Commercial Cybersecurity

Technology is constantly evolving, as is the threat to your organization. The effects of each commercial data breach are being felt around the world and costing companies billions of dollars in funds applied to ransomware, post-breach recovery efforts and lawsuits. Global attacks such as WannaCry, highlight the need to increase network security through initiatives such as replacing passwords, which are relatively easy to hack, with two-factor authentication, which is nearly impossible.

Would a breach affect me, the same as a major corporation? The effects of a data breach impact more than your client, whose information may be stolen and could lead to fraudulent credit card activity. A breach affects your business’s reputation, which could cost you a lot more than you think in the long run. Would you continue to have a relationship with a business that led to your information being compromised?

Why would anyone want to attack my business? We’re not a major corporation, like Target or Chase Bank. No, you’re not a major corporation, which means you may not be the intended target of a breach, but a point of entry to your client’s network. In the most recent data breaches, such as Target (the largest commercial data breach-to-date), Netflix and Sony- a third-party was used to access the intended party’s network.

How did the Target breach happen? In November 2013, Target was the victim of a data breach that affected more than 40 million consumers. You would think that a major corporation would have some of the best cybersecurity to protect themselves against an outside threat- and they did. However, Target did work with an HVAC company that didn’t.

Target’s network was compromised when hackers used credentials from the contracted HVAC company to access Target’s network (which the HVAC company had accessed regularly for remote monitoring and other tasks)- and upload malware programs on the company POS system, giving them millions of customer’s credit card information.

What is malware? Malware is software SPECIFICALLY designed to damage or gain access to a computer without the owner’s knowledge.  Malware comes in many forms, like software or even a piece code embedded in an email or webpage- which is why the guy’s computer across from your cubical, got infected after he visited that page with laughing cats.

The Target breach showed us that the vulnerable point of entry is often not within the organization, but a third-party- such as a contractor. The breach also revealed the importance of incorporating hard to replicate credentials to gain network access, such as multi-factor authentication.

What is multi-factor authentication? Multi-factor authentication is a security verification method that uses a token (something you have) WITH something you know, like a password, to verify the user and grant access. Thursby offers the government software and applications that are accessed using multi-factor authentication, such as Common Access Cards (CAC) and Personal Identity Verification (PIV) cards for Macs and mobile devices (Apple and Android).

How can Thursby Software Help Me? Thursby offers government certified secure applications that are accessed using smartcards. Our most popular application is Sub Rosa, a mobile web browser application, uses multi-factor authentication, such as Common Access Cards (CAC) and Personal Identity Verification (PIV) cards with our card readers. The application is available for Apple (Sub Rosa for iOS) and Android (Sub Rosa for Android) mobile devices. This allows the end user to securely browse sites, including those that require security certificates, access Outlook Web App (OWA) and sign/encrypt/decrypt email.

Sub Rosa Pro for iOS and Sub Rosa Pro for Android, also work with derived credentials and mobile device management programs. Meaning users can log in using the credentials from their smartcard without having the smartcard and smartcard reader. This option is ideal for users who don’t want to have additional devices.

Who else has Thursby Software helped? Thursby has been a pioneer in Mac and mobile devices for more than 30 years. Our hardware and software products have been deployed and used by the U.S. Naval Services Training Command and DLA.

Recently, Thursby has partnered with the United States Navy Reserve to launch the Ready 2 Serve (R2S) program. This Bring Your Own Device (BYOD) program allows active Navy Reservist to access OWA, using S/MIME features (sign/encrypt/decrypt emails) and access Navy websites with security certificates from their personal mobile devices. The R2S app is a customized version of the Sub Rosa app, specifically, designed for the Navy Reserve. This program functions at 1/10th of the cost of the previous government program.

How do I get started? Contact or call us at +1(817) 478-5070 today to see how we can help you increase security while maintaining usability


About Thursby Software

Thursby Software is a privately-held American enterprise based in Arlington, TX. Founded in 1986, with a solution to integrate Macs into Windows environments- Thursby has become a trusted and reliable brand, offering simple and secure solutions for Macs and mobile devices to clients ranging from the Pentagon to the Discovery Channel and BMW.

1,000,000+ paid licenses at 80,000+ clients across 140+ countries