Staying Current on Security

Akore Trust sets the standard for cloud based security and will be an effective partner for any enterprise.

A Fully Managed Solution Has Benefits

Offers Security & Compliance Readiness!

Visibility

Continuous Threat Detection
Full visibility info who is accessing data with continuous auditing at the I/O storage level.

Availability

Reduced attack space and increased availability
Data minimization through encryption policies reduces opportunity for attacks and disruption.

Productivity

Added data security with minimum impact to operations
Transparent to users, operating systems and applications.

Speed

Reduced time to compliance by up to 50%
Encryption with centralized key management delivers an efficient solution for meeting data security regulations.

Security  Best Practices: Akore is dedicated to helping customers be secure, feel secure and access our system status any time, day or night.

TLS 1.1 or Higher

Beginning July 22, 2017, Akore will require secure Org connections to use the latest protocol TLS 1.1 or higher to provide a more secure environment and continued PCI compliance. Orgs using TLS 1.0 must be upgraded for continued access to API integration, connections to communities and sites, partner app exchanges, and user browser access.

Login IP Ranges

Login IP Ranges limit unauthorized access by requiring users to login to Akore from designated IP addresses — typically your corporate network or VPN. By using Login IP Ranges, admins can define a range of permitted IP addresses to control access to Akore. Those who try to login to Akore from outside the designated IP addresses will not be granted access.

Decrease Session Timeout Thresholds

Users sometimes leave their computers unattended or they don’t log off. You can protect your applications against unauthorized access by automatically closing sessions when there is no session activity for a period of time. The default timeout is 2 hours; you can set this value from between 30 minutes and 8 hours.

Educate Users About Phishing

Akore highly recommends phishing education for all Akore users. Most cyber attacks use malware (malicious software) to infect a computer with malicious code designed to steal passwords, data, or disrupt an entire computer/network. Fortunately, you don’t need to be a security expert to help stop malware.

Password Policies

Strong password security is an important first step in protecting your Akore accounts.

Akore recommends these best practices:

  1. Password expiration – Akore recommends no more than 90 days to force users to reset their passwords
  2. Password length – Akore suggestions minimum password length of 8-10 characters
  3. Password complexity – Require users to include a mix of alpha and numeric characters in their Akore password.
    In addition, remind users to never reuse passwords on multiple accounts, or they risk compromise of more than one of their accounts. Last, users need to understand that they must never share passwords with anyone, either online or in person — this includes their Akore password.

Phishing Examples

Phishing scams use fraudulent emails to get users to reveal confidential information. Such emails typically look as though they come from a legitimate organization and may contain links to what appears to be that organization’s site, but is actually a fake site designed to capture information.

Report suspicious emails by forwarding them to info@akore.com

As these scams get more sophisticated, it can be tough knowing whether an email is real or fake. The best way to avoid being tricked is knowing what to look for. Check out these examples of recent scams: