About AaSys

This author has not yet filled in any details.
So far AaSys has created 10 blog entries.

Be Careful What You Wish For!

The necessity of customer service has all been drilled into us.  In fact, some financial institutions use customer service as a differentiator:  their staff is nicer, faster, smarter. . . But this very feature can be used against us by clever social engineering professionals!  By using that innate desire to help people, the adept con [...]

By |2016-07-18T13:15:28-04:00July 18th, 2016|Social Engineering|0 Comments

Three Main Threats That Sometimes Go Unrecognized

You don’t need to be an IT genius to ensure that you are keeping your business and employees safe from cyber-attacks. The key is to ensure possible threats are monitored on a regular basis. Here is a helpful guide to assist you in knowing what to look for. We are constantly bombarded with advertisements, emails [...]

By |2016-06-23T10:11:18-04:00June 23rd, 2016|Security Tips|0 Comments

What You Need to Know About Imposter Emails

On Thursday May 5, 2016, an email security breach hit Yahoo!, Gmail, Microsoft, and some other large corporations. Experts are calling this the biggest attack since the cyber-attacks that hit banks and major retailers two years ago. The attack affected more than 97 million people! Infiltrating emails has been the MO of choice for cyber [...]

By |2016-06-23T11:09:22-04:00May 23rd, 2016|Security Tips|0 Comments

Secure Your Printer from Cyber Threats

Security is at the top of the list for many companies. It has been reported that the annual cost for a company to resolve cyber-crime is $7.7 million on average.  Desktops, smart phones and tablets are not the only devices that can be infiltrated by cybercriminals. Printers are also prone to malicious attacks and are [...]

By |2016-06-21T13:29:11-04:00April 25th, 2016|Cyber Threats, Security Tips|0 Comments

Bitcoins/Blockchain and the Future of Banking

Bitcoins was created in 2009 as a way to have another currency other than actual money to make transactions on the Internet. The theory behind bitcoins, also known as cryptocurrency, was to cut out the middle man - the banks. One of the main selling points was to ensure no single institution would control [...]

By |2016-05-09T10:58:15-04:00April 15th, 2016|Bitcoins & Blockchain|0 Comments

Impact of Social Media on Banking

Social media has literally taken over almost every aspect of our life. There is not a day that goes by when we are not asked to “like, “post or “retweet” something. There has been a significant shift in every industry like education, tech, and even banking to make social media a part of their [...]

By |2016-05-10T16:51:04-04:00March 21st, 2016|Social Media|0 Comments

Proofpoint: A Trusted Email Security Option to McAfee

McAfee has decided to end their email security line and instead focus their efforts on other critical security solutions. In light of this, McAfee has recommended their existing customers move to a trusted strategic partner called Proofpoint and AaSys fully agrees. Proofpoint was founded in 2002 and has been a leader in the industry [...]

By |2016-04-25T17:06:55-04:00March 7th, 2016|Security|0 Comments

Three New Malwares to Look Out for in 2016

Cybercriminals continue to be relentless when it comes to breaking the law and getting what they want. They definitely take to heart the saying, “if at first you don’t succeed, try, try again”.  These new tactics require diligence and extreme patience, and these criminals are proving they have both in abundance. Many researchers have warned [...]

By |2016-04-25T17:09:35-04:00February 15th, 2016|Malware|0 Comments

Words from a Visionary, AaSys President Tony Coleman

Tony Coleman epitomizes the American dream. Like many leaders, he had a focused vision and set about making his goals come to fruition. From the birth of the company in 1992 to the present year, AaSys Group, Inc. has evolved into a multimillion dollar force within the banking and IT industry. Twenty-four successful years is [...]

By |2016-05-02T15:57:11-04:00February 1st, 2016|AaSys|0 Comments
Go to Top