EZProtect Virus Scanner for Salesforce

Protect your Salesforce orgs against the WannaCry Ransomware attack - download EZProtect Virus Protection for Salesforce today. Free 30-day trial. #ransomware, #virusscanner, @salesforce

Read More
1411580979-google-achilles-heel

An unusually sophisticated identity phishing campaign appeared to target Google's roughly 1 billion Gmail users worldwide, seeking to gain control of their entire email histories and spread itself to all of their contacts, Google confirmed Wednesday.

Read More
161206132328-privacy-checklist-how-to-780x439

Use strong passwords and don’t go to sketchy websites, and you’ll protect yourself online, right? A new report from Pew Research details some of American’s biggest misconceptions about #cybersecurity. @ezprotect, @salesforce

Read More
AP_17006672039957_c0-247-4032-2597_s885x516

A bipartisan bill introduced in the Senate would establish the creation of a specialized committee devoted solely to cybersecurity, an effort to narrow the chamber’s scope on an emerging topic that’s become as convoluted as it is consequential.

Read More
Christie Terrill ,   CONTRIBUTOR
I translate cybersecurity topics into business-relevant action.  

Opinions expressed by Forbes Contributors are their own.
TWEET THIS
More often than not, companies fail at deploying traditional security controls to “nodes” connecting to their network.
Technology changes faster than most business can keep up with. The proliferation of mobile technology, the Internet of Things (IoT) and cloud computing has changed the types of “assets” connected to networks. Implementing cybersecurity “best practices” across an increasingly unstructured and decentralized network is one of the most vexing challenges facing companies today.

Traditional cybersecurity approaches revolved around the medieval concept of “protecting the crown jewels” – a concentric circle view of layered security focused on protecting the important data at the center through successive layers of defenses such as application, host-based, network (internal and external perimeter) and physical controls. This defensive strategy works in a centralized, controlled and managed-device network, which is becoming increasingly extinct.

Companies have the most control over devices that they purchase, configure and issue to users. But as consumer-driven technology drives new devices and systems, organizations are losing control over devices their users and network interacts with. More often than not, companies fail at deploying traditional security controls to “nodes” connecting to their network.

For example, with IoT devices it isn’t possible to change or install software. In an enterprise context, IoT includes medical devices in hospitals or monitoring devices deployed in manufacturing or agriculture. This technology is particularly attractive for these traditionally unconnected industries as it offers new leaps into interconnected systems and monitoring what was once impractical due to safety or geographical reasons.


ADVERTISING


LAS VEGAS, NV - JANUARY 04: Tim Baxter, President and Chief Operating Officer of Samsung Electronics America, speaks at CES 2017 on January 4, 2017 in Las Vegas, Nevada. (Photo by Alex Wong/Getty Images)

Consistently challenge your organization through proactive testing, often referred to as “red team, blue team exercises.

Read More
sept16-13-111021595-1200x675

While the CISO will identify risks and prioritize security protocols, it is incumbent on senior executives to understand and carry out the procedures across the business — to the most-vulnerable points of entry for cyber criminals. #cybersecurity

Read More
cybersecurity-insurance

CIOs and other C-level executives are taking the fall and ultimately being named in cyber security lawsuits. Understand some of the issues that CIOs and board members should be asking regarding their cyber security policies here. @salesforce, #ezprotect

Read More
govcio_logo

Alex Wong, CTO of Adaptus, discusses virus threats within Salesforce with gov CIO Outlook Magazine, and explains the industry's leading virus scanning solution - #EZProtect®. @salesforce,#virusprotection

Read More
ColoradoDeptTrans

Adaptus is pleased to announce the successful release of EZProtect™ antivirus scanner for Salesforce with early adopters CDOT and large financial institutions. #cdot @salesforce

Read More
Shield security (done in 3d, isolated)

If your company is using Salesforce and providing "communities" or "portals", both internal and external, your organization is vulnerable and at great risk of malware and phishing attacks. EZProtect is the industry's only anti-virus protection application to fend off such threats in the Salesforce environment. Download your FREE trial today!

Read More