mailerlogo.png

Newsletter

 
July 31st, 2018
 julyissue.png
nnt_center.png

Introducing NNT Member Download Area 2.0

An area of the NNT site has now been re-worked to make for a more pleasant user experience! Ease of use was our goal and we believe we have achieved this by splitting the area into three different sections and incorporating simple but informative buttons to help you quickly identify what it is that you are looking for. The three sections are as follows: NNT Change Tracker Generation 7, NNT Log Tracker Enterprise, and Archive. 

In NNT Change Tracker Generation 7 and NNT Log Tracker enterprise sections, you'll find our latest and greatest server and agent installation files, along with a large library of documentation which is there to help you deploy and configure the software. The Archive section is a place where you can find our outdated installation files which may be needed if you are working with older operating systems that cannot support the newer versions of software that we have to offer.

Take a look around, we're sure you'll like it but if you feel any further improvements can be made, please do let us know!

supply_chain.png

supply chain attacks pose increased threat to security



Read more »


networksecurity.png

Change Tracker's ITSM Integration 

The clue is in the name, Change Tracker detects changes in an organization’s infrastructure. But so what? Why is that a useful thing to do? How am I benefitting from knowing what has been altered within my environment? The terrifying answer? To detect malicious activity.

The slightly more mundane answer? To identify a best intention change that, nevertheless, has impacted infrastructure operations.

Here at NNT, we are advocates of change. Change is essential to keep environments up-to-date and applications running smoothly and with as few vulnerabilities as possible. The key to change, the utopia, the Holy Grail if you will, is to provide some context to the change activity, the why did this change question.

NNT Change Tracker has a number of approaches to provide the answers.


Read more »



cosco_ransomware.png

Shipping giant Cosco hit by ransomware attack


gdpr_datareporting.jpg

Data Breach reports quadruple under gdpr

bec.png

BEC SCAMS costing orgs over $12 billion

According to an alert published by the FBI last week, the losses and potential losses reported as a result of business email compromise (BEC) and email account compromise (EAC) scams is over $12 billion globally.


This figure is based on data collected by the FBI’s Internet Crime Complaint Center (IC3), international law enforcement agencies and financial institutions across the word between October 2013 and May 2018. During this time, the FBI found that 78,000 complaints were made, with over 41,000 victims reported in the U.S. alone.



change.png

nice quotes, but I wouldn't take cybersecurity advice from alphonse karr

Despite the accepted wisdom of the often-used quotation from Alphonse Karr ‘The more things change, the more they stay the same’, Alphonse obviously didn’t know much about cybersecurity.


Every single breach starts with a change, or the need for a change. Changes are both the enemy and the ally of cybersecurity, but in both cases, it is absolutely not the case that security is unaffected by change. Changes to IT systems are not just inevitable but near incessant in every organization: patches are routinely required to address vulnerabilities while business-as-usual improvements to IT services means that nothing stays still for long.


Read more »

USA Office - Naples
9128 Strada Place, Suite 10115
Naples, Florida, 34108
Tel: 1-888-898-0674

USA Office - Atlanta
201 17th Street, Suite 300 
Atlanta, Georgia, 30363

UK Office
Rivers Lodge, West Common, Harpenden
Hertfordshire, AL5 2JN
Tel : 020 3917 4995

Email: [email protected] | Web: www.newnettechnologies.com
Copyright © 2018 - New Net Technologies, All rights reserved.