Don’t let size fool you.

Wednesday, November 30th, 2016

smallpower

 

Don’t be fooled by the name–CyBlock Mini Appliance is powerful, comprehensive, and worth every inch of its compactness.

Maintaining visibility throughout your workforce is key to running a secure business today. Don’t settle on just any solution that really doesn’t meet your needs. If you need coverage for a remote office, have limited space either in your server room or in your office, or are struggling with how to keep your business secure with a limited IT budget, Wavecrest has more choices than ever. No matter what business size or industry type, CyBlock Mini Appliance is likely to be just what you have been looking for.

The powerful Mini Appliance provides the comprehensive Web-use security capabilities of CyBlock, including HTTP and HTTPS URL filtering, comprehensive detailed reporting, secure guest Wi-Fi services with captive portal, advanced threat protection, bandwidth management, cloud services management, as well as coverage for non-HTTP activity, e.g., P2P, torrents, IM, and e-mail. Get all of this in one compact and economical package. The general size of a Wi-Fi hub, the Mini allows you to put it in the corner, on your desk, or in that tiny space you have left in your packed server room!

As a cost-effective choice for any business type or size, the robust, yet compact Mini Appliance provides the leading-edge, comprehensive Web-use security capabilities of CyBlock. Designed to fit every business environment, the Mini Appliance can be paired with CyBlock Appliance or deployed on its own, depending on the required Web-use security solution needs.

For more information on CyBlock Mini Appliance or any of our other products, please contact us today!

About Wavecrest Computing

Celebrating 20 years in business, Wavecrest Computing, headquartered in historic downtown Melbourne, FL, has provided commercial business and government clients with reliable, accurate Web-use management and Cloud Access Security Broker products since 1996. Managed Service Providers, IT specialists, HR professionals, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage employee Internet usage — managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest has clients worldwide, including General Electric, Lockheed Martin, Florida Department of Health, Siemens, Department of Homeland Security, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit https://www.wavecrest.net.

CyBlock/Cyfin Release 9.2.7 Now Available

Monday, November 28th, 2016

We recently released new versions of CyBlock and Cyfin. In this release, a new user ID will be added in new installations or accounts to compile machine updates that produce Web traffic. Also, for products that are uninstalled, a product-specific uninstall page will be displayed to allow you to submit feedback to Sales. The enhancements are highlighted below.

  • CyBlock
    • User ID for Machine Updates. The new *$ user ID with full name “machine updates” will handle machine requests for updates that produce Web traffic. Previously, the traffic was displaying in Dashboard charts with a machine name, and in reports, as an IP address. These URLs are grouped as *$ in the VIP group. Click here for more information on machine names.
  • CyBlock Directory Agent, CyBlock Software, and Cyfin
    • Web Site Uninstall Feedback Page. After uninstalling, a product-specific uninstall landing page will be displayed with a feedback section to be completed and submitted as applicable.

There are also corrections in this release. To see the full release notes for your product, visit our Web site or knowledge base. You can upgrade to the latest release by going to the Help – Check for Updates screen in your product.

For additional assistance, please feel free to contact us.

CyBlock/Cyfin Release 9.2.6 Now Available

Monday, November 14th, 2016

In Release 9.2.6, we are pleased to provide the ability to pair multiple cloud accounts in Hybrid deployments extending your local CyBlock policies to employees in multiple regions. Multiple cloud accounts can also be paired with your CyBlock Directory Agent instance to update the groups and IDs information for employees across multiple regions.

Also in this release is the ability to set a different time zone in your cloud account based on where your Web activity is occurring versus the time zone of your cloud instance. For MSP Partners, the time zone can be set for each of your customers. For Hybrid deployments, the time zone can be set for each of your cloud accounts. The enhancements are highlighted below.

  • Multiple CyBlock Hybrid Cloud Accounts
    • Hybrid Configuration. The ability to pair your local CyBlock installation with multiple CyBlock Cloud accounts is now available on the Hybrid Configuration page. Any configuration changes, including policy changes, in your local CyBlock instance are automatically synced with all paired cloud accounts.
    • Data Management. The cloud log file name is now in the format cloudproxy_cloudserver+port_date.txt and is truncated. You can hover over it to view the full name.
    • Real-Time Web Monitor. Your multiple hybrid configurations are displayed in the Data Configuration drop-down field. Monitor the live Web traffic of any cloud account by selecting the associated hybrid configuration.
    • Reporting. Your multiple hybrid configurations are also available for selection in Dashboard charts and in reports allowing you to view the data for any cloud account.
  • Multiple CyBlock Directory Agent Cloud Accounts
    • The ability to pair your CyBlock Directory Agent installation with multiple CyBlock Cloud accounts is now available on the Directory Agent Configuration page. This allows you to synchronize your internal Active Directory with multiple cloud accounts.
    • Any AD configuration changes in CyBlock Directory Agent are automatically synced with all paired cloud accounts.
  • Cloud Web Activity Time Zone
    • Cloud Customers. The time zone in which your organization’s Web activity is occurring can now be set in your CyBlock Cloud account. The default Web activity time zone is the time zone of your cloud instance, but this can be changed. Web activity displayed in the Dashboard charts, reports, and real-time monitors will reflect the time zone that is set for your cloud account.
    • MSP Customers. For MSP Partners, the time zone can be set for each of your customers. Web activity displayed in the Dashboard charts, reports, and real-time monitors will reflect the time zone that is set for that specific customer.
    • Hybrid Deployments. For Hybrid deployments, the time zone can be set for each of your CyBlock Cloud accounts. Reporting is based on your local CyBlock instance time.

There are also corrections in this release. To see the full release notes for your product, visit our Web site or knowledge base. You can upgrade to the latest release by going to the Help – Check for Updates screen in your product.

For additional assistance, please feel free to contact us.

Are Santas taking over your network?

Thursday, November 10th, 2016

Santas on computers at Virgin Megastore

Can you believe that it is almost the end of the year already? A lot has happened for us this year, and it seems to have made the year go even faster. No matter how fast or slow the year went for you, it is time for all of us to think of the holiday shopping season that is coming up.

Every year, it is predicted that more and more of us will be using online shopping to get a good portion of our list taken care of. With time constraints in normal life, your employees are definitely going to sneak in some shopping on their work devices, clogging up your network bandwidth with nonessential traffic–and it probably won’t just be on Cyber Monday!

Don’t experience additional holiday stress. Go ahead and allow your employees a bit of freedom to do some surfing to find the right toy, tie, or TV for their loved ones. But also give yourself, your IT department, and your whole business the gift of knowing your mission-critical business operations come first, with the bandwidth management, filtering, and reporting tools in our CyBlock Employee Web-use Security Solution.

CyBlock will help you and your IT team with:

  • Bandwidth Management
    • Uncover Web activity that can cause network slowdowns.
    • Spot spikes that could indicate excessive data use.
    • Identify which categories have the most visits triggering high bandwidth usage.
    • Pinpoint which bandwidth-intensive sites are being visited, hogging enterprise bandwidth, and potentially posing security risks.
    • Automatically throttle nonessential traffic by content category or group.
    • Stay informed with triggered alerts and real-time monitoring.
  • Web-use Filtering and Reporting
    • Limit the time users are online by the hour and day of the week.
    • Identify risk, and analyze usage of your network resources.
    • Configure policy exceptions for different users and groups.
    • Use white & black lists to restrict or allow access to certain sites.
    • Cover your main office, remote users, and branch offices.
    • Get complete, accurate, actionable, & compliance-ready reports.

Find ways to satisfy all your business and employee needs. Give your employees the gift of online shopping time during this holiday season, while making sure your IT team receives the gift of proactively throttling bandwidth for noncritical applications, getting alerts, and gaining visibility into bandwidth hogs.

About Wavecrest Computing

Celebrating 20 years in business, Wavecrest Computing, headquartered in historic downtown Melbourne, FL, has provided commercial business and government clients with reliable, accurate Web-use management and Cloud Access Security Broker products since 1996. Managed Service Providers, IT specialists, HR professionals, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage employee Internet usage — managing cloud and guest Wi-Fi services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest has clients worldwide, including General Electric, Lockheed Martin, Florida Department of Health, Siemens, Department of Homeland Security, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit https://www.wavecrest.net.

Things That Lie In Wait

Tuesday, November 1st, 2016

crocodile-small

There are many shows on cable today that portray instant recognition of a breach. To repeat what all others in the actual cyber industry say . . . not realistic.

Think of the scenario where an employee opens a file or accesses a malicious Web site. Step one is done. Nothing happens; the employee shrugs his or her shoulders and moves on. Nothing happened, so we are all good, right? Wrong. In reality, malware can happen behind the scenes with no visual effect at all at the time of being infected. The malware is just lying in wait. It either waits for an external signal–a preprogrammed time or until a specific action on the host computer is done. A hacker then would have access to look around, doing nothing noticeable, just checking things out . . . until the time that he finds what he wants.

Six months pass. All of a sudden, systems are breached, potentially causing loss of controls, data, or financial information. And no one knows where or how it happened until a thorough investigation finally points back to the past point in time.

It sounds unavoidable, right? No, it’s not unavoidable but the chances increase all the time that it will happen to your business. But if you take steps to protect and prepare as much as possible, the damage can be potentially avoided or at least somewhat overcome.

How? Here are 5 steps to try to avoid or quickly recover from a breach:

  1. BACK UP!!! Enough said. Think cloud, separate, secure, and frequent. Ransomware, a type of malware, takes over your files and holds them hostage. With a secure and separate backup, your business can go on operating.
  2. Train. Train your employees for anything that could happen. Teach them about current cyber threats; keep them informed. They can be considered an additional “firewall.”
  3. Use patch management. The days of worrying about how frustrating the changes will be from new updates are over. Patch consistently . . . because many of the patches today are security related and crucial to staying protected.
  4. Apply multiple layers of security. Your firewall will not protect you from a threat that originates internally. And yes, many happen using some form of an internal breach such as phishing and e-mails with malware links, or by way of privileged credentials whether internally or from a breach at a third-party contractor. Get a comprehensive employee Web-use security solution that will block access to malicious sites and links.
  5. Monitor. Watch it all. You will see trends, user behavior, and anomalies. Monitor network activity and the activity that accesses the Internet. Guest Wi-Fi networks, BYOD, and employee Web use should be included. Make sure you have visibility into what is going on with a solution that not only provides real-time monitoring, but also forensic-level detail reporting easily accessible by both IT and managers.

Overall, taking steps to ensure your business is protected is crucial, but know that you can still keep critical business operations functioning following any type of breach. Providing proactive solutions to protect, secure, and manage your business’s Web use in a cost-effective, agile, and customer-centric way is what we do. Let us help.

About Wavecrest Computing

Celebrating 20 years in business, Wavecrest Computing, headquartered in historic downtown Melbourne, FL, has provided commercial business and government clients with reliable, accurate Web-use management and Cloud Access Security Broker products since 1996. Managed Service Providers, IT specialists, HR professionals, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage employee Internet usage — managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest has clients worldwide, including General Electric, Lockheed Martin, Florida Department of Health, Siemens, Department of Homeland Security, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit http://www.wavecrest.net.