• Account
    • Customer Login

Menu

  • Home
  • Contact
  • Our Company
  • Products
  • Request Trial
  • Industries
    • Education
    • Government
    • Healthcare
    • Finance
  • Resources
    • Support
    • Events
    • Press
Home
Toggle mobile menu
1-800-662-6090
  • Home
  • Press
  • Support
  • Login
  • Products
    • Data Security
      • Encryption
        • MegaCryptionComprehensive Cryptography for the z/OS environment
        • MegaCryption PCSame great MegaCryption, but ported for use on PC systems.
        • MegaCryption IXSame great MegaCryption, but ported for use on Unix/Linux systems.
        • MegaCryption IDMSA variety of encryption options built specifically for CA IDMS data.
        • MegaCryption DB2MegaCryption encryption engineered specifically for DB2 systems on z/OS.
        • MegaZipArchival compression and encryption for z/OS for all common file formats.
        • CryptoZCryptography Diagnostic Tool
      • Administration
        • ERARACF Security Risk Assessment and Auditing
        • ERQRACF Administration, Reporting, and Custom Programming
    • Access Management
      • Password Reset
        • ReACTA centralized, enterprise-wide self-service password reset solution.
        • ReACT MFAMulti-Factor Authentication Tool
        • ReACT MGReACT for GSA Contract Holders.
      • Access Recovery
        • OARAccess recovery solution for off-network and/or offline devices.
      • User Provisioning
        • ProACTUser provisioning and identity management.
    • Systems
      • Data Management
        • WizDomA suite of solutions that includes tools for file maintenance, file aging, impact analysis, and date/time simulation.
      • Systems Administration
        • CIMEasy ICF catalog administration for z/OS operating systems.
        • SpaceCalcStorage efficiency right from the start: file modeling and allocation.
      • CICS
        • Command CICSCICS Migration Tool
        • HelpKeyCreate online help screens interactively without programming knowledge.
  • Industries
    • Education
    • Government
    • Healthcare
    • Finance
  • Our Company
    • Customer Testimonials
    • Community
    • International Distributors
  • Resources
    • News
    • Events
    • ReACT Calculator
    • Contact
    • Career Opportunities
  • Request Trial

Tag: cyber safety

Digital safety is at a crossroads – here’s how we navigate online threats globally

Published on May 17, 2024

via World Economic Forum A recent survey conducted by Microsoft has brought to light a disturbing revelation: a staggering 69% of the 16,000 respondents across 16 countries encountered online risks within the past year. This alarming statistic underscores the pervasive nature of digital threats, including misinformation, disinformation,…

How to create a password that’s safe from hackers in 2024

Published on May 6, 2024

via This Is Money It can take less than six hours to hack 90 per cent of passwords, leaving your online identity, personal data, and bank accounts clicks away from any hacker worth their salt. Gone are the halcyon days of choosing passwords such as…

Cybersecurity Tips for Traveling This Summer

Published on June 2, 2023

via Travel Pulse Summer travel is starting to sizzle, and that means travelers need to be vigilant about security for the devices they use, such as laptops, phones and tablets. With millions of Americans planning trips, cybersecurity company Lookout's cyber security expert Hank Schless provided tips for travelers so…

Now Social Engineering Attackers Have AI. Do You? 

Published on May 31, 2023

via Security Intelligence Everybody in tech is talking about ChatGPT, the AI-based chatbot from Open AI that writes convincing prose and usable code. The trouble is malicious cyber attackers can use generative AI tools like ChatGPT to craft convincing prose and usable code just like everybody…

The Role of Human Resources in Cybersecurity

Published on April 5, 2023

via Security Intelligence The human resources (HR) department is an integral part of an organization. They work with all departments with a wider reach than even IT. As a highly visible department, HR can support and improve an organization’s security posture through employee training. Their…

Actions to Take When the Cyber Threat is Heightened

Published on May 13, 2022

via UK National Cyber Security Centre Balancing cyber risk and defence The threat an organization faces may vary over time. At any point, there is a need to strike a balance between the current threat, the measures needed to defend against it, the implications and…

1 Year Later: Actions Taken, Lessons Learned Since The Colonial Pipeline Cyberattack

Published on May 9, 2022

via Forbes A lot has happened in response to the Colonial Pipeline cyberattack a year ago today that created a crisis for the company and the country. President Joe Biden took steps to improve the country’s defenses against future cyberattacks and signed a bill into law that is designed to improve…

How to Build a Culture of Cybersecurity

Published on March 17, 2022

Via MIT Sloan School of Management Technology and training are not enough to safeguard companies against today’s litany of cybersecurity attacks. Here’s how to infuse safe behavior into corporate culture. At a large bank, the CEO kicks off every all-staff meeting with a cybersecurity story,…

7 Pressing Cybersecurity Questions Boards Need to Ask

Published on March 14, 2022

Via Harvard Business Review For every new technology that cybersecurity professionals invent, it’s only a matter of time until malicious actors find a way around it. We need new leadership approaches as we move into the next phase of securing our organizations. For Boards of…

Bosses are Reluctant to Spend Money on Cybersecurity. Then They Get Hacked.

Published on December 8, 2021

Via ZDNet Preventing a cyberattack is more cost-effective than reacting to one - but many boardrooms still aren't willing to free up their budget. Many businesses still aren't willing to spend money on cybersecurity because they view it as an additional cost – and then…

Topics

  • Access Management
  • Business
  • Cryptography
  • Data Security
  • Insider Program
  • Main Issue
  • Mainframes
  • Multi-Factor Authentication
  • News
  • Press
  • Press Releases
  • Uncategorized

Archives

  • 2025
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013

3185 Horseshoe Drive South
Naples, FL 34104-6138 USA

  • Phone: (239) 649-1548
  • Toll-Free: (800) 662-6090
  • After Hours: (239) 649-3099

Access Management

  • ReACT
  • OAR
  • ReACT MG
  • ReACT MFA
  • ProACT

Systems

  • CIM
  • WizDom
  • SpaceCalc
  • HelpKey
  • Command CICS

Data Security

  • MegaCryption
  • MegaCryption PC
  • MegaCryption IX
  • MegaCryption IDMS
  • MegaCryption DB2
  • MegaZip
  • CryptoZ
  • ERQ
  • ERA

Compliance

  • Accessibility Statement

Facebook profile Twitter profile LinkedIn profile Instagram profile

Copyright 2025 Advanced Software Products Group. All Rights Reserved.

Built by BOOST Creative

arrow drop cross
Hit enter to search or ESC to close

Can't find what you need?

Contact us directly at (239)-649-1548

May We Suggest?

MegaCryption - MegaZip - CryptoMon - ERQ - ReACT - ERA - OAR - CommandCICS - Help/Key

Having trouble logging in? Reset your password