The Adoption Of More Sophisticated Security Technologies

by Frank Leonarad
There are a number of new technologies emerging that may start to see wider adoption in 2018. For example, the use of “remote browsers” can be helpful for isolating a user’s browsing session from the network/endpoints.

Deception technologies, which work by imitating a company’s critical assets, act as a trap for attackers looking to steal this data.

There will also be an increase in the use of solutions which can detect and respond to anomalous behaviour. Firstly, there are Endpoint Detection and Response (EDR) solutions, which can monitor endpoints and alert sysadmins of suspicious behaviour. Secondly, Network Traffic Analysis (NTA) can be used to monitor network traffic to help determine the type, size, origin, destination and contents of data packets.

Thirdly, and very importantly, more and more companies are starting to adopt sophisticated real-time change auditing solutions, which can help companies secure critical assets in numerous ways. For example, they can help detect and respond to user privilege abuse and suspicious file/folder activity — either based on single event alert or threshold condition. They can detect account modifications, deletions, inactive user accounts, privileged mailbox access and a lot more.

“BAD RABBIT” RANSOMWARE

Last week, a new form of ransomware began making its rounds through Eastern Europe and has spread to several other countries. This new ransomware is similar to the WannaCry and Petya outbreaks that happened earlier this year. At this time, it is unclear how far this threat has or will spread. Trivium Technology is staying on top of its activity and wants to ensure all of our clients are protected.
For our WatchGuard clients, there are several things that need to be done to ensure you are not susceptible to this new threat.
• WatchGuard has released a signature to identify Bad Rabbit through Gateway Antivirus. It is important you ensure your GAV is updated with the most recent signatures.
• APT Blocker was immediately able to identify the threat when it was released, if the service is configured correctly.
• Threat Detection & Response (TDR) can detect Bad Rabbit files on the network and can quarantine them if the service is configured correctly. Also, the Host Ransomware Prevention (HRP) portion of TDR has been updated to identify these files.
If you do not currently have TDR or APT Blocker licensed on your device, please contact us so that we can assist you in adding them to your licensing. If you do currently have these services and want to ensure they are configured correctly, please Contact Us so that one of our WatchGuard experts can review your configuration and ensure your network is properly secured.

How to Evaluate a CRM Package

HOW TO EVALUATE A CRM SYSTEM

The primary concern of any CRM system is to improve relationships with customers and generate higher revenue for your business. Your CRM implementation can track the efficiency of sales and marketing and help build strong relationships with your customers.

CRM ROI

Any CRM system should provide measurable ROI, help calculate real business benefits, and enable accurate budgeting and reduced resources.

Ease of Use

A CRM solution should simplify customer relationship and business process, provide a user-friendly interface, and allow ease of CRM navigation.

Customization

The efficiency of any CRM implementation lies in flexibility to change the default setup, provision to mould the CRM to your business process, and options to roll back to the default setup.

Simplified Workflow

A CRM system should help users perform tasks easily, present simplified workflow logic, and encourage easy user adoption.

Support

No CRM system is complete without user help documentation, online support, an active user community with similar needs, and notes and tutorials to complement documentation.