Skip to content

24.6.7 Voyager released

Changes compared to 24.6.6

New Features

  • Added SMB Storage Vault option to the Comet Server Service Manager first use wizard

Bug Fixes

  • Fixed an issue with Microsoft 365 listing that caused processing to fail when SharePoint Sites are locked
  • Fixed an issue with operating system information being incomplete for Windows devices
  • Fixed an issue causing certain Gradient PSA failures to retry for an unnecessarily long time

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

Dope security puts a new spin on secure web gateways

Need to secure non-human entities, leaky clouds, and complex environments? The companies included in our network security startups to watch series have bold ideas.

dope.security is one of Network World’s 7 network security startups to watch for 2024. It rearchitected the traditional secure web gateway (SWG) to avoid routing traffic through cloud data centers. By performing security directly on the endpoint instead of routing traffic through stopover data centers, dope.security says its SWG can boost network performance fourfold.

dope.security at a glance

  • Founded: 2021
  • What they do: Provide secure web gateways (SWG)
  • Funding: $20 million
  • Headquarters: Mountain View, California
  • CEO: Kunal Agarwal
  • Competitors include: Forcepoint (through its acquisition of Websense),
  • Netskope,Symantec (through its acquisitions of Blue Coat), and Zscaler
  • Customers include: Plansource and Success Academies

Why dope.security is a startup to watch:
Cloud security risks are numerous and growing. According to ICS2’s 2024 Cloud Security Report, 96% of organizations are worried about public cloud security, and more than half (55%) consider securing multi-cloud environments as their top challenge.

Many legacy security solutions don’t have the ability to fully investigate and respond to cloud and SaaS threats. Conversely, cloud-native security solutions tend to force enterprises to route traffic through cloud data centers, which sacrifices network performance.

dope.security intends to improve cloud security and performance by rethinking legacy secure web gateway (SWG) design, removing a stop between enterprise resources and end users. The startup uses airline terminology to drive home the point, calling its architecture “fly direct.” dope.security’s SWG architecture eliminates stopovers at cloud data centers, which the startup says improves performance up to fourfold.

Instead, dope.security’s SWG performs security directly on the endpoint, including URL filtering, SSL inspection, and cloud app control. Dope.security also provides AI-powered Cloud Access Security Broker (CASB) services, including Data Loss Prevention (DLP), SaaS Security Posture Management (SSPM), and contextual analysis of an organization’s publicly exposed data.

The startup has raised a total of $20 million in VC funding. Its most recent round closed in March 2023, a $16 million Series A round led by Google Ventures (GV), with participation from existing investors boldstart ventures and Preface.

About Dope Security

A comprehensive security solution designed to protect individuals and organizations from various cyber threats and vulnerabilities. With a focus on proactive defense and advanced technologies, Dope Security offers a range of features and services to safeguard sensitive data, systems, and networks.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Key Insights into Windows Content Management

Field workers whose roles entail them to work away from the office, individuals needing quick access or those lacking corporate email access, and scenarios involving kiosks can all present numerous challenges.  For instance, the sudden disappearance of crucial documents or the need for the most up-to-date documents, such as field reports, compliance documents, or operational manuals, underlines the vital role of efficient content management solutions for Windows. 

Windows Content Management
Content Management for Windows

Now, ensuring seamless access to essential documents is not just about productivity but also customer experience. Scalefusion, with its features for Windows content management, addresses these challenges head-on. The features empower teams to collaborate efficiently and protect valuable data during the most demanding times. 

Let’s explore the essential needs in content management and how Scalefusion, as an MDM solution,  helps startups and enterprises alike, ensuring important documents are always within reach, no matter the circumstances.

Critical Needs in Content Management

1. Efficient Content Distribution

  • Facilitating easy and secure content sharing: Content management allows seamless sharing of documents, media, and other digital assets across various departments and teams. This makes sure all employees have access to the most up-to-date information they need, when they need it, without compromising on security.
  • Managing permissions and access controls: A robust control mechanism is important to protect sensitive information. This includes setting permissions at various levels (e.g., document, folder, user, and group levels) to ensure that only authorized personnel can view, edit, or distribute certain content. This safeguards data and also helps maintain a clear hierarchy of information access within the company.

2. Compliance and Governance

  • Ensuring content management practices adhere to industry regulations: Businesses must adhere to industry regulations to ensure their content management practices meet legal and industry standards effectively. This is essential to avoid penalties, maintain trust with customers, and protect sensitive information. These practices involve implementing measures such as data encryption, user authentication processes, and secure data storage to safeguard against data breaches and ensure compliance with regulatory standards.
  • Maintaining audit trails and records for accountability: To meet governance standards, detailed logs of all content-related activities are essential. This includes tracking who accessed or modified a document when changes were made, and what specific changes occurred. Such audit trails are crucial for internal reviews and external audits, ensuring transparency and accountability in content management practices.

Windows Content Management Using Scalefusion

1. FileDock: Remote File Management for Windows

FileDock, a proprietary app offered by Scalefusion, makes sure employees always have access to the latest versions of necessary documents and files, which increases workflow efficiency.

  • Easy file transfer: Using FileDock, IT teams can remotely publish, unpublish, and update files, folders, documents, videos, and presentations across Windows devices and the corporate network.
  • Folder and subfolders: FileDock allows you to create folders and subfolders, providing a structured hierarchy for organizing files. This hierarchical organization helps minimize clutter, streamline file access, and maintain a systematic approach to managing documents.
  • Data security: FileDock ensures data security, prioritizing confidentiality and integrity throughout the entire file transfer process. This benefits that sensitive corporate data remains protected at all times.

2. Presentation for Digital Signage

Presentation settings are available within the content management section of the Scalefusion dashboard. These settings are particularly suited for kiosk use cases, including unattended kiosks.

  • Versatile display options: Transforms Windows devices into dedicated kiosks for digital signage.
  • Customizable interface: Allows for the creation of customized interfaces to meet specific business needs, from information displays to interactive kiosks.
  • Remote management: Enables IT teams to manage and update kiosk content remotely, ensuring timely and relevant information is displayed.
  • Enforce landscape mode: Offers an option to keep presentation orientation in ‘landscape’ mode.
  • Use as a screensaver: Allows the presentation to be used as a screensaver.
  • Loop continuously: Enables presentations to play in a continuous loop, ideal for digital signage.
  • Set interval time: Allows setting a delay between files, with options ranging from 5 seconds to 1 minute.
  • On-demand playback: Admins can place a shortcut on the device to start the presentation on-demand.

3. BitLocker: Configuration for Windows Device Security

Data protection is necessary for safeguarding sensitive information. IT admins can configure and manage BitLocker settings on Windows devices, ensuring data encryption to protect against theft and unauthorized access. 

BitLocker provides full-volume encryption, securely encrypting hard disk volumes to prevent exposure and theft of sensitive data. This is essential for maintaining the confidentiality and integrity of corporate data, especially in environments with high-security demands.

Empowering Businesses: Windows Content Management with Scalefusion

Scalefuion helps businesses walk through the complexities of Windows content management with ease. By providing effective content distribution, compliance and governance, and better collaboration and productivity, it ensures vital documents are always accessible and secure.

Schedule a demo with our experts to see Scalefusion’s Windows content management in action. Start a 14-day free trial today by signing up!

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scalefusion
Scalefusion’s company DNA is built on the foundation of providing world-class customer service and making endpoint management simple and effortless for businesses globally. We prioritize the needs and feedback of our customers, making sure that they are at the forefront of all decision-making processes. We are dedicated to providing comprehensive customer support services, and place emphasis on customer-centric thinking throughout the organization.

Amazon passkey: What it is and how to set it up on your account

Welcome to the passwordless era

Passwords are on the brink of retirement. They have served us well as an authentication method for a long time, no doubt about that. But like all technologies, they are being replaced by the next best thing. Right now, that thing is password-free authentication, already adopted by companies like Amazon, Google, and Apple to allow their customers to log in to their services quickly and securely without passwords.

Other organizations are expected to follow in the footsteps of the big players, especially since they can use free tools like Authopia by NordPass to effortlessly add a passkey-based login option to their website or service. The term “passkey-based” is pivotal here. What exactly are passkeys, and why are they considered the successor to passwords? Let’s dive in and find out.

What are passkeys?

Simply put, passkeys are a new authentication method that allows users to log in to their accounts on websites or services without using passwords. It relies on cryptography to provide secure authentication—sets of cryptographic keys, to be exact. One key, known as the “public” key, is stored on a server, while the other, the “private” key, remains on the user’s device. During the login process, the key from the user’s device is verified against the key stored on the server. If the two keys match, the user is granted access to the account.

Since the keys are generated by the system, there’s no need to remember them, which makes the technology much more user-friendly compared to passwords. Moreover, because encryption is used, passkeys offer greater security than even the longest and most complex passwords can provide.

How to enable Amazon passkeys

Setting up passkeys on your Amazon account is a straightforward process that can be completed in just a few minutes. However, the steps vary slightly depending on whether you are using a desktop or a mobile device. Let’s now review the setup process for both options.

Setting up passkeys via the Amazon website (desktop)

  1. Open your web browser and go to amazon.com.

  2. Access your account settings and scroll down to the “Login & Security” section.

  3. Find the option for “Amazon Passkeys” or “Two-Step Verification.”

  4. Follow the on-screen instructions to set up your passkey settings.

  5. Confirm the setup by scanning a QR code displayed on your computer screen with your mobile device, and authenticate using your mobile device’s biometric features.

  6. To verify that everything is set up correctly, log out and log back in using your newly set passkeys.

Setting up passkeys via the Amazon app (mobile)

  1. Launch the Amazon app on your iPhone, iPad, or Android device.

  2. Tap the menu icon and navigate to “Account.”

  3. Select “Login & Security.”

  4. Click on “Set Up” next to the “Passkey” option.

  5. Follow the prompts on your device to authenticate using your fingerprint or facial recognition.

How to sign in with an Amazon passkey

Once enabled, using passkeys to log into your Amazon account is super easy. All you have to do is:

  1. Visit the Amazon website and open the account login form.

  2. Enter your email or mobile number.

  3. Instead of entering your password, click on “Sign in with Amazon passkey.”

  4. Enter your passkey, for example, by using a biometrics scanner on your device.

  5. You’re securely logged in!

How to delete your Amazon passkey

If for some reason you would like to delete your Amazon passkey, you need to go back to your account settings and navigate to the “Login & Security” section. Once there, select the active passkey and click on “Delete.” When you confirm your choice, your passkey will be removed and your account will revert to the traditional password login option.

Can you use Amazon passkeys on multiple devices?

As a matter of fact, yes, Amazon passkeys can be used on multiple devices. Once you enable a passkey, it’s stored in your cloud service account, so you can use it across all linked devices. Therefore, when you access Amazon from another device using the same cloud service account, the passkey should automatically appear as a login option.

Effectively store and manage your passkeys with NordPass

If you want to be passwordless and start using passkeys to log in to your Amazon and other accounts, you need a solution that will allow you to store and manage your passkeys effectively. One such solution is NordPass.

Although primarily known as a password manager, NordPass fully supports passkeys and was one of the first tools of its kind to do so. This means you can now use it to create, store, and manage your passkeys with ease, significantly improving your login experience in terms of both security and convenience.

In other words, NordPass allows you to keep all your passkeys in an encrypted vault accessible only to you. And since NordPass is available on Android and Apple devices, you can quickly access your passkeys anytime, from any device.

So, if you’re ready to move away from traditional passwords and embrace the latest passwordless technology, NordPass can help you get started. Give it a try and see the difference for yourself.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

10 steps to train employees on cybersecurity

Data breaches usually start with an employee mistake. Someone may click a dangerous link or send data via an unprotected connection. Soon, that error becomes a crisis. Websites fail, customer data spreads across the Dark Web, and regulators become involved.

Most of the time, all of this can be avoided. Proper cybersecurity training and cybersecurity tabletop exercise tools prepare staff to deal with threats.

The shocking thing is that almost one-third of US companies don’t provide cybersecurity training for employees. Worse still, over half of SMBs have no cybersecurity plan at all.

Don’t follow their example. Create a cybersecurity awareness training program that educates employees and puts security policies into action.

This article will explain how to raise cybersecurity awareness across your organization. So pull a chair up to the whiteboard as we deliver our 10-step cybersecurity training roadmap.

Key takeaways

  • Raising cybersecurity awareness is a vital business goal. Start by building a foundation. Create comprehensive cybersecurity policies and aim to ensure every employee is aware of their security role.

  • Cybersecurity training should focus on urgent data security threats. List relevant risks and train employees to identify and minimize them.

  • Device security awareness training is critical–especially in companies that rely on remote workers. Train employees to secure devices from digital and physical threats.

  • Educating employees on password security is a priority. Most cybersecurity breaches target weak credentials. Ensure staff know how to use strong passwords and access network assets safely.

  • Focus training on confidentiality and data protection. Define company data and instruct employees how to handle data securely. This includes regular backups, secure storage, and tools like Virtual Private Networks (VPNs).

  • Update training programs annually. Cybersecurity threats evolve, and training should keep pace. Refresh employee knowledge, taking advantage of free cybersecurity training when possible.

Cybercrime targets human error key stats

Step 1: Ensure employees understand their cybersecurity role

Cybersecurity training must include every employee, no matter how junior (or senior). Every network user must be aware of their security responsibilities. Communicate that one slip-up or policy breach can lead to data theft and regulatory action.

Guide employees on how to meet security requirements. For instance, you may require a VPN and Secure Remote Access for remote workers. Inform staff how to report security issues and reassure them. Reporting accidental policy breaches is a good thing–not something to fear.

Step 2: Create watertight data security policies

Cybersecurity training rests on comprehensive and easy-to-follow security policies. Create formal policies on handling confidential data, incident response, password management, remote work, and other relevant areas.

Security awareness training should cover employee knowledge of security policies. But one-time testing is not enough. Schedule regular meetings to discuss policies. Test knowledge annually to ensure staff remain aware of policy requirements.

Remember: policies are worthless if they are just documents. They need to be part of everyday professional practice. Make policies available in a central library for staff to access, and double-check the language to avoid technical jargon.

Step 3: Train employees to identify data security threats

Cybersecurity training can’t necessarily create an army of technical experts, but raising overall awareness is vital. Well-trained employees understand cyber threats and know how to prevent or mitigate them.

Train staff to identify email phishing, fake websites, insecure document transmission, and the risks of using unsecured public Wi-Fi. Make it clear that adding unauthorized software to the network is out of bounds.

Real-life examples help employees understand the nature of cyber threats. For example, sessions could include visual material on pop-ups, sudden device slow-downs, or unrequested browser extensions.

Above all, employee training must communicate the consequences of cyber-attacks and emphasize the need to follow security policies. By educating staff, you build a human firewall that adds an extra layer of defense against attackers.

This is a critical point and a key recommendation in Gartner’s 2024 Cybersecurity Trends Report. Human firewalls complement technology by changing employee behavior to mitigate potential threats. Properly-educated employees understand the threat reporting process. Training involves everyone in network protection efforts. A human firewall of engaged employees is much more likely to identify cybersecurity problems before a data breach occurs.

Gartner review

Step 4: Tighten up your password hygiene

Weak, rarely-changed passwords often expose businesses to information security threats. Robust password policies are the only reliable protection.

Don’t assume employees understand password risks. Two-thirds of Americans re-use passwords across accounts. Up to 80% of data breaches result from easily guessed or stolen passwords. People tend to be lazy about password hygiene. Don’t give them that option.

Instead, consider assigning passwords to employees and rotating these passwords regularly. Train staff and password managers to use strong passwords. Add multi-factor authentication to network logins and ensure employees know how to use it.

Step 5: Fine-tune device security

Training employees on cybersecurity must cover device security. Remote and off-site staff often rely on mobile devices. If a device contains sensitive data or allows network access, security policies apply.

Take action to minimize the risk of device loss. Mandate separate work and personal devices when cybersecurity risks are high. Include training modules explaining the difference between personal and business use.

Cybersecurity training should cover physically securing devices and protecting remote connections. It’s also wise to use remote monitoring tools and inform employees that their business accounts are transparent.

Step 6: Make sure employees backup critical data

Employees must back up company data, preferably every day. During employee training, make it clear that local backups are insufficient. Employee devices are vulnerable to theft or external attacks. Instead, use secure cloud storage systems to hold critical documents or customer data.

Step 7: Put in place authorization and access management systems

Authorization and authentication technology should always shield central data centers and cloud-hosted apps. However, it’s important to instruct employees in proper access security practices.

For instance, employees should never share work devices with colleagues or external individuals without authorization. Writing down passwords or authentication codes is out of the question. Adding new devices without agreement from network admins should also be prohibited.

Sometimes, employees complain about time-consuming authorization systems. Outflank those issues by explaining why MFA and VPNs are so important. When they know what is at stake, employees will quickly adopt secure access routines.

Step 8: Ensure secure web development and website updating

SQL and web application exploits are common security breach vectors, making secure coding a vital element of cybersecurity awareness training.

Deliver a secure training program to every staffer with access to web backends and coding tools. Even those without direct coding responsibilities can allow access to attackers. If employees update web assets in any way, they must do so safely.

Authorization is also important. Employees should know who is authorized to change web code or update websites and how to request permission to make changes.

Step 9: Make sure employees use email securely

Email is another critical weak point in business cybersecurity. Cybersecurity awareness training should help employees spot potential threats like phishing attempts and links to suspicious websites.

If necessary, test employee competence with phishing simulations that generate false social engineering emails. Simulations are great because they prove users can spot dangerous messages from authentic business communications.

Separate training applies if employees use email to transmit sensitive information. In these cases, ensure workers use VPNs and email encryption to safeguard data.

It should go without saying, but you should also test employees on what constitutes “sensitive data.” Many email users send confidential information via unsafe personal accounts, and that should end when they understand how you classify information.

Step 10: Update your training program regularly

Cybersecurity awareness tends to wane after a few months. Around 10% of employees say they remember all of their cybersecurity training. The other 90% have likely drifted back to unsafe passwords or unsecured remote connections.

Refreshing cyber security training is the only viable solution, but it can be challenging for businesses with a limited security awareness budget.

However, refreshing knowledge does not need to be expensive. Cybersecurity awareness training often costs virtually nothing if you know where to look.

Keep costs low by checking out free cybersecurity training listed at the National Institute for Science and Technology (NIST). For example:

  • The Cisco Networking Academy offers 6 hours of free cybersecurity training covering all core themes.

  • Evolve Academy provides free cybersecurity awareness training focused on practical technical skills.

  • Microsoft Technologies Training offers refresher courses to boost information security awareness when using Microsoft products.

These are just a few of many free or low-cost cybersecurity education options. You can also listen to podcasts about security awareness. Combine external courses with internal training to manage cybersecurity costs.

How can NordLayer help?

Companies are never alone when delivering cyber security awareness training, so don’t feel isolated. Instead, work with trusted partners like NordLayer to build internal knowledge and upskill your workforce.

NordLayer’s Learning Center is the perfect bookmark for trainers and employees. Use our accessible security checklists and in-depth explainers to understand concepts and tick off cybersecurity tasks. And stay on top of emerging threats thanks to cutting-edge intelligence.

It also helps to add video elements to training sessions. In that case, explore NordLayer’s YouTube channel. Our channel covers cybersecurity essentials like device posture security and secure remote access—supplementing tests and in-person training.

Whatever you do, don’t struggle alone. Share the cybersecurity challenge by enlisting expert assistance. If you’d like to find out more, get in touch with NordLayer today. We’ll help you find the right training and security solutions.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×