duo

Cisco Duo Security – Secure Access During Remote Work

In today’s environment, when many employees are working remotely, it is important for organizations to identify users and verify the security of their devices before opening access to various corporate applications and services. The Duo Security solution can help.

Duo Security is a developer of authentication systems that Cisco officially acquired in 2018. Thus, Duo’s CEO and his team have joined the Cisco network technology and security business.

Duo Security Solutions verifies the identity of users and the status of their devices before giving them access to applications. This helps prevent cyber security breaches. Integrating Cisco systems with zero-confidence Duo authentication products helps Cisco customers easily and securely connect users to any application on any network device.

Why is Duo Security useful?

duo-securityWe live in an era of access, and the cybersecurity industry is severely disrupted. Business-critical confidential data is now available to customers, partners, and employees who do not always use secure networks. And during the quarantine period, the probability of using such networks becomes even greater.

Duo Security products help you connect and use digital features securely.

Duo Security is:

  • Secure access.

The program will detect infections on third-party devices even before they are connected. This is an easy-to-use protection that allows you to do exactly what has real meaning.

  • Verified users.

Two-factor authentication of all users will help determine the truth of their identity. Also, such authentication provides the opportunity to introduce the most stringent policies regarding the availability of data for each employee.

  • Scan device.

Another feature of DUO protection is to check the user’s device for old software and missing security protocols.

  • All applications and data are protected.

No matter where your data is located, in the cloud or on a physical server, it will always be protected by malicious influences.

  • One authorization

Using Single sign-on (SSO) technology, logging in for each employee will be as simple as possible. Logging in to the system will be enough once to ensure constant access to any application of the enterprise.

  • Ubiquitous access.

During remote work, when all employees use their own devices to access the applications of their organization, this function becomes more popular and useful. They can access data from anywhere.

DuoScreen

Additional Duo features for administrator convenience and increased resource access protection:

  • Custom Self Service
  • Geographic Filters
  • Deny access to anonymous networks
  • Block or grant IP access
  • Ability to set individual authentication requirements for users with the highest level of access.
  • Control the level of protection of mobile devices on which the Duo Mobile application is installed, from viruses and the possibility of hacking.

Duo Security pricing depends on the number of features available. Despite the fact that Duo tariffs cannot be called cheap, in comparison with their large competitors (RSA, Vasco, Gemalto, etc.), their pricing policy is quite acceptable and consistent with its functionality. Learn more about this solution from our specialists.

eset-safetica

How to protect confidential data of employees during remote work?

Today, perhaps, one of the most popular issues is the issue of organizing telecommuting, namely the security of employee and company data.

What challenges arise when organizing remote work?

  • Organization of remote access to necessary resources
  • Securing endpoints that access your corporate network
  • Authentication of employees during the organization of access to the corporate network
  • Employee time control
  • Protecting Confidential Data
  • Backup & Restore

One of the most common problems is the protection of confidential information. What could cause a data leak?

  • Employee Mistakes: Lack of Information Security Skills, Device Loss, or Just Carelessness
  • Intentional leaks

dlp-safeticaESET has developed a special solution for protecting confidential data, as well as providing control over the actions of employees that affect their performance of their duties – DLP Safetica.

Now in those companies where DLP (Data Loss Prevention) is not installed, employees can exchange confidential documents through corporate mail, visit social networks, print non-work information on business printers, connect external media and copy information to them. This uncontrolled activity leads to chaos in the workplace, low staff efficiency and an increased risk of data leakage.

 

 

 

How does Safetica work?

This system is a comprehensive protection against internal intruders, which allows you to close the channels of information leakage and regulate the risks associated with the human factor.

Safetica consists of a server part, which includes a server with a management console, a database, an information security officer’s tool, and directly agents that perform the functions of monitoring data leakage and user actions.

safetica-scheme

What exactly can control Safetica?

It controls all file operations: transfer through cloud-based file-sharing systems and social networks, email, external media, various instant messengers, etc.

How useful is such a solution for each organization?

  • Reduce financial risks (human errors, lost laptops, industrial espionage …)
  • Protect sensitive data (email, external media, internet connection, download, print …)
  • Analyzes user behavior
  • Ensures compliance with regulatory requirements (GDPR, HIPAA, SOX, PCI-DSS, GLBA, ISO / IEC 27001 …)

One of the important benefits of Safetica is its ease and speed of deployment.

System installation is quite simple, in one distribution there are all necessary components. Both manual and automatic installation are possible.

safetica

System requirements for the server side (Service Management Safetica 8):

  • Quad-core processor
  • 4 GB RAM
  • 100 GB of disk space
  • (database + backups) Microsoft SQL Server 2008 and above, including Express
  • Microsoft Windows Server 2008 R2

For the client:

  • Dual core processor
  • 2 GB RAM
  • 2 GB of disk space
  • Microsoft Windows 7 32-bit and 64-bit and newer Windows

ASAP DEMO is an official partner of ESET. Therefore, we offer our services of implementation and customization of all their software products. To do this, contact us in any way convenient for you.

antivirus

The virus threatens not only people: we choose protection for Windows

There is a dispute between supporters and opponents of anti-virus programs for PCs and gadgets. A small percentage believes that for the safety of your device it’s enough to be a competent user, not follow dubious links, don’t install unverified software, etc. The main idea of ​​those who are against antiviruses is that modern protection tools are far from ideal and will not always be able to protect your gadget from viruses and malware. In part, they are right, because in most cases the infection of the operating system occurs through stupidity and not caution.

However, we are still supporters of antivirus software and believe that even the most experienced and careful user can make a mistake that will lead to serious problems and viruses.

How do antiviruses work?

The main tasks of antivirus software are to detect malicious code, prevent it from infecting the operating system or files, and restore them after infection.

How to choose the right protection? First of all, you need to decide how exactly you will protect your device: will it be permanent, background and automatic protection, or will it be enough one-time checks in manual mode?

When it comes to full-fledged protection tools, we by default mean primarily paid anti-virus software, which requires installation on a PC and provides constant background monitoring of what is happening in real time.

Below we have described the most popular anti-virus software that provide the best protection for personal data and have many additional useful features.

Bitdefender Antivirus Plus

bitdefenderThe Romanian company Bitdefender has developed one of the world’s most popular antiviruses, the functionality of which has a complete set of tools to prevent any virus attacks. Such an antivirus has a built-in firewall, intispam and antiphishing functions that block suspicious sites; multi-level protection of personal data and even webcam protection.

Pros of Bitdefender Antivirus Plus:

  • Convenient
  • Easy and simple interface
  • Accurate malware detection
  • Strong URL blocking

ESET NOD32

One of the most relevant antiviruses on the market today. Like its competitors, it is able to effectively counter most of the known cyber threats, including web protection, phishing protection and email protection.

eset-nod32Of the advantages of this software can be identified:

  • Low resource consumption. Compared to its competitors, the ESET application loads the system significantly less, while the scanning speed shows excellent results.
  • Cross-platform. NOD32 versions exist for all known platforms: Windows, Linux, OS X, and even for the Android mobile operating system.
  • ThreatSense technology that allows you to find and neutralize threats that are not even in the signature database.
  • Update distribution system
  • User friendly interface. The structure of the settings menu will make it easy even for a novice to figure out and configure the antivirus software as it sees fit.

Avast Pro Antivirus

avast-pro-antivirusThis product of the Czech company Avast Software back in 2017 became one of the most popular, surpassing all its competitors in many criteria and qualities. Such software can be bought at an affordable price and get reliable protection, practically without loading the processor.

Of the advantages of this antivirus, CyberCapture technology can be noted, which automatically sends unknown files found by the user to the laboratory, which contributes to the most rapid update of virus signatures.

 

 

 

Each of the above anti-virus programs has its pros and cons for specific tasks and goals. That is why our technical experts will help you figure out which software is best suited for your device. Contact us in any way convenient for you.

microsoft_365

Microsoft has announced an update to Office 365 – Microsoft 365 with new applications and features

Microsoft has announced a new subscription, which, in essence, is a rebranding of Office 365, but includes several new features and benefits.
The subscription is presented in two versions – Personal and Family, they will be available to users from April 21 this year. Existing Office 365 Personal and Home subscribers will be automatically migrated to Microsoft 365 with the release of new versions in April.

New Microsoft Editor

Microsoft 365 Subscription includes the new Microsoft Editor. The application has received new features and has become available as an extension of the Edge browser.
Thanks to the artificial intelligence that underlies Microsoft Editor, it is a set of tools that help with grammar and provide recommendations as you type. In addition, the editor supports more than 20 languages ​​and can be used in Word, Outlook, Edge and Google Chrome.
Microsoft Editor is available to everyone who has a Microsoft account, however, subscribers to the new Microsoft 365 will be able to use the editor with more advanced grammatical and stylistic improvements.

Updated PowerPoint Presenter Coach Feature

Microsoft 365 subscribers will be able to take advantage of the new PowerPoint Presenter Coach feature, which uses artificial intelligence to listen to the tone of your voice and provide real-time feedback with suggestions and tips on how to better write sentences and phrases.

Money in Excel

Money-in-ExcelThis function should greatly simplify financial management. It allows you to link bank accounts and credit card data so that Excel collects important data on income and expenses in a table and provides personalized financial analytics.
Money in Excel is an exclusive Microsoft 365 feature that will only be available on a paid basis.

 

In addition, Microsoft 365 includes premium templates, fonts, and icons. For example, PowerPoint Designer will automatically create a presentation design using more than 300 new templates, 8000 images, looping videos, fonts and icons, while ensuring the presentation is unique.

 

Microsoft is also currently working on upgrading the Microsoft Teams enterprise application. Today, it is a necessary application for remote teamwork, which allows you to chat, make calls, conduct video conferences and use other features for remote work in one application.
microsoft-teamsUpdated Teams will allow you to create groups to plan trips, create a schedule of events. Also, it will be possible to unite in group chats, conduct video calls, together make lists of tasks and set tasks for individuals. In addition, Teams will add tools for storing important information.

We, as an official Microsoft partner, will be happy to help you with the implementation and configuration of any cloud products or company updates. Contact us in any way convenient for you.

https-ssl-for-affiliates

How to make the Internet safe? Google Chrome will soon block downloading files via HTTP

A few years ago, Google began to consider HTTPS support when ranking search results with indexing of HTTPS pages by default. Soon, in the Chrome browser (from version 68), pages using the HTTP protocol began to be flagged as insecure. The next step taken to improve Internet security was to block file downloads without encryption.

Recall that in October 2019, the Chromium development team first announced the appropriate mechanism to combat the so-called “mixed” content and warned that blocking would be introduced gradually. What does “mixed” content mean? This is when on HTTPS pages individual elements are insecurely loaded via HTTP without encryption. This process was officially launched in Chrome 80.

In addition, the Google development team has published a plan to introduce in Chrome a new mechanism for blocking file downloads over HTTP. The improvement should increase the security of users on the Internet. As the developers explain, downloading files without encryption can be used by cybercriminals. They can intercept sensitive data through content spoofing during MITM attacks.

chrome_version_timelineIn the current version of Chrome 80, automatic updating of “mixed” audio and video content is enabled when possible. Also, corresponding notifications about mixed content appeared on the page for users – they will be displayed in the Omnibox line.

With the release of Chrome 82, the browser will start to warn you every time you try to insecurely download executable files using links from HTTPS pages. In Chrome 83, blocking for executable files will already be enabled by default, and warnings will be displayed for archives.

With the release of Chrome 84, the lock will extend to archives, and if documents are uploaded, the system will warn of potential dangers.
In Chrome 85, documents will also be blocked, and warnings will start to appear when unsafe downloading of images, videos, sound, and text that starts to block with the release of Chrome 86.chrome-http-download-blocked

In the mobile versions of Chrome for Android and iOS, blocking will be implemented with a lag of one release (warnings will appear not in Chrome 82, but in version 83, etc.). In Chrome 81, an option will appear in the service settings section that allows you to enable the display of warnings one release earlier. It is already available in the test version of Chrome Canary.

Обратный звонок