Secure Modern Workplace / en How Finance and Insurance Providers Can Respond To The Surge of Cyberattacks /resources/blog/february-2022/how-finance-and-insurance-providers-can-respond-surge-cyberattacks <span>How Finance and Insurance Providers Can Respond To The Surge of Cyberattacks</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Wed, 02/23/2022 - 11:41</span> <a href="/taxonomy/term/31" hreflang="en">Trends</a> <a href="/taxonomy/term/10" hreflang="en">ĒļæūŹÓʵɫ</a> <article><img src="/sites/default/files/2022-02/woman_at_computer_on_call.jpg" width="1079" height="488" alt="""" loading="lazy" typeof="foaf:Image" /></article><p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>Over the past two years working from home (WFH) has rapidly accelerated in many fields. Although the pandemicā€™s part in contributing to this shift is undeniable, much of this trend would be impossible without software developments supporting remote work. However, digital growth has increased the chances for cybercriminals to strike out and harm companies.</span></span></span></span></span></p> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>Smaller and mid-sized businesses </span></span><a href="https://appriver.com/blog/4-tips-to-protect-your-organization-from-ransomware" rel="nofollow"><span><span><span>are especially at risk</span></span></span></a><span lang="EN" xml:lang="EN" xml:lang="EN"><span> due to limited resources and budgets for cybersecurity. On the other hand, businesses that have had increased digital footprints have also given cyber insurance companies more information to assess risk profiles of policyholders. These data-driven insights help provide more accurate underwriting and ultimately protect the insured.</span></span></span></span></span></p> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>This article will discuss the ways WFH has altered the digital landscape and what, both financial and insurance, providers can do to respond to this increased growth.</span></span></span></span></span></p> <h2><span><span><span><span>Growing Digital Footprints</span></span></span></span></h2> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>As of 2020, </span></span><a href="https://www.statista.com/topics/2237/internet-usage-in-the-united-states/#topicHeader__wrapper" rel="nofollow"><span><span><span>over half of the worldā€™s population</span></span></span></a><span lang="EN" xml:lang="EN" xml:lang="EN"><span> is connected to the Internet. In America, over 90% of Americans have access to the internet. These numbers stand in sharp contrast to 2007 (the year the first iPhone was released), when 47% of Americans had access to broadband Internet at home. Every year more and more people are coming online and signing up for the services and platforms that connect us in this digital age. Increasingly, our digital presence has become relied upon as a method for us to transact business and experience our lives.</span></span></span></span></span></p> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>More and more businesses require employees to leverage these types of digital systems, which is why we have seen a huge increase in vulnerabilities. The transition from an Internet of the wild west to a place where the vast majority of the worldā€™s business takes place has been essential for WFH to become possible. Importantly, businesses should </span></span><a href="https://www.freshbooks.com/blog/rebuild-business-after-covid" rel="nofollow"><span><span><span>consider how to rebuild</span></span></span></a><span lang="EN" xml:lang="EN" xml:lang="EN"><span> after Covid.</span></span></span></span></span></p> <h2><span><span><span><span>Powered by the Cyberworld: Working From Home</span></span></span></span></h2> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>WFH, sometimes called remote work, or even more rarely, working from anywhere (WFA) has become key to how we do business today. The sudden shift to WFH dramatically altered the business landscape because overnight we suddenly found many workers, some of whom had never sent an email, were handed a laptop and told to sign up for Zoom.</span></span></span></span></span></p> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>Early in the pandemic Zoom went from </span></span><a href="https://www.cnbc.com/2021/07/15/heres-how-zoom-is-creating-the-new-world-of-hybrid-work-.html" rel="nofollow"><span><span><span>servicing 10 million people a day</span></span></span></a><span lang="EN" xml:lang="EN" xml:lang="EN"><span> to over 300 million. In short, the Internet got way bigger and way more crowded. Companies suddenly needed new services, like being able to encrypt your emails. This rush to cyberspace also created an open floodgate of information for cybercriminals to wade through.</span></span></span></span></span></p> <h2><span><span><span><span>Criminal Threats Online</span></span></span></span></h2> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>Cybercrime is nothing new, but the massive shift to remote work has made business data all that more vulnerable to hackers. Zoombombing, the practice of breaking into private Zoom meetings and disrupting them, although largely benign, underlines the importance of </span></span><a href="https://appriver.com/solutions/by-industry/information-technology" rel="nofollow"><span><span><span>securing your businessā€™s online presence</span></span></span></a><span lang="EN" xml:lang="EN" xml:lang="EN"><span>.</span></span></span></span></span></p> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>Something important to keep in mind is the various types of groups that perpetrate these crimes, but also the angles from which they may attack businesses. This information is critical for financial and insurance providers because by understanding how cybercriminals behave you can determine how to better protect policy-holders.</span></span></span></span></span></p> <h3><span><span><span><span><span>Cybercrime Perpetrators</span></span></span></span></span></h3> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>Generally, there are three to four types of cybercriminals that can be identified based on their alignment. The first group would be government actors. These are hackers </span></span><a href="https://www.defense.gov/News/News-Stories/Article/Article/2618386/in-cyber-differentiating-between-state-actors-criminals-is-a-blur/" rel="nofollow"><span><span><span>employed by the government</span></span></span></a><span lang="EN" xml:lang="EN" xml:lang="EN"><span> of a nation and are frequently used to undermine the stability of other governments. Second, there are government-sponsored hackers. These groups are typically paid for by nations in order to separate themselves from the type of attack that is taking place. They attack all kinds of targets.</span></span></span></span></span></p> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>The third and fourth are hacking collectives and individual rogue hackers. Sometimes hacking collectives can be government-sponsored. Other times they act on their own. Frequently, these groups attack corporations of all sizes and harvest their data for sale on the dark web.</span></span></span></span></span></p> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>Consider how these groups might attack your clients and how your clientsā€™ risk profile might change based on the groups that target them.</span></span></span></span></span></p> <h3><span><span><span><span><span>Crime Targets, Attack Vectors, and What They Mean for Financial and Insurance Providers</span></span></span></span></span></h3> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>What methods do these criminals use though? And what are their targets? Unfortunately, I cannot cover every single type of target and attack vector here, but I will cover the most common areas and discuss how these can impact your business.</span></span></span></span></span></p> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>To begin, many hackers target personal data -- at all levels. This means whether a business has 2 employees or 2,000, they are ripe for being attacked. Personal data does not just mean an employeeā€™s data either, it means all the data that the business itself has collected.</span></span></span></span></span></p> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>For example, hospitals store all sorts of important data on patients, including their date of birth, social security number, address, and even vital records. Encrypting records is key to preventing these data breaches. Hospitals arenā€™t the only vulnerable industry, however, all business owners should consider some type of insurance to prevent loss when a data breach occurs.</span></span></span></span></span></p> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>Second, </span></span><a href="https://appriver.com/blog/emailed-bomb-threats-demanding-bitcoin" rel="nofollow"><span><span><span>a favorite target</span></span></span></a><span lang="EN" xml:lang="EN" xml:lang="EN"><span> of many hackers is cryptocurrencies and other financial assets. Today, more and more financial institutions sell cryptocurrency or invest in it themselves. Insurance providers may offer policies that cover the loss of cryptocurrency. There are many options </span></span><a href="https://cryptowallet.com/best-litecoin-ltc-wallets/" rel="nofollow"><span><span><span>for safely storing your crypto</span></span></span></a><span lang="EN" xml:lang="EN" xml:lang="EN"><span>, but it will definitely continue to be a major target along with all other types of assets.</span></span></span></span></span></p> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>When it comes to <em>how</em> attackers seek this information the most common methodology is phishing. Phishing involves posing as, or spoofing, a trustworthy identity. Once the hackers have gained your trust, through social engineering, they then send a file, link, or other pieces of malicious software to gobble up your information or take control over your system.</span></span></span></span></span></p> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>Email is one of the most common ways that phishing scams are employed, which is why it is so vital that your </span></span><a href="https://appriver.com/product/email-threat-protection" rel="nofollow"><span><span><span>email is secured</span></span></span></a><span lang="EN" xml:lang="EN" xml:lang="EN"><span> with the right software. Other times these scams can be employed on social media. A business may have employees on Facebook or TikTok, who subsequently, albeit unintentionally, expose their employer to threats.</span></span></span></span></span></p> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>Insurance companies should consider this in the underwriting process. Does the business you are insuring have a social media policy for employees? Does the business have </span></span><a href="https://www.policyme.com/blog/how-much-does-life-insurance-cost-in-canada" rel="nofollow"><span><span><span>other kinds of insurance policies</span></span></span></a><span lang="EN" xml:lang="EN" xml:lang="EN"><span> in place in the event of the worst happening? A training program to protect against phishing? These should be considerations in any process you undertake.</span></span></span></span></span></p> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>Brute force hacking is far less </span></span><a href="https://appriver.com/blog/avast-phishing-threatens-deadly-viruses" rel="nofollow"><span><span><span>common than phishing</span></span></span></a><span lang="EN" xml:lang="EN" xml:lang="EN"><span>, but it often requires more resources on the part of the hacker. Businesses and financial institutions can be particularly vulnerable to these types of intrusions because of corporate software that allows many employees to connect in the cloud. A hacker targeting the database of a large corporation could easily gain access to countless files.</span></span></span></span></span></p> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>These are just a handful of the areas that can potentially be impacted by cybercriminals, but they are the main areas to consider if you provide either financial or insurance products.</span></span></span></span></span></p> <h2><span><span><span><span>Big Opportunities for Financial and Insurance Providers</span></span></span></span></h2> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>As you can see, the increase in cybercrime and expansion of cyber vulnerabilities are opportunities for both financial and insurance providers to tailor their services to their clients. By better understanding how working from home has expanded the marketplace for hackers, financial and insurance providers can both offer more complete coverage and better protect consumers.</span></span></span></span></span></p> <a href="/resources/blog/secure-modern-workplace" hreflang="en">Secure Modern Workplace</a> Wed, 23 Feb 2022 17:41:55 +0000 admin 520 at 6.5 Billion Emails Quarantined in 2021 /resources/blog/january-2022/65-billion-emails-quarantined-2021 <span>6.5 Billion Emails Quarantined in 2021</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Wed, 01/26/2022 - 16:03</span> <a href="/taxonomy/term/12" hreflang="en">Email Security</a> <a href="/taxonomy/term/5" hreflang="en">David Bisson</a> <article><img src="/sites/default/files/2022-01/threat_report_pdf_thumb.jpg" width="1400" height="700" alt="""" loading="lazy" typeof="foaf:Image" /></article><p><span><span>The ĒļæūŹÓʵɫ | AppRiver team quarantined 6.5 billion emails in 2021, a volume which constituted a 12.5% increase over the previous year.</span></span></p> <h2><span><span><span><span><span>A Year of Email Attacks in Review</span></span></span></span></span></h2> <p><span><span>In its <a href="/resources/report/global-threat-report-full-year-2021" rel="nofollow">ā€œGlobal Threat Report: Full Year 2021,ā€</a> ĒļæūŹÓʵɫ | AppRiver revealed that emails with malware attachments decreased in volume to below five million during the first five months of the year. Those messages jumped up above 15 million the following month and ended at around the same level in December 2021. That was after the team detected over 25 million emails with attached malware samples in November.</span></span></p> <p><span><span>Overall, the ĒļæūŹÓʵɫ | AppRiver team flagged 165 million email messages with malicious attachments through <a rel="nofollow">2021.</a></span></span></p> <p>Ā </p> <figure role="group" class="align-center"><article><img src="/sites/default/files/2022-01/Picture1.png" width="1264" height="684" alt="The monthly totals of directly attached malware emails in 2021. (Source: ĒļæūŹÓʵɫ | AppRiver)" loading="lazy" typeof="foaf:Image" /></article><figcaption>The monthly totals of directly attached malware emails in 2021. (Source: ĒļæūŹÓʵɫ | AppRiver)</figcaption></figure><p>Ā </p> <p><span><span>When it examined the origins of these and other malware attacks, the ĒļæūŹÓʵɫ | AppRiver team observed that many of the email campaigns had originated from the United States. China came in with the second highest number of attacks at just over 10 million. This attack volume marked a growth rate of 240% for the country when compared with 2020.</span></span></p> <p>Ā </p> <figure role="group" class="align-center"><article><img src="/sites/default/files/2022-01/Picture2_0.png" width="1266" height="680" alt="The top 10 most common email malware attack origins in 2021. (Source: ĒļæūŹÓʵɫ | AppRiver)" loading="lazy" typeof="foaf:Image" /></article><figcaption>The top 10 most common email malware attack origins in 2021. (Source: ĒļæūŹÓʵɫ | AppRiver)</figcaption></figure><p>Ā </p> <p><span><span>ĒļæūŹÓʵɫ | AppRiver also examined the most common attachment file types used by email attackers in 2021. Excel worksheets were the most common. Even so, malicious HTM/HTML attachments increased throughout the entire year.</span></span></p> <h2><span><span><span><span><span>Sources of Inspiration for Their Attacks</span></span></span></span></span></h2> <p><span><span>The ĒļæūŹÓʵɫ | AppRiver team witnessed malicious actors seize on various events as inspiration for their attacks in 2021. Letā€™s examine a couple of these below.</span></span></p> <h3><span><span><span><span>The Kaseya Supply Chain Attack</span></span></span></span></h3> <p><span><span>Following the <a href="/resources/blog/july-2021/revil-ransomware-gang-demands-70m-kaseya-software-supply-chain-attack" rel="nofollow">software supply chain attack involving Kaseya in July 2021</a>, ĒļæūŹÓʵɫ | AppRiver <a href="/resources/blog/july-2021/malware-distributors-leverage-kaseya-attack" rel="nofollow">detected a malicious email</a> that claimed to be offering a patch for the affected software product. The attack email instructed the recipient to open an attached executable file for the purpose of resolving a Kaseya weakness. Once executed, the file loaded Cobalt Strike, commercially available pentesting software which malicious actors can weaponize as an attack tool. </span></span></p> <h3><span><span><span><span>Global Shipping Issues</span></span></span></span></h3> <p><span><span>Several months later, the researchers at ĒļæūŹÓʵɫ | AppRiver detected an attack campaign that <a href="/resources/blog/november-2021/phishers-impersonating-maersk-line-steal-victims-email-credentials" rel="nofollow">claimed to originate from Maersk Line</a>. The message used stolen branding to trick the recipient into thinking that the email had originated from the shipping company. From there, the email instructed the recipient to view some documents including an invoice, a bill of lading, and a packing list by clicking on a ā€œDownload Confirmationā€ button. If the user complied, the campaign redirected them to a phishing page designed to steal their email account credentials. </span></span></p> <h2><span><span><span><span><span>Email Attack Predictions for the Year Ahead</span></span></span></span></span></h2> <p><span><span>Looking forward to 2022, the ĒļæūŹÓʵɫ | AppRiver team has several predictions for where email attacks will go. First, they noted that there will be greater coordination between threat groups. The researchers witnessed such collusion following Emotetā€™s takedown in 2021. Trickbotā€™s operators stepped up and began distributing Emotet later in the year. This activity helped malicious email traffic involving Emotet to <a href="/resources/blog/november-2021/emotets-it-again" rel="nofollow">increase beginning in mid-November</a>.</span></span></p> <p><span><span>Second, the ĒļæūŹÓʵɫ | AppRiver team anticipates that attackers will make more attempts to target software supply chain attacks like Kaseya. Doing so will help malicious actors to broaden their impact to dozens if not hundreds or even thousands of companies with a single compromise. </span></span></p> <p><span><span>Finally, researchers at the security firm wrote that digital criminals are going to continue turning to spear-phishing attacks in 2020. Such activity will support attackers as they devise new customization tacticsā€”all for the purpose of focusing even further on their targets.</span></span></p> <h2><span><span><span><span><span>Email Defense for 2022</span></span></span></span></span></h2> <p><span><span>The predictions discussed above highlight the need for organizations to invest in their email threat protection over the following year. They need to prioritize building more specificity into their email defenses. Towards that end, they could consider investing in an <a href="/products/email-threat-protection" rel="nofollow">email security solution</a> thatā€™s capable of scanning incoming messages at multiple levels for the purpose of blocking email attacks while allowing legitimate correspondence to reach their destination.</span></span></p> <a href="/resources/blog/secure-modern-workplace" hreflang="en">Secure Modern Workplace</a> Wed, 26 Jan 2022 22:03:44 +0000 admin 514 at Log4Shell Targeted by Email Attackers in Two Campaigns /resources/blog/january-2022/log4shell-targeted-email-attackers-two-campaigns <span>Log4Shell Targeted by Email Attackers in Two Campaigns </span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Mon, 01/17/2022 - 15:58</span> <a href="/taxonomy/term/12" hreflang="en">Email Security</a> <a href="/taxonomy/term/5" hreflang="en">David Bisson</a> <article><img src="/sites/default/files/2022-01/cover%20%281%29.png" width="1400" height="700" alt="""" loading="lazy" typeof="foaf:Image" /></article><p><span><span>The ĒļæūŹÓʵɫ | AppRiver team spotted two campaigns in which email attackers attempted to exploit a <a href="https://www.opentext.com/support/log4j-remote-code-execution-advisory" rel="nofollow">recently disclosed Log4j vulnerability</a> on susceptible systems.</span></span></p> <h2><span><span><span><span><span>A Bit of Background on Log4j</span></span></span></span></span></h2> <p><span><span>As explained by the <a href="https://www.cisa.gov/uscert/apache-log4j-vulnerability-guidance" rel="nofollow">U.S. Cybersecurity & Infrastructure Security Agency</a> (CISA), the Log4j vulnerability (detected as <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228" rel="nofollow">CVE-2021-44228</a> and dubbed ā€œLog4Shellā€) is a critical remote code execution flaw that affects versions 2.0-beta9 to 2.14.1 of Log4j, Apacheā€™s Log4j software library which services can use to log security and performance information. Those services include background modules that that help to process email header information as well as perform analytics and reporting.</span></span></p> <p><span><span>CVE-2021-44228 affects Log4jā€™s Java Naming and Directory Interface (JNDI) insofar as some of its features ā€œdo not protect against adversary-controlled LDAP [Lightweight Directory Access Protocol] and other JNDI related endpoints.ā€ Malicious actors can use a specially crafted request to exploit the flaw and execute arbitrary code for the purpose of infecting the system, exfiltrating information, and/or deploying ransomware. For the purposes of this article, they can launch an email attack where Log4j parses a string, executes malicious code, and compromises a system that attempts to log information about the email.</span></span></p> <h2><span><span><span><span><span>Campaign #1: A Slack Workplace Invitation</span></span></span></span></span></h2> <p><span><span>As soon as it learned of the Log4j vulnerabilityā€™s disclosure on December 10, 2021, the ĒļæūŹÓʵɫ | AppRiver team prepared itself for attack attempts to begin spreading over organizationsā€™ email systems. It was just four days later when the team detected the first such attempt. In the weeks that followed, those attacks grew in frequency and creativity.</span></span></p> <p><span><span>Which brings us to one campaign flagged by the ĒļæūŹÓʵɫ | AppRiver team in the beginning of January. For this attack, someone by the name of ā€œSmith Johnā€ invited a recipient to join a Slack workplace. The invite came with a unique workplace name crafted to exploit CVE-2021-44228.</span></span></p> <p>Ā </p> <figure role="group" class="align-center"><article><img src="/sites/default/files/2022-01/Picture1.jpg" width="1013" height="1012" alt="Screenshot of the Slack workplace invitation. (Source: ĒļæūŹÓʵɫ | AppRiver)" loading="lazy" typeof="foaf:Image" /></article><figcaption>Screenshot of the Slack workplace invitation. (Source: ĒļæūŹÓʵɫ | AppRiver)</figcaption></figure><p>Ā </p> <p><span><span>ā€œI assume the attacker is hoping that the attempt would be logged by a vulnerable system and trigger the exploit,ā€ noted Troy Gill, senior manager of threat intelligence at ĒļæūŹÓʵɫ | AppRiver. ā€œWe donā€™t know for sure if that was strictly intended as an email attempt or if the attacker was trying to send the exploit via Slack and that action triggered an email. Or both maybe?ā€</span></span></p> <h2><span><span><span><span><span>Campaign #2: An AWS Attack</span></span></span></span></span></h2> <p><span><span>It was around that same time when the ĒļæūŹÓʵɫ | AppRiver team came across another attack that attempted toe exploit the Log4j vulnerability. Whoever designed this attempt dispensed with concealing their efforts behind a well-known brand like Slack. Instead, they sent out an email with the exploit code for Log4Shell included not only in the subject line but also in the body of the attack email. </span></span></p> <p>Ā </p> <figure role="group" class="align-center"><article><img src="/sites/default/files/2022-01/Picture2.jpg" width="627" height="103" alt="Screenshot of the attack email. (Source: ĒļæūŹÓʵɫ | AppRiver)" loading="lazy" typeof="foaf:Image" /></article><figcaption>Screenshot of the attack email. (Source: ĒļæūŹÓʵɫ | AppRiver)</figcaption></figure><p>Ā </p> <p><span><span>Gill and his team analyzed the email and found that its sender had data theft on their mind.</span></span></p> <p><span><span>ā€œIt was trying to retrieve multiple AWS items along with java and virtual machine information,ā€ he pointed out. ā€œThis AWS attack tried to retrieve the secret access key, session token, shared credentials file, web identity token file, profile, config file, and access key ID. Iā€™m not sure about the efficacy of this attack, but it is certainly being attempted. </span></span></p> <p>Ā </p> <figure role="group" class="align-center"><article><img src="/sites/default/files/2022-01/Picture3.jpg" width="1184" height="304" alt="Screenshot of some of the AWS items targeted by the attack email. (Source: ĒļæūŹÓʵɫ | AppRiver)" loading="lazy" typeof="foaf:Image" /></article><figcaption>Screenshot of some of the AWS items targeted by the attack email. (Source: ĒļæūŹÓʵɫ | AppRiver)</figcaption></figure><p>Ā </p> <h2><span><span><span><span><span>How to Defend Against Email Attacks Targeting CVE-2021-44228</span></span></span></span></span></h2> <p><span><span>The campaigns described above highlight the need for organizations to defend themselves against attack attempts that seek to exploit CVE-2021-44228. One of the ways they can do that is by using an <a href="/products/email-threat-protection" rel="nofollow">email security solution</a> that can analyze incoming messages for known vulnerabilities and other malicious indicators. Simultaneously, organizations should seek to patch Log4Shell using their vulnerability management programs.</span></span></p> <a href="/resources/blog/secure-modern-workplace" hreflang="en">Secure Modern Workplace</a> Mon, 17 Jan 2022 21:58:15 +0000 admin 512 at 4 of the best Microsoft Teams features you may not be using today /resources/blog/january-2022/4-best-microsoft-teams-features-you-may-not-be-using-today <span>4 of the best Microsoft Teams features you may not be using today </span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Wed, 01/12/2022 - 09:49</span> <a href="/taxonomy/term/254" hreflang="en">Microsoft 365</a> <a href="/taxonomy/term/10" hreflang="en">ĒļæūŹÓʵɫ</a> <article><img src="/sites/default/files/2022-01/teams_phone.jpg" width="1400" height="700" alt="""" loading="lazy" typeof="foaf:Image" /></article><p><span><span><span>When the pandemic hit in early 2020, many workplaces migrated to Microsoft Teams, looking for a quick fix to connect employees until it was safe to return to the office. Nearly two years later, many of those same workplaces are now planning to work remotely or in a hybrid setup indefinitely. This may lead you to wonder if thereā€™s more to the tool that your team can benefit from.</span></span></span></p> <p><span><span><span>Indeed, thereā€™s more to Microsoft Teams than just video meetings, instant messages, and project channels. Letā€™s take a look at some of the lesser-known features that can help your team long-term.</span></span></span></p> <h2><span><span><span><span>Get more out of messaging</span></span></span></span></h2> <p><span><span><span>Most discussion of Microsoft Teams only considers it the ā€œnew version of Skype chatā€, or likens it to Slack. In reality, thereā€™s a lot more to it than being able to send and receive instant messages. Teams is set up so that you can work in real-time with your colleagues without ever leaving the channel youā€™re in. Itā€™s a great place to house your digital workplace hub to collaborate, plan, and execute work as a team.</span></span></span></p> <p><span><span><span>Where Microsoft Teams gets a leg up over other messaging apps is in its ability to support many functions at once. Within project channels and direct messages, you can easily attach a file, video or voice-call a colleague, and access other Microsoft apps like OneNote and Office, all within the same window. This makes it easy to stay on-task, collaborate seamlessly, and organize project information.</span></span></span></p> <p>Ā </p> <article class="align-center"><img src="/sites/default/files/2022-01/Picture2.png" width="451" height="501" alt="""" loading="lazy" typeof="foaf:Image" /></article><p>Ā </p> <h2><span><span><span><span>Collaborate with colleagues</span></span></span></span></h2> <p><span><span><span>There are a number of features that make collaboration easier with Microsoft Teams. </span></span></span></p> <p><span><span><span>First, as Microsoft explains over on their <a href="https://support.microsoft.com/en-us/office/first-things-to-know-about-apps-in-microsoft-teams-747492ee-7cdd-4115-a993-8c7e7f98a3d0" rel="nofollow"><span>support page</span></a>, adding tabs makes it possible to keep your information organized and streamlined. You can add any relevant files and apps as tabs to your existing Teams conversations. For example, if thereā€™s a deck your team is working on thatā€™s part of a larger project, you can add a tab to that channel to make the deck easily accessible to everyone. Once a file is added, users can also co-edit it together in real-time, without needing to leave Teams. </span></span></span></p> <p><span><span><span>Another great collaboration feature is the ability to add both internal and external contributors to project spaces. This makes it possible to add vendors, suppliers, freelancers, and clients as guest users, which means you donā€™t have to rely on a separate email thread to keep them in the loop (just make sure you run this function through your security process first).</span></span></span></p> <p>Ā </p> <article class="align-center"><img src="/sites/default/files/2022-01/Picture3.png" width="484" height="457" alt="""" loading="lazy" typeof="foaf:Image" /></article><p>Ā </p> <h2><span><span><span><span>Integrate for ease</span></span></span></span></h2> <p><span><span><span>Integrations make it easier to work smarter using third-party apps in conjunction with Teams.</span></span></span></p> <p><span><span><span>First, sometimes you need more than just text to get your message across. Microsoft Teams lets you easily embed content from third-party apps directly into your messages, making them more interactive, informative, and functional for the people receiving them.</span></span></span></p> <p><span><span><span>You can also interact with 24 different app bots by @mentioning them in chats or project channels. This <a href="https://support.microsoft.com/en-us/office/first-things-to-know-about-apps-in-microsoft-teams-747492ee-7cdd-4115-a993-8c7e7f98a3d0" rel="nofollow"><span>support article</span></a> uses the example of chatting with Survey Monkey to create a new poll within a team message. This makes it easier to accomplish more, without having to put any extra effort in.</span></span></span></p> <p>Ā </p> <article class="align-center"><img src="/sites/default/files/2022-01/Picture4.png" width="405" height="440" alt="""" loading="lazy" typeof="foaf:Image" /></article><p>Ā </p> <h2><span><span><span><span>Access from anywhere</span></span></span></span></h2> <p><span><span><span>Weā€™ve all gotten used to working from home over the last two years, but the Teams phone app makes it possible to access all your documents and conversations while youā€™re on the go as well. </span></span></span></p> <p>Ā </p> <article class="align-center"><img src="/sites/default/files/2022-01/Picture5.jpg" width="447" height="298" alt="""" loading="lazy" typeof="foaf:Image" /></article><p>Ā </p> <p><span><span><span>Once you have the Teams app on your phone, there are a number of ways you can customize it to suit your work style. For example, you can set quiet hours (and even quiet days) to filter out notifications during your down time. You can also use the app to share content from your phone during a meeting, or transfer a call from your laptop to your mobile app.</span></span></span></p> <p><span><span><span>Overall, Microsoft Teams is more than just a messaging app. With the right actions, information, and integrations, you can use it to connect with your team on everything from day-to-day communications to larger projects that require heavy collaboration. </span></span></span></p> <p><span><span><span>If youā€™d like to talk to a Microsoft Partner about Microsoft Teams, get in touch <a href="/partners/find-a-partner" rel="nofollow"><span>here</span></a>. </span></span></span></p> <a href="/resources/blog/secure-modern-workplace" hreflang="en">Secure Modern Workplace</a> Wed, 12 Jan 2022 15:49:56 +0000 admin 510 at Advanced Notice: Staying Alert and Aware of a Security Breach /resources/blog/staying-alert-security-breach <span>Advanced Notice: Staying Alert and Aware of a Security Breach </span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Thu, 01/06/2022 - 09:55</span> <a href="/taxonomy/term/64" hreflang="en">Thought Leadership</a> <a href="/taxonomy/term/10" hreflang="en">ĒļæūŹÓʵɫ</a> <article><img src="/sites/default/files/2022-01/invalid_password.jpg" width="1400" height="700" alt="""" loading="lazy" typeof="foaf:Image" /></article><p><span><span><span><span>Locking your digital doors is the most important thing your organization can doā€”a cybersecurity system is crucial in today's hack-happy world. </span></span></span></span></p> <p><span><span><span><span>Recognizing what a picked lock looks like is the second thing. Cyberattacks do come with warning signs, and your team needs to know those signs so that you can <a href="/request-demo" rel="nofollow"><span>stop a security breach before it's too late</span></a>. </span></span></span></span></p> <p><span><span><span><span>We hear stories all the time about how a proactive approach to cybersecurity makes a breach less catastrophic. Here's a hypothetical business and name, but the scenario has happened many times. </span></span></span></span></p> <p><span><span><span><span>Jay Duncan and his team learned this the hard way. Jay is the IT director for Sew Clean, a chain of alterations and dry cleaning stores. He has pushed his senior management to move towards a completely digital point of sale system, so their customers' information is stored in their network. Jay installed Intrusion Detection Software (IDS) in the network when they installed the new POS software, thinking that with all that customer data they needed bigger firewalls. The IDS he chose is antivirus software that monitors incoming network traffic. </span></span></span></span></p> <p><span><span><span><span>So far, it's worked out well. Not only are customer's starch choices in the system, but so are their measurements, so they can just drop off basic alterations like hemming. During the pandemic, this full curbside service has boosted Sew Clean's business while their competitors are struggling. </span></span></span></span></p> <p><span><span><span><span>Sew Clean has several branches in the metropolitan area, and Jay oversees a team of six administrators. Together, they keep customer data secure and manage the business operations.Ā  </span></span></span></span></p> <h2><span><span><span><span><span><span><strong><span lang="EN" xml:lang="EN" xml:lang="EN"><span><span>A Series of Peculiar Events</span></span></span></strong></span></span></span></span></span></span></h2> <p><span><span><span><span>One day, a branch manager mentioned that she had been locked out of her account when she tried to log in. She hadn't said anything about it because she assumed she had missed a capital letter on her password. Jay didn't think much about it; Susan was new and he figured she had just forgotten the sequences.Ā  He had also added email encryption to the system for an added layer of security. That afternoon, the operations manager said that the network seemed slow, and some of the computers were inexplicably crashing. Jay immediately shut down his computer, only it would not cooperate and kept running. Jay's suspicions of a security breach were confirmed when a ton of pop-ups started doing just thatā€”popping up exponentially. </span></span></span></span></p> <p><span><span><span><span>Jay realized that a data breach was in progress. He had been discussing plans for an emergency recovery with his IT admins since his first day, so he called his lead engineer and told her "we're hacked, get everyone on site and start working through the plan." Then he called the CEO with the news.</span></span></span></span></p> <p><span><span><span><span>While Jay was having an uncomfortable discussion with the CEO, his lead engineer Jane had shut down all company routers to limit the spread of the hack, and had begun shutting down all servers. Her staff were calling branch managers to tell them to run through the instructions in the red 3-ring binder labeled "Emergency Recovery Plan."</span></span></span></span></p> <p><span><span><span><span>By the time Jay got to the data room, Jane and her staff were almost finished rebuilding the desktop computers in the office. "Jay, I'm glad you made us practice this last month. I've put all the main servers in quarantine, and Tom's signed off on the checks. I'm sending the guys out to the branches to make sure they're all clean. Once that's done, we'll be back in business within an hour".</span></span></span></span></p> <h2><span><span><span><span><span><span><strong><span lang="EN" xml:lang="EN" xml:lang="EN"><span><span>How Jay Prepared for a Data Breach</span></span></span></strong></span></span></span></span></span></span></h2> <p><span><span><span><span>Jay and his team knew the signs of a security threat, but the initial signalā€”a new employee couldn't log in right awayā€”was so subtle that he and Jane dismissed it at the outset. His CEO was grateful that Jay had insisted on additional email security as well as security audit software, although he had grumbled a bit about the cost at the time. </span></span></span></span></p> <p><span><span><span><span>Fortunately, he and Jane both had that emergency plan in place, so they had minimal downtime and no loss of data. </span></span></span></span></p> <h2><span><span><span><span><span><span><strong><span lang="EN" xml:lang="EN" xml:lang="EN"><span><span>Major Signs a Data Breach is Underway</span></span></span></strong></span></span></span></span></span></span></h2> <p><span><span><span><span>Jay and Jane knew the warning signals for a data breach and had trained their staff to look out for these signs. </span></span></span></span></p> <ul><li><span><span><span><span><strong>Users locked out of accounts</strong>ā€”Susan couldn't log in because a phisher was interfering</span></span></span></span></li> <li><span><span><span><span><strong>Slow hardware and software performance</strong>ā€“systems freeze and crash without reason</span></span></span></span></li> <li><span><span><span><span><strong>Abnormal system behavior</strong>ā€”lots of pop-up and virus detection messages are a sure sign that malware is worming its way into your network</span></span></span></span></li> </ul><p><span><span><span><span>A <a href="/resources/blog/september-2021/attackers-increasingly-using-customized-phishing-campaigns-target" rel="nofollow"><span>security breach attack</span></a> can even take the form of targeted campaigns that are customized to spoof legitimate notification messages.</span></span></span></span></p> <p><span><span><span><span>More subtle changes to the system are sudden file changes and unusual activity on an administrative account. When Jay realized a cyberattack was underway, he was able to confirm through his security audit software that his admin account was secure and that the malware had not infected the company files. </span></span></span></span></p> <h2><span><span><span><span><span><span><strong><span lang="EN" xml:lang="EN" xml:lang="EN"><span><span>Your data security should have built-in updates</span></span></span></strong></span></span></span></span></span></span></h2> <p><span><span><span><span>Data security tools are constantly evolving to keep up with the bad actors in cyberspace. Jay had already installed<a href="/audit" rel="nofollow"> </a><a href="/audit" rel="nofollow"><span>Microsoft 365 Security Audit software</span></a><u> </u>that continuously monitors his email system for vulnerabilities. Hackers are always looking for a way in, and emails are a popular delivery vehicle for testing the waters. <a href="/resources/blog/august-2021/phishing-attacks-h1-2021-stood-out-their-levels-sophistication" rel="nofollow"><span>Phishing attacks</span></a> are typically the first breach in a network.<u> </u>The security audit analyzes all network mailboxes for permissions, passwords, MFA, and forwarding settings so that any attempt at breaking in is automatically rebuffed. </span></span></span></span></p> <h3><span><span><span><span><span><span><strong><span lang="EN" xml:lang="EN" xml:lang="EN"><span><span>Phishing is a highly profitable attack vector</span></span></span></strong></span></span></span></span></span></span></h3> <p><span><span><span><span>According to an IBM study on overall costs of a <a href="/resources/blog/august-2021/phishing-driven-data-breaches-cost-465m-average-finds-ibm" rel="nofollow"><span>data breach</span></a>, a successful phishing attempt accounts for the second costliest type of attack. Phishing accounts for 17% of all data breaches, and costs companies an average of $4,65 million. Compromised email credentialsā€”when the malware fools the active directory into thinking a request is validā€”are responsible for 20% of security breaches. These incidents, however, are less expensive to clean up than a phishing hack.</span></span></span></span></p> <p><span><span><span><span>Phishing breaches that wormed into business email, however, cost an average of $5.01 million in recovery. What's worse, IBM found that phishing only accounts for 4% of data breaches, and takes almost a yearā€”317 daysā€”to identify. </span></span></span></span></p> <p><span><span><span><span><strong><span lang="EN" xml:lang="EN" xml:lang="EN"><span>Modern IDS Keeps Up with the Bad Actors</span></span></strong></span></span></span></span></p> <p><span><span><span><span>The days when Jay and Sew Clean could keep their data secure with anti-virus software are long gone. As businesses are networked, security levels need to meet that risk by providing safeguards for the entire system. An IDS acts as that gatekeeper, with highly adaptable technologies that keep all your systems secure against consistently more sophisticated cyber threats. </span></span></span></span></p> <p><span><span><span><span>Signature-based IDS takes off from antivirus software, which searches for patterns in byte sequencingā€”signaturesā€”or known malware instruction sequences. The problem with signature-based IDS is that it cannot identify new attacks as there is no pattern precedent. </span></span></span></span></p> <p><span><span><span><span>Anomaly-based IDS goes a step further and uses AI to identify odd patterns of behavior against a predefined trust model. The downside to this IDS is that fake positives are a possibility; in some instances new legitimate activity gets flagged as malicious. </span></span></span></span></p> <p><span><span><span><span>Until this attempted data breach, Jay and Jane were having a hard time convincing their team and CEO that modern security software was critical for their company and customer information to remain safe and secure. Once theĀ  crisis had passed, they were fully on board with learning and staying up to date onĀ  security protocols. </span></span></span></span></p> <a href="/resources/blog/secure-modern-workplace" hreflang="en">Secure Modern Workplace</a> Thu, 06 Jan 2022 15:55:58 +0000 admin 511 at How to increase adoption of Microsoft Teams /resources/blog/december-2021/how-increase-adoption-microsoft-teams <span>How to increase adoption of Microsoft Teams</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Thu, 12/23/2021 - 13:33</span> <a href="/taxonomy/term/254" hreflang="en">Microsoft 365</a> <a href="/taxonomy/term/10" hreflang="en">ĒļæūŹÓʵɫ</a> <article><img src="/sites/default/files/2021-12/3.png" width="2240" height="1260" alt="""" loading="lazy" typeof="foaf:Image" /></article><p><span><span><span>For some workplaces, going remote in 2020 was their first foray into collaborating and meeting virtually. For these organizations, Microsoft Teams was a welcome addition, allowing them to meet, chat, and stay organized from afar. </span></span></span></p> <p><span><span><span>Now that some time has passed, however, some are finding that while their colleagues and employees are using Microsoft Teams, theyā€™re not getting the most out of it. Letā€™s look at a few ways you can encourage more meaningful adoption of Microsoft Teams at your workplace. </span></span></span></p> <h2><span><span><span><span>Decide what success looks like</span></span></span></span></h2> <p><span><span><span>Weā€™ve touched on the bridge between usage and meaningful adoption, but what does that look like? The truth is, itā€™s different for every business. Itā€™s important to define what a successful adoption of Teams will look like for your business and work towards those metrics. </span></span></span></p> <p><span><span><span>As with any goal, itā€™s important to make sure yours are specific, measurable, achievable, realistic, and time-bound. According to <a href="https://docs.microsoft.com/en-gb/microsoftteams/teams-adoption-define-outcomes" rel="nofollow"><span>Microsoft</span></a>, there are four categories of outcomes you can work towards: organizational, cultural, tangible, and individual. Letā€™s look at each a little more closely.</span></span></span></p> <p><span><span><span><strong>Organizational outcomes:</strong> Goals in this category include those around cultural transformation, employee retention, talent acquisition, social engagement, and operational agility. </span></span></span></p> <p><span><span><span><strong>Cultural outcomes: </strong>These include goals around employee sentiment, employee recommendations, customer feedback, and innovation measures.</span></span></span></p> <p><span><span><span><strong>Tangible outcomes: </strong>These can include impacts on customer experience, cost savings, revenue generation, data security, process simplification, and retirement of legacy systems. </span></span></span></p> <p><span><span><span><strong>Individual outcomes:</strong> Hereā€™s where we get more into the weeds of user adoption, with outcomes related to actual use of the tool, employee morale, employee productivity, employee engagement, and idea generation.</span></span></span></p> <p><span><span><span>Being clear from the outset on which of these outcomes are important to you (and how you plan on achieving them) is critical, but so is being flexible. If youā€™re having trouble reaching an outcome, you can investigate why and adjust your adoption approach accordingly. </span></span></span></p> <h2><span><span><span><span>Drive engagement with champions</span></span></span></span></h2> <p><span><span><span>Encouragingā€”and managingā€”behaviour change is one of the most difficult things leaders can do within an organization. Getting employees to join a work call on Meetings is one thing; getting someone to change the way they conduct their day-to-day communication is another entirely. </span></span></span></p> <p><span><span><span>Managing this change, however, is critical. Engagement is a major factor in driving software adoption across an organization. When it comes to Microsoft Teams, the company has a solution for making this happen: onboard early adopters first, and identify Microsoft Teams championsā€”that is, the people who will drive awareness, adoption, and education around how to use Teams within the organization. As <a href="https://docs.microsoft.com/en-gb/microsoftteams/teams-adoption-create-champions-program" rel="nofollow"><span>Microsoft</span></a> recommends, champions should be given: </span></span></span></p> <ul><li><span><span><span>Formal training in how to use the software</span></span></span></li> <li><span><span><span>Encouragement and empowerment to guide, teach, and train others</span></span></span></li> <li><span><span><span>Consistent, positive reinforcement on the progress and impact theyā€™re making</span></span></span></li> <li><span><span><span>A clear, time-based plan to execute</span></span></span></li> </ul><p><span><span><span>Microsoft even has a <a href="https://adoption.microsoft.com/become-a-champion/" rel="nofollow"><span>Champions Program</span></a>, where leaders can access valuable materials about getting the most out of Teams. If youā€™re running your champions program well, these people will learn all they can about Teams and pass that knowledge and support onto others who may be less enthusiastic or knowledgeable about the software.</span></span></span></p> <p><span><span><span>If youā€™ve already been using Teams and havenā€™t appointed Champions, itā€™s not too late, and itā€™s worth the effort. Thereā€™s no replacement for having someone internal who can drive adoption and address any questions and concerns others may have.</span></span></span></p> <h2><span><span><span><span>Incorporate feedback and invest in awareness</span></span></span></span></h2> <p><span><span><span>Itā€™s important to gather feedback about Teams from your employees, both from your champions and from others. Understanding how people use and experience the product will help you adjust the way you approach awareness and training going forward. </span></span></span></p> <p><span><span><span>Microsoft <a href="https://docs.microsoft.com/en-gb/microsoftteams/teams-adoption-optimize-feedback-and-reporting" rel="nofollow"><span>recommends</span></a> paying close attention to things like how users incorporate Teams with existing technology and which questions they ask about how to use it.</span></span></span></p> <p><span><span><span>Finally, you should put considerable effort into building awareness and training across the organization. Microsoft <a href="https://docs.microsoft.com/en-gb/microsoftteams/teams-adoption-drive-awareness" rel="nofollow"><span>equates</span></a> this with the ā€œmarketing and communicationsā€ segment of your overall adoption strategy.</span></span></span></p> <p><span><span><span>A good awareness and training plan includes deliberate internal communications, which can look like events, signage, and self-help/training information to familiarize people with why this is an important tool. </span></span></span></p> <p><span><span><span>Itā€™s important to evaluate your success metrics and share them widely to encourage continued adoption across the organization. Microsoft <a href="https://docs.microsoft.com/en-gb/microsoftteams/teams-adoption-drive-awareness" rel="nofollow"><span>recommends</span></a> sharing insights from your feedback channels with the hashtag #TeamStories to make them easily searchable. They also recommend sharing a team story company-wide every month to show what increased productivity and collaboration looks like using Teams.Ā  </span></span></span></p> <h2><span><span><span><span>Meaningful adoption doesnā€™t happen overnight</span></span></span></span></h2> <p><span><span><span>As with any major endeavor, success with Microsoft Teams adoption wonā€™t happen overnight. Getting employees engaged, trained properly, and enthusiastic about using this tool will take careful planning, deliberate execution, and discernment about whatā€™s working and what could be improved. </span></span></span></p> <p><span><span><span>If you enable your champions, measure success, and incorporate feedback, youā€™ll be well on your way to meaningful adoption across the board.</span></span></span></p> <a href="/resources/blog/secure-modern-workplace" hreflang="en">Secure Modern Workplace</a> Thu, 23 Dec 2021 19:33:07 +0000 admin 509 at Data Resilience 101 /resources/blog/december-2021/data-resilience-101 <span> Data Resilience 101</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Wed, 12/22/2021 - 17:49</span> <a href="/taxonomy/term/14" hreflang="en">Backup</a> <a href="/taxonomy/term/255" hreflang="en">Todd Gifford</a> <article><img src="/sites/default/files/2021-12/Todd%20Gifford.png" width="2240" height="1260" alt="""" loading="lazy" typeof="foaf:Image" /></article><h2><span><span><span><strong>What is data resilience?</strong></span></span></span></h2> <p><span><span><span>You know when your car breaks down or when the fuses blow, and the lights go out at your house? Often both of those things are problems, but you can work around them:Ā  You can call breakdown recovery or grab a taxi, and if the lights go off, sometimes the power is still on elsewhere, or you have a torch. Both of those situations and the workarounds supply a level of resilience ā€“ when there is a problem or something breaks, you can still walk around the house at night and see where you are going or make it work or the airport on time.</span></span></span></p> <p><span><span><span>Data resilience is your ability to take a hit on your data availability or integrity and keep your organization running. </span></span></span></p> <h2><span><span><span><strong>Why do you need data resilience?</strong></span></span></span></h2> <p><span><span><span>Letā€™s get this out there:Ā  All organizations rely on their data; they always have. That accountancy firm from a hundred years ago had loads of data ā€“ it was just on paper. Architects, mechanics, the hospital, manufacturers, software developers, those of us who write blogs ā€“ everything we do has data at its core or associated with it. Many organizations even have data about their data ā€“ how much there is, where it is, who has access to it, how long they should hold it ā€“ the list goes on.</span></span></span></p> <p><span><span><span>Letā€™s take an example ā€“ an oil pipeline. How much data is associated with pumping oil through a pipe? Probably quite a bit:Ā  flow rates, volumes pumped, pressure, leaks, maintenance records, valves, staff, locations, emails, diagrams, bills, wages, security information, etc.</span></span></span></p> <p><span><span><span>What happens if all that data is lost or modified? No oil. No bills are issued, or revenue paid. Maybe a massive environmental disaster. </span></span></span></p> <p><span><span><span>So ā€“ data. How about that ā€“ itā€™s <strong><em>critical</em></strong> to your organisation.</span></span></span></p> <h2><span><span><span><strong>How to make data resilient</strong></span></span></span></h2> <p><span><span><span>Data resilience requires planning. All organizations have some of the same types of data (like finance or HR) ā€“ but its value is different depending on the organisation. </span></span></span></p> <p><span><span><span><strong>Step 1</strong>:Ā  Collect the business requirements for data resilience ā€“ these will inform what to protect, how often to protect it, and how quickly it may need restoring after a data resilience event:</span></span></span></p> <ul><li><span><span><span>Know what data is essential to your organization. Work with department heads and those who use the data to perform their jobs. Categorise the data into high, medium and low based on the sensitivity of data (such as HR or medical) and how it would affect your organization if it were changed or unavailable.</span></span></span></li> <li><span><span><span>Know where the data is ā€“ if you canā€™t find the data, you canā€™t control it and protect it.</span></span></span></li> <li><span><span><span>Know who needs access to the data and how often</span></span></span></li> <li><span><span><span>Work out how long each area of your organization could function <em>without </em>access to its data. This will allow you to work out the maximum time you could be without access to data, known as the RTO or ā€˜Recovery Time Objective.ā€™</span></span></span></li> <li><span><span><span>Work out how much data you can afford to lose ā€“ this is known as the RPO or ā€˜Recovery Point Objectiveā€™.</span></span></span></li> </ul><p><span><span><span>For some organizations ā€“ those last two will be zero. As in, the data needs to be ā€˜always availableā€™ with ā€˜no lossā€™.Ā  Ouch ā€“ those are some tough asks ā€“ but not impossible. There will always be <em>some </em>risk of data loss due to Murphyā€™s Law ā€“ (if something can happen, it will) ā€“ but we can do our best to minimize the likelihood. </span></span></span></p> <p><span><span><span><strong><span lang="EN-GB" xml:lang="EN-GB" xml:lang="EN-GB"><span>Step 2:Ā  </span></span></strong><span lang="EN-GB" xml:lang="EN-GB" xml:lang="EN-GB"><span>Data resilience design</span></span></span></span></span></p> <p><span><span><span><span lang="EN-GB" xml:lang="EN-GB" xml:lang="EN-GB"><span>Data resilience design requires answers to the previous questions, but it also needs to consider the systems you are using. Is all of your CRM in Salesforce? Staff using Dropbox for corporate data without permission? Email and finance data in Microsoft 365? </span></span></span></span></span></p> <p><span><span><span><span lang="EN-GB" xml:lang="EN-GB" xml:lang="EN-GB"><span>Here are some pointers for design:</span></span></span></span></span></p> <ul><li><span><span><span><span lang="EN-GB" xml:lang="EN-GB" xml:lang="EN-GB"><span>Control where the data is and where it can go</span></span></span></span></span></li> <li><span><span><span><span lang="EN-GB" xml:lang="EN-GB" xml:lang="EN-GB"><span>Secure those locations ā€“ understand who can access the data</span></span></span></span></span></li> <li><span><span><span><span lang="EN-GB" xml:lang="EN-GB" xml:lang="EN-GB"><span>Make those systems and locations as available as they <em>need</em> to be. This is key as the budget likely wonā€™t stretch to allow every system to have 99.999% uptime. The payroll server only needs to run once a month, for example. That real-time ambulance tracking system ā€“ that one needs those five-nines of availability.</span></span></span></span></span></li> <li><span><span><span><span lang="EN-GB" xml:lang="EN-GB" xml:lang="EN-GB"><span>Despite all that resilience ā€“ you do need to take a backup. </span></span></span></span></span></li> </ul><p><span><span><span><span lang="EN-GB" xml:lang="EN-GB" xml:lang="EN-GB"><span>For me ā€“ the cloud offers a cost-effective way of achieving a high level of availability at an affordable price, as those expensive infrastructure and maintenance costs are shared across many organisations. </span></span></span></span></span></p> <p><span><span><span><strong><span lang="EN-GB" xml:lang="EN-GB" xml:lang="EN-GB"><span>Step 3:Ā  </span></span></strong><span lang="EN-GB" xml:lang="EN-GB" xml:lang="EN-GB"><span>Back up the data</span></span></span></span></span></p> <p><span><span><span><span lang="EN-GB" xml:lang="EN-GB" xml:lang="EN-GB"><span>This is probably the number one thing on the list of data resilience must-haves. Backups. Back up your data somewhere that lives separately from your primary data (i.e. ā€“ consider AWS instead of Azure if your primary data is hosted in Microsoft, and vice-versa). </span></span></span></span></span></p> <p><span><span><span><span lang="EN-GB" xml:lang="EN-GB" xml:lang="EN-GB"><span>All the security and outsourced hosting wonā€™t protect you from every incident ā€“ in fact, most cloud service providers bury it in their terms of agreement that they are not responsible for your data loss. When looking at your resilience plan, itā€™s important to ask - are you hosting your data in the cloud? In someone elseā€™s cloud platform? </span></span></span></span></span></p> <p><span><span><span><span lang="EN-GB" xml:lang="EN-GB" xml:lang="EN-GB"><span>There is a </span></span><a href="https://appriver.com/products/backup-recovery" rel="nofollow"><span><span>backup</span></span></a><span lang="EN-GB" xml:lang="EN-GB" xml:lang="EN-GB"><span> for that as well ā€“ often called cloud-to-cloud backup or SaaS Backup</span></span></span></span></span></p> <p><span><span><span><span lang="EN-GB" xml:lang="EN-GB" xml:lang="EN-GB"><span>Backups provide you with a point-in-time recovery option. Between those points-in-time, however, there could be some data loss (most enterprises backup systems every hour, for example).</span></span></span></span></span></p> <p><span><span><span><strong><span lang="EN-GB" xml:lang="EN-GB" xml:lang="EN-GB"><span>Step 4:</span></span></strong><span lang="EN-GB" xml:lang="EN-GB" xml:lang="EN-GB"><span> Archive or backup? You may need both.</span></span></span></span></span></p> <p><span><span><span><span lang="EN-GB" xml:lang="EN-GB" xml:lang="EN-GB"><span>Need to make sure there is as close to zero loss on those legal emails or conversations about patients? For that, you need a real-time copy of everything that happens. This can be in the form of replication to an offsite location for virtual systems or an </span></span><a href="https://appriver.com/product/information-archiving" rel="nofollow"><span><span>information archive</span></span></a><span lang="EN-GB" xml:lang="EN-GB" xml:lang="EN-GB"><span> for cloud systems to capture real-time data, like emails or Teams conversations.</span></span></span></span></span></p> <p><span><span><span><span lang="EN-GB" xml:lang="EN-GB" xml:lang="EN-GB"><span>Even if you have backups in place, if you work in an industry with any level of compliance requirement, having an archive can be the fastest and easiest way to source a copy of your communications. Where a backup brings you a step further ā€“ it can back up files, images, projects and other data in addition to your communications. When it comes to legal requirements, itā€™s crucial to practice as much due diligence as possible. You can read more about the difference in archive and backup <a href="/resources/solution-brief/backup-or-archiving" rel="nofollow">here.</a></span></span></span></span></span></p> <h2><span><span><span><strong><span lang="EN-GB" xml:lang="EN-GB" xml:lang="EN-GB"><span>Summary ā€“ data resilience</span></span></strong></span></span></span></h2> <p><span><span><span><span lang="EN-GB" xml:lang="EN-GB" xml:lang="EN-GB"><span>The first rule of data resilience is to ensure you implement backup. The second rule of data resilience is to always have a backup. You can hone your data resilience approach by taking input from your organization. Likely nobody will be comfortable with data loss, but they may be able to operate without some data for a period of time (RPO vs RTO).</span></span></span></span></span></p> <p><span><span><span><span lang="EN-GB" xml:lang="EN-GB" xml:lang="EN-GB"><span>Follow the steps and plan your approach. Not only will this enable you to concentrate your efforts and budget in the right areas, but it will also enable you to <em>show </em>the board or the regulator what you are doing and why.</span></span></span></span></span></p> <p><span><span><span><span lang="EN-GB" xml:lang="EN-GB" xml:lang="EN-GB"><span>And donā€™t forget the third rule of data resilience ā€“ always have a backup, and make sure it is stored away from where the primary system is. Run all of your environment inside Microsoft 365? An excellent choice ā€“ but donā€™t keep the backups there as well, just in case.</span></span></span></span></span></p> <p>Ā </p> <article class="align-left"><img src="/sites/default/files/2021-12/Picture1.jpg" width="100" height="100" alt="""" loading="lazy" typeof="foaf:Image" /></article><p><span><span><a href="https://link.edgepilot.com/s/d18b5dab/bzc8qTiGakK89XEJUvHEhQ?u=https://eur03.safelinks.protection.outlook.com/?url=https%253A%252F%252Fwww.linkedin.com%252Fin%252Ftodd-gifford%252F%26data=04%257C01%257Ctodd.gifford%2540optimisingit.co.uk%257C830cc0de55324d65cb4c08d94e0a0a26%257C6ddb60aff59f491c91abca97310261cd%257C0%257C0%257C637626628799039669%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C2000%26sdata=E0RHq%252FmEmXxL1hT5%252FqcLXuiAub0FS0yq6ullu8YoXik%253D%26reserved=0" rel="nofollow">Todd Gifford</a>, BEng, CISSP, has 22 years of cybersecurity experience and is the CTO of Optimising IT, a UK-based Managed Service Provider whose goal is to help you pragmatically manage risk. Connect with Todd on LinkedIn or <a href="https://www.optimisingit.co.uk/cloud-services/backups-and-recovery/" rel="nofollow">visit Optimising IT</a> to learn more about how they can help you choose and implement the best cloud-to-cloud backup solution for your business.</span></span></p> <p>Ā </p> <a href="/resources/blog/secure-modern-workplace" hreflang="en">Secure Modern Workplace</a> Wed, 22 Dec 2021 23:49:19 +0000 admin 508 at IP Spoofing Attacks: What are they and how can you prevent them? /resources/blog/IP-spoofing-attacks <span>IP Spoofing Attacks: What are they and how can you prevent them?</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Fri, 12/17/2021 - 15:45</span> <a href="/taxonomy/term/31" hreflang="en">Trends</a> <a href="/taxonomy/term/10" hreflang="en">ĒļæūŹÓʵɫ</a> <article><img src="/sites/default/files/2022-01/IP%20Spoofing%202.png" width="2240" height="1260" alt="IP spoofing attacks 101 IP animation representation" loading="lazy" typeof="foaf:Image" /></article><p><span><span><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>There are dozens of techniques hackers can use to try to infiltrate your company's sensitive data, though some are more sophisticated than others. IP spoofing attacks are used by bad threat actors to ā€œget a foot-in-the-door" of your network. Theyā€™re growing in popularity and frequency, and have the potential to wreak havoc on your organization if gone unnoticed. In this article, we will dive deeper into what IP spoofing is, how itā€™s commonly used, and what you can do to protect your organization for these types of attacks.</span></span></span></span></span></span></span></p> <h3><span><span><span><span><span><strong><span lang="EN" xml:lang="EN" xml:lang="EN"><span>What Are IP Spoofing Attacks?</span></span></strong></span></span></span></span></span></h3> <p><span><span><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>When</span></span><u><span><a href="/products/secure-file-share" rel="nofollow"> </a></span></u><span><u><span lang="EN" xml:lang="EN" xml:lang="EN"><span><u><span><a href="/products/secure-file-share" rel="nofollow">data is transferred</a></span></u></span></span></u></span><span lang="EN" xml:lang="EN" xml:lang="EN"><span> over the internet, it gets broken up into packets before being reassembled upon arrival.Ā  Each and every packet comes with source information, including the IP address of the sender and receiver. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>IP spoofing is an entry point for attackers, used to bypass systems that are set up on a model of trust, or used to enter networks that arenā€™t secured with the right systems. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>When attackers use IP spoofing, they impersonate a legitimate entity by changing their IP (Internet Protocol) source information to make the receiving computer system believe the data is coming from a trusted source. In systems that are configured to work between a set of trusted networked devices, IP spoofing can be used to circumvent the IP authentication process by appearing as a trusted entity on the network... getting past the moat and into the castle.</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>IP spoofing can be used to carry out ā€œMan-in-the-Middle" (MitM) or ā€œdenial-of-service" (DoS) attacks. These methods allow hackers to obtain sensitive data, such as credit card information or social security numbers by interfering with communication between other networked computers. In the case of DoS, the hacker leverages devices theyā€™ve compromised, i.e. ā€œzombieā€ devices to carry out the attack. Often, hackers will even have a large network of these compromised devices, that they will use to </span></span><a href="/resources/blog/november-2021/record-setting-ddos-attack-highlights-malicious-actors-strategic" rel="nofollow"><span><span>flood or completely shut down websites and servers</span></span></a><span lang="EN" xml:lang="EN" xml:lang="EN"><span>, and the IP source information is falsified to create confusion and prevent mitigation. This is similar to someone sending a dangerous item in the mail, but placing a false return address on the package (or even putting the recipient address on the package as the return address). This method makes it difficult for businesses to trace the source of the attack. </span></span></span></span></span></span></span></p> <h3><span><span><span><span><span><span><span><strong><span lang="EN" xml:lang="EN" xml:lang="EN"><span><span>How Can My Organization Prevent IP Spoofing?</span></span></span></strong></span></span></span></span></span></span></span></h3> <p><span><span><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>Although there are many things to worry about in the world of cyber security, there are also many ways to keep yourself and your organization safe from attacks like these. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>Your users will be highly unlikely to detect IP spoofing, thatā€™s why itā€™s important to ensure the organizationā€™s IT security measures are up-to-date and configured properly. Some recommendations are to enable multi-factor-authentication (MFA) for your employees to access critical data in your network. Validating devices inside the organization with MFA is a strong option to provide an extra protection layer. Itā€™s also recommended to place your network behind a firewall, and to implement additional security measures beyond IP authentication alone. Perhaps itā€™s time to implement packet-filtering for incoming traffic (ingress filtering), and external network traffic (egress filtering) to bulk up your IP authentication process, for example. Members of your web development team can also ensure theyā€™re using the most up-to-date internet protocol, as old versions are more vulnerable to attacks.</span></span></span></span></span></span></span></p> <h3><span><span><span><span><span><span><span><strong><span lang="EN" xml:lang="EN" xml:lang="EN"><span><span>How Can My Organization Recover From an Attack?</span></span></span></strong></span></span></span></span></span></span></span></h3> <p><span><span><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>If your organization has been the victim of attacks carried out after IP spoofing, you know how jarring it is to discover that your network has been infiltrated. If you notice a device (or multiple devices) in your organization has been infiltrated, the first step is to disconnect it from the network as soon as possible. This can prevent the spread of the attack and give you a chance to perform data backups if they aren't done</span></span><a href="/products/backup-recovery" rel="nofollow"> </a><a href="/products/backup-recovery" rel="nofollow"><span><span>automatically in the cloud</span></span></a><span lang="EN" xml:lang="EN" xml:lang="EN"><span>. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>Next, affected users should change their login credentials and avoid using the same password for multiple accounts. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>At this stage, you should have your cybersecurity team scan your system for viruses or malware, or reach out to a professional local IT security team (such as a Managed Service Provider in your area) that can help you with the process.</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>Finally, run an audit and see where the vulnerabilities were that allowed a hacker to gain access to your network or data. Once you know how the attacker got in, you can change your cybersecurity policies and procedures to prevent attacks like this from happening ever again, and begin implementing some of the recommendations we provided above.</span></span></span></span></span></span></span></p> <h2>Ā </h2> <h4><span><span><span><span><span><span><strong><span lang="EN" xml:lang="EN" xml:lang="EN"><span><span>Connect With A ĒļæūŹÓʵɫ Partner Today to Help Prevent Cybersecurity Attacks</span></span></span></strong></span></span></span></span></span></span></h4> <p><span><span><span><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>ĒļæūŹÓʵɫ is partnered with thousands of Managed Service Providers who can help you get to the root of your most common security vulnerabilities and offer their top choices for the tools you need to properly patch up any gaps. You can connect with </span></span><a href="/partners/find-a-partner" rel="nofollow"><span><span>a local IT partner in our network</span></span></a><span lang="EN" xml:lang="EN" xml:lang="EN"><span> to help with network security.</span></span><a href="/request-demo" rel="nofollow"> </a></span></span></span></span></span></span></p> <a href="/resources/blog/secure-modern-workplace" hreflang="en">Secure Modern Workplace</a> Fri, 17 Dec 2021 21:45:22 +0000 admin 503 at A rundown of backup recovery and data loss /resources/blog/backup-recovery-data-loss <span>A rundown of backup recovery and data loss</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Fri, 12/17/2021 - 11:14</span> <a href="/taxonomy/term/14" hreflang="en">Backup</a> <a href="/taxonomy/term/10" hreflang="en">ĒļæūŹÓʵɫ</a> <article><img src="/sites/default/files/2021-12/man_illustration.jpg" width="1400" height="700" alt="""" loading="lazy" typeof="foaf:Image" /></article><p><span><span><span><span>As a business owner, knowing how to protect your digital data is a must when it comes to avoiding disruption to your business. Your business's essential data may be on a device that can get damaged, and data that is stored online may be accidentally deleted. Fortunately,<a href="/resources/blog/august-2021/what-robust-data-backup-strategy-looks-practice" rel="nofollow"> </a><a href="/resources/blog/august-2021/what-robust-data-backup-strategy-looks-practice" rel="nofollow"><span>data backup and recovery services</span></a> make getting your data back if something happens to it easier than you might think. Here is an overview of what data backup and recovery typically look like and how they can benefit your business! </span></span></span></span></p> <h2><span><span><span><span><span><span><strong><span lang="EN" xml:lang="EN" xml:lang="EN"><span><span>What Is Data Backup and Recovery? </span></span></span></strong></span></span></span></span></span></span></h2> <p><span><span><span><span>Data backup and recovery describe the steps business owners can take to make sure they still have access to their digital assets, files, and other data in case something were to happen to the original version. Data that has been properly backed up in advance can usually be recovered if it is accidentally deleted, your device is damaged, or your business becomes the target of a cyber attack. </span></span></span></span></p> <h2><span><span><span><span><span><span><strong><span lang="EN" xml:lang="EN" xml:lang="EN"><span><span>Difference Between Backup and Recovery</span></span></span></strong></span></span></span></span></span></span></h2> <p><span><span><span><span>Data backup and recovery are two closely related concepts, but they are not exactly the same thing. Data backup is a preventative measure that should be taken long before you experience data loss or other problems with your data, while recovery is the process of getting your data back after a problem occurs. Properly backing up your data is an important step in making sure that you are able to recover it if you need to, as the process cannot be done in reverse if data that has not been adequately backed up is lost. </span></span></span></span></p> <h2><span><span><span><span><span><span><strong><span lang="EN" xml:lang="EN" xml:lang="EN"><span><span>Types of Backups</span></span></span></strong></span></span></span></span></span></span></h2> <p><span><span><span><span>Your business has several options when it comes to backing up your data. Although you will need to begin by performing a full backup, incremental and differential backups tend to be more efficient options for backing up new data. </span></span></span></span></p> <h3><span><span><span><span><span><span><strong><span lang="EN" xml:lang="EN" xml:lang="EN"><span><span>Full Backups</span></span></span></strong></span></span></span></span></span></span></h3> <p><span><span><span><span>A full backup creates an extra copy of all the data on your system. This type of backup is the most thorough, and it is an essential starting point when backing up your system for the first time. However, it is usually not the best choice for adding new data once the majority of your information has already been backed up because it is a very time-consuming process that typically takes many hours or even days to complete.Ā Ā  </span></span></span></span></p> <h3><span><span><span><span><span><span><strong><span lang="EN" xml:lang="EN" xml:lang="EN"><span><span>Incremental Backups</span></span></span></strong></span></span></span></span></span></span></h3> <p><span><span><span><span>Under most circumstances, incremental backups are a better option when it comes to backing up new data. Because you do not need to back up your entire system over and over, selecting this option allows you to only create a copy of new files or other types of data that have not yet been backed up. As long as you have done at least one full backup in the past, an incremental backup is a faster and more efficient option for making sure you have a backup copy of all the files you need. </span></span></span></span></p> <h3><span><span><span><span><span><span><strong><span lang="EN" xml:lang="EN" xml:lang="EN"><span><span>Differential Backups</span></span></span></strong></span></span></span></span></span></span></h3> <p><span><span><span><span>Differential backups fall in between full backups and incremental backups. Like incremental backups, they only affect some of your data, but they use your most recent full backup as a starting point instead of your most recent incremental backup. </span></span></span></span></p> <h2><span><span><span><span><span><span><strong><span lang="EN" xml:lang="EN" xml:lang="EN"><span><span>Types of Recovery</span></span></span></strong></span></span></span></span></span></span></h2> <p><span><span><span><span>There are also several types of data recovery methods to choose from, some of which can work better for certain types of data failure than others. Some of the most common types of data recovery include granular recovery, instant mass restoration, volume recovery, virtual machine disk recovery (VMDK recovery), bare machine recovery, and instant volume mounts. Assuming your data was backed up properly before its failure, you can choose which type of recovery is the best fit for the type of data you lost and what problem caused it to disappear. </span></span></span></span></p> <h2><span><span><span><span><span><span><strong><span lang="EN" xml:lang="EN" xml:lang="EN"><span><span>Importance of Backup and Recovery</span></span></span></strong></span></span></span></span></span></span></h2> <p><span><span><span><span>Here are several reasons why considering data backup and recovery before you need them is essential when it comes to protecting your business! </span></span></span></span></p> <h3><span><span><span><span><span><span><strong><span lang="EN" xml:lang="EN" xml:lang="EN"><span><span>Your Data Is Essential to the Operations of Your Business</span></span></span></strong></span></span></span></span></span></span></h3> <p><span><span><span><span>Digital data security has quickly become a far bigger concern for many businesses than it was even a decade ago, although it has been an important consideration for as long as it has been used for business purposes. Your business likely relies on a wide range of categories of digital data to function normally on a daily basis, and abruptly losing access to that data can hinder your business from accomplishing as much as it should. For this reason, taking steps to ensure the overall security of your data is a must when it comes to keeping your business up and running. </span></span></span></span></p> <h3><span><span><span><span><span><span><strong><span lang="EN" xml:lang="EN" xml:lang="EN"><span><span>No Business Is Immune to Data Loss</span></span></span></strong></span></span></span></span></span></span></h3> <p><span><span><span><span>No matter how strong your security measures are, your business's devices and programs can fail or experience a cyber attack. Laptops can wear out and no longer turn on, files can become corrupted and unable to be opened, human error can cause you or an employee to accidentally delete data, and your business may become the target of a r<a href="/resources/blog/what-is-ransomware" rel="nofollow"><span>ansomware attack</span></a> or other cyber security concern. Although your IT team should certainly take steps to reduce the likelihood of these problems, it is impossible to guarantee that they will not cause your data to disappear.Ā  </span></span></span></span></p> <h3><span><span><span><span><span><span><strong><span lang="EN" xml:lang="EN" xml:lang="EN"><span><span>Ramifications of Not Backing Up Your Data</span></span></span></strong></span></span></span></span></span></span></h3> <p><span><span><span><span>Although it is understandable that your quest to find ways to save time and money for your business may not automatically include investing time and money in data backup and recovery programs that you may never need to use, it is important to carefully consider the<a href="/resources/blog/october-2021/should-you-backup-your-cloud-communications-and-apps-answer-yes-and" rel="nofollow"> </a><a href="/resources/blog/october-2021/should-you-backup-your-cloud-communications-and-apps-answer-yes-and" rel="nofollow"><span>ramifications</span></a> of cutting corners in an area that has the potential to cause extreme financial losses and productivity setbacks if something happens and your data cannot be recovered.</span></span></span></span></p> <p><span><span><span><span>Cyber criminals are becoming more sophisticated even as cyber security programs become stronger, and banking on never experiencing a cyber attack because you are taking precautions could be catastrophic for your business. Simple human error, such as accidental deletion, can also destroy hours, weeks, or even years' worth of hard work.Ā  </span></span></span></span></p> <p><span><span><span><span>At ĒļæūŹÓʵɫ, we prioritize helping our clients take steps to avoid the damage that data loss can do to their businesses.<a href="/request-demo" rel="nofollow"> </a><a href="/request-demo" rel="nofollow"><span>Contact us today</span></a> to learn more about how we can help you take steps to protect your data from a wide range of potential losses or to get started! </span></span></span></span></p> <a href="/resources/blog/secure-modern-workplace" hreflang="en">Secure Modern Workplace</a> Fri, 17 Dec 2021 17:14:30 +0000 admin 507 at The Email Security Dictionary /resources/blog/email-security-dictionary <span>The Email Security Dictionary</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Mon, 12/13/2021 - 16:13</span> <a href="/taxonomy/term/12" hreflang="en">Email Security</a> <a href="/taxonomy/term/10" hreflang="en">ĒļæūŹÓʵɫ</a> <article><img src="/sites/default/files/2021-12/MSP%20Security%20Best%20Practices%20%284%29.png" width="2240" height="1260" alt="arrows and dictionary image and text that reads The Email Security Dictionary Common Terms You Should Know" loading="lazy" typeof="foaf:Image" /></article><p><span lang="EN" xml:lang="EN" xml:lang="EN">The world of email security contains all kinds of terms that are not often understood intuitively without a clear definition. For this reason, we have created a comprehensive email security dictionary to help you and your team understand the most important cyber security definitions, which will ultimately help you keep your company's data and information safe. </span></p> <p><span lang="EN" xml:lang="EN" xml:lang="EN">This guide is broken up into two categories: email security acronyms and good old-fashioned cyber security words or phrases.</span></p> <h2><strong><span lang="EN" xml:lang="EN" xml:lang="EN">Email Security Acronyms You Need to Know</span></strong></h2> <p><span lang="EN" xml:lang="EN" xml:lang="EN">Email security terms often consist of acronyms, which are sometimes referred to as cyber security alphabet soup. Here are the most important ones for you to be aware of:</span></p> <h3><strong><span lang="EN" xml:lang="EN" xml:lang="EN">2FA: 2 Factor Authentication</span></strong></h3> <p><span lang="EN" xml:lang="EN" xml:lang="EN">2FA, also known as MFA (multi-factor authentication), refers to the requirement of a password and tangible authentication system, often a confirmation code sent to a cellphone, to allow access to private online accounts or computer systems. These prevent immediate access by hackers to private data and accounts, even if the password has been compromised. </span></p> <h3><strong><span lang="EN" xml:lang="EN" xml:lang="EN">APT: Advanced Persistent Threat</span></strong></h3> <p><span lang="EN" xml:lang="EN" xml:lang="EN">An APT is a cyber attack against a network that is systematic and uses multiple tactics in an attempt to overload existing security measures over time. Hackers using APTs often attempt to infiltrate numerous platforms, and breaking into email accounts is one of the most common methods. Basic security strategies are usually not enough to stop these kinds of attacks, though more<a href="/products/email-threat-protection" rel="nofollow"><span> </span></a><a href="/products/email-threat-protection" rel="nofollow"><span>advanced security measures</span></a> can slow them down or prevent them altogether.</span></p> <p><span lang="EN" xml:lang="EN" xml:lang="EN">Note: this acronym is not to be confused with ATP (Advanced Threat Protection) </span></p> <p><strong><span lang="EN" xml:lang="EN" xml:lang="EN">DKIM: DomainKeys Identified Mail</span></strong></p> <p><span lang="EN" xml:lang="EN" xml:lang="EN"><a href="https://www.gov.uk/government/publications/email-security-standards/domainkeys-identified-mail-dkim" rel="nofollow"><span>DKIM</span></a><u><span> </span></u>is a helpful email security measure that ensures messages are not altered during transit from the sender to the receiver. It provides the email with a private key while it exits the outbox, and the recipient's inbox uses the organization's public key to verify the sender and that the message was not altered. This security measure is essential for preventing email spoofing attacks. </span></p> <h3><strong><span lang="EN" xml:lang="EN" xml:lang="EN">IMAP: Internet Message Access Protocol</span></strong></h3> <p><span lang="EN" xml:lang="EN" xml:lang="EN">IMAP allows users and email clients to access their messages from multiple devices on the internet. This is what enables people to check their email on their phone, computer, tablet, or other devices, and the email client usually leaves messages on the server until the user deletes them. Nearly all email clients use IMAP to allow widespread email access. </span></p> <h3><strong><span lang="EN" xml:lang="EN" xml:lang="EN">MTA: Mail Transfer Agent</span></strong></h3> <p><span lang="EN" xml:lang="EN" xml:lang="EN">MTAs are the software that actually performs the transfer of emails from one computer to another. It receives emails from other users, and forwards them to its intended recipient. Microsoft Exchange is an example of an MTA.</span></p> <h3><strong><span lang="EN" xml:lang="EN" xml:lang="EN">PKI: Public Key Infrastructure</span></strong></h3> <p><span lang="EN" xml:lang="EN" xml:lang="EN"><a href="https://www.fedidcard.gov/faq/what-pki-public-key-infrastructure-and-why-do-i-need-it" rel="nofollow"><span>PKIs are protocols</span></a> that help<a href="/products/secure-file-share" rel="nofollow"><span> </span></a><a href="/products/secure-file-share" rel="nofollow"><span>data transfer securely</span></a> over networks with digital certificates that are issued and managed with public-key encryption. A PKI consists of policies, procedures, hardware, software, and so much more. </span></p> <h2><strong><span lang="EN" xml:lang="EN" xml:lang="EN">Email Security Words or Phrases to Be Aware of</span></strong></h2> <p><span lang="EN" xml:lang="EN" xml:lang="EN">Aside from acronyms, email security is also full of terms that may seem more intuitive, but might actually not mean what many people believe they do. Here is some clarification about important email security words or phrases:</span></p> <h3><strong><span lang="EN" xml:lang="EN" xml:lang="EN">Encryption</span></strong></h3> <p><span lang="EN" xml:lang="EN" xml:lang="EN">Encryption usually involves emails sent from one user to another getting scrambled until they are incomprehensible, only to be reassembled with the use of a key. There are several different types of encryption, but<a href="/products/email-encryption" rel="nofollow"><span> </span></a><a href="/products/email-encryption" rel="nofollow"><span>email encryption</span></a> is helpful for keeping emails safe from prying eyes while they are sent, transferred, and received. Every organization should have, at the very least, an email encryption system in place to prevent hacks and data loss. </span></p> <h3><strong><span lang="EN" xml:lang="EN" xml:lang="EN">Data Loss Prevention </span></strong></h3> <p><span lang="EN" xml:lang="EN" xml:lang="EN">Data loss prevention is the proactive efforts by an organization to detect and dismantle security threats and violations before they result in compromised accounts and data loss. Data loss prevention policies often include practices for using, storing, and transferring sensitive data in a safe in secure way to protect employees and clients. </span></p> <h3><strong><span lang="EN" xml:lang="EN" xml:lang="EN">Phishing</span></strong></h3> <p><span lang="EN" xml:lang="EN" xml:lang="EN">Phishing is a common method hackers use to obtain sensitive information and data. Most often, phishing attacks consist of email messages that seem legitimate, but trick recipients into clicking links or replying with private data like login information or passwords. Phishing attacks have gotten more advanced in recent years, and they can result in devastating losses for your organization. </span></p> <h3><strong><span lang="EN" xml:lang="EN" xml:lang="EN">Public Key Cryptography</span></strong></h3> <p><span lang="EN" xml:lang="EN" xml:lang="EN"><a href="https://csrc.nist.gov/glossary/term/public_key_cryptography" rel="nofollow"><span>Public key cryptographies</span></a> are any systems that use both public and private keys within a network to protect messages. Public keys are held by all users within a network, while private ones are held only by an individual. Some encryption methods use public keys to allow the sender to send their message, while the intended recipient is the only one who can access the message because of their private key. </span></p> <h3><strong><span lang="EN" xml:lang="EN" xml:lang="EN">Ransomware Attacks</span></strong></h3> <p><span lang="EN" xml:lang="EN" xml:lang="EN">Ransomware attacks encrypt files on a device, which makes them unreadable and unusable. Attackers who carry out ransomware attacks often target government agencies or large corporations and demand money in exchange for decryption. Ransomware attacks are often activated when users open an attachment from a bad actor that compromises their files and data. </span></p> <h3><strong><span lang="EN" xml:lang="EN" xml:lang="EN">Spoofing</span></strong></h3> <p><span lang="EN" xml:lang="EN" xml:lang="EN">Spoofing is a cyber attack where hackers use fake information that seems legitimate, such as email addresses or domain names, to get users to divulge important information. Some companies have suffered spoofing attacks where employees received instructions to wire money to illegitimate accounts from an email address that appeared to be a higher up in the company. Less advanced spoofing attacks are easy to spot, but many hackers use surprisingly complex techniques to make it difficult for users to differentiate the legitimate from the illegitimate. </span></p> <h2><strong><span lang="EN" xml:lang="EN" xml:lang="EN">Need More Email Security Assistance? Talk to the Pros at ĒļæūŹÓʵɫ | AppRiver Today! </span></strong></h2> <p><span lang="EN" xml:lang="EN" xml:lang="EN">Now that you have a better understanding of important email security terms, you will be better able to understand and implement basic cybersecurity measures in your own life and organization. Even still, your company will likely still have email security vulnerabilities that can result in compromised data and financial losses. </span></p> <p><span lang="EN" xml:lang="EN" xml:lang="EN">Fortunately, the email security professionals at ĒļæūŹÓʵɫ have the knowledge and experience they need to help your organization devise a comprehensive email security plan. To learn more about how ĒļæūŹÓʵɫ can get your company off on the right email security foot, please<a href="/request-demo" rel="nofollow"><span> </span></a><a href="/request-demo" rel="nofollow"><span>contact us</span></a> today! </span></p> <a href="/resources/blog/secure-modern-workplace" hreflang="en">Secure Modern Workplace</a> Mon, 13 Dec 2021 22:13:55 +0000 admin 498 at