Cybersecurity Tips for a Safer Vacation
Published on July 21, 2022
via Security Intelligence The beauty of having different climates around the world is that there is always somewhere we can travel for leisure all year round. These are times when we tend to relax and let our guard down. The reality, though, is that cyber…
Why Multi-Factor Authentication is Key to Modern Cybersecurity
Published on July 8, 2022
via CIO According to recent data from the Identity Theft Resource Center, there was a 14% increase in data breaches and compromises in the first quarter of 2022 compared to 2021. What’s more — this is the third consecutive year where breaches have increased in Q1.…
Stay Safe Online: Hack-Proof Your Passwords
Published on July 5, 2022
Via WMAR According to data compiled by the university of Maryland, there’s a hacking attack on computers with internet access every 39 seconds. These attacks affect one in three Americans each year. One of the biggest ways hackers break into accounts is through unsecure passwords.…
The Role of Mainframe in Modern Business
Published on June 27, 2022
Via CIO When people hear the term mainframe they typically think of a tall, black computer in a storage closet or some 2000’s pop culture reference (e.g., The Matrix). In reality, people are engaging with technology that relies on the mainframe every day, like when…
Evolving Beyond the Password: It’s Time to Up the Ante
Published on June 22, 2022
via Dark Reading The fact that we continue to rely on passwords this deep into the digital age is more than a bit jarring. These alphanumeric scraps, the equivalent of digital skeleton keys, once served as a valuable tool. Unfortunately, passwords are now far more trouble than…
Revisit Your Password Policies to Retain PCI Compliance
Published on June 16, 2022
via Bleeping Computer Ever since 2004, the payment card industry has required merchants who accept credit card payments to adhere to the Payment Card Industry Data Security Standards (PCI DSS, often shortened to PCI). This requirement doesn’t just apply to merchants, but is applicable to…
Cloud or Mainframe?
Published on June 7, 2022
via Dancing Dinosaur To respond to the ongoing pressures of the global pandemic and more, IBM observed that businesses around the world have turbo-charged their digital transformations. At least some of these priorities are companies looking to take advantage of cloud computing. Strategically, they…
ASPG, Inc. Announces Alliance Partnership with Sheltered Harbor
Published on May 23, 2022
Advanced Software Products Group (ASPG, Inc.) is delighted to announce a new alliance partnership with Sheltered Harbor, the financial industry-established and industry-led not-for-profit organization whose mission is to protect public confidence in the U.S. financial system if a cyberattack causes an institution’s critical systems and…
The Logic Behind Three Random Words
Published on May 18, 2022
via UK National Cyber Security Centre One of the most popular pages on the NCSC website, nearly 5 years after its first publication, is 'Three random words or #thinkrandom'. It explains how - by combining three random words - you can create a password that's…
Actions to Take When the Cyber Threat is Heightened
Published on May 13, 2022
via UK National Cyber Security Centre Balancing cyber risk and defence The threat an organization faces may vary over time. At any point, there is a need to strike a balance between the current threat, the measures needed to defend against it, the implications and…