your business.

Using encryption software helps to mitigate these risks and problems, as it allows you to control information much more carefully.

Controlling information contained within emails by being able to set time limits before emails automatically expire, having recall functions if emails are sent by mistake, disabling forward options so that emails can’t be passed around, etc.

Controls access

You can control access at each stage of the journey of your email, tracking messaging, showing who has accessed your content, has it been forwarded on and if so who to, etc.

Ultimately you are in control, and you can always remain in control.

Don’t always have to remember

Integrating email encryption into your IT solutions can make sure that employees don’t have to continually remember how to encrypt sensitive information or protect email attachments, as this will automatically be done for them as part of their operating system, helping to protect against a variety of security and compliance risks.

7b. Email encryption should…

  • Be effortless
  • Be universal
  • secure any file attachments
  • transport sensitive information securely
  • remain private!

Without email encryption, your email messages and attachments remain unprotected.


Cold emailing plays a vital role in business development and networking. Producing the right email, with the right information and using the right software approaches can not only make sure it gets through secure spam filters but that it is actually read by the intended recipient.

If you have any questions you'd like to ask, maybe you'd like to share your email security experiences with us, or if you feel something is missing from our guide, we'd love to hear from you! Comment in the box below or email

Online attacks continue to grow

by Admin Admin

Unfortunately, and apologies for being the bearers of bad news, but online attacks aren’t going away anytime soon. In fact, they’re growing! Growing in sophistication and targeting, bypassing weaker security systems and hence having the power to evolve.

Cyber threat reports, like the ones carried out by SonicWall online, have recently shown a staggeringly high increase in ransomware attacks in particular.

Reports show that in the first six months of 2018, 5.99 billion malware attacks were carried out, equating to a whopping 102% increase compared to the same six months in 2017.

Two big-named threats

Ransomware such as WannaCrypt (also known as WannaCry) and variances of this malicious software have added to this increase with this particular ransomware first striking systems in 2017 and playing havoc with networks ever since.

The basis of this ransomware is where the malware encrypts user data and then hides it for ransom until the victim pays.

Unfortunately, threats like this are very real and especially linked with the encryption of data – nothing can be considered safe anymore.

To help counteract such attacks from getting through operating systems in the first place, installing firewall devices, and SonicWall security will help to provide an automatic barrier, filtering out what is “good” and “bad.” Your firewall should act as your first line of defence in setting up any networks and new devices.

One of the biggest online security threats also hitting the headlines has been the emergence of the Meltdown and Spectre vulnerabilities which have impacted multiple CPU vendors.

Meltdown and Spectre vulnerabilities ultimately allowed side-channel attacks that abused operating systems memory to steal user information and confidential files.

SonicWall’s Real Time Deep Memory Inspection technology has been designed to protect businesses and individuals against these Spectre attacks. Looking at what these attacks are trying to achieve, how they are accessing systems and providing the highest level of security within a device from stopping these features getting into your operating systems.

Changing with the times

Online attacks, like everything, change with the times. They follow the latest trends and where people are spending or using money, and these attackers jump on the bandwagon.

An example of this has been the rise in stealing cryptocurrencies. Using stolen information as leverage or hacking into operating systems to build upon this growing trend.

At SonicWall we monitor trends, and we ensure that the SonicWall firewalls also stand up against any new and unusual threats, offering you complete peace of mind that you don’t need a new firewall device every time a new threat is introduced.

It’s also important to be aware that there has been a rise in fake ransomware attacks, where demand is made but no files are encrypted or any data etc. stolen and used.

Fake ransomware means just that; they’re fake. However because not everyone is aware what is fake and what is not and things to look out for to spot a fraud (check out our posts and guides on how to spot a fake) we often don’t realise that if you are a victim of fake ransomware, then your files can be restored. But and there is a but, because most users will likely consider their data to be gone, i.e., they have believed the fake ransomware has encrypted their systems, users will perform a full reinstall, losing everything.

For all fake ransomware attacks have been unsuccessful the threat is still there, and in some cases, the harm is still done if people carry out a full reinstall of their systems.

A different way

A note for organisations is that online threats are also now trying to find a different way in. What we mean by this is that they’re now using non-standard ports which maybe don’t have the same level of security as others, as they are not necessarily thought to carry the same level of risk.

However, over 19% of malware attacks last year came through non-standard ports, so we advise all companies and their IT departments to apply the same level of diligence to these as you do the standard ports in operation.

In 2018 attacks on IoT devices stood at 32.7 million and SonicWall security wants to play its part in bringing these extremely high figures down or at least providing the defence to stop attacks from impacting on people and businesses in the first place.

Thousands of people buy SonicWall firewalls and security devices because of the features and benefits they can provide, the enhanced security they offer and the trusted service they receive from our teams.

Call us today on 0333 2405667 to find out how you can stay protected online.

SonicWall Firewalls take it to the next level 

by Admin Admin

SonicWall Firewalls take it to the next level

Cyber-attacks are not only increasing every day, but they’re also growing in sophistication.

At SonicWall Sales we see these increases on public infrastructures, in the cloud, every day, posing numerous threats and costly fixes!

SonicWall Firewalls take it to the next level

However, when it comes to offering security solutions for the cloud, there is still a lot of work to do.

Work in understanding its infrastructure, understanding how it works with the mobile era, and how we can zone in on these understandings to create the best security software available.

Why is this level of understanding important?

Well, IDC has recently reported that approximately 83% of projects are now virtual and a further 60% of bigger enterprises now use the cloud in some form.

In addition to these statistics, with continuous changes to the cloud, keeping projects and workloads secure has become more challenging than ever before.

But SonicWall firewalls are ready.

Continuously developing security software, SonicWall has recently extended security to the public cloud (enhancing and taking it one step further from the private cloud), providing start to finish security for multiple cloud deployments - all through the SonicWall Network Security virtual (NSv) firewall series.

The benefits of cloud technology are widely known, offering users scalability, greater flexibility and agility, infrastructure consistency and improved business efficiency. And now, with SonicWall NSv, Microsoft Azure and AWS (Amazon Web Services) are to be included in the public cloud environments.

An industry-leading firewall series

The SonicWall NSv series offers users:

  • Application control and intelligence
  • Monitoring in real-time
  • IPS
  • Inspection and decryption
  • Advanced cyber-attack protection
  • Network segmentation and VPN capabilities

All designed and developed to protect Azure and AWS environments.

The NSv is the next generation to the SonicWall hardware firewall, which includes the features that customers like and admire most. Such as the innovative technology - Reassembly-Free Deep Packet Inspection (which is patented), and the Capture Advanced Threat Protection sandbox which provided real-time. Deep Memory Inspection, both designed to stop cyber threats and attacks in their tracks.

If you’re looking to control traffic and get complete transparency across all of your virtual networks and private clouds, then NSv is for you. Providing you with seamless security, enhanced management capabilities, increased performance, reduced operating costs, a drive in innovation, quick placement, and more - NSv makes a move to the cloud safer and more straightforward.

Solutions to cloud security needs

Cloud security is of the utmost importance, and NSv in all of its many models is on hand to address the issues surrounding public cloud data and applications.

Benefits to protecting your public resources and cloud infrastructure include gaining clarity into the virtual world of threat prevention, you can implement security zoning and appropriate policies, and you can be in a stronger position to protect against everyday hackers and threats.

You can also stop service disruptions from happening and maintain the highest levels of security, remaining compliant and risk-free, all without having a negative impact on performance.

SonicWall firewall VPN can be used in VPN deployment, secure connectivity, as well as used to tighten remote access and more.

Make SonicWall NSv THE security choice when it comes to the public cloud.

With patented technologies, the best in the business technological innovation to support the latest developments, and powerful security now extending to the

public cloud, for the best security systems in the market, SonicWall provide it with all.

Note: The date for AWS availability is pending; however, SonicWall NSv is available for Azure public cloud environments now.

At SonicWall Sales, we provide the latest in security software and hardware systems, and we’re always on hand to answer your questions.

Call us today on 0333 2405667 to find out more.

SonicWall firewalls support SD-WAN (Software Defined WAN)

by Admin Admin

The software-defined wide area network (SD-WAN) is a specific application of software-defined networking (SDN) technology applied to WAN connections, which are used to connect enterprise networks – including branch offices and data centers – over large geographic distances.

A WAN might be used, for example, to connect branch offices to a central corporate network, or to connect data centers separated by distance. In the past, these WAN connections often used technology that required special proprietary hardware. The SD-WAN movement seeks to move more of the network control is moved into the “cloud,” using a software approach.

SD-WAN technology allows organizations and enterprises with branch locations to build highly available and higher-performance WANs. By using low-cost internet access (broadband, 3G/4G/LTE, fiber), organizations can cost-effectively replace expensive WAN connection technologies such as MPLS with SD-WAN. SonicWall delivers comprehensive, industry-leading security solutions that simplify SD-WAN deployments.

SonicWall Capture Security Center (CSC) Features

by Admin Admin

What are the feature differences between CSC/Cloud GMS tiers?

Full details at