Thursday, 28 May 2015

Are you realising the importance of Wi-Fi Security?


In the modern day office it is vitally important to realise that a Wi-Fi network does not end at the office walls, in many cases it is possible for the network to extend over 300 feet through the air.

If your Wi-Fi access points are not properly secured people outside your business may be able to gain access to it.
 

If someone were to gain access to your Wireless Network it could mean more than them simply having internet access via your network.

People who are able to access your wireless router or network may also be able to;

• Gain access to all of the files on your computer/shared network and spread viruses

• Monitor all of the websites you visit, copy log-in names and passwords

• Gain access to sensitive emails

• Slow down computers & laptops and the internet connection speed

• Send spam

• Carry out illegal activities using your Internet connection


How to keep your Wi-Fi secure:

Use Wi-Fi Protected Access (WPA)
Many access points still offer the older WEP standard of security, however this is leaves your network open to hacking. It is vital that a network is secured using a WPA protection or the more recent WPA2 encryption.

 

Utilise a Secure WPA/WPA2 Password
When creating a password for your Wireless network always avoid anything memorable or related to your business. Instead a random assortment of letters both upper and lower case,        numeric and symbols can be used to create a long password that would be difficult to recreate.

 

Check for Rogue Wi-Fi Access Points
Rogue Access points can present a huge security threat. These would not be authorised by your company but instead have been installed by a visitor, employee or even intruder. These can then be used to gain access to your network with relative ease.

 

Make a separate network available for guests
If you have visitors to your building and wish to allow them access to the internet via your Wi-Fi network it is highly recommended that you create a guest account. Many Wi-Fi      solutions allow you to create extra networks but give you the ability to restrict their access.

 

Restrict access to devices that present risk

Some solutions offer WIPSs (Wireless Intervention Prevention System) that can automatically detect devices that present a potential risk and restrict their access. Cisco Meraki offer one of the best with Air Marshall.

Wednesday, 20 May 2015

GS1 Order to Cash Implementation


GS1 Order to Cash Implementation -

 
 
 
 
 
 
 



Ordering, delivering and paying for goods is what most companies do. Automating the process, using GS1 standards, makes it faster, more accurate and cheaper.

 

Order-to-cash is the process where goods are:


•Ordered

•Delivered and received

•Invoiced and paid for

 

Whether you are ordering or delivering the goods, this process is critical for almost all businesses. Many businesses, of all sizes and across many industries, have automated the entire process using Electronic Data Interchange (EDI) and GS1 standards.
 

Find out more here

Friday, 15 May 2015

New Eagle Functionality - Continuous Backflush & Eagle Portal


Continuous Backflush


Eagle is please to announce its new Continuous Backflush Process (CBP). This process is standard for Enterprise Editions (EE).

 

The Eagle CBP transaction reads the file, performs the backflush, creates the container and generates the container label in QAD in real time, using data sent by shop-floor equipment/PLC.  

 

The smart architecture allows customers to use their existing PLC and software to create the input files from various production lines.  The product design allows customers to have one CBP session for multiple lines or unique CBP sessions per line for transaction monitoring.

 

Eagle Portal
 

The Eagle Portal is a collection of tools to help customers get more out of their existing Eagle investment. For example:

 

Eagle's Business Intelligence (BI) tool set allows supervisory monitoring of plant / warehouse usage of Eagle transactions. 

 

Eagle BI provides for simple charting of key transaction utilization and other metrics for operations improvement.