Archives for Services

security-blue2

RANSOMWARE – Are you at risk?

The Essential Things to Know

Over the past few years, organisations around the world have seen an increased number of attacks of the new cybercrime known as Ransomware. Whilst many of us have heard the term Malware and understand that it’s a problem for many consumers and business alike, we don’t necessary understand the impact it could have on our business and lives, nor do we understand the true differences between malware and ransomware.

Outlined below are the essential things you need to know, how this threat operates and how to best protect yourself and your organisation, protection through technology, people, procedures and policies.

Included at the bottom of this page is a link to download a PDF handout, ideal to give to staff.

 

What is Ransomware

Ransomware is a type of malware, except instead of tracking your computer amount-lostusage, it blocks or limits access to your computer or files. In line with the name a ransom is demanded by the scammer to unlock your computer or files. In order to block or limit access to files, users are generally required to download a file. This could be a to watch a video – also known as a codec, or it could take the form of music, movies, a game or an application fix a computer problem. Files are then locked using an encryption key known only to the scammers. Once your files are locked, scammers demand a fee to unlock your files. In recent times scammers have jumped onto the Software as a Service (SaaS) model. Instead of a onetime payment, regular payments must be paid to ensure the continued access to files. Even then there is no guarantee you will get access to your computers or files again. Scammers have been known to go back on their ‘word’.

 

Anti-Ransomware

Also known as Malware Checkers or Malware Scanners are similar to Virus Checkers, except they have been specifically developed to check for known malicious files and prevent attacks by blocking files from downloading. If computers do become infected these applications can generally remove malware, but there are very few cases where they have successfully unencrypted files affected by ransomware.

 

Why you should Patch and Update Applicationslocation

Patching or updating your applications is one of many preventative measures you can take to protect your files. Applications providers like Microsoft, Adobe or Java, to name just a few, are continually looking at ways to protect your data files from attacks. The updates you receive from the providers are often patching identified security gaps in the products.

 

 Windows Policies can help

In recent times, ransomware applications have been known to delete your files locally stored backups. One course of action is to block access to Volume Shadow Copy Services (VSS) to stop deletions of backups. By blocking the ability for the computer to delete your backups, you may be left with a useable restore file.

delivery-method

 

Disable Script Hosting

Depending on the complexity of the ransomware program, these applications have been known to download additional files in the background. By disabling windows script hosting, blocks the ransomwares ability to download additional files to execute its tirade on your system.

 

Don’t Phish

Phishing is a term used when users are taken to a fake website that looks like the real thing. In order to maintain this type of appearance, website often have the same logo and branding of legitimate sites. In fact, many phishing sites are hard to tell apart from the real site. Often the only giveaway is the URL (or Domain name) in the address bar. But normally at this point, it’s too late. By then tracking cookies may have been downloaded. Never visit a website unless you have first checked the legitimacy of the address on other documentation provided by the organisation.

 

age
Filter ‘.exe’ Files

Also known as an executable file, by blocking these files in your modem/router can prevent the installation of these malicious programs. By denying the download of these files, also means emails are less likely to receive an executable file from downloading, and stops the temptation staff feel to open the files.

 

Backup

Backing up your computers and data files, especially retaining multiple copies over time is one of the most important things you can do. In the event such an attack is successful, you will have the ability to ‘roll-back’ to a time prior to the installation of the ransomware. It only takes one momentary lapse of judgement opening an email, or downloading a file and your entire computer network could be infected.



gender
Educate Users

Are your staff and family aware of these risks? One of the best prevention’s to ransomware attacks is to ensure other users are briefed on the same information. It is recommended that you educate other computer users to never open files attached to suspicious emails, especially ones from unknown senders. It is also important that all emails and recommended file downloads be treated as suspect until verified. Victims that have fallen to pray to these attacks may have had a program installed on their system that sends the same ransomware on to email address saved in their address book. Additionally staying current of ransomware developments, the most different and most dangerous strains and who’s most at risk, will help defend against attacks.


 

Don’t Panic

In the event of an attack, remain vigilant and isolate the infected computer to stop the spread of attack through the rest of the network. Contact your anti-ransomware provider and advise the situation. These organisations will have the most amount of knowledge to assist. They may have a solution or be working on one already. If attempts to remove the ransomware are unsuccessful, and providing regular backups have been maintained, a full clean of your computer, and re-installation of your application, and data from your backups is the only way to know conclusively that your computer has been returned to its original state.

This data is based on reports provided to the ACCC by web form and over the phone.
The data is published on a monthly basis. Our quality assurance processes may mean the data changes from time to time.
Some upper level categories include scam reports classified under ‘Other’ or reports without a lower level classification due to insufficient detail provided. Consequently, upper level data is not an aggregation of lower level scam categories.
Note: Due to a technical error, some scam reports from previous months are included in July 2016 causing an increase in reports for some categories. This error has been fixed for future months.
Read more
MYOB EXO Integration

Can EXO ERP Integration Benefit My Business?

 

Efficiency is the cornerstone of competitive advantage in today’s marketplace, and C-level business leaders are focused on the integration of legacy systems and applications in order to both extend the lifecycle return of their technology and financial investments, as well as ensure their MYOB EXO ERP platform remains at the very epicenter of data exchange and capture in an “always open for business” digital economy.

 

EXO-ERP-System-Integration

The MYOB EXO ERP platform is capable of integrating multiple native and third party applications and platforms to achieve holistic control over business ares of competency.

But what is MYOB EXO ERP Integration? How does it differ from customisation and add-on modules, and what are some of the key benefits delivered within the business?

 

Unlike customisation which is generally confined to the modification of a single ERP instance or initial configuration of a ‘greenfield’ ERP deployment, MYOB EXO ERP integration involves the complex and specialist task of dovetailing an organisations existing proprietary and multi-vendor applications such as CRM, Supply Chain, Logistics, Accounting, E-Commerce, etc. into the EXO ERP core.

The ultimate goal of ERP integration is to create a business environment where processes can be translated into highly efficient system-to-system data exchanges and interactions, and where the reliance to interact with; and manage multiple applications, data-sets and analytics may be removed to focus on operational improvement, holistic streamlining and performance benefits.

ERP customisation also differs from EXO ERP integration in that it is typically driven by a requirement to modify how information is captured or presented from a user experience (UI/UX). It (customisation) does not typically extend out from the core EXO ERP platform to exchange or consolidate information with existing 3rd party applications.

For example, a travel agency may require the adaptation of a specific field or data set within their ERP system to capture information for a customer’s airline booking. This would be considered a customisation. But if we extend this fields ability to exchange and interrogate information in real-time directly with an airlines proprietary ticketing platform located externally of the travel agency we require the ability for these two platforms to interact and communicate – thus be integrated.

 

EXO-ERP-Platform-Integration

As our needs become more sophisticated and expand away from the internal MYOB EXO ERP Core Platform we discover that we need a partner like Indivia capable of integrating external applications and systems.

MYOB EXO Modules vs Integration

 

MYOB EXO Modules sometimes called “add-ons”, are purpose built turnkey applications that provide a business with the ability to expand the capabilities of their MYOB EXO solution as well as enhance functionality. Although these modules are engineered to seamlessly integrate into MYOB EXO ERP they do not natively integrate with 3rd party applications and in many instances themselves require customisation to achieve what the business ultimately desires.

 

What are the Key Benefits of MYOB EXO Integration?

 

In every ERP implementation, there comes a time where all systems need to communicate with other 3rd party and legacy applications.

Indivia’s ERP integration solutions allow data collection, warehouse management, and other 3rd party systems to integrate more easily and reliably with your MYOB EXO ERP solution. As your business grows and your needs become more sophisticated and complex some of the compelling reasons to integrate your MYOB EXO solution may include:

 

  • Extend capital and operating investments over existing systems and applications whilst decreasing overall total cost of ownership (TCO);
  • Remove potential strains on IT and training resources through the use of one application to run an entire business;
  • Provide a holistic end to end business performance environment with a “single source of truth” for data capture, reporting and analytics;
  • Integrate both internal and external information and work flows used by the organisation within a single, comprehensive solution;
  • Drive the flow of information between all internal business functions while managing connections to outside stakeholders such as suppliers, partners and service providers;
  • Deliver tighter controls for financial and compliance reporting practices;
  • Access valuable corporate data to drive continuous improvement and consolidation strategies;
  • Support streamlined sourcing and procurement processes;
  • Providing sales and operations planning with access to critical information that ensures the business can deliver to customer’s expectations.
  • Automate business processes such as invoicing and sales and purchase orders;
  • Use of a single base of information for billing and other customer interactions to improve service levels and customer retention.

 

Talk to us about your EXO application integration strategy

 

Since ERP solutions are the operational backbone of an organisation, it’s essential to partner with a company like Indivia that understands your business, can improve the quality and efficiency of your organisation, and unlike others deliver a truly integrated solution and not simply a bolt on or off the shelf solution.

For more information on how Indivia’s MYOB EXO ERP Integration solutions will ultimately save time and expense, or to have a confidential discussion about your application integration strategy, telephone us today on 1300 660 652 or use the details provided on our contact page.

 

Read more