Centurion Technologies, along with panel expert Blade Technologies hosted a webinar on the topic of Security Threats and how SmartShield® can help prevent malicious intent.
Improve your computer systems with the perfect complement to our SmartShield® products. SmartShield® CurrrentWare software is ideal at preventing unauthorized access to websites and documents. There are several features which facilitate this powerful benefit and help you to maintain a quality computing infrastructure for all your users.
Keep your staff focused and prevent guests from accessing sites you don’t want them to. This feature allows you to permanently block sites from being accessed from any on your network and enforces your internet usage policies as you define them. There are several elements to this feature including:
- Controlling who has access to the internet and who does not.
- Two lists for which website can be accessed and which are restricted.
- HTTPS filtering.
- URL Category filtering.
See what your users are doing with the BrowserReport function. This allows you to check if your users are adhering to your internet usage policies. The tool tracks their activity and monitors the bandwidth being used. An auto-generated report is emailed to you directly if improper use of the internet occurs. Finally, should you require it; authorised personnel can take screenshots of what your users are doing from any computer.
In today’s world there are numerous external storage devices that can interface with your machines. Protecting your systems and the data they control is paramount. AccessPatrol gives you this power by offering a proactive solution for securing organisational endpoints to prevent unwanted transfer of sensitive data.
This feature allows you to control the access of any device, restricting it to only being able to read or write data or block the device entirely. You will also have access to usage reports which can be automatically emailed to relevant members of your organisation.
Effectively manage the power usage of your computer system by seeing where energy is being used and remotely shut down, restart, hibernate or place a computer on standby. This helps your organization to conserve energy and save money.
Get the ultimate package to improve your computing systems today and see how the extra protection saves you from unwanted system changes, energy usage and costs.
Browsing the internet is not always the safest activity. Some websites have software that will deviously install itself on your computer and potentially steal financial details, slow down your computer or send you unwanted advertising emails.
The majority of this software is downloaded when you visit websites that aren’t safe. How can you tell whether a site is safe to visit or not?
One of the best tips for your online browsing safety is to double check the url of every site you enter. Many websites hosting malicious software will closely mimic official sites in their address. For instance, sometimes they will have an extra letter or have one left off.
You could also use sites that use HTTPS instead of HTTP. However, the former of these isn’t foolproof and some websites which are legitimate will use HTTP.
There are also some handy tools for checking websites that you are visiting are safe. The first is Google Safe Browsing. To use this service, type in http://google.com/safebrowsing/diagnostic?site= (ex. http://google.com/safebrowsing/diagnostic?site=www.centuriontech.com) followed by the website you wish to test. You can also test IP address. The results will let you know whether the site has hosted any malware software within the last three months.
HpHosts is another similar service. For this, simply enter in the site into the search box and it will check that against a database of known problematic websites.
Where You Are Visiting
Another common tip to help you protect your computers is to avoid certain industries. Gambling, adult themed and file sharing sites are normally accused of being malware hosts. Therefore, it is best to avoid these websites.
Finally another good piece of advice for knowing whether the sites you are visiting are safe and secure is to trust your browser. At times they will attempt to warn you about the security certificates being out of date or other details that raise the red flag to your browser.
Protecting your computer can be a difficult task. Keeping to high quality websites and those that do not host malicious software is sometimes a game of Russian roulette. However, by following the advice above you can reduce the risks of surfing the internet.
For further protection while browsing the internet evaluate SmartShield® CurrentWare, our web filtering software.
News has just been released that some major banks all of the world have been breached and large sums of monies were stolen. The culprits instead of using the front doors stole the money via hacking into the banks’ computer systems and then making money transfers to themselves.
During one of the most sophisticated hacking and bank robbery incidents of modern times, it is estimated that as much as $1 billion has been taken from over 100 banks from across the world. What happened and how could this security breach have been prevented?
The scam worked by infecting the computer systems of bank workers with malware. This software monitored their keystrokes and by taking screenshots of the workers’ computer screens. This allowed the hackers to understand and get to know the banks’ process. Then, the hackers pretended to be employees of the system and, by exactly mimicking the bank process, transferred funds to rogue accounts.
The process happened over many months and in some cases, money was given to the criminals by telling ATMs to release cash remotely. At these locations, there would be associates of the hackers ready to pick up the cash.
The theft went unrecorded for so long for two main reasons:
- Relative to normal bank transaction levels, the amount stolen per transaction was relatively low.
- All the transactions were done as if an employee of the bank had processed the action.
Was There Anything That Could Be Done?
The critical aspect of the bank robbery was the malware was installed on the local devices of bank employees. The software called ‘Carbanak’ was all that was needed for the thieves to monitor the regular activities of their targets. Then, it helped them gain access to the network via other machines and pretend to be employees.
Right now the banks that were targeted are actively taking steps to stop further attacks from happening. These banks should look no further than: SmartShield® Suite. This security protection software would have stopped the malware from getting access to the system in the first place by keeping it on a virtual hard drive after it was first downloaded. This virtual hard drive prevents the program from making any permanent changes to the computer system.
When the computer is restarted, the malware would have simply been wiped off with the rest of the data that was on the virtual server with Centurion Technologies, Next Generation Security Protect Software. SmartShield® Suite, by itself, would have provided the necessary security software to alleviate this breach.
What are you doing to protect your computer systems from hackers? Have you had a major incident?
Let us know in the comments below.
Centurion Technologies would like to offer you the chance to better understand our SmartShield® product. This webinar will go into detail on our advanced features and functions of SmartShield® software. If you would like to know how to use SmartShield® Suite for all it is worth, don’t miss it.
SmartShield is the Next Generation Computer Protection that has many optional modules, such as: Screenview, V-Control, Optional Directory Protection (ODP), & Energy Saver. Watch the video to learn more about each one.
Centurion Technologies would like to offer you the chance to better understand our SmartShield® Suite product. This webinar will cover the features and functions of SmartShield® Suite software.
Learn the Basics of SmartShield® Suite:
- Scheduling Windows Updates
- SmartControl Basic Management
- Using Optional Directory Protection
SmartShield® endpoint protection creates a virtual space where all unwanted changes are wiped away upon reboot, freeing the user to perform daily tasks without compromising the integrity of the system. Whether managing lab computers in a school, library, corporate or government environment, SmartShield® will provide the ultimate control over user workstations.