Launching SaaS Alerting Technology to Manage Common Business Applications

October 13th, 2021 by admin

Someone video conferencing with a lawyer on the phone through unified communications.

Leading Managed Technology Services Provider Invests in Advanced Cybersecurity Tools

PLYMOUTH, MN – Nova Technologies, a leading managed technology services provider (MTSP), has increased their investments in an advanced cybersecurity technology to create additional layers of protection for their customers. Nova Technologies is deploying a SaaS (Software-as-aService) alert technology to help its customers monitor, protect and manage their employees access on widely-used business applications like G Suite, Salesforce, Slack, Dropbox, Office 365 and Box. Nova Technologies's new SaaS alert technology monitors upwards of 35 different types of applications and gives SMBs real-time alerts and reporting capacities. Additionally, it automatically responds to issues which require attention before the customer has initiated any action.

1. Brute Force Attacks - this is when cybercriminals use automation and scripts to guess passwords. Typical brute force attacks make a few hundred guesses every second which take advantage of simple passwords which use common expressions like 'user123' or 'password1,' and can be cracked in minutes.

2. Logins From Unauthorized Countries - these types of breaches can be spotted through various indicators such as: a VPN connection from an unknown device or anonymous proxy, an abnormal amount of data uploaded during a VPN session, an increase of company-related data files accessed, multi-factor authentication (MFA) from a new device, or too many failed VPN logins.

3. Outdated File Shares From OneDrive/Google Drive/Dropbox/Etc. (Orphaned Links) - these occur when attackers overtake expired, stale, and invalid external links on credible websites, portals, or applications so that they can repurpose them for fraudulent activities.

4. Data Exfiltration - this is when any malicious actor targets, copies, and transfers sensitive data outside out of a company's network, which can often be used to extract a ransom or be offered to a competitor for a bribe.

5. Confidential Files Viewed - when businesses are immediately notified as to which users are accessing confidential. A telltale sign that a cyber attacker is poking around in a network that they shouldn't be meddling in, is when confidential files are being viewed frequently.

6. Security Group and Policy Changes - this is often a means to make it easier for a hacker to break in and cause a deeper extent of damage to a business or organization, yet SaaS alert technology can be configured to send off an alert to ensure that the company is in control of any changes being made to the security group.

"While there are many more types of attacks which can be rectified with various levels of complexity, these SaaS alerts can add a much-needed layer of security for any organization," added Mr. Jones. "However, as cybercriminals continue to innovate, so must the technology that we leverage to protect our customers."

View Press Release (PDF)

Posted in: Press Release


Nova Will Help You Explore ALL Options

Hosted, Virtual, VoIP or Traditional Phone System… Which fits your company best?