Monthly Archives: August 2017

CyBlock/Cyfin Release 9.2.8 Now Available

Release 9.2.8 consists of improvements for both Cyfin and CyBlock. For Cyfin customers, a filter allows you to log only relevant data into the syslog, keeping the syslog file at the smallest possible size. Cyfin customers also have the ability to delete only raw syslog log files from disk to help reduce the risk of running out of disk space. For CyBlock customers, changes to IP/domain exceptions in your PAC file configuration can be synced with your cloud account in a Hybrid deployment.

For both products, the product disk usage and the available disk space are displayed for your information on the Server Information screen. Also, the calculation of Hits and Visits has been updated to be more precise. These and other enhancements are highlighted below.

  • Syslog Log File Configurations (Cyfin)
    • After enabling the syslog server, the Syslog Filter field appears which is prepopulated with the default value format based on your syslog configuration. It is used to log only the pertinent data into the syslog and not all the data that is being sent.
  • Log File Removal (Cyfin)
    • The ability to delete only raw syslog log files from disk has been added. You can manually delete or schedule a deletion of the files either at the current time or at the default scheduled time.
  • PAC File Sync (CyBlock Appliance, CyBlock Software)
    • Any IP/domain exception changes to the PAC file configuration are now automatically or can now be manually synced with your CyBlock Cloud account in a Hybrid deployment.
  • Server Information
    • On the System Status – Server Information screen, the product disk usage and available disk space are now displayed. The available disk space shows the amount of free space remaining out of the total drive space.
  • Hits and Visits Calculation
    • The hits and visits calculation has been enhanced by evaluating additional information from the log records.
  • Java Runtime Environment
    • The version of JRE was updated to the latest with all security and performance fixes.
  • System Status Messages
    • The Event Log and Profiling Log screens have been updated to allow Technical Support to view legacy or new messages.

To see the full release notes for your product, visit our Web site or knowledge base. You can upgrade to the latest release by going to the Help – Check for Updates screen in your product.

For additional assistance, please feel free to contact us.

Is your business’ human operating system secure?

Everyone is worried about operating systems, whether it is network operations, business operations, or a desktop operating system. The functionality of these intricate parts of your business are critical. But have you thought about your employees and how they operate? Today, your human operating system needs to be more than just making sure your employees are doing their job. Human vulnerabilities are a primary target for cyber criminals. Your human operating system, or the human factor, needs to be manageable and efficient, with tools in place that proactively support an open, yet secure, digital work environment.

Insider threats can be found at the top of headlines almost every day. Listen carefully to what each event tells you. It can happen to you, no matter how big or how small your business is. You don’t have to be a government organization to be susceptible to an insider threat. Insider threats can be a malicious employee who may be upset at the company, a good employee who just makes a mistake, or a targeted employee who unknowingly allows a malicious user into the network or access to proprietary data. Whatever the cause, there has to be tools in place to combat these human factor Web-use risks.

The human factor in business Web use is complicated in many ways. Hackers target natural human vulnerabilities and mistakes happen, employees can be sensitive to being singled out or afraid to admit the mistake, and fully blocking all access in today’s digital work world will likely just limit productivity and upset employees. The key? Visibility into the human factor. See how and when your employees use their Internet access. With that visibility into Web-use detail, you can then manage the usage to fit your unique business needs and gain a comprehensive, proactive way to secure and protect your business.

Securing and managing your enterprise’s human operating system in a proactive and efficient manner will help reduce cyber risks, such as phishing, malware intrusions, ransomware, data loss, employee misuse, legal liabilities, bandwidth hogs, shadow IT, and more. Find a solution that fits your business and your budget. Make sure it is flexible, easy to use, and easy to manage, allowing you to secure and shape employee Web-use–on your terms.

About Wavecrest

Wavecrest has over 20 years of proven history of providing reliable, accurate Web-use management and Advanced Log File Analyzer products across various industries. Managed Service Providers, IT specialists, HR professionals, Forensics Investigators, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage the human factor in business Internet usage — managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Trusted by large government and commercial organizations such as US-CERT Homeland Security, U.S. Department of Justice, USPS Office of Inspector General, National Grid, Johns Hopkins, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit https://www.wavecrest.net.