"Securing Your Data, Property, Communications, Profits, and Job with Strong Encryption and Cybersecurity"

COLONEL BILL MARRA | April 26, 2016

article image
"In today's business world each business must know and understand every risk it faces, if it is to be successful and survive. As the users organization and cyberspace evolves, so too must their organization's cyber security Tactics, Techniques, and Procedures (TTPs) shift and refine in order to address evolving threats, threat actors, and new intelligence. TTPs define how their organization handles necessary critical risks such as data and communications. TTPs, methods, and technological defense systems must be maintained to safeguard information, data, communication, and physical security systems from being compromised."

Spotlight

Calsoft Systems

For over two decades, Calsoft Systems has been a leading provider of business technology solutions, specializing in ERP systems implementation for Microsoft Dynamics GP, Microsoft Dynamics NAV and Microsoft Dynamics AX. As a Microsoft Gold Certified partner, Calsoft excels in multi-site ERP implementations, tailored customizations, comprehensive IT support services and a boutique customer experience. Our expertise in the distribution, logistics, manufacturing and travel industries enable our clients to leverage an enterprise system to its fullest potential.

OTHER ARTICLES

Guest Blog: Cyber security guidance for remote working

Article | March 20, 2020

In these challenging times, it’s sad to learn that cyber criminals are only increasing their activity as they look to capitalise on the Covid-19 crisis. With the NCSC (National Cyber Security Centre) issuing warnings of such activity on a daily basis, it’s important that we all work to protect our businesses from the damage of cybercrime. As many of us move to working from home, the opportunity for cyber attacks only increases, so it’s vital that we work together with our IT colleagues to adopt good cyber health practices. If you are working from home, you should only be using a VPN (Virtual Private Network) or a secure home network with strong end-to-end encryption; e.g. Office 365 SSL session. Don’t be tempted to use public wifi, as hackers can position themselves between you and the access point.

Read More

Coronavirus malware roundup: watch out for these scams

Article | March 18, 2020

With so many of us hunting out the latest Covid-19 info, it hasn’t taken long for hackers to take advantage. So first off, a basic hygiene reminder: Don’t download anything or click on any links from unfamiliar sources. This includes coronavirus-related maps, guides and apps. Here’s a closer look at some of the specific threats that have emerged over the last week or so. The DomainTools security research team has uncovered at least one example of a coronavirus-related fake app .The Android app in question was discovered on a newly created domain, (coronavirusapp[.]site). The site prompts users to download an Android App to get access to a coronavirus app tracker, statistical information and heatmap visuals. The app actually contains a previously unseen ransomware application, dubbed CovidLock. On download, the device screen is locked, and the user is hit with a demand for $100 in bitcoin to avoid content erasure.

Read More

Work From Home: Cyber Security During Covid-19

Article | April 14, 2020

COVID-19 has significantly affected individuals and organizations globally. Till this time more than 1.7 million people in 210 countries have bore the brunt of this mysterious virus. While this crisis is unparalleled to the past crises that have shaken the world and had lasting impacts on different businesses, economies and societies but the one domain that had remained resilient through all the past crises and is going solid in COVID-19 as well is Cyber security. While most of the sectors globally have been affected, Cybersecurity’s importance to organizations, consumers and home users have not only remained strong but have been increased drastically.

Read More

How Is Covid-19 Creating Data Breaches?

Article | March 30, 2020

Trevor is working from home for the first time. He loves the freedom and flexibility, but doesn’t read his company’s new BYOD policy. Sadly, he misses the fact that his home PC is not protected with updated security software nor the latest operating system patches. Kelcie’s home PC is faster than the old work laptop that she’s been issued to use during the pandemic. She decides to use a USB stick to transfer large files back and forth between her PCs to speed things up. After a few days, she does all her work on her home PC, using a “safe” virtual desktop app. But unbeknownst to her, there is a keylogger on her home PC.

Read More

Spotlight

Calsoft Systems

For over two decades, Calsoft Systems has been a leading provider of business technology solutions, specializing in ERP systems implementation for Microsoft Dynamics GP, Microsoft Dynamics NAV and Microsoft Dynamics AX. As a Microsoft Gold Certified partner, Calsoft excels in multi-site ERP implementations, tailored customizations, comprehensive IT support services and a boutique customer experience. Our expertise in the distribution, logistics, manufacturing and travel industries enable our clients to leverage an enterprise system to its fullest potential.

Events