Tech Updates

/Tech Updates
­

Wanna Cry/WannaCrypt

cyberThe newest Ransomware making headlines today is Wanna Cry/WannaCrypt. 

It affects both servers and devices.  Windows 10 is not affected however all older OS versions are.  In fact Microsoft released a patch for XP and 2003 even though both are no longer supported for patches!

Here is a link that describes MS guidance.   The short answer is patching and disable SMB1 if possible.

Read Microsoft’s Customer Guidance Document on WannaCrypt Attacks.

For those customers that have patching as part of their CTComp Master agreement – you probably have been patched already!  Microsoft released the patch in March so your April patching has patched it!   If you are not a patching customer – please patch all your systems as soon as possible and consider turning off at least SMBv1 if possible.

While this attack is handled by the patch, we feel this attack will evolve over time, so additional defense strategies will provide possible protections. For example, to further protect against SMBv1 attacks, customers should consider blocking legacy protocols on their networks. The other component is to turn off SMBv1 if possible.  This is not something that is part of typical patches and can lead to application or access failure so use caution.

If you would like to engage CTComp to patch your systems or to work w/you in shutting off SMBv1 please submit a ticket requesting the patch or removal of SMBv1 to service@ctcomp.com.

By |May 15th, 2017|Tech Updates|Comments Off on Wanna Cry/WannaCrypt

Cisco Notice

Cisco has identified an issue with a component, a clock-signal, which is faulty in some of its equipment.  In some units, this clock signal component will degrade over time. Although the Cisco products with this component are currently performing normally, Cisco expects product failures to increase over time, beginning after the unit has been in operation for approximately 18 months. Once the component has failed, the system will stop functioning, will not boot, and is not recoverable.

 

To learn more about this issue, visit: http://www.cisco.com/c/en/us/support/web/clock-signal.html#~overview

 

 

Products affected:

Product Family Product IDs (PIDs)
4300ISR

 

 

C1-CISCO4321/K9, C1-CISCO4331/K9

C1-CISCO4351/K9, ISR4321/K9, ISR4321-AX/K9, ISR4321-AXV/K9, ISR4321-SEC/K9, ISR4321-V/K9, ISR4321-VSEC/K9, ISR4331/K9, ISR4331-AX/K9, ISR4331-AXV/K9, ISR4331-SEC/K9, ISR4331-V/K9, ISR4331-VSEC/K9, ISR4351/K9, ISR4351-AX/K9, ISR4351-AXV/K9, ISR4351-SEC/K9, ISR4351-V/K9, ISR4351-VSEC/K9, ISR4321-B/K9, ISR4321BR/K9, ISR4321BR-V/K9, ISR4331-B/K9, ISR4331BR/K9, ISR4331BR-V/K9

APP UCS-EN120E-108/K9, UCS-EN120E-208/K9, UCS-EN120E-54/K9, UCS-EN120E-58/K9, UCS-EN140N-M2/K9
NCS1000 NCS1K-CNTLR
NCS5500 NC55-18H18F,NC55-24H12F-SE, NC55-24X100G-SE, NC55-36X100G
N9500 N9K-C9504-FM-E, N9K-C9508-FM-E, N9K-X9732C-EX
INDAPPL 1783-SAD2T2SBK9, 1783-SAD2T2SPK9,

1783-SAD4T0SBK9, 1783-SAD4T0SPK9,

ISA-3000-2C2F-K9, ISA-3000-4C-K9

M2M800 IR809G-LTE-GA-K9, IR809G-LTE-NA-K9,

IR809G-LTE-VZ-K9, IR829GW-LTE-GA-EK9,

IR829GW-LTE-GA-ZK9, IR829GW-LTE-NA-AK9

IR829GW-LTE-VZ-AK9, IR829GW-LTE-GA-CK9,

IR829GW-LTE-GA-SK9

Meraki All MX84s and MS350s
CNSWTCH MS350-24-HW, MS350-24P-HW, MS350-48-HW, MS350-48LP-HW, MS350-48FP-HW, MS350-24X-HW
ASALOW ASA5506H-SP-BUN-K9, ASA5506-K8, ASA5506-K9, ASA5506-SEC-BUN-K8,

ASA5506-SEC-BUN-K9, ASA5506W-A-K9,

ASA5506W-B-K9, ASA5506W-E-K9, ASA5506W-Q-K9,

ASA5506W-Z-K9, ASA5506-FTD-K9, ASA5506W-A-FTD-K9, ASA5506W-B-FTD-K9, ASA5506W-E-FTD-K9

ASAMID ASA5508-K8, ASA5508-K9, ASA5516-FPWR-K8, ASA5516-FPWR-K9, ASA5508-FTD-K9, ASA5516-FTD-K9

 

 

By |February 9th, 2017|Tech Updates|Comments Off on Cisco Notice

2016 Technology Showcase – Securing Your Future

 

2016 Technology Showcase

 

2016 Technology Showcase

Register Here

The Hilton

The Russian Lady

Agenda

8:45 – 9:15 REGISTRATION & BREAKFAST

(Parking @ the Hilton will be validated)

9:15 – 9:30 OPENING REMARKS
9:30 – 10:15
  • Your Last Layer of Security – Backup, Replication, Recovery (CTComp & CASE)
  • Are your Printers and MFPs Providing Access for Security Threats? (Hewlett Packard)
  • Ethernet – A Secure Evolution from LAN to MAN to WAN in a Cloud Connected World (Comcast)
  • Insiders Are the New Malware (Varonis)
10:15 – 11:00
  • Drive Productivity within Your Organization with Salesforce.com (CTComp & CASE)
  • Keeping You off The Front Page with Cisco’s Threat- Centric Security (Cisco)
  • Protecting Your Digital Enterprise (Hewlett Packard Enterprise)
  • eFolder’s Secure Mapped Drive in the Cloud, File Sync/Share Solution (eFolder)
11:00 – 11:45
  • Seven Quick Tips for Improving Your Website’s User Experience (CTComp & CASE)
  • HP’s Latest Client Device Line-Up (Hewlett Packard)
  • Criticality of Email Security (Zix Corp)
  • Physical Security and Environmental Monitoring in Mission Critical Facilities (APC)
11:45 – 12:30
  • Is Your Site the Next Target? Website and Web Application Security Best Practice (CTComp & CASE)
  • Expect the Unexpected from Cisco! (Cisco)
  • How to Effectively Leverage the Cloud to both Simplify Administration and Save Your Company Money (Gemalto)
  • The Power of an Eco-System (Milestone & Axis)
12:30 – 1:15 LUNCH
1:15 – 2:00
  • Your Last Layer of Security – Backup, Replication, Recovery (CTComp & CASE)
  • Are your Printers and MFPs Providing Access for Security Threats? (Hewlett Packard)
  • Ethernet – A Secure Evolution from LAN to MAN to WAN in a Cloud Connected World (Comcast)
  • Insiders Are the New Malware (Varonis)
2:00 – 2:45
  • Drive Productivity within Your Organization with Salesforce.com (CTComp & CASE)
  • Keeping You off The Front Page with Cisco’s Threat- Centric Security (Cisco)
  • Protecting Your Digital Enterprise (Hewlett Packard Enterprise)
  • eFolder’s Secure Mapped Drive in the Cloud, File Sync/Share Solution (eFolder)
2:45 – 3:30
  • Seven Quick Tips for Improving Your Website’s User Experience (CTComp & CASE)
  • HP’s Latest Client Device Line-Up (Hewlett Packard)
  • Criticality of Email Security (Zix Corp)
  • Physical Security and Environmental Monitoring in Mission Critical Facilities (APC)
3:30 – 4:15
  • Is Your Site the Next Target? Website and Web Application Security Best Practice (CTComp & CASE)
  • Expect the Unexpected from Cisco! (Cisco)
  • How to Effectively Leverage the Cloud to both Simplify Administration and Save Your Company Money (Gemalto)
  • The Power of an Eco-System (Milestone & Axis)
4:15 – 5:00 Closing Remarks, Raffle & Walk to The Russian Lady
5:00 – 7:00 Networking, Appetizers, Entertainment
7:00 – 9:00 Networking, Dinner, Entertainment
Register Here
Book a Room Here
2016 Technology Showcase
Your Last Layer of Security – Backup, Replication, Recovery (CTComp & CASE)

Most organizations don’t consider backup & recovery as part of their IT security posture, however, as you read the many articles on how to protect against cyber-attacks, backup will always appear as the last line of defense. By incorporating versioning, file/image, system-state backups, and disaster recovery into your security posture your business is much more likely to survive an attack. Come see how CTComp’s Managed backup, replication and recovery services can get your organization back up and running within a few hours not days, while you can focus on your business.

Are your Printers and MFPs Providing Access for Security Threats? (Hewlett Packard)

IT is continually tasked with protecting confidential information, including employee identities and customer data, across multiple devices and environments. Although many IT departments rigorously apply security measures to individual computers and the business network, printing and imaging devices are often overlooked and left exposed. The security threats are real, and as printing and imaging devices become increasingly sophisticated, they offer greater opportunities for attackers to compromise the device or the entire network. Hear how HP can help you determine the vulnerability of your printing devices and see how they can help you secure your print environment.

Ethernet – A Secure Evolution from LAN to MAN to WAN in a Cloud Connected World (Comcast)

How Ethernet has evolved from a local area network protocol to becoming a network solution of choice for Metropolitan Area Network to Wide Area Networking including Cloud Services connectivity.

Insiders Are the New Malware (Varonis)

Nearly every major security breach starts with an insider, or an attacker using an insider’s credentials. 2015 was a banner year for insider threats. It’s estimated that the average organization suffered from 3.8 insider attacks last year and 45% of businesses can’t tell if they’ve suffered a breach. In order to combat the insider threat, organizations need to shift their focus from the perimeter to their data itself. They need to secure their data from the inside out. Join us for a live presentation where you’ll learn our 3-phase Inside-Out approach for preventing insider threats.

Drive Productivity within Your Organization with Salesforce.com (CTComp & CASE)

Are you managing key aspects of your operation with spreadsheets or from your email inbox? Are you using “swivel-chair integration” to get your systems to talk to each other? Are your Sales, Service and Marketing teams unable to see a unified view of your customers? If so, then join us to learn how Salesforce.com can streamline, integrate and automate your business processes.

Keeping You off The Front Page with Cisco’s Threat-Centric Security (Cisco)

People responsible for defending networks realize that the security threat landscape is constantly in flux as attackers evolve their skills. Cisco security platforms and our Talos research team provide unmatched architectural approaches that leverage big data, open APIs, and security baked into all of our products to provide unmatched visibility and automate defenses. In this talk we will see how this approach reduces time to detection, enhances effectiveness, and keeps your business from being front page news. Mike McPhee is a Cisco Systems Engineer focused on cybersecurity and internet edge architectures for a wide variety of verticals and customers. His previous experience in helping architect command and control systems for military customers, brewing lousy beer, and coaching his kids through micro soccer have helped him maintain perspective and deal with the chaos and fear the pursuit of true network security sometimes generates. Not to worry – this session won’t hurt a bit.

Protecting Your Digital Enterprise (Hewlett Packard Enterprise)

Keeping pace with market trends driving changes in data protection.

eFolder’s Secure Mapped Drive in the Cloud, File Sync/Share Solution (eFolder)

Tired of relying on consumer grade technology for your business file sharing and syncing needs? eFolder offers a secure business grade technology integrated with Mapped Drive capabilities for easy business collaboration.

Seven Quick Tips for Improving Your Website’s User Experience (CTComp & CASE)

Does your website need a redesign? Don’t have the time or the budget to do a complete overhaul? Not sure where to start? Usability is an important and often overlooked aspect of web design. In this session, you’ll learn techniques to make your site easier to navigate on any device, create cleaner and more consistent layouts, improve user engagement with clear calls to action, and continually improve your site through analytics and user testing.

HP’s Latest Client Device Line-Up (Hewlett Packard)

Hear about the new devices and technologies offered in the most secure line-up of HP client devices including the thinnest and lightest notebooks, detachables, and the new HP Elite x3, HP’s first built for business 3-in-1 device. Designed for business, these devices offer the features that users love, but with the security that IT requires.

Criticality of Email Security (Zix Corp)

The increase in data breaches and the rise in external threats has reminded us of the importance of securing emails. Organizations need to be confident that the millions of emails leaving their network each day are protected where necessary, whether sent from a desktop or from a mobile device. Implementing secure email solutions should increase productivity and mitigate risk without creating employee frustration. Join security experts from Zix for a discussion on solutions to solve your most pressing secure email challenges.

Physical Security and Environmental Monitoring in Mission Critical Facilities (APC)

Physical security and environmental monitoring are critical to achieving availability goals of mission critical facilities. Security of the data center accounts for its surroundings as well as data processing equipment inside and the systems supporting them. In this presentation, systems for providing secure facilities are recommended and best practices for physical security are explained.

Is Your Site the Next Target? Website and Web Application Security Best Practice (CTComp & CASE)

In today’s web world, any website can become a target for hackers. These attacks do not discriminate between web sites that are large or small. Attendees will learn about security measures that all business should take to protect their websites and will gain an understanding of recommended security services, vulnerability detection and reporting tools.

Expect the Unexpected from Cisco! (Cisco)

Cisco Spark – Expect amazing new experiences as we blend team messaging, meetings and phone calls in the cloud. Bring your companies teams together in a place that makes it easy to keep people and work connected. Everyone who attends is eligible for a free Spark trail. Spark is where all your work lives and it is a mobile first platform and 100% cloud delivered!

Cisco Video – Unmatched video collaboration experience joining together with Webex into once experience! Now is the time for an intelligent approach to video conferencing from the pocket to the boardroom that is simple to use and provides choices from anywhere! Terry Blowers is a Unified Communications specialist at Cisco. His delivery is dynamic and relevant to today’s issues facing IT executives looking to simplify their communications while creating amazing new experiences.

How to Effectively Leverage the Cloud to both Simplify Administration and Save Your Company Money (Gemalto)

In this session, Gemalto Authentication Sales Engineer Andrew Arnott will review how a Cloud-based token management system can minimize initial capital expenditure on hardware, while saving data center power consumption and rack space. In addition to these up front and ongoing expenses, Andrew will speak to the ease of administration that goes along with that; service packs, patching and the like become things of the past. Token rollout automation tools, multi-tenant capabilities, and customizable help screens greatly simplify both the Administrator and User experience.

The Power of an Eco-System (Milestone & Axis)

Milestone and Axis team will show how two industry leaders can create your video security system. With Axis’ feature rich cameras powered by Milestones easy to use software platform we’ll demonstrate how using the Eco-System, you can create a best of breed solution.

 

 

 

 

By |August 17th, 2016|Tech Updates|Comments Off on 2016 Technology Showcase – Securing Your Future

Tech Update May 27, 2016

  CASE PARTNERS - Technology Elevated SALESFORCE SECURITY UPDATE  

Introduction

Salesforce has announced that they will be upgrading their systems and will no longer support certain legacy encryption standards. This means that applications which interact and communicate with Salesforce may need to be upgraded to support this change.

CASE Partners  explain how the upcoming security changes to the Salesforce platform may affect your business and how to proactively avoid any negative impact.

Background of Security Protocols

Transport Layer Security (TLS) is an industry standard security protocol that ensures privacy between applications and/or users as they communicate over the Internet. TLS ensures that no external party can read or modify messages during transmission via accepted methods of data encryption. TLS is governed by a working group of an independent agency, specifically the Internet Engineering Task Force (IETF).

 

TLS standards were originally released in 1999 and have undergone several updates over the years. Software vendors independently decide on when they will support a new version of TLS and, more importantly, when they will no longer support older versions of the protocol. Two platforms wishing to communicate using the TLS security protocol must support the same minimal level of TLS or that communication will fail.

 

Impact of Salesforce Security Changes

There are three categories of “applications” that need to be considered, including:

  1. Web browsers used to access com
  2. Custom developed web applications that save data to and/or retrieve data from Salesforce
  3. Other applications that interact with Salesforce including Salesforce Data Loader and apps installed from the AppExchange

Web Browsers

Most modern web browsers already support the new protocol. The simplest way to confirm that your organization will not have issues is to attempt to access this Salesforce test site. If you are routed to a page that indicates TLS 1.0 Deactivation Test Passed, your current browser should not have any issues accessing Salesforce once the Salesforce security upgrade is in place. If you use multiple browsers, you will want to test each of them.

Custom Developed Web Applications

If you or your customers currently utilize any applications developed by CASE Partners or another internal/external development team, there may be changes required to those applications and the servers on which they are running to accommodate this upgrade from Salesforce. These include, for example, customer web portals and server batch processes. For existing CASE Partners‘ clients, we have been pro-active and have already determined the changes needed to your environments.

Other Applications

If you utilize applications that you’ve downloaded from the AppExchange, salesforce.com, or other locations, you’ll want to make sure these applications are compliant with the new security changes. Of particular note is the Salesforce provided Salesforce Data Loader. A new version of the Data Loader was released by Salesforce with the Spring ’16 release which is designed to support the change. This new version does require that the machines using it are running a specific version of the Java Framework (8.0).

Action Required

If you are an existing CASE Partners’ client, you will be contacted by your Account Executive to discuss the options for having us assist in ensuring that this Salesforce change will not impact your business operations or your clients’ experiences on your web sites.

For others interested in learning more, please feel free to contact us at salesforce@casepartners.com or give us a call 860-527-0436.

By |May 27th, 2016|Tech Updates|Comments Off on Tech Update May 27, 2016
HTML Snippets Powered By : XYZScripts.com