Staying Current on Security
Akore Trust sets the standard for cloud based security and will be an effective partner for any enterprise.
A Fully Managed Solution Has Benefits
Offers Security & Compliance Readiness!
Visibility
Continuous Threat Detection
Full visibility info who is accessing data with continuous auditing at the I/O storage level.
Availability
Reduced attack space and increased availability
Data minimization through encryption policies reduces opportunity for attacks and disruption.
Productivity
Added data security with minimum impact to operations
Transparent to users, operating systems and applications.
Speed
Reduced time to compliance by up to 50%
Encryption with centralized key management delivers an efficient solution for meeting data security regulations.
TLS 1.1 or Higher
Beginning July 22, 2017, Akore will require secure Org connections to use the latest protocol TLS 1.1 or higher to provide a more secure environment and continued PCI compliance. Orgs using TLS 1.0 must be upgraded for continued access to API integration, connections to communities and sites, partner app exchanges, and user browser access.
Login IP Ranges
Login IP Ranges limit unauthorized access by requiring users to login to Akore from designated IP addresses — typically your corporate network or VPN. By using Login IP Ranges, admins can define a range of permitted IP addresses to control access to Akore. Those who try to login to Akore from outside the designated IP addresses will not be granted access.
Decrease Session Timeout Thresholds
Users sometimes leave their computers unattended or they don’t log off. You can protect your applications against unauthorized access by automatically closing sessions when there is no session activity for a period of time. The default timeout is 2 hours; you can set this value from between 30 minutes and 8 hours.
Educate Users About Phishing
Akore highly recommends phishing education for all Akore users. Most cyber attacks use malware (malicious software) to infect a computer with malicious code designed to steal passwords, data, or disrupt an entire computer/network. Fortunately, you don’t need to be a security expert to help stop malware.
Password Policies
Strong password security is an important first step in protecting your Akore accounts.
Akore recommends these best practices:
- Password expiration – Akore recommends no more than 90 days to force users to reset their passwords
- Password length – Akore suggestions minimum password length of 8-10 characters
- Password complexity – Require users to include a mix of alpha and numeric characters in their Akore password.
In addition, remind users to never reuse passwords on multiple accounts, or they risk compromise of more than one of their accounts. Last, users need to understand that they must never share passwords with anyone, either online or in person — this includes their Akore password.
Phishing Examples
Phishing scams use fraudulent emails to get users to reveal confidential information. Such emails typically look as though they come from a legitimate organization and may contain links to what appears to be that organization’s site, but is actually a fake site designed to capture information.
Report suspicious emails by forwarding them to info@akore.com
As these scams get more sophisticated, it can be tough knowing whether an email is real or fake. The best way to avoid being tricked is knowing what to look for. Check out these examples of recent scams: