• Account
    • Customer Login

Menu

  • Home
  • Contact
  • Our Company
  • Products
  • Request Trial
  • Industries
    • Education
    • Government
    • Healthcare
    • Finance
  • Resources
    • Support
    • Events
    • Press
Home
Toggle mobile menu
1-800-662-6090
  • Home
  • Press
  • Support
  • Login
  • Products
    • Data Security
      • Encryption
        • MegaCryptionComprehensive Cryptography for the z/OS environment
        • MegaCryption PCSame great MegaCryption, but ported for use on PC systems.
        • MegaCryption IXSame great MegaCryption, but ported for use on Unix/Linux systems.
        • MegaCryption IDMSA variety of encryption options built specifically for CA IDMS data.
        • MegaCryption DB2MegaCryption encryption engineered specifically for DB2 systems on z/OS.
        • MegaZipArchival compression and encryption for z/OS for all common file formats.
        • CryptoMonBehind-the-scenes look at your z/OS cryptography.
      • Administration
        • ERARACF Security Risk Assessment and Auditing
        • ERQRACF Administration, Reporting, and Custom Programming
    • Access Management
      • Password Reset
        • ReACTA centralized, enterprise-wide self-service password reset solution.
        • ReACT MGReACT for GSA Contract Holders.
      • User Provisioning
        • ProACT
      • Access Recovery
        • OARAccess recovery solution for off-network and/or offline devices.
    • Systems
      • Data Management
        • SMFUTILSMF data management utility for z/OS for automating SMF processing.
        • SMFVIEWSMF data examining and repairing tool for z/OS.
        • WizDomA suite of solutions that includes tools for file maintenance, file aging, impact analysis, and date/time simulation.
      • Systems Administration
        • CIMEasy ICF catalog administration for z/OS operating systems.
        • SpaceCalcStorage efficiency right from the start: file modeling and allocation.
      • CICS
        • HelpKeyCreate online help screens interactively without programming knowledge.
  • Industries
    • Education
    • Government
    • Healthcare
    • Finance
  • Our Company
    • Customer Testimonials
    • Community
    • International Distributors
  • Resources
    • News
    • Events
    • ReACT Calculator
    • Contact
    • Career Opportunities
  • Request Trial

Tag: data breaches

Actions to Take When the Cyber Threat is Heightened

Published on May 13, 2022

via UK National Cyber Security Centre Balancing cyber risk and defence The threat an organization faces may vary over time. At any point, there is a need to strike a balance between the current threat, the measures needed to defend against it, the implications and…

1 Year Later: Actions Taken, Lessons Learned Since The Colonial Pipeline Cyberattack

Published on May 9, 2022

via Forbes A lot has happened in response to the Colonial Pipeline cyberattack a year ago today that created a crisis for the company and the country. President Joe Biden took steps to improve the country’s defenses against future cyberattacks and signed a bill into law that is designed to improve…

Responding to Heightened Cyberattack Risk: Focus on the Basics

Published on April 11, 2022

via CSO Online Take care of security basics first When reviewing your network for potential cyber threats, don’t make things worse by making misconfigurations that will create more problems. Spend time on the basics and on other projects that you probably should have worked on…

How to Protect Your Devices Against a Cyberattack

Published on March 23, 2022

Via ABC News A cyber security expert is sharing steps you should take, to protect yourself from a potential cyberattack. Hackers are already trying to break through, according to cyber security expert Randy Marchany. He said they're seeing an increase in probing, which means hackers…

How to Build a Culture of Cybersecurity

Published on March 17, 2022

Via MIT Sloan School of Management Technology and training are not enough to safeguard companies against today’s litany of cybersecurity attacks. Here’s how to infuse safe behavior into corporate culture. At a large bank, the CEO kicks off every all-staff meeting with a cybersecurity story,…

Don’t Ditch the Password Yet: Countering a Brute Force Attack

Published on February 15, 2022

There’s been a lot of chatter lately about moving on from passwords. But long passwords are still a good defense against some types of attacks. Brute force attack actors dedicate just a fraction of their efforts to cracking them, a Microsoft researcher found. The researcher…

Breach Response Shift: More Cyber-Insurance Coverage

Published on February 11, 2022

via Dark Reading Companies are more likely to rely on outside attorneys to handle cyber responses in order to contain potential lawsuits. Meanwhile, cyber insurance premiums are rising but covering less. The face of data breach investigations is changing as companies weigh business factors outside…

What You Need to Know About Data Encryption Right Now

Published on February 4, 2022

via Security Intelligence You might feel like you’ve heard these imperatives a million times: “You need to encrypt your data.” “Your information isn’t secure unless you encrypt it.” “You need to eat your fruits and vegetables.” But if you’re like a lot of people, you…

Businesses Suffered 50% More Cyberattack Attempts per Week in 2021

Published on January 28, 2022

Via Dark ReadingCyberattack attempts reached an all-time high in the fourth quarter of 2021, jumping to 925 a week per organization, partly due to attempts stemming from the Log4j vulnerability, according to new data. Check Point Research on Monday reported that it found 50% more…

Small Business Cybersecurity: What to Fix, What to Manage, and What to Outsource

Published on January 19, 2022

via Security Intelligence The risk posture of small and medium-sized businesses has changed a lot over the last few years. Bluntly: small businesses inherited a series of digital risks. Many of these risks, such as supply chain and cloud-related risks, can wound and devastate a small business. Meanwhile, the…

Topics

  • Access Management
  • Business
  • Cryptography
  • Data Security
  • Insider Program
  • Main Issue
  • Mainframes
  • News
  • Press
  • Press Releases
  • Uncategorized

Archives

  • 2022
  • 2021
  • 2020
  • 2019
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013

3185 Horseshoe Drive South
Naples, FL 34104-6138 USA

  • Phone: (239) 649-1548
  • Toll-Free: (800) 662-6090
  • After Hours: (239) 649-3099

Access Management

  • ReACT
  • OAR
  • ReACT MG
  • ProACT

Systems

  • CIM
  • SMFUTIL
  • WizDom
  • SpaceCalc
  • HelpKey

Data Security

  • MegaCryption
  • MegaCryption PC
  • MegaCryption IX
  • MegaCryption IDMS
  • MegaCryption DB2
  • MegaZip
  • CryptoMon
  • ERQ
  • ERA

Facebook profile Twitter profile Twitter profile

Copyright 2022 Advanced Software Products Group. All Rights Reserved.

Built by BOOST Creative

arrow drop cross
Hit enter to search or ESC to close

Can't find what you need?

Contact us directly at (239)-649-1548

May We Suggest?

MegaCryption - MegaZip - CryptoMon - ERQ - ReACT - ERA - OAR - CommandCICS - Help/Key

Having trouble logging in? Reset your password