Don’t let size fool you.

Wednesday, November 30th, 2016

smallpower

 

Don’t be fooled by the name–CyBlock Mini Appliance is powerful, comprehensive, and worth every inch of its compactness.

Maintaining visibility throughout your workforce is key to running a secure business today. Don’t settle on just any solution that really doesn’t meet your needs. If you need coverage for a remote office, have limited space either in your server room or in your office, or are struggling with how to keep your business secure with a limited IT budget, Wavecrest has more choices than ever. No matter what business size or industry type, CyBlock Mini Appliance is likely to be just what you have been looking for.

The powerful Mini Appliance provides the comprehensive Web-use security capabilities of CyBlock, including HTTP and HTTPS URL filtering, comprehensive detailed reporting, secure guest Wi-Fi services with captive portal, advanced threat protection, bandwidth management, cloud services management, as well as coverage for non-HTTP activity, e.g., P2P, torrents, IM, and e-mail. Get all of this in one compact and economical package. The general size of a Wi-Fi hub, the Mini allows you to put it in the corner, on your desk, or in that tiny space you have left in your packed server room!

As a cost-effective choice for any business type or size, the robust, yet compact Mini Appliance provides the leading-edge, comprehensive Web-use security capabilities of CyBlock. Designed to fit every business environment, the Mini Appliance can be paired with CyBlock Appliance or deployed on its own, depending on the required Web-use security solution needs.

For more information on CyBlock Mini Appliance or any of our other products, please contact us today!

About Wavecrest Computing

Celebrating 20 years in business, Wavecrest Computing, headquartered in historic downtown Melbourne, FL, has provided commercial business and government clients with reliable, accurate Web-use management and Cloud Access Security Broker products since 1996. Managed Service Providers, IT specialists, HR professionals, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage employee Internet usage — managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest has clients worldwide, including General Electric, Lockheed Martin, Florida Department of Health, Siemens, Department of Homeland Security, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit https://www.wavecrest.net.

Things That Lie In Wait

Tuesday, November 1st, 2016

crocodile-small

There are many shows on cable today that portray instant recognition of a breach. To repeat what all others in the actual cyber industry say . . . not realistic.

Think of the scenario where an employee opens a file or accesses a malicious Web site. Step one is done. Nothing happens; the employee shrugs his or her shoulders and moves on. Nothing happened, so we are all good, right? Wrong. In reality, malware can happen behind the scenes with no visual effect at all at the time of being infected. The malware is just lying in wait. It either waits for an external signal–a preprogrammed time or until a specific action on the host computer is done. A hacker then would have access to look around, doing nothing noticeable, just checking things out . . . until the time that he finds what he wants.

Six months pass. All of a sudden, systems are breached, potentially causing loss of controls, data, or financial information. And no one knows where or how it happened until a thorough investigation finally points back to the past point in time.

It sounds unavoidable, right? No, it’s not unavoidable but the chances increase all the time that it will happen to your business. But if you take steps to protect and prepare as much as possible, the damage can be potentially avoided or at least somewhat overcome.

How? Here are 5 steps to try to avoid or quickly recover from a breach:

  1. BACK UP!!! Enough said. Think cloud, separate, secure, and frequent. Ransomware, a type of malware, takes over your files and holds them hostage. With a secure and separate backup, your business can go on operating.
  2. Train. Train your employees for anything that could happen. Teach them about current cyber threats; keep them informed. They can be considered an additional “firewall.”
  3. Use patch management. The days of worrying about how frustrating the changes will be from new updates are over. Patch consistently . . . because many of the patches today are security related and crucial to staying protected.
  4. Apply multiple layers of security. Your firewall will not protect you from a threat that originates internally. And yes, many happen using some form of an internal breach such as phishing and e-mails with malware links, or by way of privileged credentials whether internally or from a breach at a third-party contractor. Get a comprehensive employee Web-use security solution that will block access to malicious sites and links.
  5. Monitor. Watch it all. You will see trends, user behavior, and anomalies. Monitor network activity and the activity that accesses the Internet. Guest Wi-Fi networks, BYOD, and employee Web use should be included. Make sure you have visibility into what is going on with a solution that not only provides real-time monitoring, but also forensic-level detail reporting easily accessible by both IT and managers.

Overall, taking steps to ensure your business is protected is crucial, but know that you can still keep critical business operations functioning following any type of breach. Providing proactive solutions to protect, secure, and manage your business’s Web use in a cost-effective, agile, and customer-centric way is what we do. Let us help.

About Wavecrest Computing

Celebrating 20 years in business, Wavecrest Computing, headquartered in historic downtown Melbourne, FL, has provided commercial business and government clients with reliable, accurate Web-use management and Cloud Access Security Broker products since 1996. Managed Service Providers, IT specialists, HR professionals, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage employee Internet usage — managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest has clients worldwide, including General Electric, Lockheed Martin, Florida Department of Health, Siemens, Department of Homeland Security, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit http://www.wavecrest.net.

Think defense.

Monday, June 27th, 2016

ransom

Ransomware has the annoying characteristic of sneaking up on you. If you aren’t prepared, you may as well pay the ransom. Why? Because being prepared for loss of data is not at all difficult. First off–think old school . . . BACK UP, BACK UP, and BACK UP! This first very important step is that simple.

Think about what you do on your devices today, professionally or personally. We now live our lives in this digital environment. It is likely your use of technology has increased, even in the past year. This puts all of us at risk. Not just on our desktops either. Wired.com reports “these days ransomware doesn’t just affect desktop machines or laptops; it also targets mobile phones. Last week news broke of a piece of ransomware in the wild masquerading as a porn app. The so-called Porn Droid app targets Android users and allows attackers to lock the phone and change its PIN number while demanding a $500 ransom from victims to regain access.” Not many people could function today without access to their phones. Businesses are becoming more and more friendly to mobile devices as well. All this data floating around just makes it more appealing to hackers.

Where do we go from here? Back . . . back to backing up. Get that portable hard drive back out, dust it off, and use it. Yup . . . I did say that. Back it all up. Of course, for businesses it is more complex (and critical). But that is what cloud storage services are for. My only recommendation when it comes to off-site backups? Use more than one service. This way if anything does happen to your access to one backup, you will still have access to another. Inserting stern warning here: Do not store your passwords on your devices or in your backups unencrypted. If a hacker can access and lock up your systems, then he can find your passwords and have a go at them as well, including access to your backups.

Protect your business. Train your employees about new threats and monitor what is happening. Information is a gold mine–get visibility to see where your employees are going and then make some decisions that can protect your business. Ransomware can hit you through just a link in an e-mail. Make sure you have a solution in place that will help stop access to malicious Web sites.

We need to rethink the way we operate. It is just a shift, and if you just do it now, then you won’t be alarmed when you do get hit. Sadly, chances of a business being victimized by cybercrime are becoming more and more likely. Be prepared. And please, don’t let them win. The Internet has opened up so many opportunities for us and generations to come. Singapore is a perfect example of letting hackers win. They are moving to shut down Internet access for government computers, “from May next year and affect about 100,000 computers in use in the public service in the city-state, local media said.” (Reuters)

Do you think giving up Internet access will solve cybercrime?

We can help you find a better way.

About Wavecrest Computing

Celebrating 20 years in business, Wavecrest Computing, headquartered in historic downtown Melbourne, FL, has provided commercial business and government clients with reliable, accurate Web-use management and Cloud Access Security Broker products since 1996. Managed Service Providers, IT specialists, HR professionals, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage employee Internet usage — managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest has clients worldwide, including General Electric, Lockheed Martin, Florida Department of Health, Siemens, Department of Homeland Security, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit http://www.wavecrest.net.

Can you see your enterprise shadow IT?

Monday, July 20th, 2015

shadow-it-300x171Can you? It’s there…hidden on your employees’ devices and on your network. We all know people try to use the path of least resistance in getting something done. Today, cloud computing allows us all to do almost anything from anywhere with relatively no resistance at all. Within corporations though, this can become a problem commonly known as shadow IT. “There are an astonishing 10,000 cloud services available on the market today, which creates a growing problem for IT around Shadow IT as only 9.3 percent of those apps meet enterprise data, security and legal requirements, cloud security company Skyhigh Networks found in its Q1 2015 Cloud Adoption and Risk Report.” Corporations need to control their proprietary information, network, and Web security. While employees may be thinking they can get their job done faster, the corporation is thinking about threats. “The result is technologies that empower individuals and teams limit the organisation as a whole.”

There are several views for this, all valuable. From the employees’ view, they believe they are finding ways to be more productive and efficient by using technology that is easily accessible and likely, not costing the corporation anything additional. It is quick and easy and can get the job done before the IT department would even have a chance to look at a request form. So, why would the corporation be upset? Here’s why–unauthorized applications, or shadow IT, can cause serious risks, such as Malware, data loss, and other severe network security concerns. As the responsible party, IT needs to know what is happening, especially when it comes to the random unauthorized applications users are bringing into the network.

What can be done? Which view holds more importance? That depends on your organization but gathering the information to make that decision can be quick and easy. You need total visibility into Web use so you can find and analyze any potential shadow IT. Proactive, comprehensive reporting of all Web-use activity allows a full view of users’ activities. IT and management need to see detailed drill-down activity per user, per group, or per category, and determine if the “shadow” application is to be quarantined, or discover the application is actually useful to the organization as a whole and add to the acceptable applications list.

It is important to take into consideration the employees’ need to have access to useful and contemporary tools. No post, article, or news story can tell you what to do within your organization. Only you know what will best suit your environment. Try collaboration though, between users, management, and IT. The key is to find the most useful applications and move toward applications that work, with the best interest of the overall corporation at heart.

Wavecrest Computing has been the recognized leader in Web Security for over 19 years with CyBlock and Cyfin Solutions. These scalable filtering and forensic reporting analysis products are designed to enable organizations to successfully address Internet abuse, legal liability, shadow IT, workforce productivity, and Web security threats.

Into the Madness of March…brackets, bandwidth, malware, and all.

Tuesday, March 17th, 2015

BracketMarch Madness begins on March 17th this year. We all know that employees check out highlights or even stream a whole game. According to Turner Sports’ Will Funk’s interview with AdWeek,Turner did 70 million live streams on broadband and mobile during March Madness 2014. That is a lot of streaming. With all the streaming and new apps that are out since last year, 2015 will likely set another record.

This year, have the choice to allow your employees some freedom to watch and enjoy! CyBlock Web Security Solutions will help protect your business, blocking sites known for malware and proactively controlling bandwidth consumption, while allowing responsible viewing.

With Wavecrest’s Bandwidth Management in CyBlock, there are numerous ways to be able to control access when you need to. With Real-Time Data Usage Monitoring, you will be able to easily view current data usage for the entire enterprise, detect unexpected spikes that could indicate excessive data use, or just observe the last 5, 10, or 15 minutes of real-time updates.

You can also make sure the critical business operations remain functioning efficiently, even during the games, by using the Bandwidth Throttling features. Be more restrictive as the noncritical usage gets higher by setting one of the automatically triggered, higher-usage policy thresholds to throttle more or even block. E-mail alerts will keep you informed wherever you are. Once a policy is activated, policy-specific traffic is throttled or blocked, allowing business-critical applications (VoIP, CRM, etc.) to continue operating as needed.

Don’t forget about protecting your company from malware. March Madness search results have had a history of being known for malware in past years, and this year will likely be no different. As your employees search for brackets or results, CyBlock blocks traffic to the constantly growing number of sites that generate and/or promote malware. Keep out viruses, Trojan horses, phishing attacks, and more.

March Madness has become a way of life. Decide how your company will handle the traffic and proactively prepare for it by letting CyBlock help protect and secure your business and your employees. Find out more about all the Web Security product lines at Wavecrest Computing.

 

Cyber Monday is Quickly Approaching is Your Network Ready?

Monday, November 17th, 2014

cyber-monday-2013

Cyber Monday crushed it, again.

Online shopping on Cyber Monday hit $2.29 billion in sales in 2013

  • Adobe reported that Cyber Monday eCommerce sales grew 16% year-over-year to $2.29 billion.
  • Adobe also said that 18.3% of sales came from mobile devices, an increase of 80% year-over-year.
  • ComScore reported that Cyber Monday reached $1.73 billion in desktop online spending, up 18% from 2012.
  • IBM said Cyber Monday was the biggest online shopping day in history, with a 20.6% increase in online sales.
ThanksgivingWeekendByHour

The chart above shows Cyber Monday sales dramatically increasing around 9 am on Monday and holding steady throughout the entire work day.

With more and more of your employees doing their shopping online, it has become a cyber security issue for businesses making sure their networks are secure, managing bandwidth and protecting their employee from identity theft . CyBlock Web Security products will help you manage all of this from an easy to use single console.

CyBlock is a complete Web management and security product:

  • Advanced Web Filtering
  • Threat Protection
  • Bandwidth Management
  • SSL Inspection
  • Comprehensive Reporting

More information about CyBlock Web Security Products.

 

Forrester’s latest report says that the SaaS market will hit $131 billion by 2020.

Wednesday, May 14th, 2014

SaaSAre you ready to take advantage of the boom in the SaaS market? Have you thought about reselling cloud services? Or have you already started the transition into the managed service resale model? Wavecrest wants to help make this transition as simple and streamlined as possible.  We will provide you with all the tools you need to succeed. You can start selling our cloud service immediately with minimal investment and no binding contract.

Wavecrest understands the service model and the complexities behind selling SaaS solutions. Having a range of services that can be sold independently or in a bundle is key to generating a stable and recurring source of revenue. Web Security as a service is integral to any MSP’s offerings. That is why we have streamlined our ordering and licensing process. Furthermore, we have developed a simple to manage and provision service to ensure you maintain your profit margins!

Wavecrest Computing’s industry leading Web security solution, CyBlock, is a mature, robust and feature rich solution. CyBlock is now available as a cloud-based security service (SaaS) solution.  CyBlock Web Security services will protect your clients against Web based threats, lost productivity and mitigate legal issues associated with employee Web use. CyBlock Web Security service also provides bandwidth management.  This critical feature enables you to provide your clients with the highest quality of Service (QoS) by ensuring speed and reliability of mission-critical Web activity.

Let Wavecrest show you how selling the SaaS Web Access Security CyBlock Cloud will have a rapid and positive impact on your MSP business!

Find out more detail on our MSP partner page or send us your information on our partner form and we will contact you!

Toll Free:

877-442-9346 (U.S. and Canada) Ext. 3

E-Mail:

partner@wavecrest.net

Website:

http://www.wavecrest.net

            

Wait Until You Hear How Many Hours a Day an EPA Official Confessed to Watching Porn at Work

Wednesday, May 7th, 2014

Bad-Press-PublicityIn today’s world, many if not most employees have access to the Web at work. For the most part, that’s a good thing, and in some cases essential.  Unfortunately, that same access has a dark side. That’s because certain workers will inevitably visit illicit or risky Web sites, and such visits can expose the organization to serious legal liability.  The most troublesome sites are those devoted to pornography.  Sites devoted to gambling, illegal drugs, hate speech and criminal activity can also create legal issues, albeit to a lesser extent.  In addition to exposing the organization to legal liability, visits to inappropriate sites cause other serious issues such as lost productivity and wasted bandwidth.

To read the full article about the EPA official click here.

 

For more information about Wavecrest’s product offerings.

Toll Free:

877-442-9346 (U.S. and Canada) Ext. 3

E-Mail:

sales@wavecrest.net

Website:

http://www.wavecrest.net

            

CyBlock Cloud Removes Security Blind Spots

Thursday, April 10th, 2014

 

CyBlock HTTPs Inspection

CyBlock HTTPs Inspection

Wavecrest Computing announces that SSL Inspection is now available in CyBlock Cloud. The SSL (HTTPS) Inspection feature allows CyBlock Cloud to decrypt, analyze, and fully inspect all HTTPS traffic. In order to defeat security threats facing companies today, the capability of SSL Inspection is becoming critical. With the rise in use of HTTPS and with applications (such as Twitter and Facebook) and search engines enabling SSL by default, most enterprises should expect an average yearly increase of ~20% in SSL traffic. The increased use of SSL can create “blind spots” that can actually reduce security on corporate networks because network security products and other defenses may not be able to monitor SSL traffic effectively or efficiently.

Surveys show 25%-35% of enterprise traffic is SSL-encrypted, and the number can be as high as 70% in specific industries. CyBlock Cloud’s SSL inspection feature enables organizations to gain visibility and control of SSL communications. It provides a critical control point for protection against Web threats, enforcing acceptable use policies and performance. Users can seamlessly enforce usage policies on both unsecured and secure traffic. Users can also choose what traffic to inspect or “tunnel” base on their specific security policies.

SSL traffic is growing into a significant amount of corporate traffic. This creates major blind spots for IT. CyBlock Cloud removes these blind spot, enabling organizations to establish a critical control point for Web protection, policy enforcement and performance of users and Web applications using SSL.

CyBlock Web Security Solution is now available in the Cloud

Monday, December 9th, 2013

 Melbourne, FL, Dec. 9, 2013 (GLOBE NEWSWIRE) — Wavecrest Computing, the makers of CyBlock, have just announced the availability of a Cloud version of CyBlock. Now companies have access to the most popular and solid Web Security solution in the Cloud.

CyBlock Cloud Web Security is an easy-to-implement solution that benefits organizations of all sizes and quickly safeguards your network. Whether you have branch offices, remote users, or just one location, CyBlock Cloud protects your company and its employees allowing you to take advantage of time and money savings. Enforce your company’s AUP by defining one or more Web-use policies to successfully address Internet abuse, legal liability, workforce productivity, and Web security threats.

“We are very excited to be extending our product line into the Cloud market. Now, new and existing customers who are considering a cloud solution have one less worry. Starting today they can access an industry tested and proven solution with a successful 13 year track record. CyBlock Cloud is a perfect addition to Wavecrest’s line of industry leading Web Security Solutions.” CEO – Dennis McCabe

Wavecrest Computing has been the recognized leader in Web-access security and Web-usage forensics solutions for the last 16 years. Our scalable filtering and forensic reporting analysis products are designed to enable organizations to successfully address Internet abuse, legal liability, workforce productivity, and Web security threats. Wavecrest Computing’s client list includes well-known corporations such as Edward Jones, General Electric, Lockheed Martin, Blue Cross Blue Shield, MillerCoors, Rolex, Siemens, and others.

Link to Press Release.