Tag Archive for: independent

iboss Adaptive Private Access for Zero Trust Networks Provides Greater Protection Against Advanced Threats and Malware than Competitors in Independent Laboratory Tests


News Image

At iboss, we are hyper focused on creating technology that makes it easier for organizations to implement a complete Zero Trust Network Architecture to better protect organizations in this modern-day work from anywhere environment

iboss, the leader in cloud-delivered cybersecurity, today announced the results of its third-party efficacy testing for its iboss Zero Trust Adaptive Access for Zero Trust Networks, which was rigorously tested for its malware blocking effectiveness by Miercom, a premier independent testing laboratory. The report concluded that iboss Adaptive Private Access delivered superior malware threat protection and is the only service that provides continuous inspection of Private Access traffic.

The test evaluated iboss’s Adaptive Private Access technology. This cloud native Zero Trust platform protects organizations by ensuring employees or devices accessing sensitive cloud apps are redirected through iboss’s Adaptive Private Access, which acts as a checkpoint that continuously monitors for threats to the protected cloud app. When iboss Adaptive Private Access adaptive identifies a threat, the platform cuts access immediately and automatically, with no human intervention, to prevent infections from spreading and corporate data from being stolen. The test results proved that iboss exceeded the requirements set forth by Miercom, blocking 99.7% of malware, and performed 26% higher in malware blocking effectiveness than the industry average of all platforms tested by Miercom to date.

“At iboss, we are hyper focused on creating technology that makes it easier for organizations to implement a complete Zero Trust Network Architecture to better protect organizations in this modern-day work from anywhere environment,” said Paul Martini, CEO and co-founder of iboss. “This result confirms our commitment to providing the most comprehensive security solution for organizations of all sizes.”

The report concluded that iboss Adaptive Private…

Source…

Independent experts find no foul play in 2020 election


A new report from an independent review of Maricopa County’s 2020 election equipment supports what the county has said all along: the voting machines weren’t connected to the internet, and the county didn’t try to obstruct the state Senate’s audit or delete data. 

The report comes after the Arizona Senate and the county agreed in September 2021 that three independent computer security experts would review the county’s routers and answer the Senate’s questions in relation to the 2020 general election. Both parties agreed that former Congressman John Shadegg would act as an impartial “special master” to oversee the process. 

Six months later, the findings, which were released late Wednesday, fall in line with the county’s own independent election audits conducted more than a year ago. 

John Shadegg

The Senate’s election review team, headed by Cyber Ninjas, presented its report in September 2021, offering no evidence of widespread fraud. Its ballot hand count found Joe Biden received 99 more votes than the official tally. However, the Senate still wanted to examine the county’s routers and Splunk logs, which it had also subpoenaed earlier in the year. The county resisted, citing security concerns. But, faced with losing hundreds of millions of state-shared revenues for not complying with the subpoenas, the county eventually settled with the Senate to allow an independent review of the equipment. 

Shadegg’s report stated that the team found no evidence that “routers, managed switches, or election devices” connected to the Internet. He and the experts also found no evidence that the county obstructed the audit. 

“The special master and expert panel found no evidence of data deletion, data purging, data overwriting, or other destruction of evidence or obstruction of the audit,” the report stated. 

Maricopa County Board of Supervisors chairman Bill Gates said in a written statement that the report should be “a final stake in the heart of the Senate’s so-called ‘audit,’” pointing out that it concluded the ballot tabulation system was not connected to the internet and that county routers were not connected to the election…

Source…

How a Password Manager could improve security for your small business – Saddleworth Independent


Advertisement feature by ASPECT IT.
By Peter Dorotiak, Director

LOTS of people re-use passwords for multiple accounts or use common password that could be hacked. Why? People struggle to remember strong passwords.

Having a strong password is essential!

The NCSC (National Cyber Security Centre) published a survey (https://tinyurl.com/22ut7np3) on the most hacked passwords and passwords commonly used by hackers. Do any of your passwords appear on this list? Some included premier league football teams, musicians, and family names.

Sharing and reusing passwords can also be a risk. In a business setting, different staff may require access to various online accounts which require password access. This can pose a problem. Do you share the password? Do you write it down? Do you reuse the same password?

These issues can be alleviated by using a password manager and here is a brief overview of the benefits.

A password manager is an app that securely stores your passwords. This means you can have very complex passwords as you do not have to remember them. 

A password manager app can be installed onto your phone, tablet, computer, or as an extension in your web browser. 

When you require access to a website or app, the password manager will recall the relevant username and password and fill it in for you. This means you do not need to remember the password or type it.

Professional password managers have many great features for small businesses. One is the ability for multiple users to use the app, but to also hide the passwords from them. This means that users can access whatever accounts they are allocated without knowing or seeing the password. 

If any staff member leaves, you simply remove their access from the app and you do not have to change all your passwords.

Many apps will alert you if your reuse passwords for different accounts and prompt you to change them. Re-using passwords is a security risk because if a hacker steals one of your passwords, they will try to access other accounts using the same one.

If your business needs help with IT security or password managers, then contact Aspect IT. We are a professional and long-established IT services company based in…

Source…