• Account
    • Customer Login

Menu

  • Home
  • Contact
  • Our Company
  • Products
  • Request Trial
  • Industries
    • Education
    • Government
    • Healthcare
    • Finance
  • Resources
    • Support
    • Events
    • Press
Home
Toggle mobile menu
1-800-662-6090
  • Home
  • Press
  • Support
  • Login
  • Products
    • Data Security
      • Encryption
        • MegaCryptionComprehensive Cryptography for the z/OS environment
        • MegaCryption PCSame great MegaCryption, but ported for use on PC systems.
        • MegaCryption IXSame great MegaCryption, but ported for use on Unix/Linux systems.
        • MegaCryption IDMSA variety of encryption options built specifically for CA IDMS data.
        • MegaCryption DB2MegaCryption encryption engineered specifically for DB2 systems on z/OS.
        • MegaZipArchival compression and encryption for z/OS for all common file formats.
        • CryptoMonBehind-the-scenes look at your z/OS cryptography.
      • Administration
        • ERARACF Security Risk Assessment and Auditing
        • ERQRACF Administration, Reporting, and Custom Programming
    • Access Management
      • Password Reset
        • ReACTA centralized, enterprise-wide self-service password reset solution.
        • ReACT MGReACT for GSA Contract Holders.
      • User Provisioning
        • ProACT
      • Access Recovery
        • OARAccess recovery solution for off-network and/or offline devices.
    • Systems
      • Data Management
        • SMFUTILSMF data management utility for z/OS for automating SMF processing.
        • SMFVIEWSMF data examining and repairing tool for z/OS.
        • WizDomA suite of solutions that includes tools for file maintenance, file aging, impact analysis, and date/time simulation.
      • Systems Administration
        • CIMEasy ICF catalog administration for z/OS operating systems.
        • SpaceCalcStorage efficiency right from the start: file modeling and allocation.
      • CICS
        • HelpKeyCreate online help screens interactively without programming knowledge.
  • Industries
    • Education
    • Government
    • Healthcare
    • Finance
  • Our Company
    • Customer Testimonials
    • Community
    • International Distributors
  • Resources
    • News
    • Events
    • ReACT Calculator
    • Contact
    • Career Opportunities
  • Request Trial

Tag: password security

Responding to Heightened Cyberattack Risk: Focus on the Basics

Published on April 11, 2022

via CSO Online Take care of security basics first When reviewing your network for potential cyber threats, don’t make things worse by making misconfigurations that will create more problems. Spend time on the basics and on other projects that you probably should have worked on…

How to Protect Your Devices Against a Cyberattack

Published on March 23, 2022

Via ABC News A cyber security expert is sharing steps you should take, to protect yourself from a potential cyberattack. Hackers are already trying to break through, according to cyber security expert Randy Marchany. He said they're seeing an increase in probing, which means hackers…

The End-User Frustration of Password Resets

Published on February 24, 2022

via Tech Genix Ask any user to list the things that frustrate them the most about their employer’s IT department, and password policies are sure to be near the top of the list. Password rage is real, and the typical way in which most organizations…

Don’t Ditch the Password Yet: Countering a Brute Force Attack

Published on February 15, 2022

There’s been a lot of chatter lately about moving on from passwords. But long passwords are still a good defense against some types of attacks. Brute force attack actors dedicate just a fraction of their efforts to cracking them, a Microsoft researcher found. The researcher…

Breach Response Shift: More Cyber-Insurance Coverage

Published on February 11, 2022

via Dark Reading Companies are more likely to rely on outside attorneys to handle cyber responses in order to contain potential lawsuits. Meanwhile, cyber insurance premiums are rising but covering less. The face of data breach investigations is changing as companies weigh business factors outside…

Businesses Suffered 50% More Cyberattack Attempts per Week in 2021

Published on January 28, 2022

Via Dark ReadingCyberattack attempts reached an all-time high in the fourth quarter of 2021, jumping to 925 a week per organization, partly due to attempts stemming from the Log4j vulnerability, according to new data. Check Point Research on Monday reported that it found 50% more…

Small Business Cybersecurity: What to Fix, What to Manage, and What to Outsource

Published on January 19, 2022

via Security Intelligence The risk posture of small and medium-sized businesses has changed a lot over the last few years. Bluntly: small businesses inherited a series of digital risks. Many of these risks, such as supply chain and cloud-related risks, can wound and devastate a small business. Meanwhile, the…

The Top 5 Cybersecurity Tools to Implement Right Now

Published on January 11, 2022

via Infosecurity Magazine Since the beginning of the pandemic, the US Federal Bureau of Investigation (FBI) has reported a 400% increase in cyber-attacks. What’s more, as of July 31 2021, the FBI has reported a 62% increase in reported ransomware incidents since the beginning of the year as…

Cost of Account Unlocks, and Password Resets Add Up

Published on November 1, 2021

via The Hacker News There are many labor-intensive tasks that the IT service desk carries out on a daily basis. None as tedious and costly as resetting passwords. Modern IT service desks spend a significant amount of time both unlocking and resetting passwords for end-users.…

Why Enterprises are Subcontracting Cybersecurity Work

Published on October 22, 2021

Via VentureBeat NewtonX market research revealed this week that 56% of organizations surveyed subcontract as much as 25% of their cybersecurity work. In the study, more than 100 chief information security officers, CTOs, and other senior decision-makers indicated a trend toward subcontracting one of the most critical roles…

Topics

  • Access Management
  • Business
  • Cryptography
  • Data Security
  • Insider Program
  • Main Issue
  • Mainframes
  • News
  • Press
  • Press Releases
  • Uncategorized

Archives

  • 2022
  • 2021
  • 2020
  • 2019
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013

3185 Horseshoe Drive South
Naples, FL 34104-6138 USA

  • Phone: (239) 649-1548
  • Toll-Free: (800) 662-6090
  • After Hours: (239) 649-3099

Access Management

  • ReACT
  • OAR
  • ReACT MG
  • ProACT

Systems

  • CIM
  • SMFUTIL
  • WizDom
  • SpaceCalc
  • HelpKey

Data Security

  • MegaCryption
  • MegaCryption PC
  • MegaCryption IX
  • MegaCryption IDMS
  • MegaCryption DB2
  • MegaZip
  • CryptoMon
  • ERQ
  • ERA

Facebook profile Twitter profile Twitter profile

Copyright 2022 Advanced Software Products Group. All Rights Reserved.

Built by BOOST Creative

arrow drop cross
Hit enter to search or ESC to close

Can't find what you need?

Contact us directly at (239)-649-1548

May We Suggest?

MegaCryption - MegaZip - CryptoMon - ERQ - ReACT - ERA - OAR - CommandCICS - Help/Key

Having trouble logging in? Reset your password