Tag Archives: control employee web activity

Things That Lie In Wait

crocodile-small

There are many shows on cable today that portray instant recognition of a breach. To repeat what all others in the actual cyber industry say . . . not realistic.

Think of the scenario where an employee opens a file or accesses a malicious Web site. Step one is done. Nothing happens; the employee shrugs his or her shoulders and moves on. Nothing happened, so we are all good, right? Wrong. In reality, malware can happen behind the scenes with no visual effect at all at the time of being infected. The malware is just lying in wait. It either waits for an external signal–a preprogrammed time or until a specific action on the host computer is done. A hacker then would have access to look around, doing nothing noticeable, just checking things out . . . until the time that he finds what he wants.

Six months pass. All of a sudden, systems are breached, potentially causing loss of controls, data, or financial information. And no one knows where or how it happened until a thorough investigation finally points back to the past point in time.

It sounds unavoidable, right? No, it’s not unavoidable but the chances increase all the time that it will happen to your business. But if you take steps to protect and prepare as much as possible, the damage can be potentially avoided or at least somewhat overcome.

How? Here are 5 steps to try to avoid or quickly recover from a breach:

  1. BACK UP!!! Enough said. Think cloud, separate, secure, and frequent. Ransomware, a type of malware, takes over your files and holds them hostage. With a secure and separate backup, your business can go on operating.
  2. Train. Train your employees for anything that could happen. Teach them about current cyber threats; keep them informed. They can be considered an additional “firewall.”
  3. Use patch management. The days of worrying about how frustrating the changes will be from new updates are over. Patch consistently . . . because many of the patches today are security related and crucial to staying protected.
  4. Apply multiple layers of security. Your firewall will not protect you from a threat that originates internally. And yes, many happen using some form of an internal breach such as phishing and e-mails with malware links, or by way of privileged credentials whether internally or from a breach at a third-party contractor. Get a comprehensive employee Web-use security solution that will block access to malicious sites and links.
  5. Monitor. Watch it all. You will see trends, user behavior, and anomalies. Monitor network activity and the activity that accesses the Internet. Guest Wi-Fi networks, BYOD, and employee Web use should be included. Make sure you have visibility into what is going on with a solution that not only provides real-time monitoring, but also forensic-level detail reporting easily accessible by both IT and managers.

Overall, taking steps to ensure your business is protected is crucial, but know that you can still keep critical business operations functioning following any type of breach. Providing proactive solutions to protect, secure, and manage your business’s Web use in a cost-effective, agile, and customer-centric way is what we do. Let us help.

About Wavecrest Computing

Celebrating 20 years in business, Wavecrest Computing, headquartered in historic downtown Melbourne, FL, has provided commercial business and government clients with reliable, accurate Web-use management and Cloud Access Security Broker products since 1996. Managed Service Providers, IT specialists, HR professionals, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage employee Internet usage — managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest has clients worldwide, including General Electric, Lockheed Martin, Florida Department of Health, Siemens, Department of Homeland Security, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit https://www.wavecrest.net.

Interesting to watch, yes. Useful to you, the customer . . . resounding no.

pillows fighting

When you watch two big companies argue, it tends to become interesting. We think so anyway! Zscaler pushes for cloud versus appliance benefits, while Forcepoint pushes back with Zscaler’s expensive, hidden costs with limited options. We admit they each get some points for effort. Why then do we watch with interest? Because Wavecrest tends to stay out of the fray with not only all the options you need for your distributed and unique workforce, but the pricing that will allow you to see ROI almost immediately.

Forcepoint definitely represents the changes that have happened since the Raytheon acquisition of Websense. Websense customers may very well be feeling some pinch this year since the acquisition’s changes are finally kicking in. Support or customer service people are hard to get a hold of. When renewal time comes around, the pricing, contract terms, or even the product lines have changed, and more. Hesitate before you sign on. You probably don’t need the entire package being pushed or to pay the add-on prices for things like SSL inspection or technical support that should already be included in the first place!

Zscaler, on the other hand, is on a mission to destroy the idea of hardware for your Web security. We disagree. A hardware option can play a critical role in the security of your business. In fact, our CyBlock Appliance is very popular and is consistently updated with new capabilities to protect your business against today’s always changing cyber threats — and the updates come at no additional cost to our customers!

Stop having to choose from limited options, or having to purchase more than you require because of all-in-one packages. Don’t get talked into believing that you are wrong to still want hardware instead of SaaS, or that you have to pay more for services or technical support you deserve. We have a solution and deployment that fits all workforce configurations. Purchase CyBlock Appliance and then add a remote office or roaming users. Great! CyBlock Hybrid will cover you. Purchase CyBlock Software and add another office in Italy? Grande! CyBlock Software is there for you without paying for an additional software license. Looking for a deployment requiring no hardware or software to buy and install, and no ongoing maintenance . . . CyBlock Cloud will be your solution.

Get involved in the process again. Become not just our customer but part of our family, knowing that we think of you first, listen, and react. You are our focus . . . not competing Goliaths or hardware bashers.

Wavecrest has cost-effective, comprehensive, agile, and reliable solutions for your employee Web-use security and analytics needs, ranging from software and hardware deployments to cloud and hybrid deployments–all with U.S.-based technical support included. No matter your business size, industry, or distributed workforce, Wavecrest has a solution for you. Leave the high prices and complicated contractual terms, hidden fees for technical support or product updates, and all the confusion (and arguing) behind. Let Wavecrest focus on your business and your specific requirements. Talk to us today.

About Wavecrest Computing

Celebrating 20 years in business, Wavecrest Computing, headquartered in historic downtown Melbourne, FL, has provided commercial business and government clients with reliable, accurate Web-use management and Cloud Access Security Broker products since 1996. Managed Service Providers, IT specialists, HR professionals, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage employee Internet usage — managing cloud services and guest Wi-Fi networks, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest has clients worldwide, including General Electric, Lockheed Martin, Florida Department of Health, Siemens, Department of Homeland Security, and a growing list of global enterprises and government agencies. Proud GSA contract holder for over 16 years and counting. For more information on the company, products, and partners, visit https://www.wavecrest.net.

Time for a change . . . for the better.

culturechange2

Changes are finally showing at Forcepoint since the Raytheon acquisition of Websense. We know Websense customers are feeling some pinch this year since the Raytheon policies are now kicking in. Support or customer service people are harder to get a hold of. When renewal time comes around, the pricing, contract terms, and even the product lines have changed, and more.

Hesitate before you sign on again. Why should you pay extra for add-ons that should already be included in a Web-use security solution, like SSL inspection and U.S.-based technical support? Or why should you pay for a cloud solution that does not have the reporting detail that makes it a useful tracking or investigative tool? Research your options. It may well be time for your own change — to a stable, customer-centric Web-use security solution vendor like Wavecrest Computing.

Wavecrest has cost-effective, comprehensive, agile, and reliable solutions for your employee Web-use security and analytics needs, ranging from software and hardware deployments to cloud and hybrid deployments–all with SSL inspection, forensic-level reporting detail, and U.S.-based technical support included. No matter your business size, industry, or distributed workforce, Wavecrest has an easy-to-setup and easy-to-manage solution for you. Leave the high prices and complicated contractual terms, hidden fees for technical support or product updates, and all the confusion behind. Let Wavecrest focus on your business and your specific requirements. Talk to us today.

About Wavecrest Computing

Celebrating 20 years in business, Wavecrest Computing, headquartered in historic downtown Melbourne, FL, has provided commercial business and government clients with reliable, accurate Web-use management and Cloud Access Security Broker products since 1996. Managed Service Providers, IT specialists, HR professionals, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage employee Internet usage — managing cloud services and guest Wi-Fi networks, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest has clients worldwide, including General Electric, Lockheed Martin, Florida Department of Health, Siemens, Department of Homeland Security, and a growing list of global enterprises and government agencies. Proud GSA contract holder for over 16 years and counting. For more information on the company, products, and partners, visit https://www.wavecrest.net.

Security should make you feel secure . . . right?!

big_fish_little_fish

It is important to note that many companies are acquired every day, and this can be a good thing . . . for them. Or maybe not . . . “According to collated research and a recent Harvard Business Review report, the failure rate for mergers and acquisitions (M&A) sits between 70 percent and 90 percent,”Business Review Europe, 2015. More importantly for you as customers, many companies that are acquired leave old customers behind, picking up the pieces of what is left of good service, good prices, good products, and even good friendships.

Service is a critical part of finding the right vendor, especially in security today. There are just too many risks out there that SMBs don’t have the time to fully educate themselves about–they just want to go about their business. So for these SMBs, it is more important to rely on a vendor who they know and trust. When this type of service ends, it can be a major disruption requiring many businesses to decide to deal with the higher prices, more complex contracts, and foreign-based service people with endless ticket systems and long wait times.

About a year after the vendor is acquired, the new corporation’s policies really kick in, and customers start getting a good idea of changes. Renewal time comes around and instead of your vendor team member calling you to talk about how everything is and if there are any changes to your needs, you get an invoice with extensive terms and conditions that you need to hire a lawyer to understand. Prices increase and you wonder if it is not just to pay for all the terms and conditions being written!

What once was one of your favorite products becomes a burden. Product names change, product lines are cancelled or combined with new product lines, and the confusion builds. Cybersecurity industry acquisitions are becoming hard to follow. One is bought by another, to be bought by another, and then another that has already bought five other companies . . . names mix, divisions are formed, and old relationships are destroyed.

Security for your business should make you feel secure. It should not be something that holds you back or gobbles you up. Don’t be fooled by the promises vendors make just to hold onto you so that they can raise prices at renewal time. You got into business to focus on what you do. It should not be about keeping up with the fine print of enterprise security, the in and outs of the industry acquisitions, confusing contract terms, and high prices. Find that vendor who will become your “stable go-to.” Get a security vendor that makes you and your business feel secure.

About Wavecrest Computing

Celebrating 20 years in business, Wavecrest Computing, headquartered in historic downtown Melbourne, FL, has provided commercial business and government clients with reliable, accurate Web-use management and Cloud Access Security Broker products since 1996. Managed Service Providers, IT specialists, HR professionals, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage employee Internet usage — managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest has clients worldwide, including General Electric, Lockheed Martin, Florida Department of Health, Siemens, Department of Homeland Security, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit https://www.wavecrest.net.

Think defense.

ransom

Ransomware has the annoying characteristic of sneaking up on you. If you aren’t prepared, you may as well pay the ransom. Why? Because being prepared for loss of data is not at all difficult. First off–think old school . . . BACK UP, BACK UP, and BACK UP! This first very important step is that simple.

Think about what you do on your devices today, professionally or personally. We now live our lives in this digital environment. It is likely your use of technology has increased, even in the past year. This puts all of us at risk. Not just on our desktops either. Wired.com reports “these days ransomware doesn’t just affect desktop machines or laptops; it also targets mobile phones. Last week news broke of a piece of ransomware in the wild masquerading as a porn app. The so-called Porn Droid app targets Android users and allows attackers to lock the phone and change its PIN number while demanding a $500 ransom from victims to regain access.” Not many people could function today without access to their phones. Businesses are becoming more and more friendly to mobile devices as well. All this data floating around just makes it more appealing to hackers.

Where do we go from here? Back . . . back to backing up. Get that portable hard drive back out, dust it off, and use it. Yup . . . I did say that. Back it all up. Of course, for businesses it is more complex (and critical). But that is what cloud storage services are for. My only recommendation when it comes to off-site backups? Use more than one service. This way if anything does happen to your access to one backup, you will still have access to another. Inserting stern warning here: Do not store your passwords on your devices or in your backups unencrypted. If a hacker can access and lock up your systems, then he can find your passwords and have a go at them as well, including access to your backups.

Protect your business. Train your employees about new threats and monitor what is happening. Information is a gold mine–get visibility to see where your employees are going and then make some decisions that can protect your business. Ransomware can hit you through just a link in an e-mail. Make sure you have a solution in place that will help stop access to malicious Web sites.

We need to rethink the way we operate. It is just a shift, and if you just do it now, then you won’t be alarmed when you do get hit. Sadly, chances of a business being victimized by cybercrime are becoming more and more likely. Be prepared. And please, don’t let them win. The Internet has opened up so many opportunities for us and generations to come. Singapore is a perfect example of letting hackers win. They are moving to shut down Internet access for government computers, “from May next year and affect about 100,000 computers in use in the public service in the city-state, local media said.” (Reuters)

Do you think giving up Internet access will solve cybercrime?

We can help you find a better way.

About Wavecrest Computing

Celebrating 20 years in business, Wavecrest Computing, headquartered in historic downtown Melbourne, FL, has provided commercial business and government clients with reliable, accurate Web-use management and Cloud Access Security Broker products since 1996. Managed Service Providers, IT specialists, HR professionals, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage employee Internet usage — managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest has clients worldwide, including General Electric, Lockheed Martin, Florida Department of Health, Siemens, Department of Homeland Security, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit https://www.wavecrest.net.

Wavecrest Computing Announces the Release of Our Redesigned User Interface

We are excited to announce the release of our redesigned user interface for Cyfin, CyBlock Software, CyBlock Appliance, and CyBlock Cloud.  The new user interface (UI) design was a collaborative effort, including direct customer input. This input played a major role in the design and layout of the new UI.  The results of this shared effort include a very intuitive layout with easy-to-use navigation and a widescreen layout that will cleanly work with any size monitor.

The new UI enhances our clients’ productivity by making it easier to access, configure, and manage all product functionality. We invite you to contact sales or technical support if you have any questions about the new UI!

NewUI

The World Cup Means Time Wasted at Work

The 2010 FIFA World Cup games begin today and will run until July 11.  Challenger, Gray & Christmas, a research firm that deals with lost workplace productivity, ranks the World Cup as one of the biggest time wasters in the workplace worldwide.  And it’s not just time that World Cup viewers will suck up in the workplace.  Bandwidth consumption will also increase with the availability of video streaming of the games.

While the World Cup ranks number 4 in the US as a top time waster behind March Madness, the Super Bowl and Fantasy Football, it will still cost American companies about $121.7 million in lost productivity.  The British economy, however, is looking to lose about $7.36 billion in productivity, according to the British law firm Brabners Chaffe Street.

Wavecrest’s Cyfin and CyBlock products and services help all types of organizations manage and control employee Web activity. Cyfin and CyBlock products do this by monitoring and/or filtering employees’ Web use and reporting on the activity by content categories, e.g., sports, social networking, games, and others. Of particular note, with regard to the World Cup, CyBlock products can be set up to block Web access by categories and by hour so employees can access sports sites on their lunch break or after hours. This approach can help sustain morale while minimizing lost productivity and bandwidth associated with the World Cup.

Sources:
https://blogs.reuters.com/shop-talk/2010/06/08/world-cup-is-no-march-madness-in-sapping-productivity/
https://www.bizjournals.com/kansascity/blog/2010/06/world_cup_promises_some_kick_to_productivity_apps_aim_to_help.html
https://www.usnews.com/usnews/biztech/articles/060608/8worldcup.htm