The document discusses the new version of ransomware called CryptoWall (also known as Cryptolocker 2.0). CryptoWall encrypts files on infected devices and demands ransom payment for the encryption key. It has been improved from the original Cryptolocker with unique payment IDs, increased encryption security, and use of independent servers to process payments. The document recommends not opening suspicious attachments or emails from unknown sources to prevent infection. Maintaining regular backups of important files is also suggested in case files are encrypted and ransom is not paid.
The document analyzes the prevalence and security impact of HTTPS interception by middleboxes and antivirus software. The researchers developed techniques to detect interception based on differences between the TLS handshake and HTTP user agent. Applying these techniques to billions of connections, they found interception rates over an order of magnitude higher than previous estimates, and that the majority (97-62%) of intercepted connections had reduced security, with 10-40% vulnerable to decryption. Testing of interception products found most reduced security and many introduced severe vulnerabilities. The findings indicate widespread interception negatively impacts security.
Hands-On Security Breakout Session- Disrupting the Kill ChainSplunk
The document summarizes a security investigation conducted using Splunk software. The investigation began by detecting threat intelligence related network activity from an employee's system. Further investigation across endpoint, email, web, and DNS data sources traced the activity back to a targeted phishing email containing a weaponized PDF file. The file exploited a vulnerable PDF reader and installed Zeus malware. The root cause was determined to be a brute force attack on the company's website that stole the weaponized file. The investigation disrupted the cyber kill chain from reconnaissance to actions on objectives.
This short document promotes creating presentations using Haiku Deck, an online presentation tool. It encourages the reader to get started making their own Haiku Deck presentation and sharing it on SlideShare. In just one sentence, it pitches the idea of using Haiku Deck to easily create engaging presentations.
This short document promotes creating presentations using Haiku Deck on SlideShare. It encourages the reader to get started making their own Haiku Deck presentation by providing a button to click to begin the process. The document is advertising the ability to easily create presentations on SlideShare using Haiku Deck.
This short document promotes creating presentations using Haiku Deck, a tool for making slideshows. It encourages the reader to get started making their own Haiku Deck presentation and sharing it on SlideShare. In just one sentence, it pitches the idea of using Haiku Deck to easily create engaging slideshows.
This short document promotes creating presentations using Haiku Deck, a tool for making slideshows. It encourages the reader to get started making their own Haiku Deck presentation and sharing it on SlideShare. In just one sentence, it pitches the idea of using Haiku Deck to easily create engaging slideshow presentations.
The document analyzes the prevalence and security impact of HTTPS interception by middleboxes and antivirus software. The researchers developed techniques to detect interception based on differences between the TLS handshake and HTTP user agent. Applying these techniques to billions of connections, they found interception rates over an order of magnitude higher than previous estimates, and that the majority (97-62%) of intercepted connections had reduced security, with 10-40% vulnerable to decryption. Testing of interception products found most reduced security and many introduced severe vulnerabilities. The findings indicate widespread interception negatively impacts security.
Hands-On Security Breakout Session- Disrupting the Kill ChainSplunk
The document summarizes a security investigation conducted using Splunk software. The investigation began by detecting threat intelligence related network activity from an employee's system. Further investigation across endpoint, email, web, and DNS data sources traced the activity back to a targeted phishing email containing a weaponized PDF file. The file exploited a vulnerable PDF reader and installed Zeus malware. The root cause was determined to be a brute force attack on the company's website that stole the weaponized file. The investigation disrupted the cyber kill chain from reconnaissance to actions on objectives.
This short document promotes creating presentations using Haiku Deck, an online presentation tool. It encourages the reader to get started making their own Haiku Deck presentation and sharing it on SlideShare. In just one sentence, it pitches the idea of using Haiku Deck to easily create engaging presentations.
This short document promotes creating presentations using Haiku Deck on SlideShare. It encourages the reader to get started making their own Haiku Deck presentation by providing a button to click to begin the process. The document is advertising the ability to easily create presentations on SlideShare using Haiku Deck.
This short document promotes creating presentations using Haiku Deck, a tool for making slideshows. It encourages the reader to get started making their own Haiku Deck presentation and sharing it on SlideShare. In just one sentence, it pitches the idea of using Haiku Deck to easily create engaging slideshows.
This short document promotes creating presentations using Haiku Deck, a tool for making slideshows. It encourages the reader to get started making their own Haiku Deck presentation and sharing it on SlideShare. In just one sentence, it pitches the idea of using Haiku Deck to easily create engaging slideshow presentations.
Haiku Deck is a presentation platform that allows users to create Haiku-style slideshows. The document encourages the reader to get started creating their own Haiku Deck presentation on SlideShare by providing a link to do so. It aims to inspire the reader to try out Haiku Deck's unique presentation style.
This short document promotes creating presentations using Haiku Deck on SlideShare. It encourages the reader to get started making their own Haiku Deck presentation by providing a button to do so. In just one sentence, it pitches the idea of using Haiku Deck on SlideShare to create presentations.
CJIS GROUP | Developing Your Sales Channels for the SLED MarketStefani Shepherd
The document discusses developing sales channels in the state and local government market. It provides an overview of a webinar on this topic presented by CJIS GROUP. According to CJIS GROUP research, systems integrators are awarded the most projects in dollar amount, while product companies win the most opportunities in terms of volume. The webinar features a panel discussion on partnerships, challenges of the state and local market, and approaches to working with channels and partners to succeed in this market.
Parth Chudasama has 1.5 years of experience working in human resources departments at Welspun Corp Ltd, a large pipe manufacturing company in India. His roles included training coordination, operations like interview scheduling, and administrative tasks. He seeks a position as an MIS executive in human resources where he can utilize his skills in Microsoft Office, particularly Excel. He has a background in computer science and is pursuing a bachelor's degree while residing in Gandhidham, India.
This short document promotes creating presentations using Haiku Deck, a tool for making slideshows. It encourages the reader to get started making their own Haiku Deck presentation and sharing it on SlideShare. In a single sentence, it pitches the idea of using Haiku Deck to easily design presentations.
This document is a resume submitted by Mohammad Firdaus Bin Yahya, a 32-year old Malaysian citizen applying for the position of 3rd Engineer on vessels. The resume provides personal details including education, certifications, medical records, sea service history and references. Mohammad Firdaus has over 15 years of experience as an engineer on various vessel types including tankers, tugs, offshore support vessels and dredgers. He holds qualifications as a 3rd Engineer and has experience working for companies such as MISC, Emas Offshore and Ajjang Shipping.
This document is a resume for Uzair Khan that outlines his education and professional experience. It summarizes that he received a BBA in Marketing and Human Resources from National University of Computer and Emerging Sciences in Lahore from 2012-2016. For professional experience, it highlights key roles he held such as Assistant Manager of Marketing for Fabric Club and Area Sales Manager for Universal Surgical. It also lists relevant projects, skills, and achievements.
1) Los flip flops son dispositivos síncronos de dos estados que cambian de estado sincronizados con el pulso de reloj. Existen varios tipos como SR, JK, T y D.
2) El flip flop JK es uno de los más usados en circuitos digitales y forma parte de contadores y registros. Cambia los estados de salida dependiendo de las entradas J y K.
3) El flip flop D tiene una sola entrada D y transfiere su estado a la salida al pulso de reloj, lo que permite transferir datos paralelos.
How to Knock Out Threats from Crypto-Style VirusesCarbonite
This document discusses ransomware viruses like CryptoLocker and the need for regular data backups. It notes that ransomware infections grew 500% in 2013 and describes how the viruses work by encrypting files until a ransom is paid. While email filtering and security software help, they are not foolproof. The document argues that the only sure way to mitigate ransomware threats is through regular, versioned data backups that allow restoring files from before infection. Backups not only protect against ransomware but also other data loss causes, providing overall systems continuity for businesses.
Heartbleed is a serious security bug discovered in the popular OpenSSL encryption software. It allows hackers to access sensitive user information transmitted over the internet, such as credit card numbers, social security numbers, user credentials and passwords. Over 66% of websites are believed to be affected. The bug has potentially allowed private data to be exposed and intercepted for up to two years. It poses a huge threat as stolen information is untraceable and sites need to patch the vulnerability, revoke compromised keys, and reissue new ones to protect users going forward.
Secure Video Downloads Amid Cyber Threats delves into the importance of safeguarding digital video content from potential cyber-attacks. This guide underscores best practices and advanced measures to ensure that video downloads remain uncompromised in a digitally vulnerable era.
It’s that time of the year again. October is upon us, so get ready to spread some cybersecurity wisdom around you and, of course, a few candies here and there for the occasional Halloween visitors.
- The article discusses Canada lowering its corporate tax rate to 25%, the lowest among G7 countries, making Canada more competitive globally.
- The federal government lowered the corporate tax rate from 33% to 15% over 5 years, while provinces collaborated to achieve a common 10% rate.
- Despite tax cuts, corporate tax revenue has remained steady or increased, reaching $30 billion in 2010-2011 compared to an average of $25 billion in 2002-2005.
How to Bulletproof Your Data Defenses Locally & In the CloudNordic Backup
This document provides recommendations for strengthening data defenses for businesses. It discusses educating employees, enforcing strong passwords, utilizing multi-layered security, having backups, and monitoring systems. It also covers email and web browsing safety, using firewalls, antivirus software, and data leakage prevention tools. The goal is to reduce threats and risks of data loss or breaches locally and in the cloud.
Balancing Cloud-Based Email Benefits With SecuritySymantec
This document discusses balancing the benefits of cloud-based email with security. It notes that while cloud email provides ease of use and cost savings, organizations must still maintain security. The document outlines some common security issues with cloud email like phishing, malware, and insider threats. It recommends that organizations evaluate cloud email providers based on their ability to protect against attacks, enforce encryption policies, and support a gradual migration to the cloud while integrating with other security tools. The document promotes Symantec Email Security.cloud as a solution that provides security, compliance, and flexibility for organizations adopting cloud-based email.
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...Jack Pringle
These are the written materials accompanying a presentation I made at the SC Bar Convention on January 17, 2019 and addressing the role of human error, inattention, impatience, and greed in data security incidents, all of which often lead to the loss of sensitive information, client funds, and access to networks and files.
Computer Security Guide to Pc Security
“Your Info Guide to Beefing Up Your Personal Computer’s Safety From Malicious Threats
As we do these things on a more regular basis, we open ourselves up to potential hackers, attackers and crackers. While some may be looking to phish your personal information and identity for resale, others simply just want to use your computer as a platform from which to attack other unknowing targets. Computer Security is very important
- The document discusses online safety, security, and netiquette rules. It provides guidance on safe practices for using the internet and interacting with others online, including not sharing personal information, using strong passwords, keeping software updated, and being polite and respectful in online communications. Specific risks of sharing different types of personal details are outlined. Common types of online threats like malware, phishing and cyberbullying are also defined. The importance of privacy policies and digital etiquette are emphasized.
Have you experienced seeing little pop-up windows in your PC or mobile devices? Well, these tell you that software updates are available for your computer, laptop, tablet, or mobile device. Software updates are important to your digital safety and cyber security. Do not click on that “Remind me later” button or at least don’t put off updating your software for long. This will make you feel confident your device is more secure until the next update reminder.
Have you experienced seeing little pop-up windows in your PC or mobile devices? Well, these tell you that software updates are available for your computer, laptop, tablet, or mobile device. Software updates are important to your digital safety and cyber security. Do not click on that “Remind me later” button or at least don’t put off updating your software for long. This will make you feel confident your device is more secure until the next update reminder.
Have you experienced seeing little pop-up windows in your PC or mobile devices? Well, these tell you that software updates are available for your computer, laptop, tablet, or mobile device. Software updates are important to your digital safety and cyber security. Do not click on that “Remind me later” button or at least don’t put off updating your software for long. This will make you feel confident your device is more secure until the next update reminder.
Have you experienced seeing little pop-up windows in your PC or mobile devices? Well, these tell you that software updates are available for your computer, laptop, tablet, or mobile device. Software updates are important to your digital safety and cyber security. Do not click on that “Remind me later” button or at least don’t put off updating your software for long. This will make you feel confident your device is more secure until the next update reminder.
Have you experienced seeing little pop-up windows in your PC or mobile devices? Well, these tell you that software updates are available for your computer, laptop, tablet, or mobile device. Software updates are important to your digital safety and cyber security. Do not click on that “Remind me later” button or at least don’t put off updating your software for long. This will make you feel confident your device is more secure until the next update reminder.
Have you experienced seeing little pop-up windows in your PC or mobile devices? Well, these tell you that software updates are available for your computer, laptop, tablet, or mobile device. Software updates are important to your digital safety and cyber security. Do not click on that “Remind me later” button or at least don’t put off updating your software for long. This will make you feel confident your device is more secure until the next update reminder.
Have you experienced seeing little pop-up windows in your PC or mobile devices? Well, these tell you that software updates are available for your computer, laptop, tablet, or mobile device. Software updates are impor
This document provides a guide to improving PC security. It discusses topics like protecting your system, fighting spam, preventing spyware and adware, protecting against phishing and identity theft, using antivirus software, and recommended security resources. The guide recommends updating software, using a firewall, reviewing browser settings, installing antivirus software, not opening unknown attachments, and disabling hidden file extensions to improve security. It also provides tips to reduce spam like using multiple email addresses and blocking bulk mail. Spyware is discussed along with examples like CoolWebSearch and how to prevent it using antispyware software. Phishing is described as fraudulent emails asking for personal information to steal identities.
Haiku Deck is a presentation platform that allows users to create Haiku-style slideshows. The document encourages the reader to get started creating their own Haiku Deck presentation on SlideShare by providing a link to do so. It aims to inspire the reader to try out Haiku Deck's unique presentation style.
This short document promotes creating presentations using Haiku Deck on SlideShare. It encourages the reader to get started making their own Haiku Deck presentation by providing a button to do so. In just one sentence, it pitches the idea of using Haiku Deck on SlideShare to create presentations.
CJIS GROUP | Developing Your Sales Channels for the SLED MarketStefani Shepherd
The document discusses developing sales channels in the state and local government market. It provides an overview of a webinar on this topic presented by CJIS GROUP. According to CJIS GROUP research, systems integrators are awarded the most projects in dollar amount, while product companies win the most opportunities in terms of volume. The webinar features a panel discussion on partnerships, challenges of the state and local market, and approaches to working with channels and partners to succeed in this market.
Parth Chudasama has 1.5 years of experience working in human resources departments at Welspun Corp Ltd, a large pipe manufacturing company in India. His roles included training coordination, operations like interview scheduling, and administrative tasks. He seeks a position as an MIS executive in human resources where he can utilize his skills in Microsoft Office, particularly Excel. He has a background in computer science and is pursuing a bachelor's degree while residing in Gandhidham, India.
This short document promotes creating presentations using Haiku Deck, a tool for making slideshows. It encourages the reader to get started making their own Haiku Deck presentation and sharing it on SlideShare. In a single sentence, it pitches the idea of using Haiku Deck to easily design presentations.
This document is a resume submitted by Mohammad Firdaus Bin Yahya, a 32-year old Malaysian citizen applying for the position of 3rd Engineer on vessels. The resume provides personal details including education, certifications, medical records, sea service history and references. Mohammad Firdaus has over 15 years of experience as an engineer on various vessel types including tankers, tugs, offshore support vessels and dredgers. He holds qualifications as a 3rd Engineer and has experience working for companies such as MISC, Emas Offshore and Ajjang Shipping.
This document is a resume for Uzair Khan that outlines his education and professional experience. It summarizes that he received a BBA in Marketing and Human Resources from National University of Computer and Emerging Sciences in Lahore from 2012-2016. For professional experience, it highlights key roles he held such as Assistant Manager of Marketing for Fabric Club and Area Sales Manager for Universal Surgical. It also lists relevant projects, skills, and achievements.
1) Los flip flops son dispositivos síncronos de dos estados que cambian de estado sincronizados con el pulso de reloj. Existen varios tipos como SR, JK, T y D.
2) El flip flop JK es uno de los más usados en circuitos digitales y forma parte de contadores y registros. Cambia los estados de salida dependiendo de las entradas J y K.
3) El flip flop D tiene una sola entrada D y transfiere su estado a la salida al pulso de reloj, lo que permite transferir datos paralelos.
How to Knock Out Threats from Crypto-Style VirusesCarbonite
This document discusses ransomware viruses like CryptoLocker and the need for regular data backups. It notes that ransomware infections grew 500% in 2013 and describes how the viruses work by encrypting files until a ransom is paid. While email filtering and security software help, they are not foolproof. The document argues that the only sure way to mitigate ransomware threats is through regular, versioned data backups that allow restoring files from before infection. Backups not only protect against ransomware but also other data loss causes, providing overall systems continuity for businesses.
Heartbleed is a serious security bug discovered in the popular OpenSSL encryption software. It allows hackers to access sensitive user information transmitted over the internet, such as credit card numbers, social security numbers, user credentials and passwords. Over 66% of websites are believed to be affected. The bug has potentially allowed private data to be exposed and intercepted for up to two years. It poses a huge threat as stolen information is untraceable and sites need to patch the vulnerability, revoke compromised keys, and reissue new ones to protect users going forward.
Secure Video Downloads Amid Cyber Threats delves into the importance of safeguarding digital video content from potential cyber-attacks. This guide underscores best practices and advanced measures to ensure that video downloads remain uncompromised in a digitally vulnerable era.
It’s that time of the year again. October is upon us, so get ready to spread some cybersecurity wisdom around you and, of course, a few candies here and there for the occasional Halloween visitors.
- The article discusses Canada lowering its corporate tax rate to 25%, the lowest among G7 countries, making Canada more competitive globally.
- The federal government lowered the corporate tax rate from 33% to 15% over 5 years, while provinces collaborated to achieve a common 10% rate.
- Despite tax cuts, corporate tax revenue has remained steady or increased, reaching $30 billion in 2010-2011 compared to an average of $25 billion in 2002-2005.
How to Bulletproof Your Data Defenses Locally & In the CloudNordic Backup
This document provides recommendations for strengthening data defenses for businesses. It discusses educating employees, enforcing strong passwords, utilizing multi-layered security, having backups, and monitoring systems. It also covers email and web browsing safety, using firewalls, antivirus software, and data leakage prevention tools. The goal is to reduce threats and risks of data loss or breaches locally and in the cloud.
Balancing Cloud-Based Email Benefits With SecuritySymantec
This document discusses balancing the benefits of cloud-based email with security. It notes that while cloud email provides ease of use and cost savings, organizations must still maintain security. The document outlines some common security issues with cloud email like phishing, malware, and insider threats. It recommends that organizations evaluate cloud email providers based on their ability to protect against attacks, enforce encryption policies, and support a gradual migration to the cloud while integrating with other security tools. The document promotes Symantec Email Security.cloud as a solution that provides security, compliance, and flexibility for organizations adopting cloud-based email.
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...Jack Pringle
These are the written materials accompanying a presentation I made at the SC Bar Convention on January 17, 2019 and addressing the role of human error, inattention, impatience, and greed in data security incidents, all of which often lead to the loss of sensitive information, client funds, and access to networks and files.
Computer Security Guide to Pc Security
“Your Info Guide to Beefing Up Your Personal Computer’s Safety From Malicious Threats
As we do these things on a more regular basis, we open ourselves up to potential hackers, attackers and crackers. While some may be looking to phish your personal information and identity for resale, others simply just want to use your computer as a platform from which to attack other unknowing targets. Computer Security is very important
- The document discusses online safety, security, and netiquette rules. It provides guidance on safe practices for using the internet and interacting with others online, including not sharing personal information, using strong passwords, keeping software updated, and being polite and respectful in online communications. Specific risks of sharing different types of personal details are outlined. Common types of online threats like malware, phishing and cyberbullying are also defined. The importance of privacy policies and digital etiquette are emphasized.
Have you experienced seeing little pop-up windows in your PC or mobile devices? Well, these tell you that software updates are available for your computer, laptop, tablet, or mobile device. Software updates are important to your digital safety and cyber security. Do not click on that “Remind me later” button or at least don’t put off updating your software for long. This will make you feel confident your device is more secure until the next update reminder.
Have you experienced seeing little pop-up windows in your PC or mobile devices? Well, these tell you that software updates are available for your computer, laptop, tablet, or mobile device. Software updates are important to your digital safety and cyber security. Do not click on that “Remind me later” button or at least don’t put off updating your software for long. This will make you feel confident your device is more secure until the next update reminder.
Have you experienced seeing little pop-up windows in your PC or mobile devices? Well, these tell you that software updates are available for your computer, laptop, tablet, or mobile device. Software updates are important to your digital safety and cyber security. Do not click on that “Remind me later” button or at least don’t put off updating your software for long. This will make you feel confident your device is more secure until the next update reminder.
Have you experienced seeing little pop-up windows in your PC or mobile devices? Well, these tell you that software updates are available for your computer, laptop, tablet, or mobile device. Software updates are important to your digital safety and cyber security. Do not click on that “Remind me later” button or at least don’t put off updating your software for long. This will make you feel confident your device is more secure until the next update reminder.
Have you experienced seeing little pop-up windows in your PC or mobile devices? Well, these tell you that software updates are available for your computer, laptop, tablet, or mobile device. Software updates are important to your digital safety and cyber security. Do not click on that “Remind me later” button or at least don’t put off updating your software for long. This will make you feel confident your device is more secure until the next update reminder.
Have you experienced seeing little pop-up windows in your PC or mobile devices? Well, these tell you that software updates are available for your computer, laptop, tablet, or mobile device. Software updates are important to your digital safety and cyber security. Do not click on that “Remind me later” button or at least don’t put off updating your software for long. This will make you feel confident your device is more secure until the next update reminder.
Have you experienced seeing little pop-up windows in your PC or mobile devices? Well, these tell you that software updates are available for your computer, laptop, tablet, or mobile device. Software updates are impor
This document provides a guide to improving PC security. It discusses topics like protecting your system, fighting spam, preventing spyware and adware, protecting against phishing and identity theft, using antivirus software, and recommended security resources. The guide recommends updating software, using a firewall, reviewing browser settings, installing antivirus software, not opening unknown attachments, and disabling hidden file extensions to improve security. It also provides tips to reduce spam like using multiple email addresses and blocking bulk mail. Spyware is discussed along with examples like CoolWebSearch and how to prevent it using antispyware software. Phishing is described as fraudulent emails asking for personal information to steal identities.
Here is a draft social media post for your "Think Before You Click" campaign ad/poster:
#ThinkBeforeYouClick
One click can change everything. Help keep yourself and others safe online by pausing to consider what you share and where you surf. Your privacy and security are important - be mindful of protecting personal information. Use technology to empower yourself through knowledge and connection, not endanger yourself through haste or deception. This message brought to you by the #EmpowermentTechnology campaign. Think before you click!
This document provides information and advice about cyber security for small businesses. It discusses protecting software, hardware, and data assets by keeping them updated, backed up, and secured. It recommends using antivirus software, training employees on secure practices, and implementing security measures for email, websites, and protecting against ransomware attacks. The goal is to provide small businesses with affordable cyber security strategies given their limited resources.
The document discusses a biology student's volunteer experience participating in a breast cancer walk for a class assignment, requiring preparation for the event including fundraising and spreading awareness about breast cancer. During the event, the student helped set up, assisted participants, and learned more about how nonprofit organizations support breast cancer research and patients. Overall, the experience provided valuable learning outside of the classroom.
Cybercrime and the Developer Java2Days 2016 SofiaSteve Poole
The document discusses cybersecurity risks and how developers can help address them. It notes that cybercriminals target developers because they have privileged access and knowledge of systems. Developers are often too trusting and ignore security, installing software without checking for malware or disabling certificate validation. The talk urges developers to take security more seriously by keeping systems updated, using strong authentication, and being wary of suspicious network connections and downloads from untrusted sources. Developers must help address the growing problem of cybercrime by promoting secure development best practices.
2022 Rea & Associates' Cybersecurity Conference Rea & Associates
The speaker discusses changes to the Cybersecurity Maturity Model Certification (CMMC) program over the past year, including changes to the CMMC model, rules, and the organization administering the program. Voluntary assessments are now taking place and the CMMC ecosystem of assessors, trainers, and consultants is developing. Remaining challenges include high costs of compliance, legal consequences, reciprocity between government agencies, and issues with cloud computing. The speaker stresses the importance of ethics and offers that help is available for organizations navigating CMMC requirements.
1.
4th Quarter, January 2015
In This Issue…
2 - Chief Comments
3 - New Employee Spotlight
Employee of the Quarter
4 - Harrison Happenings
5 - New Security Threat - Cryptowall
6 - 2014—A Year in Review
8 - The History of Soap
9 - Your Health & Wellness
10– Nease Cares
11 - Nease Notables
12 - Halloween Fun
13 - Holiday Party
14 - Birthdays / Service Anniversaries
NeaseNews
2. 2
CHIEF COMMENTS... ~ Frank
Happy New Year. So we have completed another year and we
are beginning a new one. Time does fly by. I hope you all had
joyous and safe holidays with family and friends. Ge ng into a
new year is always a good me for reflec on of accomplish-
ments and thinking about what will be done in the new year. It
is me to make personal resolu ons as it signals a new begin-
ning, whether it is about health and losing weight and exercis-
ing more, a favorite one for most people, resolving to save
more or pay off debt, reconnec ng with family and friends, or
something else.
Reflec ng back on 2014, it was a good year for Nease and I
want to thank one and all for making this a smooth year. So
what did we accomplish?
The detergent business integra on went well. Learning custom-
er ordering pa erns, how to maintain inventory levels, dilu ng
and packaging new products presented challenges that through
a en on to detail were efficiently overcome; that was definite-
ly a team effort, and the results showed it.
Nease started to manufacture a few new products. A er an
ini al setback on 965A, produc on issues were resolved, and
we were successful in ge ng product manufactured. This will
turn into good business for us. Efficiency improvements in the
ANS system as applied to manufacturing octane sulfonates re-
sulted in mee ng orders for the product well above plan. Addi-
onally new phosphate esters like, the 184 were successfully
manufactured using the P2O5 feeder.
Also completed was the new process building, that will allow us
to expand produc on capacity for new and exis ng products.
All this took the effort and me of all; not bad for one year.
Of course 2015 is going to bring new challenges and I am confi-
dent that we will again perform up to the usual Nease standard.
For 2015, safety will con nue to be a focus and considered to
be a key success factor for Nease. If there was a lowlight for
2014 it was the number of recordable accidents. Con nuing
work we started last year, a review of the company safety cul-
ture will be conducted through a “Safety Culture” team that will
examine current prac ces and a tude and make recommenda-
ons on how to improve in this area. If you are asked to par ci-
pate, please do so. This is important! Reviewing how to be er
perform jobs through job safety analysis and job observa ons
will con nue to focus on behavior based safety.
The effort to manufacture new products and to build on our
current product list offering will also con nue in 2015. The new
process building will be filled with manufacturing equipment
during the year so that produc on can be added. Whether this
is to expand the capacity for NA-/NA-8D, manufacturing prod-
ucts that we are currently purchasing and reselling like the Nax-
ate 260L, or adding new products, as a company it is necessary
to grow in order to remain viable.
Also effort to improve efficiency, reducing cycle me in exis ng
equipment, tackling energy saving projects, reducing waste
from the manufacturing process, as well as efforts to streamline
the opera on will con nue.
Overall I believe that 2015 will be just as an exci ng year as
2014 and I am looking forward to building on the successes of
last year.
“We will open the book. Its pages are blank. We are going to put words on them ourselves.
The book is called Opportunity and its first chapter is New Year's Day.”
― Edith Lovejoy Pierce
3. 4
What’s Happening in Harrison?
‐By Steve
Acid Expansion
Construc on of the new building is essen ally complete, and it will be ready for pilot plant and process equipment as soon as all
building permits have been finalized. Ini al equipment design and layout are currently being reviewed and equipment will most
likely be installed in early to mid-2015. Equipment installed in the new building will be first used to manufacture phosphate esters,
and perhaps NA-8/NA-8D. These reactors systems will ul mately be modified to manufacture sulfonic acids, as demand is expected
to outstrip capacity in the next several years.
New Product Manufacturing
Another new phosphate ester, Naxonac 184, has been manufactured using the
P2O5 feed system. Another version, Naxonac PB 184 is scheduled for produc on
in January. Thanks to all involved for their efforts in the success of this project.
Poten al New Products:
260L—Several a empts have been made over the last
couple of years to manufacture 260L. Advances have
been made with raw materials from new vendors
that has allowed T&PD to create material that is ac-
ceptable to our customers. Look for pilot scale pro-
duc on to begin in early 2015.
Naxonac PB 184—As men oned above, this is a modified
version of Naxonac 184. The main process is the
same, with minor adjustment to raw material charge
amounts and charge sequence
EB123X—Several batches of this product were manufac-
tured in 2014. Steve Hamilton is currently working on
equipment improvements to make the process more
efficient and more operator friendly. Demand in 2015
is expected to be approximately 150,000 lbs.
Amine Neutralized EB123X—As the name suggests, this is
a neutralized version of EB123X that is currently be-
ing inves gated for an oilfield applica on. If the pro-
ject is successful, demand could be as much as 1.0
MM lbs./year.
HEMA Phosphate—This is another phosphate ester which
requires the use of P2O5. The produc on process is
very similar to the various other phosphate esters.
4. 5
In October of last year, news broke about a new form of
malware called Cryptolocker. This malware posed a partic-
ularly large threat to many business users and led to many
quick and important security updates. Now, almost a year
later, it appears that the second version of this – Cryp-
toWall – has been released and is beginning to infect us-
ers.
What is Crypto malware?
Crypto malware is a type of Trojan horse that when in-
stalled onto computers or devices, holds the data and sys-
tem hostage. This is done by locking valuable or important
files with a strong encryption. You then see a pop-up open
informing you that you have a set amount of time to pay for
a key which will unlock the encryption. If you don’t pay be-
fore the deadline, your files are deleted.
When this malware surfaced last year, many users were
understandably more than a little worried and took strong
precautions to ensure they did not get infected. Despite
these efforts, it really didn’t go away until earlier this year,
when security experts introduced a number of online por-
tals that can un-encrypt files affected by Cryptolocker, es-
sentially neutralizing the threat, until now, that is. A recently
updated version is threatening users once again.
Cryptolocker 2.0, aka. CryptoWall
Possibly because of efforts by security firms to neutralize
the Cryptolocker threat, the various developers of the mal-
ware have come back with an improved version, Cryp-
toWall and it is a threat that all businesses should be aware
of.
With CryptoWall, the transmission and infection methods
remain the same as they did with the first version: It is most
commonly found in zipped folders and PDF files sent over
email. Most emails with the malware are disguised as in-
voices, bills, complaints, and other business messages that
we are likely to open.
The developers did however make some “improvements” to
the malware that make it more difficult to deal with for most
users. These changes include:
Unique IDs are used for payment: These are ad-
dresses used to verify that the payment is unique and from
one person only. If the address is
used by another user, payment will
now be rejected. This is different from
the first version where one person
who paid could share the unlock code
with other infected users.
CryptoWall can securely delete files: In the older
version of this threat, files were deleted if the ransom was-
n’t paid, but they could be recovered easily. In the new ver-
sion the encryption has increased security which ensures
the file is deleted. This leaves you with either the option of
paying the ransom or retrieving the file from a backup.
Payment servers can’t be blocked: With CryptoLocker,
when authorities and security experts found the addresses
of the servers that accepted payments, they were able to
add these to blacklists, thus ensuring no traffic would come
from, or go to, these servers again. Essentially, this made it
impossible for the malware to actually work. Now, it has
been found that the developers are using their own servers
and gateways which essentially makes them much, much
more difficult to find and ban.
How do I prevent my systems and devices from being in-
fected?
Unlike other viruses and malware, CryptoWall doesn’t go
after passwords or account names, so the usual changing
of your passwords won’t really help. The best ways to pre-
vent this from getting onto your systems is:
Don’t open any suspicious attachments - Look at
each and every email attachment that comes into your in-
box. If you spot anything that looks odd, such as say a
spelling mistake in the name, or a long string of characters
together, notice that you won a lottery or someone wants to
send you money, then it is best to avoid opening it.
Don’t open emails from unknown sources - Be extra
careful about emails from unknown sources, especially
ones that say they provide business oriented information
e.g., bank statements from banks you don’t have an ac-
count with or bills from a utilities company you don’t use.
Chances are high that they contain some form of malware.
Should your files be attacked and encrypted by this mal-
ware, then the first thing you should do is contact me or
FSN immediately. And again, your best line of defense is
not to open any files with a PDF that you are not expecting.
If your machine does become infected the only solution is
to wipe the computer and start again. We are not paying
the ransom. Since all of you are saving your work related
files to your “m” drive, all of that data can be recovered, but
not without significant time and effort, so please be careful
opening PDF files.
New Security Threat: CryptoWall
- by Phil
5. 6
2014—A Year in Review By Gordon
There are many great truisms in life - For example:
Time is Money
A Penny saved is a Penny Earned
There is nothing certain in this world except Death and Taxes
But one of my favorite sayings is - “The only thing constant is change.”
That was certainly never more true than in the past year of 2014. Let’s take a look back…..
Nease began handling sales and distribu on of the detergent product line of Weylchem (previously Clariant) in Janu‐
ary. There was a lot of work to do to get ready to do this given that we just heard of the sale in the 4Q of 2013 – things
like establishing product codes, sourcing product from Europe, assigning sales reps, contac ng customers, ge ng
trained on the new products, transferring inventory, changing the Nease web site, se ng up new customers in Chem‐
pax, etc. All in all the transi on was considered successful, seamless, transparent, and brought in addi onal sales
revenue and profits to Nease.
Obtained new business with our Naxan EB123 and EB123X (a new product).
Saw a drop in outsourced product sales as the compe ve landscape for DDBSA changed making it difficult for Nease
to profitably compete.
DeLaval started ordering NA8D from us on a regular basis which con nued through the year – turned out to be a sig‐
nificant volume in 2014 (again this is a new product coming out of the T&PD group).
Sold more SXS to our compe tors on a co‐producer basis.
There was a major shi in our distribu on partners. A er years of significant sales thru Univar and Ashland (Nexeo)
we shi ed away from these distributors and are now working more closely with various Brenntag companies, PVS,
and other regional distributors.
We set monthly record in sales during the month of April – the new detergents business certainly played a factor here.
We then topped this record again in the month of July.
Our hydrotrope business saw a huge increase in the April/May me frame when there was a supply interrup on in
Xylene. Nease was posi oned be er than our compe tors and was able to capitalize on this situa on.
We recaptured a major posi on with North America’s largest SXS user (Ecolab). This a er a 2 year hiatus when they
had decided to sole source their SXS requirements. We are now back supplying product to Mar nsburg, WV;
McDounough, GA; Camco; Missasauga, ON; and Greensboro, NC.
Successfully raised prices at some select accounts to improve profitability that had declined in a few situa ons.
Began inventorying, dilu ng, and packaging Hostapur SAS 60 and SAS 30 at Harrison elimina ng any es to Clariant’s
Mt Holly, NC plant. This improved service levels as well as profitability for Nease.
Dupont sold their Glass/Lamina ng Solu ons/Vinyls business to Japan‐based Kurrary Co. (We supply Naxcat to 2 of
their produc on facili es).
Kimberly Clark shi ed their 40SC requirements from their plant in San Antonio TX to a contract packager (Marie a
Corp) in NY
Nease brought on a new Account Manager – Danielle Keatley, an experienced sales person to help handle our growing
sales as well as explore new opportuni es.
Addi onally Mike Biehle was hired to bolster our business development efforts as we explore what new product areas
we should pursue – this is already paying dividends.
Con nued next page
6. 8
The History of Soap and Surfactants
~By Mike
Soap got its name, according to an ancient Roman legend, from Mount Sapo, where animals
were sacrificed. Rain washed a mixture of melted animal fat, or tallow, and wood ashes
down into the clay soil along the Tiber River. Women thought that this clay mixture was a
gi from the gods and made their wash cleaner with much less effort.
The ancient Germans and Gauls are also credited with discovering a substance called soap,
made of tallow and ashes that they used to nt their hair red.
The popularity of bathing declined with the fall of the Roman Empire and bathing through-
out Europe became a extravagance only for the wealthy. This lack of cleanliness certainly
added to the cause of the plague that occurred during the 14th century in Europe.
The technology of soap making in Europe in the 15th and 16th centuries grew as
cra smen would set up shop near animal slaughter houses where animal fats
were readily available. The soap making art came to America with the early
se lers where it became a household chore to make soap out of saved animal
fats and lye. Most of us remember the old “Beverly Hillbillies” television program
where Granny would occasionally make a batch of lye soap out by the “cement
pond”. She would melt animal fats or lard over an open fire and mix in store
bought lye. The hot mixture was poured into wooden molds and allowed to cool
to make the bars of soap used for all cleaning chores.
Eventually soap making became an industry and factories were built near animal slaughter houses such as those established in Cin-
cinna in the mid 1800’s. The much improved availability of soap caused it to change from a luxury item to an everyday necessity.
The chemistry of soap making remained essen ally the same un l 1916 when the first synthe c detergents were developed in Ger-
many during WWII when animal fats and oils for making soap were scarce. German scien sts found that synthe c “soap” could be
made by reac ng certain frac ons of petroleum or coal oil with sulfuric or phosphoric acids. These early synthe c detergents were
studied and found to have pronounced surface ac vity lowering the surface tension of water allowing faster we ng of all surfaces.
They were called surface ac ve agents which eventually morphed into the term surfactant.
The first synthe c detergents were produced in the United States in the 1930’s but never
caught on un l a er WWII. With the development of electric appliances such as washing ma-
chines the need for specialty surfactants developed. Specialty surfactants were developed for
laundry applica ons, hand dish washing, automa c dish washing, shampoo, bubble bath, cos-
me cs and eventually ins tu onal and industrial applica ons. Today there are over 2,000
name brand surfactants manufactured around the world.
Here at Nease we make some of these specialty surfactants and are ac vely looking to expand
our product line into more highly specialized areas.
¹The Soap and Detergent Associa on History of Soap
As Roman civiliza on advanced, so did bathing. The first of the famous Roman baths,
supplied with water from their aqueducts, was built about 312 B.C. The baths were
luxurious, and bathing became very popular. By the second century A.D., the Greek
physician, Galen, recommended soap for both medicinal and cleansing purposes.¹