Cyber threats to consider this Cyber Security Month

IT Proportal | October 17, 2019

Cyber threats to consider this Cyber Security Month
October marks European Cyber Security Month – an awareness campaign aiming to promote the importance of information security and highlighting the simple steps that can be taken to protect data, whether personal, financial and/or professional. This year, the campaign is centred around cyber-hygiene and how to stay safe with the latest emerging technology. Two focus areas for both individuals and businesses to be aware of are traditional attack methods such as phishing and how it is continuing to take prevalence in the cyberspace. However newer methods of attack, like AI-enabled attacks must be considered as it has the ability to wreak havoc on organisations and even entire nations.

Spotlight

Cybersecurity risk may make headlines, but compliance and operational risk are everyday challenges for organizations across industries. Still, look at risk closely and you’ll see it isn’t always a liability: Used well, it can be an asset too. For four weeks, we’re presenting a series of articles and resources to help you manage risk and apply it to your advantage.

Spotlight

Cybersecurity risk may make headlines, but compliance and operational risk are everyday challenges for organizations across industries. Still, look at risk closely and you’ll see it isn’t always a liability: Used well, it can be an asset too. For four weeks, we’re presenting a series of articles and resources to help you manage risk and apply it to your advantage.

Related News

DATA SECURITY

PDI Brings Leading-Edge Cybersecurity to Convenience and Fuel Retailers with Enhancements to Its XDR Services

PDI | August 18, 2021

Professional Datasolutions, Inc. (PDI), a global provider of leading software for the convenience retail and petroleum wholesale industries, has announced new enhancements to its XDR services offering. The enhancements follow PDI's acquisition of Cybera and ControlScan in December 2020, the creation of the PDI Security Solutions line of business, and the continued integration of security capabilities across the company's solutions portfolio. PDI XDR Complete is a fully managed cybersecurity solution that utilizes extended detection and response capabilities to protect IT systems from advanced threats. This agile monitoring service helps businesses prevent, detect, and respond to cyberthreats 24/7/365, enhancing security without consuming internal resources. With the steadily rising volume of cyberattacks threatening all types of businesses—especially retailers with multiple locations and hybrid workforces—PDI remains vigilant about raising awareness and helping those businesses avoid becoming yet another statistic. Unfortunately, several recent high-profile ransomware attacks have revealed common vulnerabilities that can contribute to increased exposure and business risk. According to Chris Kissel, Research Director of Security and Trust Products at IDC, "Most organizations don't have the internal cybersecurity resources to adequately protect their IT systems and data. With the increased threat of ransomware and other advanced cyberthreats, they're now looking for vendors who can deliver comprehensive solutions such as PDI's managed XDR for C-store businesses. The ability to proactively monitor, detect, and respond to threats is critical to business success." As a PDI customer for over five years, Nate Morgan, IT Manager at Pride Stores, said, "We've seen the impact ransomware can have on other C-Stores. Our focus is on keeping our stores operational 24/7. We do not have the time or IT staff to keep up with the constantly evolving cyberthreats. PDI does a fantastic job of providing the tools and expertise to protect our headquarters and 38 stores. They're watching our backs around the clock to make sure our data and customers are safe." "Faced with today's sophisticated cyberthreats, you must be able to detect threats immediately and take action before they impact your business," said Mark Carl, Chief Security Officer of PDI Security Solutions. "State-of-the art services such as XDR Complete feature 24/7/365 monitoring and leading-edge cybersecurity tools backed by a team of expertly trained professionals. The XDR enhancements are available today as part of our comprehensive family of fully managed security services offerings." About PDI Professional Datasolutions, Inc. (PDI) software helps businesses and brands increase sales, operate more efficiently and securely, and improve critical decision-making. Since 1983, PDI has proudly served the convenience retail and petroleum wholesale industries. Over 1,500 companies, representing more than 200,000 locations worldwide, count on PDI's solutions and expertise to deliver convenience and energy to the world.

Read More

Intent Data in the Age of Data Regulation

DECK 7 | March 23, 2020

Since the implementation of Data Protection Act in 2018, the approach behind the use of data has changed dramatically. Our clients and customers don’t just want a great experience, they also want to make sure they can trust us. Tweet This! And it makes perfect sense in the present time and space. But as data is considered a key factor in positive customer experience, the U.S. brands and agencies have found it to be increasingly complicated to earn customer trust while remaining compliant. In an article by John Snyder, CEO at Grapeshot, for Adexchanger, he says that the GDPR will remove 75% of third-party data and what’s left will be more expensive. This has caused the power dynamic between brands and agencies to evolve over time.

Read More

DATA SECURITY

NHC Collaborates with Check Point to Launch a Security Offering

NHC | April 08, 2021

New Horizon Communications Corp. (NHC), THE Communications STACK Provider™ supporting SMB and Enterprise organizations in North America with their VoIP, UCaaS, Contact Center, Collaboration, SD-WAN, Security, Network conglomeration and Managed Services needs, has joined forces with Check Point Software Technologies® (CHKP), settled in Tel Aviv Israel, to dispatch NHC's cloud-first Security Suite. In 2020, Gartner® named Check Point Software Technologies a pioneer in their Network Firewalls Magic Quadrant. Also, Check Point's capacity to incorporate sufficiently with NHC's SD-WAN assistance, given upstream by VMware, guided NHC to pick Check Point as their new Network Security accomplice. Designated spot's profound item seat will permit NHC to grow security capacities at the client edge while building up an entrance to the arising Secure Access Service Edge (SASE). "The market scene has been changing so quickly, particularly with a year ago's lockdown and rotate to a dispersed labor force model. We perceived rapidly that our clients require a strong yet adaptable arrangement as it identifies with getting their organization both at the branch level and at their all-inclusive branches, á la their worker homes", said Stephen Gibbs, President and Chief Operation Officer, NHC. "The association we're declaring today permits NHC to jump recklessly into extending our client security balance with a cloud-first arrangement which viably grows our client's edge organization and gets it from dangers both known and obscure. Combined with our Managed Service, STACKGuard, which gives clients perceivability and organization occasion goal, NHC is once more at the front of conglomerating innovation with an emphasis on the client experience." NHC's underlying business sector offering will be centered around getting the client's organization edge through the arrival of the accompanying two items: NHC EdgeSecure™ - A little impression virtual security door with cutting edge danger counteraction that can be midway conveyed and overseen in practically no time, making it an ideal security answer for branch workplaces. EdgeSecure works as a Virtual Network Function (VNF) on our Software-characterized WAN (SD-WAN) branch office machines to give extensive danger avoidance security, zero-day assurance, coordinated conveyance, the board and robotization. Clients have full control of safety strategy and information, fulfilling security and guideline prerequisites. EdgeSecure furnishes associations of all sizes with coordinated, progressed danger counteraction, decreasing intricacy and bringing down the complete expense of possession. Dissimilar to different arrangements that just identify dangers, EdgeSecure forestalls dangers with Check Point's SandBlast Zero-Day Protection. Sandblast Zero-Day is a cloud-facilitated sandboxing innovation where records are immediately isolated and investigated, running in a virtual sandbox to find vindictive conduct before it enters your organization. Malware is identified during the adventure stage, even before programmers can apply avoidance procedures endeavoring to sidestep the sandbox. This inventive arrangement joins cloud-facilitated Edge Gateway-level investigation and OS-level sandboxing to keep contamination from the most hazardous adventures and zero-day and focused on assaults. The arrangement likewise incorporates Application Control and URL Filtering to uphold safe web use. IPS, Anti-Bot and Antivirus security from known dangers, and HTTPS assessment shields from dangers attempting to stow away inside encoded HTTPS channels. Advantages include: • Lightweight VM intended for the WAN edge • 1GB of memory, 1GB of plate, 1 CPU center • Mechanized destinations on-boarding • Cloud the board • Inbound and outbound traffic assessment • Keep up protection and consistence NHC CloudSecure™ - Network security as an assistance, CloudSecure, is a cloud-facilitated network danger counteraction administration offering an upkeep free, thorough, moderate security answer for distant locales and branch workplaces. CloudSecure flawlessly conveys the most recent and most far reaching network safety accessible, shielding branch workplaces from the most recent age of focused and progressed digital dangers. CloudSecure doesn't trouble IT staff with sending or keeping up devoted equipment and supports adding progressed danger avoidance capacities on top of existing switches or SD-WAN organizations. With a straightforward and simple arrangement measure, network traffic from existing SD-WAN edge gadgets are burrowed to an essential cloud-based organization security administration at a close by area. A subsequent association gives repetition. This guarantees branch workplaces stay associated. As an Outbound organization firewall, highlights incorporate Application Control, URL Filtering (SWG), Content Awareness (DLP), IPS, Anti-Bot, Antivirus, SandBlast Threat Emulation (sandboxing) Protocols Inspected All ports, all conventions including SSL/TLS Applications and Websites 110+ classes and granular control of 8,000+ applications Data Types 40+ pre-characterized information types including PCI, PII, HIPAA, source code and that's just the beginning. Advantages include: • Most recent and consistently forward-thinking security • Flexible and versatile • Under 50 milliseconds idleness • Guarantees 99.999% uptime • APIs computerize on-boarding new locales • GRE or IPsec burrows guarantee security ABOUT NHC Established in 2002 as an enlisted public utility, NHC conveys a solitary way to all heritage and complex innovations on a solitary receipt, overseen through a solitary agony of glass, and with smoothed out 100% stateside support groups. There's no compelling reason to go elsewhere for any correspondence arrangement. NHC administration contributions include: • VoIP • Bound together Communications as a Service (UCaaS) • Contact Center as a Service (CCaaS) • Cooperation administrations • Programming Defined Wide Area Network (SD-WAN) • Security as-a-Service (SECaaS) • Programming as-a-Service (SaaS) • Regular Telephone Service (POTS) • Fiber | Broadband • LtE/5G Connectivity • Equipment as-a-Service (HaaS) • Overseen Services NHC tailors every answer for our end client needs through a record the board model spearheaded by our authors. A genome, which remembers for profundity investigation and comprehension of an association's present basic necessities while staying aware of their future development needs. NHC Key Differentiators of NHC include: • Underlay Network conveyance anyplace in North America • Cloud-first Overlay administrations conveyed over any organization • Task Management to scale from administration conveyance to Day-2 help • Straightforward online gateway for a solitary sheet of glass see • Administration investigation and point by point revealing of innovation use • Organization occasion perceivability and control • NHC is THE Communications STACK Provider™ for current SMB and Enterprise organizations, just as provincial Government Agencies.

Read More