• Account
    • Customer Login

Menu

  • Home
  • Contact
  • Our Company
  • Products
  • Request Trial
  • Industries
    • Education
    • Government
    • Healthcare
    • Finance
  • Resources
    • Support
    • Events
    • Press
Home
Toggle mobile menu
1-800-662-6090
  • Home
  • Press
  • Support
  • Login
  • Products
    • Data Security
      • Encryption
        • MegaCryptionComprehensive Cryptography for the z/OS environment
        • MegaCryption PCSame great MegaCryption, but ported for use on PC systems.
        • MegaCryption IXSame great MegaCryption, but ported for use on Unix/Linux systems.
        • MegaCryption IDMSA variety of encryption options built specifically for CA IDMS data.
        • MegaCryption DB2MegaCryption encryption engineered specifically for DB2 systems on z/OS.
        • MegaZipArchival compression and encryption for z/OS for all common file formats.
        • CryptoMonBehind-the-scenes look at your z/OS cryptography.
      • Administration
        • ERARACF Security Risk Assessment and Auditing
        • ERQRACF Administration, Reporting, and Custom Programming
    • Access Management
      • Password Reset
        • ReACTA centralized, enterprise-wide self-service password reset solution.
        • ReACT MGReACT for GSA Contract Holders.
      • User Provisioning
        • ProACT
      • Access Recovery
        • OARAccess recovery solution for off-network and/or offline devices.
    • Systems
      • Data Management
        • SMFUTILSMF data management utility for z/OS for automating SMF processing.
        • SMFVIEWSMF data examining and repairing tool for z/OS.
        • WizDomA suite of solutions that includes tools for file maintenance, file aging, impact analysis, and date/time simulation.
      • Systems Administration
        • CIMEasy ICF catalog administration for z/OS operating systems.
        • SpaceCalcStorage efficiency right from the start: file modeling and allocation.
      • CICS
        • HelpKeyCreate online help screens interactively without programming knowledge.
  • Industries
    • Education
    • Government
    • Healthcare
    • Finance
  • Our Company
    • Customer Testimonials
    • Community
    • International Distributors
  • Resources
    • News
    • Events
    • ReACT Calculator
    • Contact
    • Career Opportunities
  • Request Trial

Tag: cyberattacks

Actions to Take When the Cyber Threat is Heightened

Published on May 13, 2022

via UK National Cyber Security Centre Balancing cyber risk and defence The threat an organization faces may vary over time. At any point, there is a need to strike a balance between the current threat, the measures needed to defend against it, the implications and…

How to Build a Culture of Cybersecurity

Published on March 17, 2022

Via MIT Sloan School of Management Technology and training are not enough to safeguard companies against today’s litany of cybersecurity attacks. Here’s how to infuse safe behavior into corporate culture. At a large bank, the CEO kicks off every all-staff meeting with a cybersecurity story,…

7 Pressing Cybersecurity Questions Boards Need to Ask

Published on March 14, 2022

Via Harvard Business Review For every new technology that cybersecurity professionals invent, it’s only a matter of time until malicious actors find a way around it. We need new leadership approaches as we move into the next phase of securing our organizations. For Boards of…

CISA’s New Advisory Panel is Announced

Published on December 6, 2021

Via CyberScoop The Cybersecurity and Infrastructure Security Agency on Wednesday named members to a new cyber advisory panel that will make recommendations on subjects ranging from battling misinformation to gaining aid from the hacker community on national cyber defense. Among the 23 members selected are…

7 Unexpected Ransomware Costs

Published on September 30, 2021

Via CSO Online Ransomware is one of the fastest-growing cybersecurity attacks. One of the factors that make these threats especially intimidating is that the costs can be far-reaching. An August 2021 report from security consultancy NCC Group shows that the number of worldwide ransomware attacks analyzed by the…

Why Is There a Surge in Ransomware Attacks?

Published on August 20, 2021

via The Hacker News The U.S. is presently combating two pandemics--coronavirus and ransomware attacks. Both have partially shut down parts of the economy. However, in the case of cybersecurity, lax security measures allow hackers to have an easy way to rake in millions. It's pretty…

US Announces Formation of the Joint Cyber Defense Collaborative (JCDC)

Published on August 9, 2021

via Cyberwire CISA recently announced that it was forming a Joint Cyber Defense Collaborative (JCDC). The JCDC will be an interagency Federal partnership, a cooperative effort with state, local, tribal, and territorial governments, and, of course, a public-private partnership. Their media advisory explained: "CISA is…

Educating the Educators: Protecting Student Data

Published on July 13, 2021

Via Security Intelligence The K-12 Cybersecurity Resource Center reported 408 publicized school cyberattacks in 2020, up by 18% over 2019. Many more attacks weren’t publicized, like my son’s teacher’s issue. So that number represents just a fraction of school cybersecurity issues over the past year. The threats…

Speed of Digital Transformation May Lead to Greater App Vulnerabilities

Published on June 22, 2021

Via Dark Reading The fastest-moving industries are struggling to produce secure code, according to AppSec experts. Digital transformation initiatives have become a common way for companies to make their businesses more agile and to adapt quickly to market changes. But faster software development speeds and…

The Evolving Threat of Ransomware and How to Guard Against Attacks

Published on June 4, 2021

Via IT Security Guru As one of the unfortunate benefactors from the changing business behaviours of the pandemic, ransomware attack trends continue to evolve. During the last year, malicious actors have attacked anything from healthcare organisations and medical trials, to education and the public sector,…

Topics

  • Access Management
  • Business
  • Cryptography
  • Data Security
  • Insider Program
  • Main Issue
  • Mainframes
  • News
  • Press
  • Press Releases
  • Uncategorized

Archives

  • 2022
  • 2021
  • 2020
  • 2019
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013

3185 Horseshoe Drive South
Naples, FL 34104-6138 USA

  • Phone: (239) 649-1548
  • Toll-Free: (800) 662-6090
  • After Hours: (239) 649-3099

Access Management

  • ReACT
  • OAR
  • ReACT MG
  • ProACT

Systems

  • CIM
  • SMFUTIL
  • WizDom
  • SpaceCalc
  • HelpKey

Data Security

  • MegaCryption
  • MegaCryption PC
  • MegaCryption IX
  • MegaCryption IDMS
  • MegaCryption DB2
  • MegaZip
  • CryptoMon
  • ERQ
  • ERA

Facebook profile Twitter profile Twitter profile

Copyright 2022 Advanced Software Products Group. All Rights Reserved.

Built by BOOST Creative

arrow drop cross
Hit enter to search or ESC to close

Can't find what you need?

Contact us directly at (239)-649-1548

May We Suggest?

MegaCryption - MegaZip - CryptoMon - ERQ - ReACT - ERA - OAR - CommandCICS - Help/Key

Having trouble logging in? Reset your password