ComputerVault for Retail Outlets
Posted by Peo Nathan / October 27, 2019

Point-of-sale (PoS) systems are the common sources for skimming vital credit card information of the consumers at retail outlets. When I say retail outlets, it covers all the franchise businesses from car rentals to any and all chain retail merchandise stores. The security risk increases multi-fold when the PoS systems are connected to computers in the retail locations. A small retail shop do not have the need to connect computers in the store to process credit card transactions or track inventory, however, larger retail chains have the need to deploy computers connected to the PoS systems in the stores. PoS systems that are not networked with computers are vulnerable ...

ComputerVault 15 Minute Webinar and Demo: Every Tuesday at 11:00 am EST The ComputerVault webinar on 10/23/19 was oversubscribed. The number of people that wanted to attend greatly exceeded our expectations. So, we’re adding another one for the people that couldn’t get into the conference. We apologize for your inconvenience and we’ll be sure to increase the capacity for the next webinar.   Learn more about ...

Endpoints are a Perpetual Threat
Posted by Peo Nathan / October 18, 2019

Endpoints, such as, PCs, laptops, tablets, phones, VoIP extensions and so many more, are perpetual cyber security threats. No amount of security software would fully prevent the endpoints from being a security threat to the corporate and private data. Because, hackers are always a step ahead of those security software makers and the human error with endpoint vulnerabilities is perpetual too. Hackers create the cyber security exploitation business plans and the software companies make the investments to stop those exploitations. So, what is the solution to protect the corporate and private data? The solution comes from the acceptance that good guys are a step behind the bad guys!...

Beware! Hackers are everywhere!
Posted by Peo Nathan / October 11, 2019

Recently, I made a significant financial transaction over phone with one of the leading banks in America. Right after I hung up the phone, within 5 minutes, I got a phishing email that looked just like an email alert from my bank stating “We have detected an irregular activity on your account.” If I wasn’t careful as to what the embedded link on the “Get Started” button was, I would have compromised my PC, our corporate network and potentially my bank account information. I informed the bank, but, never heard back from them! Why commercial businesses ignore consumers’ cyber protection is a separate topic by itself. In my case, the possibility ...

VDI That Works
Posted by Paul Angelo / September 28, 2019

Would you like to see a demonstration of a Virtual Desktop product that actually works? Check out Advans’ ComputerVault VDI product Demo System. At this link you can request a demo account to use a virtual desktop and view the functionality of its administrative console. The virtual desktop and administrative console may be accessed from anywhere in the world using standard broadband Internet with either a browser or a software client whi...