Madness of March 2018…snow, cold, and of course, basketball!

March 21st, 2018

March Madness has begun and it is an exciting year already for basketball lovers. Knowing some of the games have been “nail-biters” this year, employees are definitely checking out highlights or even streaming a whole game on your network. WalletHub says, “unproductive workers during March Madness amounted to an estimated $6.3 billion in corporate losses.”

This year, have the choice to allow your employees some freedom to watch and enjoy! CyBlock Filtering and Monitoring Suite will help monitor and protect your business, blocking sites known for malware, proactively controlling bandwidth consumption, and keeping productivity flowing, while allowing responsible viewing.

With Wavecrest’s Bandwidth Management in CyBlock, there are numerous ways to be able to control access when you need to. With Real-Time Data Usage Monitoring, you will be able to easily view current data usage for the entire enterprise, detect unexpected spikes that could indicate excessive data use, or just observe the last 5, 10, or 15 minutes of real-time updates.

You can also make sure the critical business operations remain functioning efficiently, even during the games, by using the Bandwidth Throttling features. Be more restrictive as the noncritical usage gets higher by setting one of the automatically triggered, higher-usage policy thresholds to throttle more or even block. E-mail alerts will keep you informed wherever you are. Once a policy is activated, policy-specific traffic is throttled or blocked, allowing business-critical applications (VoIP, CRM, etc.) to continue operating as needed.  

Betting on the games has become increasingly popular. “According to the Gaming Association, 10 percent of adults — or roughly 24 million — reported spending nearly $3 billion in the past year on basketball pools alone,” notes cbssports.com. A more impactful example might be from WalletHub, “2x more is wagered on March Madness than the Super Bowl.” Be aware of what your employees are doing online, gambling sites are not just a legal issue but also tend to carry many security risks.

Security risks are numerous this time of year. March Madness search results have had a history of being known for malware in past years, and this year will likely be no different. As your employees search for brackets or results, CyBlock blocks traffic to the constantly growing number of sites that generate and/or promote malware. Keep out viruses, Trojan horses, phishing attacks, and more.

March Madness has become a way of life. Decide how your company will handle the traffic and proactively manage it by letting CyBlock help protect and secure your business and your employees. Find out more about all the Web management product lines at Wavecrest Computing.

About Wavecrest

Wavecrest has over 20 years of proven history of providing reliable, accurate Web-use management and Advanced Log File Analyzer products across various industries. Managed Service Providers, IT specialists, HR professionals, Forensics Investigators, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage the human factor in business Internet usage — managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Trusted by large government and commercial organizations such as US-CERT Homeland Security, U.S. Department of Justice, USPS Office of Inspector General, National Grid, Johns Hopkins, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit Wavecrest.

Employee Internet activity–get the right information to the right people in the right format.

March 20th, 2018

We always think of a business’ audience as outside of the business, as in a sales or technical support relationship with a prospect or customer. But we all have an audience within the business that needs to be serviced, provided assistance, and kept happy. From an IT standpoint, these internal customers can be HR, operations, financial, legal, C-Suite, and more . . . literally everyone within the company. This is why it is important that IT be provided and supported with comprehensive, easy-to-manage tools that proactively help supply internal customers with the relevant, detailed, easy-to-consume information they need. Their focus should be on how to efficiently get the right information to the right people in the right format–especially when it is critical information like Internet usage.

Internet usage is a leading concern for companies due to risks from employee misuse, unsanctioned cloud applications, phishing e-mails, and more. Pepper Hamilton LLP, Attorneys at Law note, “Companies often are surprised to learn that their biggest security threats come from their own employees. These risks range from the use of weak passwords to clicking on corrupt internet links to theft of sensitive data.” IT needs to not only maintain the system to keep the business’ digital environment running and secure but they also need to supply critical employee Web-use information to others within their organization. These internal customers are not prepared to dig through and interpret large amounts of technical data. They require the information be easily supplied to them for when, where, and how they need to use it. So what does “the right information to the right people in the right format” really mean?

What is the right information?

When it comes to Web-use risks, the human factor, that is, the employee, must be the focus. Without knowing the human behavior in the organization it is impossible to define what is normal and flag anomalies that may indicate unintentional mistakes or malicious acts, identify workforce productivity changes, or determine whether an employee is in compliance with corporate policy, and more. If there is reporting on Web traffic in the organization, it may still be inadequate in showing the relevant human behavior in the workplace. It is important to reduce the “noise” that happens in data when supplying information to the internal customers. The right information means clear, pertinent, easy-to-consume information for, more than likely, a nontechnical audience.

Who are the right people?

It would likely be easier to just say everyone. Most employees use some form of the Internet for work functions. If they don’t, they still likely have access to the Internet through company Wi-Fi or during their break. Even then, the business is responsible for the Web use occurring on their network at any time. Knowing this, it is understandable that many people in your organization want easy access to employees’ Web activity information. Managers may want to address productivity issues, HR personnel may want to investigate a Web-use liability issue, and IT staff themselves will want to watch network performance and security. Getting the relevant information to a specific audience in the company is important and increases overall efficiency and productivity. The right people means that the information supplied to that user is specific to their responsibility. Extraneous information not only makes the recipient’s process of deciphering the data more difficult and time-consuming, but it is also a data security issue by sharing unrelated company data with others, even within the company.

Which is the right format?

When you view something and it just has so much information or is just difficult to read, do you actually retain or even understand the information? With mission-critical operations looming, IT no longer has time to spend on walking a recipient through report information. Requested Web-use information should be in an easy-to-read and actionable format. Having reporting dashboards can provide important benefits especially when they can be customized to offer different types of analyses for different users and therefore serve different purposes. Customizable charts and interactive, drill-down reporting features with specifically relevant information increases understanding and ends up supporting clear business decision-making. So, the right format is about allowing for flexibility for each recipient to view information in a number of different formats.

So then . . . what is needed to get the right information to the right people in the right format and how can Wavecrest help?

Smart Engine analytics! Without the Smart Engine and its analytics, the reporting components could not provide the adequate information that your company needs to manage employee Web use. The Smart Engine makes technical data usable and manager-ready. Smart Engine analytics provide pertinent, detailed analysis, permitting the review or investigation of trends, policy violation, Internet misuse, security issues, and ultimately, human behavior occurring in the workplace.

With its precise, industry-leading algorithms, the Wavecrest Smart Engine is used by charts and reports to present accurate and up-to-date Web-use data. It performs functions such as determining visits and time online from Web traffic, and categorizing URLs into logical groups based on content. The Smart Engine is the key to providing understandable, easy-to-consume, manager-ready information–more precisely, the right information for right people in the right format.

Time is precious, especially in business. Getting the right information to the right people in the right format should be easy–especially when it is critical information like Internet usage. Let us help.

About Wavecrest

Wavecrest has over 20 years of proven history of providing reliable, accurate Web-use management and Advanced Log File Analyzer products across various industries. Managed Service Providers, IT specialists, HR professionals, Forensics Investigators, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage the human factor in business Internet usage — managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Trusted by large government and commercial organizations such as US-CERT Homeland Security, U.S. Department of Justice, USPS Office of Inspector General, National Grid, Johns Hopkins, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit Wavecrest.

Show cyber threats who is boss in 2018.

January 24th, 2018

Last year went by so fast. In between everyone’s normal busy schedule, most of us had to deal with natural disasters of some kind. For us at Wavecrest, it was Hurricane Irma as well as an above average rainy season. For others, it was Harvey and Maria, as well as fires, flooding,  earthquakes, remnants of storms causing wind damage–the list last year seems to be endless.

2017 also brought on some notable cyber events with the Equifax breach as one of the top incidents. 2017 was definitely a year for the books. You may have also noticed a shift in the business digital threat protection messaging. We at Wavecrest noticed . . . because it shifted to what we have always focused on. People.

People are a big part of the cyber threats that take place in businesses. No matter how automated things are, there is always the aspect of human interaction–human vulnerability. Humans inherently have vulnerabilities. It’s not a fault of one individual over another; it’s not about how good your employees are. There is a point where a business owner, manager, or decision-maker has to come to terms with managing Web use for the sake of the business over “my employees wouldn’t do that” or “I trust everyone working for me.” It may be true that you have the most trustworthy employees, but mistakes happen . . . even to the best of us. Cyber criminals focus on the easiest route first to gain access to your systems. Many times this is the employee, or human, vulnerability.

So . . . the new year is here. What can be done to improve managing employee Web use? The key is to make sure you pay attention to the human endpoint because it is not always about a failure in the actual technology. The firewall is great but if you have a weakness with an authorized user, the hacker will get past the firewall. Defend the human endpoint.

Consider these as a starting point and build on each or all!

  • MONITOR YOUR EMPLOYEES’ WEB USE! Sorry. It had to be said. If you do not know what is happening, you will not be able to know why, when, or where it happened. And you will not be able to make an informed decision on how to stop it from happening again. Remember that many times the human error that allowed for a breach may have been habitual or reactive so the employee’s memory of how it happened may not be very clear. Make sure to have visibility into the actual Web activity.
  • Analytics. Really another part of monitoring but noted separately due its importance and the flexibility of what you should be able to view and analyze. Find a Web activity solution that allows you to see relevant, drill-down data when you need it. Trends, customizable charts, by user or group, and real-time information on activity and bandwidth use are all things you should be able to analyze easily. All will allow you to expose abnormalities in user activity, identify potential insider threat behavior, flag possible legal liability issues, assess trends for data breach exposure, and observe patterns for lost productivity.
    • Hits versus Visits. This one deserves a sub-bullet. Make sure the Web-use management solution you choose has clearly defined Hits vs. Visits. Hits consist of unsolicited traffic, such as ads, and are not a reliable tracking metric on its own. Visits give you uncluttered, relevant Web activity detail based on user clicks and are a critical component to understanding human behavior. The last thing you want to do is try and sift through a bunch of data that is not even really relevant to the employee’s actual Web activity.

  • Filter. Yup . . . another suggestion that has the “but my employees are awesome” stigma to it. BUT let me just remind you that this is something that will provide another layer of security from phishing, malicious Web links, and data loss. I got your synapses firing now, don’t I! Filtering allows you to block or restrict URL link clicks that an employee may not be aware are malicious. Hackers have become increasingly precise in how things look. Very convincing e-mails and Web links are not rare anymore; they are commonplace. It is not really all about making sure your employee isn’t streaming YouTube all day. Although that should be managed as well, it should all be under your control. Allow it, don’t allow it, throttle it, or open it all up. The solution you choose should allow you to do it all, in your own customizable way.

The point is that the human endpoint is still a leading way threats get into your network. It may be through phishing, a malicious ad, or use of a unsanctioned cloud application, or it may even be a human error such as the delay of updating software. Whatever the issue, you have to be as proactive as possible to protect your network. Educate your employees continuously, have a comprehensive Web activity solution in place, make sure your Acceptable Use Policy is current, make sure patch management is an active process, and hug your IT people regularly because they are usually some of the busiest and stressed people in your organization.

Here is to showing the cyber criminals who is boss in 2018! Happy New Year!

About Wavecrest

Wavecrest has over 20 years of proven history of providing reliable, accurate Web-use management and Advanced Log File Analyzer products across various industries. Managed Service Providers, IT specialists, HR professionals, Forensics Investigators, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage the human factor in business Internet usage — managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Trusted by large government and commercial organizations such as US-CERT Homeland Security, U.S. Department of Justice, USPS Office of Inspector General, National Grid, Johns Hopkins, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit https://www.wavecrest.net.

Take the mystery out of employee Web use and gain pertinent insight into your business.

January 17th, 2018

 

We are all seeing how business operations are continuously becoming more digitally driven. Many operations that were done on a desktop are now cloud- or app-driven. The connection to the Internet is a constant, and since your employees need that access to be productive, managing that connection should be a priority. Small businesses are finding that this access not only centralizes their operations and data but also can save them money. But they are finding that the amount of data being produced makes it impossible to find the relevant information needed. Looking at the employee-Internet relationship should be on the top of your checklist.

There are things that a Web-use management solution should provide, such as allowing a business to easily filter and control access, use white and black lists, and set time limits. But one of the biggest benefits that many times can be overlooked is the ability to access easy-to-use smart analytics and reporting tools. A filtering solution is great, but if it lacks a way to collect and correlate useful, pertinent data, then all that it is doing is restricting employees, causing frustration and potentially reducing productivity. With detailed reporting and analytics, managers can open up the usefulness of the Internet while knowing they still have the control to keep the business running smoothly and safely.

Look for the Web-use management solution that provides:

  • Drill-Down, Interactive, Forensic-Level Detail – A complete view of every link a user clicks, the exact search terms entered by a user, their search time, and more.
  • Ad Hoc and Scheduled Reporting – The information you need . . .  right when you need it.
  • Smart Reporting – Intelligent, timely, and cogent reporting on all aspects of employee Web usage.
  • Hits Versus Visits – Clear, uncluttered detail based on user clicks versus unsolicited traffic.
  • Manager Access – IT-controlled access for managers and HR allowing them reporting access without the need for IT assistance.

Analytics and reporting tools allow you to take the large amount of Web-use data your employees are producing and make sense of it. This data should tell you who, where, and when about the Web usage. Allowing you to see anomalies, activity peaks, bandwidth usage, and more, this visibility helps you plan and secure your network, data, and employees.

Don’t feel like you’re in need of tarot cards or tea leaves to know what is happening within your business.

About CyBlock

CyBlock Web-Use Management Suite makes more sense of all your Web-use data with CyBlock’s comprehensive monitoring and reporting features. CyBlock is available in Cloud, Software, Appliance, Mini Appliance, and VM deployments to fit any business size or industry.

About Wavecrest

Wavecrest has over 20 years of proven history of providing reliable, accurate Web-use management and Advanced Log File Analyzer products across various industries. Managed Service Providers, IT specialists, HR professionals, Forensics Investigators, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage the human factor in business Internet usage — managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Trusted by large government and commercial organizations such as US-CERT Homeland Security, U.S. Department of Justice, USPS Office of Inspector General, National Grid, Johns Hopkins, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit https://www.wavecrest.net.

It is holiday shopping time again! Cyber Monday is now more like Cyber Month!

November 14th, 2017

With Thanksgiving right around the corner, we all know what is coming–Cyber Monday–the big day (now it is more like a month!) for personal employee Web use! More than ever before, businesses are open to employee use of the company Internet for personal use such as snagging some holiday deals. But what does this really mean for daily business operations? That depends.

There are definitely cyber risks associated with the season of shopping–malicious ads, phishing e-mails with malicious Web links, and slow bandwidth, to name a few. Paying attention to your employees’ Web usage is crucial. It is up to you whether you allow shopping on your network. If you do, there are steps you should take to manage this naturally vulnerable human endpoint.

  • Filter
    • Filtering allows you to reduce risks from malicious URLs in ads, phishing, etc. . . . employees are your weakest link. Train them continuously but also make sure there is a Web filtering solution in place to allow you to manage the Web use the way you see fit.
  • Manage Bandwidth Usage
    • This time of year employees may be doing things such as watching a video review of the latest in tech toys for their kids. Make sure your mission-critical operations are not affected. Configuring bandwidth limits by user-defined thresholds and setting trigger alerts will help you make sure you don’t have unnecessary bandwidth hogs slowing your business down.
  • Monitor Web use
    • Visibility means everything. With the right monitoring solution, you can easily analyze employee Web-usage trends, make sure your Acceptable Use Policy (AUP) is being followed, and get actionable, relevant detail when you need it.

These are only a few of the things that you can do to help reduce the risks associated with employee Web use all year long. Remember that human vulnerabilities are a leading cause of most network breaches. Focus on the human endpoint. Take the time to keep training employees, enforcing your AUP, monitoring, analyzing, and filtering.

At this time of year, you can feel good about allowing your employees some freedom to research or snag some holiday gift deals. Have a comprehensive employee Web filtering and monitoring solution in place, and enjoy your holidays even more knowing you are proactively managing employee Web activity!

About Wavecrest

Wavecrest has over 20 years of proven history of providing reliable, accurate Web-use management and Advanced Log File Analyzer products across various industries. Managed Service Providers, IT specialists, HR professionals, Forensics Investigators, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage the human factor in business Internet usage — managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Trusted by large government and commercial organizations such as US-CERT Homeland Security, U.S. Department of Justice, USPS Office of Inspector General, National Grid, Johns Hopkins, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit https://www.wavecrest.net.

CyBlock/Cyfin Release 9.2.8 Now Available

August 23rd, 2017

Release 9.2.8 consists of improvements for both Cyfin and CyBlock. For Cyfin customers, a filter allows you to log only relevant data into the syslog, keeping the syslog file at the smallest possible size. Cyfin customers also have the ability to delete only raw syslog log files from disk to help reduce the risk of running out of disk space. For CyBlock customers, changes to IP/domain exceptions in your PAC file configuration can be synced with your cloud account in a Hybrid deployment.

For both products, the product disk usage and the available disk space are displayed for your information on the Server Information screen. Also, the calculation of Hits and Visits has been updated to be more precise. These and other enhancements are highlighted below.

  • Syslog Log File Configurations (Cyfin)
    • After enabling the syslog server, the Syslog Filter field appears which is prepopulated with the default value format based on your syslog configuration. It is used to log only the pertinent data into the syslog and not all the data that is being sent.
  • Log File Removal (Cyfin)
    • The ability to delete only raw syslog log files from disk has been added. You can manually delete or schedule a deletion of the files either at the current time or at the default scheduled time.
  • PAC File Sync (CyBlock Appliance, CyBlock Software)
    • Any IP/domain exception changes to the PAC file configuration are now automatically or can now be manually synced with your CyBlock Cloud account in a Hybrid deployment.
  • Server Information
    • On the System Status – Server Information screen, the product disk usage and available disk space are now displayed. The available disk space shows the amount of free space remaining out of the total drive space.
  • Hits and Visits Calculation
    • The hits and visits calculation has been enhanced by evaluating additional information from the log records.
  • Java Runtime Environment
    • The version of JRE was updated to the latest with all security and performance fixes.
  • System Status Messages
    • The Event Log and Profiling Log screens have been updated to allow Technical Support to view legacy or new messages.

To see the full release notes for your product, visit our Web site or knowledge base. You can upgrade to the latest release by going to the Help – Check for Updates screen in your product.

For additional assistance, please feel free to contact us.

Is your business’ human operating system secure?

August 2nd, 2017

Everyone is worried about operating systems, whether it is network operations, business operations, or a desktop operating system. The functionality of these intricate parts of your business are critical. But have you thought about your employees and how they operate? Today, your human operating system needs to be more than just making sure your employees are doing their job. Human vulnerabilities are a primary target for cyber criminals. Your human operating system, or the human factor, needs to be manageable and efficient, with tools in place that proactively support an open, yet secure, digital work environment.

Insider threats can be found at the top of headlines almost every day. Listen carefully to what each event tells you. It can happen to you, no matter how big or how small your business is. You don’t have to be a government organization to be susceptible to an insider threat. Insider threats can be a malicious employee who may be upset at the company, a good employee who just makes a mistake, or a targeted employee who unknowingly allows a malicious user into the network or access to proprietary data. Whatever the cause, there has to be tools in place to combat these human factor Web-use risks.

The human factor in business Web use is complicated in many ways. Hackers target natural human vulnerabilities and mistakes happen, employees can be sensitive to being singled out or afraid to admit the mistake, and fully blocking all access in today’s digital work world will likely just limit productivity and upset employees. The key? Visibility into the human factor. See how and when your employees use their Internet access. With that visibility into Web-use detail, you can then manage the usage to fit your unique business needs and gain a comprehensive, proactive way to secure and protect your business.

Securing and managing your enterprise’s human operating system in a proactive and efficient manner will help reduce cyber risks, such as phishing, malware intrusions, ransomware, data loss, employee misuse, legal liabilities, bandwidth hogs, shadow IT, and more. Find a solution that fits your business and your budget. Make sure it is flexible, easy to use, and easy to manage, allowing you to secure and shape employee Web-use–on your terms.

About Wavecrest

Wavecrest has over 20 years of proven history of providing reliable, accurate Web-use management and Advanced Log File Analyzer products across various industries. Managed Service Providers, IT specialists, HR professionals, Forensics Investigators, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage the human factor in business Internet usage — managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Trusted by large government and commercial organizations such as US-CERT Homeland Security, U.S. Department of Justice, USPS Office of Inspector General, National Grid, Johns Hopkins, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit https://www.wavecrest.net.

Are you leaving your small business Web-use security door open?

May 15th, 2017

 

There is so much to be concerned with when running a small business. Economic uncertainty, the cost of health insurance benefits, regulatory burdens, keeping mission-critical operations running–all add up to a stressful experience. Now security concerns include more than just locking the doors; it means everything digital too. And the risks? With ransomware, phishing, insider threats, unsanctioned cloud apps, BYOD . . . lets just say, the Internet usage risks are probably even higher than the front door being left open . . . wide open.

Many small and midsized businesses (SMBs) are without full-time IT departments or even full-time IT personnel, making them a prime target for breaches. But SMBs tend to think they don’t have the resources to handle this type of security, whether it be the financial consideration, personnel needed, or when hardware is preferred, limited space constraints. Since hackers know this, SMBs have to be proactive when it comes to Web-use security–nowadays, even more so than corporations.

The connection between the human and the Internet is a weak link, making it one of the leading access points into a system for a hacker. Whether it’s from the employee clicking a Web link in an e-mail, clicking a malicious ad, or sharing company information with a cloud service, make sure to protect the business by managing that employee-Internet connection. Find a solution that allows you to easily and proactively monitor and secure your employees’ Web activity. Your business is unique–finding a way to solve these issues and concerns will take a unique solution.

A few tips for your Web-use security solution search:

  1. Find a vendor who will spend the time with you. The cyber world has its own language. It’s important to have a human being on the other end of the phone during the sales process, in customer service, and when you need technical support . . . yup, they still have human beings in technical support . . . go figure! Get with a company who wants to talk to you!
  2. Of course, it doesn’t help if that vendor doesn’t have what you need so make sure you list the top security priorities for your business. Do you want to filter access to certain Web sites or categories such as social media, or do you want to limit time that an employee may spend on one site? Are you are more concerned with your guest Wi-Fi and BYOD or throttling bandwidth use? Don’t get sold on something that doesn’t meet at least your primary concerns. One solution does not always fit all . . . in today’s cybersecurity world you need to focus on your specific business concerns. Just because an expensive, large scale, all-in-one network security solution or firewall has a Web-use add-on tool does not mean it will give you the pertinent, granular detail and control that you need to protect your mission-critical operations.
  3. Ask questions. The vendor should understand that you excel at what you do, not what they do. Don’t be intimidated by the security subject. Even those of us in this business spend a lot of time keeping up with the fast pace of cybersecurity. No question is unnecessary. If you think about it, then it is important to you and should be to the vendor too. Refer to Tip #1!
  4. Last tip for today . . . solutions come in many shapes and sizes. Don’t settle for something that doesn’t fit your business. Your business is special and unique. Your solution should fit and work in your environment without you constantly having to justify it and make it fit in.

Wavecrest can, and wants to, help you–with CyBlock Mini Appliance, specially designed for small businesses, remote offices, and limited space environments.

CyBlock Mini Appliance is an employee Internet-use security hardware solution that is not only the size of a wireless hub but is also economically priced. You gain an easy-to-setup, turnkey Web activity gateway with advanced filtering and monitoring capability, manual or automatic delivery of detailed, interactive reports, real-time monitoring by user, group, or category, the ability to easily manage BYOD, guest Wi-Fi networks, cloud services, and bandwidth use–all with included U.S.-based Technical Support.

Wavecrest also provides CyBlock Web security solutions in other shapes and sizes! Find out more about our other CyBlock deployments: Appliance, Hybrid, Cloud, and Software. As a customer-centric company, Wavecrest focuses on the needs of each customer. Let us help secure your business with a solution that fits every business size, type, and configuration.

About Wavecrest

Trusted for over 20 years, Wavecrest Computing, headquartered in historic downtown Melbourne, FL, has provided commercial business and government clients with reliable, accurate Web-use management and Cloud Access Security Broker products since 1996. Managed Service Providers, IT specialists, HR professionals, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage employee Internet usage — managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest has clients worldwide, including General Electric, Lockheed Martin, Florida Department of Health, Siemens, Department of Homeland Security, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit https://www.wavecrest.net.

Employees are like Hacker Candy

March 13th, 2017

Employees are still the central part of all our businesses. Even with all the technology, we still have people to run the operations. The human component of our business is the goal for most hackers. It is easier to find the human weakness than it is to find a network flaw. This human point of infiltration still needs attention, even when you feel your business is secure.

Hackers are smart and agile. It’s a full-time job for them. They don’t get called into meetings, get distracted by co-workers, or have to worry about receiving their W-2 in time for their tax advisors. Their focus is to get into your network using those distractions against your employees. Your employees are busy and focused on what they have to get done, many juggling multiple responsibilities. Hackers like these employees; it’s like candy to them.

Is there any one solution that will remove all risks? No. But there are ways you can help your employees protect themselves and your network. Ransomware, insider threats, phishing–there are so many threats that can halt operations that are critical to your business success. Be aware, prepare.

A combination of defenses helps you reduce the risks we all face in business today. Don’t assume one will solve everything. Develop multiple layers of proactive security. This can include anything from making sure your Acceptable Use Policy (AUP) is current or having consistent employee training, to firewall and virus protection, to Web-use comprehensive monitoring and filtering solutions.

It is also important to have a recorded and tested recovery plan in place. Make the assumption that a breach will happen. This way you are prepared. Most importantly, maintain current backups. Make sure that the backups are not accessible through your network!

The “one” solution to protect your business just doesn’t exist. Maintain a combination of defenses and solutions to cover as many risks as possible. Being proactive will pay off in the long run.

Trusted for over 20 years, Wavecrest Computing, headquartered in historic downtown Melbourne, FL, has provided commercial business and government clients with reliable, accurate Web-use management and Cloud Access Security Broker products since 1996. Managed Service Providers, IT specialists, HR professionals, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage employee Internet usage — managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest has clients worldwide, including General Electric, Lockheed Martin, Florida Department of Health, Siemens, Department of Homeland Security, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit https://www.wavecrest.net.

Are your employees full of March Madness? They will be!

March 7th, 2017

March Madness always produces a high level of anticipation and excitement. It ranks up there with the Super Bowl and the World Cup for many people. So fans want to make sure they see the games that for every year, the amount of series streaming surpasses expectations. We can all watch them on our phones, tablets, laptops, and desktops at any time and anywhere. Because of this, many managers now allow for some freedom during this time, so their employees can get their yearly March Madness fix. But there are risks to the business to always consider.

Some March Madness 2016 statistics from NCAA to consider:

  • With 18.1 million live hours, the tournament generated more video consumption than any other tournament.
  • The national championship game generated 56 million impressions across March Madness social media accounts, up 112 percent over 2015.
  • Video consumption for social media was also up with 8 million views overall, more than five times the volume of video for last year’s championship game.

Is your business ready?

The first thing that pops into a manager’s mind is increased bandwidth use. It is an important thing to consider for sure since your business has mission-critical functions that have to run for your business to operate efficiently, even during increased Internet use. Making sure you can control and monitor bandwidth use by throttling nonessential traffic if needed, is critical to making the decision to allow streaming during any time, but especially during events like March Madness.

The things that may not immediately come to a manager’s mind may be the increase in malicious links generated during times of special events. In a world with cyber threats, such as ransomware, a business cannot ignore times when this risk increases. March Madness is a time when many keep track of all the games, not just their one team. They follow the process through the whole series and enjoy the competitive nature right down to the Final Four and beyond. They may be more prone to fall for a March Madness ad link for a stat update or phishing e-mail to check the latest game highlights. During the whole series and even before it starts, educating your employees about the increase in cyber threats, such as malicious Web sites and ads, and phishing e-mails, is important. Security solutions that offer features like white/black listing and filtering will allow you to maintain Web-use protection against the human tendency to click without analyzing if the link or e-mail makes sense.

Don’t just lock up employee Web-use. Protect your business and employees from threats, such as bandwidth hogs, malicious Web links, legal liabilities, and even productivity losses. Gain the control and security needed . . . and once again, let the games begin!

About Wavecrest Computing

Trusted for over 20 years, Wavecrest Computing, headquartered in historic downtown Melbourne, FL, has provided commercial business and government clients with reliable, accurate Web-use management and Cloud Access Security Broker products since 1996. Managed Service Providers, IT specialists, HR professionals, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage employee Internet usage — managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest has clients worldwide, including General Electric, Lockheed Martin, Florida Department of Health, Siemens, Department of Homeland Security, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit https://www.wavecrest.net.