Reducing security admin time by 50% – Sophos News

The customer is a leading provider of advanced software services, including web development, mobile app development, software testing, DevOps, digital marketing, and business intelligence.

With a head office in Costa Rica, their 920 staff are spread across Latin America: primarily Bolivia, Colombia, Costa Rica, and Peru. Within the IT team, five people have some responsibility for cybersecurity.

Cybersecurity: a company priority

The customer considers good cybersecurity as fundamental to their success. As their Chief Technology Officer (CTO), says:

Who would want to do business with a company that is affected by a cyberattack or suffers a data breach?

While it’s very difficult to completely eliminate the possibility of a security event, it’s important that we can give our clients the guarantee that we are making every effort to prevent them, and that if an event does occur the impact will be minimal.”

Common challenges

Like many other organizations, the company faces challenges with cybersecurity resourcing: IT team members have multiple responsibilities, and no one is 100% dedicated to cybersecurity.

Another challenge is budget and justifying investments in cybersecurity, as the benefit is not very visible to other areas of the company.

With cyberattacks on the increase, the company is clear that putting in place security tools that automate most of the processes is essential for their success and will transform the company in general.

A cybersecurity evolution

The customer has been through a cybersecurity evolution: first they moved from a traditional firewall to a simple next-generation appliance, and then they moved to a full Sophos next-generation cybersecurity system.

They now use Sophos XG Firewall at the gateway, Sophos Intercept X endpoint protection, Sophos Email, Sophos Device Encryption, Sophos Wireless Access Points, and Sophos Phish Threat for user education.

The Sophos products share real-time threat, health, and security information, and work together to respond automatically to incidents. All protection is managed through the Sophos Central cloud-based management platform.

Transformation through automation

Prior to Sophos, there was no communication between their firewall and endpoint protection. As their CTO says:

We have gained a lot from the ability of the Sophos products to work together, in particular their ability to automatically isolate compromised computers if an event is detected.

The ability to manage all the Sophos products through a single central platform is also crucial for us, along with the roadmap with further integrations.

Having tools that automatically detect and correct most security events enables our small IT team to manage the company’s security and prevent it being compromised.”

Fifty percent reduction in time spent on security admin

Switching to a Sophos next-gen cybersecurity has reduced by 50% the amount of time the IT team spends on security admin.

Before Sophos, they spent over 20 hours a week. Now, thanks to the ability of the Sophos system to automatically respond to events, security admin takes less than 10 hours a week.

Rather than dealing with all the events themselves, the team now just reviews the alerts provided by the Sophos tools and analyzes how they are being addressed (remediation of events).

The team also greatly appreciates the ability to now manage all their cybersecurity in one place, thanks to the centralized management in Sophos’ cloud-based platform.

Security events are dealt with in seconds

While the company experiences security incidents every day – they get many malicious emails and regular attempts to breach their website – they have a very high level of containment.

In fact, their CTO says that the biggest impact of moving to the Sophos next-gen cybersecurity system is the speed with which security events are now dealt with, reducing their exposure to attacks.

Thanks to the integration between the Sophos firewall and Sophos endpoint protection, most of the events are dealt with in seconds by the system, with compromised devices automatically isolated.

The switch to the Sophos system has also enabled the team to get – for the first time – visibility of all security events, further elevating their ability to secure the organization against attackers.

Cybersecurity: a business enabler

The IT team is very aware of the role of cybersecurity in building trust with their customers and that good cyber defenses are a business differentiator.

As a result of the move to Sophos, their clients now have much greater confidence in their cybersecurity, facilitating business relationships.

See it in action

Watch this demo video to see just how easy day-to-day security management is with a Sophos system.

To try the system for yourself, the easiest way is to start a free trial of one of our products.

And for anything else, or to discuss your own challenges, the Sophos team is here to help.

Net Universe offers all Sophos Devices and subscritpions also consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/sophos.

How to use colors effectively in email marketing-Part 1

Banner image of the blog

Introduction

A marketing email is a combination of carefully crafted parts, aimed at garnering maximum engagement. Of these, color plays a vital role, adding subtlety or exuberance to the email. With the right combination of colors, you can effectively ensure you convey the appropriate message to your subscribers.

 Whether it’s seasonal, motivational, or a sale reminder, there’s a right color for every kind of email. You can choose colors that support your message, resonate with subscribers’ interests, and encourage subscribers to engage. Let’s delve into the world of colors and learn how you can best use them in your email marketing.

Importance of colors

Always remember to use colors specifically and judiciously. Restrict yourself to two or three colors, including brand colors, and make the most important color more visible than the others.

As all colors are red, green, blue, or a combination of the three with varying percentages (RGB), you should research a bit about the RGB value of your brand color and experiment with different combinations that work well with it.

You should generally try to include no more than three colors in your email templates:

  • Your primary color needs to be the most important color aligned to the message your brand logo provides and should also be the most prominent in your template

  • The secondary color, less prominent, needs to be an excellent filler for the primary color. It should also complement the message

A tertiary color can be used to provide a completeness to the entire message and the other two colors used in the email

Check the table below to see how the three major colors interact:

Color wheel showing color combinations
Color mixing and color properties in a color wheel

Use of colors in content

The use of colors in email content can be divided into two sections:

General use of colors

The background in an email template acts as a canvas, whereas the foreground contains the text, images, and other elements. The general rule is to opt for a light background and dark foreground or vice-versa.

Image of a template with a neutral color as background allowing the foreground to be prominent
Black as a neutral background color makes the golden foreground prominent

As an email marketer you need to showcase the message and other features of the email template. So to make the message stand out, you need to choose your template’s background and the foreground very carefully. White and black are less vibrant, but good for creating balanced combinations with other colors.

Use of colors in elements

Colors are used in template elements to achieve:

  • Division

  • Contrast

  • Consistency

Division

Division allows you to accommodate more and varied information in your emails. Let’s say there’s a winter sale going on and you need to show the images of apparel. Even though they’re all winter clothes, they’re going to differ in certain respects. You can use divisions to show the types of clothing in separate sections of your template to address these differences.

The products in the template maintain the same color as the template
Divisions help maintain a similar color pattern between the products and the template

Use different colors in different sections and try to match the mood or occasion the apparel goes with. For example, colors such as red and yellow are associated with festivities such as Diwali in India, and green and red go with Christmas.

Try to reflect these colors when providing alt text, as that will retain the specificity of the sections even if the images are not visible

Contrast

Contrast between sections of an email can draw the reader’s eye to specific places. Using contrasting colors lets you effectively direct attention to the most important sections of the email. Here are a few examples of contrast in action:

CTA buttons with non-neutral colors as background
Non-neutral colors make the letters in the foreground more prominent

 

  • Use light backgrounds with dark CTA buttons or dark backgrounds with light ones

  • Avoid using neutral colors for CTA buttons, as they often blend into the background or don’t stand out

  • Opt for RGB colors for CTA buttons. Orange is also a good choice

  • Ensure that your CTA colors stand out, so they can generate better engagement from subscribers

CTA buttons with neutral colors in the background
The letters in the foreground seem less prominent against neutral backgrounds

Consistency

Consistency in email templates gives the reader a sense of coherence and continuity. This, in turn, builds a sort of trust among your subscribers. You can use the same color across multiple design elements—for example, the header text and a CTA button.

Template with a consistent color code
Blue is consistently used in this template maintaining a good balance with yellow

Determine color with segmentation

Factors influence colors and colors influence action. Your lists are segmented by common factors, so why not select colors for these segments? Segment your contact lists based on factors, such as geographic, demographic, gender, and past purchasing behavior.

Let’s see how some of these factors influencing segmentation can also help you in choosing colors.

Geographic

Orange is a color often associated with Halloween and autumn. While that might not be the case in some parts where autumn doesn’t signify fallen leaves, green or other nature-related colors can work well for those regions.

Template showing orange as the dominant color in an autumn related email
Orange is a dominant color displaying autumn in some parts of the world

Segment your lists by geographical regions and choose the colors best suited for seasons and holidays pertaining to those particular regions.

Demographic

The age group of your subscribers can determine the colors they prefer.

Subtle colors in the background and foreground of a template
Subtle colors in templates work better among the elder subscribers

Segment your lists by age groups and opt for dynamic content, catering two versions of one email to two different age groups.

A colorful template provides vibrancy
Colorful templates work well among the younger subscribers

Determine color with A/B testing

You can check the efficiency of your campaign with A/B testing. This will help you determine which colors can generate maximum engagement from your subscribers.

Colors that provide similar vibes or colors that hold similar cultural significance can be checked. You can also determine the tint and shade of the dominant colors used in your templates.

Green as the main color for a nature related template
Green is ideally chosen while designing templates talking about nature

For instance, let’s say you’re about to send an email to try and get recipients to subscribe to a nature periodical. Commonly, green and brown both are good nature colors. You thus try out two versions of the same email, with version A as a green template and version B as a brown one. With A/B testing, you can easily figure out which version will resonate better with your subscribers.

Brown as s the main color for a nature related template
Brown can also be used the main color in templates taking about natural and organic products

Conclusion

Colors aren’t merely window dressing for your emails—their associations to people are cultural, geographical, demographical, and personal.

As an email marketer, you can connect with your contacts quite effectively by using the right colors for the right seasons and reasons.

Stay tuned for our next instalment, where we’ll discuss color schemes and the best uses of different colors.

 

Net Universe offers all Zoho subscritpions and consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/zoho.

Multi-firewall reporting comes to Sophos Central – Sophos News

The latest update to Sophos Central Firewall Reporting (CFR) Advanced adds reporting across multiple devices, enabling you to easily get a holistic view into network activity and threats across your entire estate.

Reporting is also more accessible in Sophos Central, with two new direct main menu options under Firewall Management for the Report Hub Dashboard and the Report Generator tools.

There’s also a new drop down box enabling you to select entire groups or individual firewalls to include in the dashboard view and reports.

New main menu items (left) provide direct access to the reporting tools, while a new drop-down selection (center) enables you to determine which firewalls to include in your various reports.

These features are included and automatically enabled at no extra charge for customers with a CFR Advanced subscription.

The new multi-firewall reporting enables easy visibility into the security posture across your entire network with just a few clicks.  You can quickly and easily identify threat activity across all your devices,  including Sandstorm suspicious file sandboxing events, AV, IPS, geo information, and much more.

Get a complete picture of threat activity across your entire network with just a few clicks.

How to get started

You can try CFR for free with limited storage and features for about seven days of data retention to see how it works and then contact your preferred Sophos Partner or Sophos directly to get going on CFR Advanced today.

Setup is easy: simply log into the firewall and select “Central Synchronization” from the main menu to add a firewall to Sophos Central. Then log into Sophos Central to confirm.

Switching from Sophos iView

Sophos iView is a legacy firewall reporting platform that is coming to end of life at the end of this year.  Sophos Central Firewall Reporting provides a far more advanced and scalable reporting and analytics platform that replaces iView, enabling us to accelerate our roadmap and deliver more exciting new functionality sooner.

If you’re still using iView, now is the time to switch. It’s super easy. Get started sending your log data to Sophos Central today.

Additional resources

Net Universe offers all Sophos Devices and subscritpions also consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/sophos.

Zoho Positioned as Visionary in Gartner Magic Quadrant for Enterprise Low-Code Application Platforms, 2020

We’re happy to announce that Gartner, a leading independent technology analyst firm, has named Zoho a Visionary in this year’s Magic Quadrant for Enterprise Low-Code Application Platforms (LCAP).

The story

At Zoho, we have a saying:

Put your head down and work hard. Results are bound to follow. 

While we’re constantly listening to our customers’ voices and gauging our effectiveness, recognition from analysts like Gartner is always a moment of happiness for us. It affords us the chance to give ourselves a quick pat on the back before continuing on our journey to be the best we can be.

And what better way to celebrate but to share a quick recap of our journey thus far with Zoho Creator, our low-code platform evaluated for the research.

Read on to see how we began, where we are, and to get a sneak peek into what’s in store for next year! 🙂

The beginning

Always think long-term. This is at the core of all our moves as an organization over the past two decades.

The decision to not go public, to stay free of debt, to invest in the cloud, to focus on building our own security infrastructure, and to create an entire ecosystem of over 45 interoperable business applications have all been a part of this.

Our journey with the idea of a low-code application development platform started in 2005. As a fast-paced young startup with a positive growth trajectory, we needed to build applications faster to run our operations smoothly, without adding to the burden on our in-house developers, who were already running at full capacity. We explored the traditional development approach to develop what we wanted, but the speed and cost, which was critical to us, was a big problem.

As we dug deeper, it became evident that our need was universal, and the right solution could potentially disrupt application development as we knew it.

And so we walked over to our drawing board and wrote down the problem statement:

Uncomplicate and democratize application development

It meant that we needed to create a platform that helped anyone from a novice to a professional developer, create fully-functional business applications utilizing their full range of skills.

To date, this still remains our vision for our platform. 🙂

Our approach

Any given feature in an application could be easy, difficult, or complicated to develop and deploy. Our approach was to build a cloud-based platform that could shift the easy to trivial, the difficult to easy, and the impossible to possible.

We achieved this by identifying customer-centric features that needed pro-code developer intervention, then abstracting it and pushing it down to the low-code or no-code spectrum. And what more, we do it retroactively with our product updates! For example, our customers could deploy a native iOS mobile app in 2013 for a web application they built in 2006, a year before the first iPhone was even launched. 

So with a lot of hustle in the back room, we launched the first version of Zoho Creator, C1, in March 2006, around eight months after the first spark.

The ethos of our platform today

Today, fourteen years later, we’re on Creator 5 (C5) and still unwaveringly committed to our vision for the platform.

The result? Apart from being recognized by the likes of Gartner, we’re the preferred low-code platform for over 10,000 organizations worldwide. Our strength lies in turning Zoho Creator into a scalable, reliable, and secure platform loaded with customer-centric features.

 Some key highlights of the current version of the platform include:

      • Multi-persona application development: Our platform is engineered for better user experience and scalability for developers with a range of skill sets. On the one hand, to meet the needs of low- and no-code developers, we’ve added multiple abstraction levels, reducing complex functions to one-click or drag-and-drop actions. On the other, we also provide an IDE and controls for pro-code developers to build customized applications and services from the ground up, without limitations. This makes us different from most other low-code platforms, which cater to either of the two personas but not both. To add to it, we also provide for interoperability between the GUI drag-and-drop mode and the IDE mode, for greater collaboration between the two personas, leading to a seamless application development experience and better app governance.

      • Multi-experience platform builder: Our web-based, multiplatform builder lets you build, design, preview, and deploy apps for web, mobile, and tablets. The app-building takes place for all platforms simultaneously, but users can design and preview the app for each platform separately. The multiplatform builder is a major productivity booster for app developers.

      • AI-based application development: We’ve implemented several AI services at the application level as drag-and-drop features, such as prediction, keyword extraction, sentiment analysis, OCR, and object detection. We also provide deployment of custom AI models, without the need for niche AI skills, as a low-code feature. For example, an object detection system usually identifies a predefined set of objects from an image. Through our custom AI builder, a user can build object detection for a healthcare system by feeding healthcare-specific information to that engine with just a few clicks. And don’t worry, we value our customer’s privacy and never use their data for model development or training.

      • Customer portal: Customers can set up dedicated white-label portals for their external stakeholders, like customers, partners, and vendors, to access the entire application or just the parts relevant to them. This gives our customers complete peace of mind without spending time and effort on building their own authentication and security mechanisms.

      • Integration without coding: With 430+ smart connectors and 700+ prebuilt workflows, our customers can integrate and automate existing and new applications using a dynamic builder to connect information across the enterprise and facilitate business synergy. This includes integration with external local on-premise databases, external cloud service databases, IoT services, and popular CRMs, accounting, eCommerce, ITSM, project management cloud services, and more.

What’s next?

Our product team is in the last leg of fine-tuning Creator 6, which is expected to roll out early next year. A host of exciting new features and improvements to existing ones are in store. A sneak peek is just around the corner! 🙂

Parting words

We’re proud that our platform is slowly changing lives by making more people less afraid of software development and giving everyone the power to do more, faster.

On one end of the spectrum, we have Pedro Schambon—a farmer turned low-code developer turned CEO of ProFarmer Software Solutions—who has built and deployed an end-to-end farming management solution on our platform and is currently reselling it to other players in his industry.

On the other end of the spectrum is Shelby Spencer, CTO of Briotix Health, who regained 75% of her company’s revenue lost in the aftermath of COVID-19 in just under a month, through extensive deployment of applications built on our platform.

We know we need to keep pursuing our vision when we hear stories like these from our customers—and you can be rest assured that we’ll continue to work hard to do just that.

You can download the full report from here.

Click here to explore the power of Zoho Creator for free

 

 

 


Tribin Roy


At work, a product marketer passionate about narrating technology stories that can help organizations make value-driven decisions. Outside of it, a cat-parent who believes that everyone should observe these fabulous beings to learn a thing or two about patience, excitement, and love.

Net Universe offers all Zoho subscritpions and consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/zoho.

A new APT uses DLL side-loads to “KilllSomeOne” – Sophos News

Recently, we’ve observed several cases where DLL side-loading was used to execute the malicious code. Side-loading is the use of a malicious DLL spoofing a legitimate one, relying on legitimate Windows executables to load and execute the malicious code.

While the technique is far from new—we first saw it used by (mostly Chinese) APT groups as early as 2013, before cybercrime groups started to add it to their arsenal—this particular payload was not one we’ve seen before. It stands out because the threat actors used several plaintext strings written in poor English with politically inspired messages in their samples.

The cases are connected by a common artifact: the program database (PDB) path. All samples share a similar PDB path, with several of them containing the folder name “KilllSomeOne.”

Based on the targeting of the attacks—against non-governmental organizations and  other organizations  in Myanmar— and other characteristics of the malware involved, we have reason to believe that the actors involved are a Chinese APT group.

Shell game

We have identified four different side-loading scenarios  that were used by the same threat actor. Two of these delivered a payload carrying a simple shell, while the other two carried a more complex set of malware. Combinations from both of these sets were used in the same attacks.

 

Scenario 1

Components

Aug.exe clean loader (originally MsMpEng.exe, a Microsoft antivirus component
mpsvc.dll malicious loader
Groza_1.dat encrypted payload

The main code of the attack is in mpsvc.dll ‘s exported function ServiceCrtMain. That function loads and decrypts the final payload, stored in the file  Groza_1.dat:

The encryption is simple XOR algorithm, where the key is the following string: Hapenexx is very bad

While analyzing the binary for the loader used in this attack type, we found the following PDB path:

C:UsersgussDesktopRecent WorkUU_PKilllSomeOne.1msvcpReleasempsvc.pdb

Scenario 2

Components

AUG.exe clean loader (renamed Microsoft DISM.EXE)
dismcore.dll malicious loader
Groza_1.dat encrypted payload

The loader has the following PDB path:

C:UsersgussDesktopRecent WorkUU_PKilllSomeOne.1msvcpReleaseDismCore.pdb

The main code is in the exported function DllGetClassObject.

It uses the same payload name (Groza_1.dat) and password (Hapenexx is very bad) as the first case, only this time both the file name and the decryption key are themselves encrypted with a one-byte XOR algorithm.

In both of these cases, the payload is stored in the file named Groza_1.dat. The content of that file is a PE loader shellcode, which decrypts the final payload, loads into memory and executes it. The first layer of the loader code contains unused string: AmericanUSA.

It has a PE loader shellcode, that decrypts the final payload, loads it into memory and executes it.The final payload is a DLL file that has the PDB path:

C:UsersgussDesktopRecent WorkUDP SHELL.7 DLLUDPDLLReleaseUDPDLL.pdb

The DLL is a simple remote command shell, connecting back to a server with the IP address 160.20.147.254 on port 9999. The code contains a string that is used to generate a key to decrypt the content of data received from the command and control server: “Happiness is a way station between too much and too little.”

More ways to KillSomeone

The other two observed types of KillSomeOne DLL side-loading deliver a fairly sophisticated installer for the simple shell—one that establishes persistence and does the housekeeping required to conceal the malware and prepare file space for collecting data. While they carry different payload files (adobe.dat in one case, and x32bridge.dat in the other), the executables derived from these two files are essentially the same; both have the PDB path:

C:UsersgussDesktopRecent WorkUU_PKilllSomeOne.1Function_hexhexReleasehex.pdb

Scenario 3

Components

SafeGuard.exe clean loader (Adobe component)
hex.dll malicious loader
adobe.dat encrypted payload

The malicious loader loads the payload from the file named adobe.dat, and uses a similar XOR decryption to that used in Scenario 1. The only significant difference is the encryption key, which in this case is the string HELLO_USA_PRISIDENT.

Scenario 4 Components
Mediae.exe clean loader
x32dbg.exe  clean loader
msvcp120.dll clean DLL (dependency of x32dbg)
msvcr120.dll clean DLL (dependency of x32dbg)
x32bridge.dll malicious loader
x32bridge.dat payload


In Scenario 4, the PDB path of the loader is changed to:

C:UsersBDesktop.1majorUP_1Releasefunctionhex.pdb

The main code is in the exported function BridgeInit.

The payload is stored in the file x32bridge.dat, and it is encoded with a XOR algorithm, the key is the same as in case 3—HELLO_USA_PRISIDENT.

I think I smell a rat

The initial stage extracted from the two payload files in both these scenarios is the installer,  which is loaded into memory from the .dat file by the initial malicious DLL.  When loaded, it drops all components for another DLL side-loading cases to several directories:

  • C:ProgramDataUsersDataWindows_NTWindowsUserDesktop
  • C:UsersAll UsersUsersDataWindows_NTWindowsUserDesktop
  • %PROFILE%Users
  • C:UsersPublicPublic Media

The installer also assigns the files the “hidden” and “system” attributes to conceal them from users.

Some of the components dropped by the KillSomeOne installer payload.

The installer then closes the executable used in the initial stage of the attack, and starts a new instance of explorer.exe to side-load the dropped DLL component.  This is an effort to conceal the execution, since the targeted system’s process list will only show another explorer.exe process (and not the renamed clean executable, which might stand out upon examination).

The installer also looks  for a running process with a name starting with “AAM,” then kills the process and deletes the file associated with it in C:ProgramData and C:UsersAll Users. This is likely because earlier PlugX side-loading scenarios used the clean files name “AAM Updates.exe”, and this mechanism removes earlier infections. It also takes several steps to ensure persistence, including the creation of a  task that executes the side-loading executable that began the deployment:

schtasks /create /sc minute /mo 5 /tn LKUFORYOU_1 /tr

Additionally, it creates a registry auto-run key that does the same thing:

SoftwareMicrosoftWindowsCurrentVersionRunSafeGuard

The side loaded DLL uses an event name to identify itself when running—LKU_Test_0.1 if running from C:ProgramData, or LKU_Test_0.2 if running from %USERHOME%.

The installer also configures the system for data exfiltration. On removable and non-system drives, it creates a desktop.ini file with settings to create a folder to the “Recycle Bin” type):

[.ShellClassInfo]
CLSID={645FF040-5081-101B-9F08-00AA002F954E}
IconResource=%systemroot%system32SHELL32.dll,7

It then copies files to the Recycle Bin on the drive in the subfolder ‘files,’ and also collects system information, including volume names and free disk space. And lastly, it copies all the .dat files dropped—including those used in the other side-loading scenarios—into the installation directories, Then the installer loads akm.dat, the file containing the next payload—the loader.

The loader is a simple DLL file, which, unlike the rest of the payloads, is not encrypted. It is a plain Windows PE file with a single export name, Start— the main function in the DLL, which builds a command line with the location of AUG.exe (the renamed Microsoft DISM.EXE):

c:programdatausersdatewindows_ntwindowsuserdesktopAUG.exe

Then in executes the command line, which would invoke side-loading scenario 1 or 2.

 

Mixed signals

The types of  perpetrators behind  targeted attacks in general are not a homogeneous pool. They come with very different skill sets and capabilities. Some of them are highly skilled, while  others don’t have skills that exceed the level of average cybercriminals.

The group responsible for the attacks we investigated in this report don’t clearly fall on either end of the spectrum. They moved to more simple implementations in coding—especially in encrypting the payload—and the messages hidden in their samples are on the level of script kiddies. On the other hand, the targeting and deployment is that of a serious APT group.

Based on our analysis, it’s not clear whether this group will go back to more traditional implants like PlugX or keep going with their own code. We will continue to monitor their activity to track their further evolution.

SophosLabs would like to acknowledge the contributions of Mark Loman and Vikas Singh to this report.

Net Universe offers all Sophos Devices and subscritpions also consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/sophos.

Multi-Firewall Reporting comes to Sophos Central – Release Notes & News – XG Firewall

The latest update to Sophos Central Firewall Reporting (CFR) Advanced enables reporting across multiple devices, enabling you to easily get a holistic view into network activity and threats across your entire estate.

Reporting is also more accessible in Sophos Central, with two new direct main menu options under Firewall Management for the Report Hub Dashboard and the Report Generator Tools.

There’s also a new drop down box enabling you to select entire groups or individual firewalls to include in the dashboard view and reports.


New main menu items (left) provide direct access to the reporting tools, while a new drop-down selection (center) enables you to determine which firewalls to include in your various reports.

These features are included and automatically enabled at no extra charge for customers with a CFR Advanced subscription.

The new multi-firewall reporting enables easy visibility into the security posture across your entire network with just a few clicks. You can quickly and easily identify threat activity across all your devices, including Sandstorm suspicious file sandboxing events, AV, IPS, geo information, and much more.


Get a complete picture of threat activity across your entire network with just a few clicks.

How to Get Started

You can try CFR for free with limited storage for about 7 days of data retention to see how it works and then contact your preferred Sophos Partner or Sophos directly to get going on CFR Advanced today.

Setup is easy… simply log into the firewall and select “Central Synchronization” from the main menu to add a firewall to Sophos Central. Then login to Sophos Central to confirm.

Switching from Sophos iView

Sophos iView is a legacy firewall reporting platform that is coming to end of life soon. Sophos Central Firewall Reporting provides a far more advanced, scalable reporting and analytics platform that replaces iView enabling us to accelerate our roadmap and deliver more new functionality sooner. If you’re still using iView, now is the time to switch. It’s super easy. Get started sending your log data to Sophos Central today.

Resources you can use

Net Universe offers all Sophos Devices and subscritpions also consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/sophos.

Zoho Show extends Unsplash support to its iOS app


Have you ever had an exciting idea to share but it somehow fell flat while presenting to your audience? The visuals you use in your slides play a vital role in engaging your audience and illustrating your points, regardless of the type of presentation you create. Your data or content by itself can be very good, but images that compliment your work can take your presentation to the next level.

While creating a presentation, there are a number of challenges in making your slides visually rich. For one, there’s a major stumbling block when it comes to using images from the web: license and copyright issues. Once you find the perfect image, you have to check the license and ensure it is free to use. The next step would be to download a royalty-free image manually, upload it to your presentation, and format it as required. Quite a task, isn’t it? This is the problem Zoho Show’s Unsplash integration efficiently solves.

Introducing Unsplash for Zoho Show iOS

Unsplash opens the door to millions of high-resolution images contributed by a community of creative photographers. Zoho Show added Unsplash as an integration at the end of last year and extended the feature to the Android app earlier this year. We are now excited to announce Unsplash is available in the Show iOS app too!

Imagine you’re pitching your business idea to potential investors. You may want to add images to slides that will create a positive impact on the investors. There is also a need to be extra careful to ensure you or your company don’t face any copyright infringement lawsuits. With the Unsplash feature, you are just a few clicks away from adding the perfect picture to complement your slide content.

Bring life to your ideas with pictures from Unsplash.

Try out the Unsplash feature in your iOS device today!

Net Universe offers all Zoho subscritpions and consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/zoho.

Zoho blog | New product by Zoho Mail

Introducing _________ by Zoho Mail! Nope, I didn’t forget to fill in the blank. We do have an announcement coming up that you won’t want to miss, but we’re not quite ready to roll it out yet.

Let’s first take a look at a few problems business owners face. These are examples we come across on a regular basis, and you likely either own a business similar to theirs or have been customers of one.

All these have one thing in common. They’re all trying to solve a specific problem that’s heavily impacting their business. Actually, they have two things in common—the second is they’re all going to LOVE what we have in store.

We at Zoho Mail are launching a new secure and user-friendly product that will help all businesses communicate efficiently with their customers, building trust. This new platform has been battle-tested by more than 45 Zoho applications over the years, and we’ve been working behind the scenes for a while, to make this product available to all of you.

With this product’s pay-as-you-go pricing model whether you’re a solopreneur working out of your house or an enterprise with multiple offices, you only pay for what you use.

We’re almost ready for launch, but you’ll have to wait just a little longer to find out more. We’ll be announcing the new product in the coming week along with a special introductory offer for Zoho Mail and Zoho Workplace users.

In the meantime, we thought, why not make it interesting and see if someone can guess what this new product does. Leave your guesses in the comments, and we’ll be back soon to reveal how many of you got it right.

Keep an eye on this space and our Twitter page for our announcement. Until then, keep safe and stay healthy!

Net Universe offers all Zoho subscritpions and consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/zoho.

The tools that help me work from home with Dyslexia

Years ago, I wrote something that received some surprising criticism. I’m dyslexic, and I decided to post an update without using any of the writing tools I typically use, just to show people how useful they are. Despite the fact that I introduced the post by explaining it was an example of how challenging writing can be for someone with dyslexia, someone responded by pointing out all my spelling and grammar mistakes. 

Thankfully, most people understood my message: Yes, dyslexia can make some things harder for me, but using the right tools can be transformative.

I really like using my own experience to help others find and use the right tools for them. For more than 25 years, I’ve been championing the benefits of neurodiversity in the tech space. Neurodiversity is a concept where neurological differences are recognized and respected just like any other characteristics that differ from person to person. Dyslexia is one example of neurodiversity; ADHD is another. 

The way I think and process problems is critical to my role at Google, as I need to see the bigger picture in a very complex landscape. Over the last few decades, I’ve been a part of mentor groups as well as neurodiversity roundtables and events where we talk about what challenges and benefits there are for those who have different communication and work styles, and how we can all best excel together. I also partner with Google Cloud and Google Workspace customers through our Office of the CTO program, or OCTO, to help bring some of these learnings to people outside of Google who use our products.

Working from home has presented hurdles for all of us, myself included. I’ve found it difficult to live without a whiteboard or develop ideas when collaborating with others. But I’ve also learned a few things that have helped me adjust, and helped me and my teams. I wanted to share some tips and tools I’ve learned over the months (and in some cases, years) that can be especially useful while many of us continue to work from home. 

  1. Personally, I’ve found that using the online version of Jamboard and a Pixel Pen during remote meetings—of which I now have plenty of—has been a game changer. Having a virtual whiteboard in front of me that my colleagues can also see helps bridge the disconnect between us. It’s amazing how engaging it can be seeing a solution coming alive, and how discussing it can enrich the outcome. This is especially critical with complex problems. 

  2. While having your camera on during every meeting can become painful, it’s incredibly helpful for many people. I need to read body language; it often helps me know if I need to speak slower or move a little more quickly through a presentation. (Of course, I fully understand when this isn’t possible!)

  3. Using captions in Google Meet is always a good idea. For me, being able to match the words that are being spoken to those typed out below helps me not miss important details, and also means I can take notes. Captions even correct speakers’ grammar mistakes, which helps with my note taking. While captions are only available in English right now, we’re actively working to bring them to more languages.

  4. This might sound a little obvious, but using Smart Compose and grammar suggestions features have definitely improved my writing abilities. If I’m struggling with how to write a sentence, Smart Compose can suggest ways to complete it, which saves me time. (And is especially helpful with words like “where” and “were.”)

  5. The fifth and final tool that’s worked well for me is using more than one screen. I’ve found that a single screen feels very restrictive to me. I normally have three screens since I jump between tasks a lot. Many neurodiverse people like myself find it difficult to stay focused on one thing for very long. Having my work “scattered” around on different screens feels sort of like having papers all over a desk; I can pick up pieces in parallel without the need to stop and start what I’m doing. Basically, being able to easily move between the different things helps me find a flow.  

Some of these things more specifically serve neurodiverse people, while others can help anyone. But the idea is that when we’re more empathetic and attuned to what everyone on our team needs, we’re better able to perform as a group.

[ad_2]

Net Universe offers all Google devices with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/google.
You can visit our Shop Online

 

Replace your background in Google Meet

What’s changing

You can now replace your background with an image in Google Meet. You can either use Google’s hand-picked images, which include office spaces, landscapes, and abstract backgrounds, or upload your own image.

Who’s impacted

End users

Why you’d use it

Custom backgrounds can help you show more of your personality, as well as help hide your surroundings.

Additional details

Virtual backgrounds work directly within your browser and do not require an extension or any additional software. At launch, they’ll work on ChromeOS and on the Chrome browser on Windows and Mac desktop devices. Support on Meet mobile apps will be coming soon; we’ll announce on the Google Workspace Updates blog when they become available.

Getting started

Admins: At launch, there will be no admin control for this feature. Admin controls to select which organizational units can use custom and preset backgrounds for meetings they organize will be introduced later this year. We’ll announce on the Google Workspace Updates blog when they’re available.

Rollout pace

  • Rapid Release domains: Gradual rollout to eligible devices (up to 7 days for feature visibility) starting on October 30, 2020
  • Scheduled Release domains: Gradual rollout to eligible devices (up to 7 days for feature visibility) starting on November 6, 2020

Availability

  • Available to Essentials, Business Starter, Business Standard, Business Plus, Enterprise Essentials, Enterprise Standard, Enterprise Plus, Enterprise for Education, and Nonprofits customers and users with personal Google accounts.
  • Selecting your own picture is not available to participants of meetings organized by Education customers.

Resources

Roadmap


[ad_2]

Net Universe offers all Google devices with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/google.
You can visit our Shop Online