I recently wrote a blog post about how to spot a phishing attack (read it here), and also incorporated some of the content in a webinar we did with Precursor Security which showed how easy it is to was to compromise a Microsoft 365 account (watch it here). In both I mentioned that if you had a sufficient Email Security Gateway in place then it should help to catch and block phishing attempts. Here I will go into more detail about what an Email Security Gateway is, and what it can do for you.
What is it?
An Email Security Gateway is effectively a security barrier between your email solution and the outside world. It has visibility of all emails sent / received and interrogates them looking for malicious content.
How does it work?
When an Email Security Gateway is put in place, the MX records for your email domain are changed to the servers of your chosen provider. This then points all email traffic to your chosen solution which will then forward the email traffic to your email servers after interrogating them. Connectors are also configured within your email solution to allow mailflow to and from the Email Security Gateway.
How does it protect you?
Traditionally, an Email Security Gateway would be hosted on-premises scan an email’s attachments for viruses and that would be that. These days an Email Security Gateway is based in the cloud and will protect you against much more. Here are just a few of the attack types that a competent solution will prevent:
Denial of Service (relevant to on-premises email servers)
Malicious links in emails
Email account takeover
Low reputation senders
Some numbers for you…
91% of cyberattacks start with an email
85% of organisations were hit by a phishing attack in 2020
1 in 7 organisations experienced an account takeover in 2020
$200,000 is the average ransom fee paid in 2020
“But I am using Microsoft 365 which has built in protection”
While technically this is true, the Microsoft Defender for Office 365 product requires a license uplift to get only some of the comparable features that a dedicated Email Security Gateway would provide. Being a dedicated solution, a 3rd party product would sanitise email traffic before it even hits Microsoft 365 and provides protection against more threats than Microsoft. Additionally, in independent tests Microsoft 365 ATP tends to perform poorly against the competition (full test here):
An Email Security Gateway would also provide an Email Continuity solution should the Microsoft 365 email servers ever go down (which they have done in the past). See a brief diagram from Barracuda on how this would work:
Email servers working
Email Servers NOT working – Barracuda’s Email Continuity service takes over
What do we recommend?
Planet IT recommends a capable 3rd party Email Security Gateway like Barracuda or Mimecast to protect your business against email threats, as both solutions provide all the tools and protection you need to keep your organisation safe.
If you would like to discuss further how Planet IT can help you secure your email environment and protect your users from scams like the above email, please get in touch via DM or email firstname.lastname@example.org.
My name is Adam, and I am a security-focused Technical Architect. My job is to provide expert advice on security solutions and assist our customers with protecting their environment from viruses, ransomware, and other nasty attack vectors! My background is in Security as a Service, Infrastructure and Helpdesk Support; I keep myself up to date with the latest threats and security products, so you don’t have to! Want to hear more of my thoughts on Cybersecurity and other technology news? Connect with me on LinkedIn
https://www.planet-it.net/wp-content/uploads/2022/06/Email-Security-Gateway-01.png6281200Adam Harrisonhttps://www.planet-it.net/wp-content/uploads/2020/07/pitheaderlogo-margin.pngAdam Harrison2022-06-27 10:41:362022-06-27 10:41:36Email Security Gateway – What is it and why should you have one in place?
Cyber Essentials is an effective, government-backed and industry-supported scheme to help organisations protect themselves against common online threats.
Cyber-attacks come in many shapes and sizes, but the vast majority are very basic in nature, carried out by relatively unskilled individuals. They’re the digital equivalent of a thief trying your front door to see if it’s unlocked. Cyber Essentials looks to guide you to better understand these threats and help to keep that metaphorical front door firmly shut.
What are the differences between different Cyber Essentials Accreditations?
There are two levels of Certification: Cyber Essentials Basic and Cyber Essentials Plus, which I have expanded on in some more detail below to help you decide what’s right for you and your business.
Fundamentally the Cyber Essentials framework was designed to provide a security baseline for every business in every industry against the following 5 key areas:
Firewalls and routers
What’s new to Cyber Essentials for 2022?
Due to the COVID-19 global pandemic, businesses operational models have drastically changed and adapted over a relatively short amount of time.
To continue operating, most businesses were forced to adopt a fully digital model and allow remote or hybrid working. This transformation and rapid adoption of cloud services that has prompted these changes to the existing Cyber Essentials scheme to ensure organisations uphold the basic level of cyber resilience which reflect the current working environments and cyber security risks.
Some of the key updates to Cyber Essentials will specifically cover changes to cloud services and web applications, bring your own device (BYOD), and security updates including password management and multi-factor authentication (MFA). Other changes include, but are not limited to the below:
Some questions have been expanded upon with more details needed in your answer.
Cloud services are now in scope of your basic and Plus assessments.
The Cyber Essentials Plus test will include local admin rights checks and a MFA test for each workstation tested.
The Two Levels Certification
Cyber Essentials Basic is obtained by completing and independently verified Self-Assessment. This option gives you protection against a wide variety of the most common cyber-attacks. This is important because vulnerability to basic attacks can mark you out as target for more in-depth unwanted attention from cyber criminals.
Certification gives you peace of mind that your defences will protect against most common cyber-attacks simply because these attacks are looking for targets which do not have the Cyber Essentials technical controls in place
Cyber Essentials Plus is a little more involved and to achieve Cyber Essentials Plus, a business must also first complete the online Cyber Essentials assessment as part of the Cyber Essentials Plus certification or have received the basic Cyber Essentials certification a maximum of 90 days prior to applying for the Cyber Essentials Plus
Unlike the Self-Assessment method for the basic certification, a hands-on technical verification is required to be carried out. Similarly, however, a qualified assessor examines the same five controls, testing that they work through a technical audit.
Another benefit of a Cyber Essentials plus certification includes automatic cyber liability insurance for any UK organisation who certifies their whole organisation and have less than £20m annual turnover.
So, is it Essential?
The threat landscape to businesses is changing rapidly, with modern working practices always evolving. More and more businesses and IT professionals placing a higher level of emphasis on the security strategy, and this is where the new changes to Cyber Essentials, will help to strengthen businesses overall cyber security stance.
Not only is Cyber Essentials cost-effective and easy to implement but it will ensure businesses deter hackers from targeting their infrastructure once the necessary Cyber Essentials technical controls are in place.
You will also give your customers and partners the reassurance that you are working to secure your IT against cyber-attacks. In an ever-competitive landscape these certifications will also display the emphasis your business is placing on security and may even help attract new business with the knowledge of these cyber security measures in place.
If you would like to discuss with myself or any of the Technical Architecture team at Planet IT about how you can get ready for a Cyber Essentials certification you can reach us using the contact details below.
A phishing attack is sending emails that appear to be from trusted sources to gain personal information, deliver malicious payloads, or compromise account credentials. Phishing attacks are usually transmitted to many email addresses. The contents are not specific to the receiving user and are generally along the lines of “Your Netflix account has been locked, CLICK HERE to unlock” or similar.
What is spear-phishing?
Spear Phishing is a method of cyber-attack that tries to convince users to provide access or information by pretending to be someone important who is in some way relatable to the targeted user. CEOs are a common vector of attack, as is a potentially lucrative new client. These attempts influence the recipient to do something such as transfer money or buy Amazon / Google Play vouchers.
I received this email on my account not too long ago and thought I would use it as an excellent example of a phishing attempt. At first glance, you can see why people would think it is genuine:
But let’s look a little closer. Notice the sender email is using the @msn.com domain, suggesting that this is a free Microsoft email account that has been set up for this purpose:
If we hover over the Confirm Your Email Address link, you will see it wants to take you somewhere that is NOT Microsoft:
If we click the link, we can see that the site we are forwarded to does not look professional at all:
As expected, a login box to steal your credentials:
Also, note that the tone of the email is assertive and trying to portray urgency. Even though it is the first you have heard of it, according to the email, you absolutely MUST click the link within 48 hours to make sure you keep your account. Many people don’t even log into their emails every 48 hours, so this is a ridiculous request.
Finally, the grammar is not good and certainly not what you would expect from an official email from Microsoft. Spelling and Grammar errors are good indicators of a malicious email. Sometimes they are even included on purpose as the assumption is if you miss them, then you will miss other signs and therefore be more gullible to fraud!
What advice can we give?
If in doubt, don’t click! Hover over links in emails if you are not sure they are from a trusted source. A phishing email may claim to be from a legitimate company. When you click on the link, it may look like the actual website, but double check by hovering over the link and checking the URL.
Never give out personal information online – as a rule, you should never share personal or financially sensitive information over the internet. If you are paying for an item or service, check that the website is secure and the address starts with “HTTPS”.
If the email contains spelling mistakes or has grammatical errors – this could indicate that it is a scam email; people write many phishing emails outside of the UK, so the standard of English is usually not good.
If the email asks you to do something urgent – claiming that your account will be closed unless you submit your details instils a sense of panic, double-check that it is from a natural source.
An unusual attachment – if you receive an unexpected email from a company that contains an attachment, it could include a malicious virus – don’t open it! These generally come in Word / PDF documents claiming to be an invoice or remittance advice but can be anything.
Phishing attacks are one of the most common types of cyber-attacks today. It is so important to keep alert and question any suspicious-looking email that you receive. There are several 3rd party solutions that can help you mitigate this risk:
Email Security Gateway – this sits between your email provider and the outside world, filtering spam, phishing, fraud attempts and other malicious email categories.
Training & Testing – there are several trusted vendors that provide end-user training on how to spot a phishing email, as well as running test campaigns to keep everyone on their toes!
Multi-Factor Authentication – the main aim of a phishing email is to forward you to a fake website and have you enter your credentials, so they are stolen and the account used for malicious activity. If you have MFA enabled on your email accounts (Office 365, for example), even if a user falls for a phishing email and enters their credentials, they cannot be used without the MFA code from a separate device.
If you would like to discuss further how Planet IT can help you secure your email environment and protect your users from scams like the above email, please get in touch via DM or email email@example.com.
My name is Adam, and I am a security-focused Technical Architect. My job is to provide expert advice on security solutions and assist our customers with protecting their environment from viruses, ransomware, and other nasty attack vectors! My background is in Security as a Service, Infrastructure and Helpdesk Support; I keep myself up to date with the latest threats and security products, so you don’t have to! Want to hear more of my thoughts on Cybersecurity and other technology news? Connect with me on LinkedIn: https://www.linkedin.com/in/adam-e-harrison/
https://www.planet-it.net/wp-content/uploads/2022/05/What-is-Phishing-01.png6281200Adam Harrisonhttps://www.planet-it.net/wp-content/uploads/2020/07/pitheaderlogo-margin.pngAdam Harrison2022-05-16 09:48:282022-05-16 09:48:28What is Phishing?
Last week, we hosted a Webinar to ask businesses if their IT department is really ready for a ransomware attack.
Over 50% of businesses will be victim of Ransomware in 2022, and the average bill to rectify an attack, considering downtime, people time, device cost, network cost, lost opportunity, ransom paid, and more… will be over £1.3m!
Did you miss it? Or would you like to watch it again? Well, the good news is that we recorded it and you can check it out here:
Your Questions, Answered.
A sign of a good webinar is the quality of the questions asked at the end. We had too many questions to be able to answer them all in the time allowed so James and Kosta have answered anything we didn’t have time for during the session.
Remember, if you you would like to find out more about Sophos MTR, have any questions around cybersecurity or need advice for your IT team, please reach out to James directly, firstname.lastname@example.org, or call one of the team 01235 433900
What about false positives within Powershell and ps1 files, repositories like PSGet, NuGet etc – these constantly get flagged in our org with Defender Endpoint!
We would suggest if these are trusted internal tools they should be excluded from Scanning based on their HASH values or path. If these are dynamic libraries then in Sophos central we would create a policy for staff allowed to use these system tools and restrict all other user access to these tools.
How much Sophos will be responsible in case of a Ransomware attack?
If your business only has the Sophos Endpoint products, firewalls or email products in the case of an attack Sophos will provide remote support but hold no responsibility as the configuration and management of the platform is the responsibility of the business. However if the MTR service is in use then the business does have a level of protection from Sophos and the remediation services are covered under your contract.
How do we get the board to take cybersecurity seriously? We’ve covered the basics in terms of controls, but anytime I try to increase budget to add additional controls – it gets pushed back.
The best option to get senior management / board to take ownership of cyber security and cyber insurance is to use the scare factor of examples like our cyber victim where all senior management, directors and the board where removed from their posts under gross negligence as part of the work that took place to recover the business. Many of these have struggled to get new roles following the merger of the business because of the legacy association with such a large scale failure.
What are the biggest cybersecurity threats right now?
The biggest threat remains ransomware and this continues to appear in different forms and flavours but ultimately the goal remains the same and that is to disrupt system usage.
Am I spending enough, appropriately on information security-related tools and controls? (Is there a network security or information security tool I should buy?)
There is no golden figure for how much to spend on protection but what you need to do is take a risk based assessment on what protection you have in place and make sure you are covering the full stack and have a solution in place for every risk in the system.
Not convinced that cyber insurance provides any real cover
Cyber Insurance is only going to work for you and your business if you have the right tools in place to protect the business in the first place as with car insurance they wont pay out if you are negligent , it is up to you and your business to make sure you have the correct protection in place.
Who would you recommend in terms of cyber security insurance providers?
We don’t directly recommend providers.
If you have someone in your team who is a disgruntled Employee and may be leaving the company and they leave a logic bomb on your network without you knowing it would Cyber Security Insurance cover this or would it then be void as its happened within your own team? What would be the legal response to this?
This is a very loaded question. In most cases, Cybersecurity Insurance will protect against this provided you have all other requirements in place. If however this disgruntled employee was part of your security team, that may raise questions around your employee vetting process and you may need to lean on your employee terms and conditions, specifically your computer misuse act should you need to follow up with legal proceedings.
Is the standard Sophos Endpoint not enough either?
We would recommend Sophos Intercept X as a minimum for protection in 2022.
Are there any courses that you would recommend for Cyber Security specialisation?
We would recommend you look at CISSP and then anything linked to business solutions you have in place.
Are the MTR team UK based?
Sophos MTR is a global follow the sun team. There is a UK team as part of this but to enable truly 24/7 support this is covered by a global team.
How do we get the board to take cybersecurity seriously? We’ve covered the basics in terms of controls, but anytime I try to increase budget to add additional controls – it gets pushed back.
The best option to get senior management / board to take ownership of cyber security and cyber insurance is to use the scare factor of examples like our cyber victim where all senior management, directors and the board where removed from their posts under gross negligence as part of the work that took place to recover the business. Many of these have struggled to get new roles following the merger of the business because of the legacy association with such a large scale failure
For us, the major deficiency we see today is not with attacks via known end points or servers but the chances of unknown devices being attached to our networks. This is an area which I feel very few companies or vendors are addressing well and cost effectively so I’d love to know if this is an area you guys both Planet and Sophos are investigating/investing in?
There are a number of NAC product’s that have surfaced over the years to try and fill this gap. What we are seeing the the solution for most business now is to terminate all VLAN’s on the firewall and use the synchronised security aspects of the Sophos XGS firewall to remove unwanted network traffic in controlled sectors, with only trusted devices being able to route traffic.
https://www.planet-it.net/wp-content/uploads/2022/04/Ransomware-webianr-Blog-image-01.png6281200James Dellhttps://www.planet-it.net/wp-content/uploads/2020/07/pitheaderlogo-margin.pngJames Dell2022-04-04 14:52:302022-04-04 15:00:02WEBINAR RECAP: Ransomware in the real world. Is your IT Department ready to be attacked?
Cyber-attacks happen and are increasing in frequency. Certain sectors are naturally susceptible to these attacks; banking, government, healthcare, and energy sectors will always be targets due to the nature of what they do. But did you know that the Education sector is also very high up the list?
Around 20% of all educational institutions have been specifically targeted by cyber criminals, and a MASSIVE 83% of UK schools had experienced at least one cyber security incident. There are many other scary statistics that can be quoted, and you would think that with this information being readily available for review, schools and other institutions would take cyber security seriously; you would think wrong.
It’s just not good enough
Here at Planet IT, we have many dealings with the education sector, whether that be providing fully managed support, running security health checks or just the facilitating the procurement of specific classroom hardware, we have seen how vulnerable a lot of school environments are. We talk to schools daily and something that keeps coming up is the widespread use of Microsoft Windows Defender as the sole endpoint security solution. Something else that keeps being apparent on most calls we join is that the on-site IT team are too busy being reactive and fighting fires to spend the time being proactive and looking at the bigger picture.
Microsoft Windows Defender is a consumer-grade antivirus that is native to Windows 10 and comes preconfigured. There is an anti-ransomware element to it, but the testing we have done in the past shows that it is not capable of detecting most live ransomware threats:
So, what should you do?
Well, you should start with an industry-leading endpoint / server security solution such as Sophos Intercept X Advanced which will detect ANY Ransomware attack using the CryptoGuard element (this detects any file encryption attempts and rolls them back using Windows Shadow Copy if any encryption has started by the time it is stopped). This combined with the award-winning Endpoint Protection / Server Protection means that your endpoints and servers would enjoy a very high level of cyber security protection.
With any good security solution should come a good EDR product. EDR stands for Endpoint Detection & Response. This provides additional reporting and threat mitigation tools for your environment.
But does this really happen?
A real-world example that I have seen first-hand – we have a large private school as a customer. They were hit by ransomware which took down some critical file servers AND compromised the backups. With Sophos Intercept X Advanced with XDR (Sophos’ EDR offering), we were able to see that not only did Windows Defender not stop the ransomware from running but didn’t even detect it as a threat.
Also, with the recent Log4j vulnerabilities, and further back the Hafnium vulnerability, XDR was a requirement to investigate customers’ environments to easily check if they were open to attack due to these vulnerabilities. With Hafnium, XDR could report what hosts were vulnerable but also if they had been compromised and the location of the remote consoles that had been deployed by the bad actors. We at Planet IT saw at least 2 instances of Microsoft Exchange servers that had been compromised, and our job was made easier with XDR.
What if my team just don’t have the time to manage XDR.
The downside of adding XDR to Sophos Intercept X Advanced is that you need the resources to respond and investigate detected threats. Sure, Sophos Intercept X Advanced will of course detect and block any threats it comes across, but any advanced solution like this requires the time to configure and monitor to ensure you get the value from the product.
This is where MTR comes in; MTR (or Managed Threat Response) is a managed SOC (Security Operations Centre) provided by Sophos themselves, and will give 24/7 threat detection and activity reporting among many other benefits that are essential for any security conscious educational institution. With the Sophos MTR service, you can focus your time on ensuring your local infrastructure is running well safe in the knowledge that your Sophos environment is being looked after competently.
Planet IT recommends Sophos Intercept X Advanced with XDR and MTR Standard as the minimum level of protection for any educational institution.
For the longest time IT in education has been on a hamster wheel of improvements tied to the yearly capital bids cycle. IT managers rush to get improvement plans and strategy budgets in for their cut off, knowing all too well that 50%+ will be dropped before they even make it to governors. The other 50% won’t make it through the process.
This capital expense programme is built from the necessities of the past. IT infrastructure had typically been the second most expensive item on a schools books after the building itself. No school, college or academy in the past could afford to stretch it’s upgrades over the operational spend of the business unless they committed to long terms lease agreements or payment plans. While good intentioned, these plans often leave the organisation dragging upgrade cycles to 5 years plus rather than their natural 3 years.
With all the changes that 2020 and 2021 have brought, this model has to change, and the main reason for that is the cloud.
The Time For The Cloud Is Now
Now this is not some fantasy of a cloud lead future. This is the reality of a world leaving behind the need for a private datacentre or server room and pushing for the convenience, security and integrity of managed public cloud.
This however leaves a challenge for all of those who are in financial roles in educational establishments. The model of spend once, wait 5 years before investing again, will not and cannot continue to work. Modern IT is mostly based around the per month or per usage model. Think Microsoft 365 and Azure, one is based on your user count or usage count per month and the other is based on the real-world usage of the last 30 days.
But we used to spread the cost..?
Now on legacy, I will grant that you could have purchased Microsoft services on a campus agreement. However, that is asking you to look into your magic 8 ball and hope you guess the right amount of usage for the next 12 months and then pre purchase Azure credits to cover that. This is a massively inefficient approach and misses the key benefit of cloud services – flexibility.
In a real world example you would expect an educational providers usage on a cloud based IaaS (Infrastructure as a service) to look something like:
• September – December (Mild Usage)
• Jan – Mar (High Usage)
• April – July (Diminishing usage as students slowly drop off timetable)
• then late July – Aug (Very low usage)
Now if you are paying for this upfront you need to work out what your average monthly spend should be and then try and guess how much you need to cover this.
This just won’t work, you will either hit your campus agreement renewal needing to pay overages or hit the renewal with hundreds if not thousands of wasted pounds. With Monthly flexible billing you don’t have this issue, you get a bill for what you actually use, now if it’s a critical system you can reserve the instance and gain some savings, but you have the flexibility.
This is a new approach for us. How best to do it?
Back to the question in hand and how does your organisation cover these costs?
Well to start with, your business manager needs to change how IT is funded in the budget. Moving the value that would have been placed on an infrastructure refresh into operational spend. They then need to find a way to increase this pot by 5-15% a year to cover cost increases. Now there is still a need for the capital bid, but these should be used for laptops, switches and firewalls and not servers and server licensing. With this shift IT becomes less of a burden as the spend is predictable and you are not looking at £500k investments every 5 years, but instead £80k a year spend on cloud services.
I often get asked how we work with our education customers to move to the cloud and for me the approach is simple; it’s about understanding. So many business managers have endured years of the CAPEX process and are used to the funding model. What our job is as technical professionals is to illustrate the savings in cooling, powers, facilitates and security that a move to the operational model brings and then work from there to deliver the best experience for the organisation.
If you are an IT manager today about to enter capital bids season, then think like this; bid for the money for your big server replacement but don’t propose legacy equipment and designs. Engage with Planet IT and we can support you in submitting a CAPEX to OPEX bid a support your move to the cloud.
Need more help to get it right?
2022 will be the year that most businesses make a major jump to the cloud. Don’t allow your educational establishment to be left behind and looking for answers, we have successfully worked with a large number of educational providers over the last 18 years to modernise and improve their IT for the better, we can do that for you too.
If you want to talk to one of our educational team about how we can help you with your capital bids or moving to the cloud, then please call 01235 433900 or you can email email@example.com or if you would like to speak to me directly you can reach out to me via DM or at firstname.lastname@example.org.
https://www.planet-it.net/wp-content/uploads/2022/02/Education-OPEX-Budget-01-01.png6271200James Dellhttps://www.planet-it.net/wp-content/uploads/2020/07/pitheaderlogo-margin.pngJames Dell2022-02-03 10:18:522022-02-03 10:18:52Why the move to an OPEX budget model in education might be driving your business manager up the wall
All the way back in January 2021, I wrote an article about what technology trends would shape your business in 2021. Looking back on those predictions, I can say without a shadow of a doubt that for many of our customers these technologies certainly did just that. If the pandemic continues to rear its ugly head some of what I said last year will still echo very true this year. You can read that article HERE.
However, the show must go on. For 2022 I am looking forward to what the new normal has become and how the technology we leverage every day can and must adapt to fit this need. Alongside this, I am exploring the tools, advancements and innovations that will change the way your business operates.
I always want to take these opportunities at the start of the year, to introduce or to develop your understanding of the technology trends we as a leading IT provider are seeing coming over the horizon. Ultimately these are what your business should and will be looking into and adopting to keep your business is safe, secure and able to compete in today’s busy market.
Here we go again… Another year, another year of the cloud. I may have said this last year, and for that matter the last 2 years before that. Cloud Services, be that in the form of IaaS (Infrastructure as a service), PaaS (Platform as a Service) or SaaS (Software as a service), will change your business in 2022 regardless of if you want to let it.
The reason I say this is because we are no longer in an IT landscape where as a consumer you can choose how to run many of the platforms or software your business uses. Your ERP or MIS, most of these platforms are or have completely moved to SaaS or PaaS offering in 2022.
Take Sage for example, the development of this product as nearly completely killed-off on premise or as a standalone. The focus is on the delivery of the cloud hosted version. That may be with Sage directly or one of their key partners.
The bad news for IT managers who are cloud adverse or cloud sceptical?
Now is time to change your mind and move with the industry or risk getting left behind with systems and solutions that will only age and cause you greater issues down the road.
Continuing on the vain on SaaS, Microsoft continue to also drive services across to Microsoft 365 in favour of the cloud hosted, forever updated version of their tools vs the previous on premise products, I’m looking at your Endpoint Manager (Intune). This product is going from strength to strength. However it is doing so off the back of SCCM and ultimately galvanising the features from this well-established platform but developing them on Microsoft’s Cloud service. This leaves the on premise version to simply hook into the cloud and co-exist rather than get any substantial upgrades itself.
With businesses that implemented cloud services in 2020 and 2021, they saw an decrease in running costs of up to 50% and an increase in uptime and productivity up to 99.99%. This makes the cloud space one that from a CFO point of view cannot be ignored and from the position of the wider business can only make day to day IT services better.
If you take anything from this about Cloud service, let it be this; They are here to stay. They are the key focus for all software vendors and it’s a case of be onboard or be left behind.
A New World for Back-Up and DR
Building off of what I have said above about Cloud Services, the world of back-up and Disaster Recovery is also dramatically changing. This is twofold; you no longer have all your data sat locally on servers, storage and systems, which a local back up can collect and protect. Also, the fact that now, if your data is in a public cloud provider with a 99.99999% uptime guarantee, are you really going to move this data from them to a private datacentre or back to on-premise?
This change is making many businesses have to rip up their back up and DR strategies. For many IT Managers, Business Owners and Businesses, this is causing some hard conversations.
My take on the situation is simple.. Look at what you have now and where your business will be at the end of 2022. If your data is mostly moving to PaaS and SaaS solutions then you need to ensure that as data is moved that each of these providers or systems has a solid separate back up in place. Now for a platform like Microsoft Azure this does not need to be off platform but it needs to be in a different location. So with Azure we would look at Geo Redundancy or even multi-Geo Redundancy leveraging the technologies and services of Microsoft to back up your data to their other datacentres across the globe. If the system is 3rd party hosted like Sage, which I mentioned above, then you need a tool and a location which is away from this provider to store your data. For this I would always recommend looking at AWS, GCP or Microsoft Azure as the level of protection and guarantees you get from these providers is 10 fold that of a private or local storage solution.
If we look at wider IaaS and Infrastructure backup solutions and DR these also need to change. The first thing I will say on this is that tape back up’s are going the way of the dinosaur. (To be honest they should have gone a few years ago). While the logic of having a removable magnetic tape sounds like the right decision for all businesses. In the past few years we have seen that these devices don’t hold up in a DR situation and if they do, they are often too slow to react.
The best solution a business in 2022 can implement is to have an immutable back up in place. This is based on technology and tools that allow for near instant recovery. As we have seen time and time again businesses cannot support multi-hour or day outages in a disaster. Traditional back up technologies and techniques are beginning to leave business’s vulnerable to large periods of downtime in a true disaster situation.
If you are thinking about how your business should be protected in 2022, why not reach out to the team and we can talk you through in detail the cloud era back up approach to support your business.
The Human Firewall
I said it last year and I will say it every year until I go blue in the face! We need to invest as much time into training our staff to ensure they can be safe and secure when using the systems and solutions that as a business we expect them to use. That is why in 2022 The Human Firewall continues to be one of the key areas of development we believe all business should be investing heavily into.
By this we mean training your staff to know what is safe and is not safe in the digital world and how to prevent risks to the business.
Now with this there has never been a one size fits all approach. There is however a logical approach which will prevent your business being open to risks that exist on your doorstep. We can teach our staff in 2022 to stop, deal with and report these problems. By doing this, then we increase the ability of a business to be robust and secure and remove the guesswork from the technology we need to ensure a business is safe. This coupled with MFA massively reduces the risk of account credentials being compromised.
For me as we enter 2022, the Year of the Human Firewall (2021) continues and I am now campaigning for the decade of the Human Firewall! So please go and train your staff and protect your business!
Silicone…. Oh Silicone
For some reason I have left the doom and gloom to last, but it has to be said that what ultimately will shape many businesses in 2022 is the continuing silicone and chip shortages. We are now 2 years into this problem and it is not getting better. We have all felt it. Consumer devices like the PS5 and Xbox Series X which where like gold dust for another Christmas. Servers and Laptops which are still being delayed by months at a time. We will all continue to feel the pain while the chip making industry rushes to fix the supply and demand issue.
As a cautionary tale for 2022, if your organisation is looking at a large refresh or even a big project this year which is time critical, think and act early when it comes to device purchasing.
We have seen wireless access points being delayed by 365 days from certain vendors in 2021. If your new office space or move is critical then this could cause you serious issues. Alongside this you have to think that every business will be in the same boat in 2022 so don’t be the one who gets caught out by lead times. I would also say don’t hold your breath for a new car any time soon as it seems the motor industry, with its love hate relationship with technology providers, has finally realised it’s not good to be at the bottom of the queue!
To stay ahead of the trend…
In conclusion 2022, like 2021 and 2020 before it is going to be a very different year to the 10’s that proceeded it. Cyber criminals and the threat landscape changing everyday, new vulnerabilities and risks appearing on a daily basis, for systems which are integrated in all of our lives and with potentially dramatic effect. However as business owners, technical professionals or employees we need to switch our approach and ensure we are using these changes to make our business ready for this continually changing landscape as we move forward. Think forward, think ahead and don’t get caught out by 2022 as I believe it will be a huge year for IT change.
https://www.planet-it.net/wp-content/uploads/2022/01/Tech-Trends-2022-01.png6291201James Dellhttps://www.planet-it.net/wp-content/uploads/2020/07/pitheaderlogo-margin.pngJames Dell2022-01-05 12:16:412022-01-05 12:23:32The tech that should shape your business in 2022
The Log4j vulnerability is effecting everything from development tools and games like Minecraft to cloud and security devices and even your car. Therefore the question is what do we look for?What is the latest information about keeping you and your business safe?
Firstly, what is Log4J?
Log4J is a flaw in a Java library.
For those reading this who are less technically included, Java is baked into many pre-made applications and used across a number of services. Therefore this vulnerability is prevalent across a number of attack vectors. Because of this it is currently the most talked about and high risk security vulnerability on the market at the moment with everyone scrabbling to patch out the risk.
The library is developed by the open-source Apache Software Foundation and is a key Java-logging framework. As detected in the vulnerability logged as CVE-2021-44228, a remote code execution flaw in Log4J, was already being exploited in the wild. Any system which has the same vulnerability is at serve risk. Warnings have been issued by the UK’s National Cyber Security Centre (NCSC).
What is at risk?
Basically any device which is exposed to the internet is at risk if it is running Apache Log4J versions 2.0 to 2.14.1. Now, the list of applications that have this would fill pages and pages – everything for Minecraft servers to Tesla’s car OS, with companies like Apple and Amazon also being pulled into the mix. Because of the way that Apache package software this vulnerability as per the NCSC notes, can also be found in anything running Apache Struts2, Solr, Druid, Flink, and Swift frameworks. With AWS having detected and working to patch the vulnerability currently, pushing mitigation protections via its CloudFront service.
Vendors with popular products known to be still vulnerable include Atlassian, Amazon, Microsoft Azure, Cisco, Commvault, ESRI, Exact, Fortinet, JetBrains, Nelson, Nutanix, OpenMRS, Oracle, Red Hat, Splunk, Soft, and VMware. And this list will continue to grow as product try to patch out the issue and make it known they have the vulnerability.
What can I do right now?
Because there is currently no direct patch for this, the best option is possible is to Airgap any system that is using or known to have Apache components or frameworks as part of its services from the internet. If you can’t do this then get a Web Application Firewall in place in front of any public facing system as it is very likely that these players will be able to provide WAF rule sets quicker than Apache can get a new version of Log4j tested and out into the wild.
As soon as a patch is available, get your Apache systems patched and up to date and ensure that you check all of your systems, as many IT administration tools install parts of the Apache framework for running web front ends or even systems of management and control for your devices.
The best action you can take as an IT system owner is to review anything you have that is publicly facing or publicly accessible. You need to take action now as this attack does allow the system to have complete control taken over by the attacker and it is not yet known how other defence tools are responding to this infiltration as the Java libraries are normally a trusted location and as such can leave a business open to attack.
If you are concerned about the security of your business then I implore you to call Planet IT today. One of our security specialists will be able to join you on a call and discuss the mitigation actions you can take and advise you of the best way to ensure your business is protected.
If you would like to discuss with myself or any of the cyber security team at Planet IT about how you can better protect you business, should that be with new technology, strategies or even better back ups you can reach us using the contact details below;
https://www.planet-it.net/wp-content/uploads/2021/12/Log4J-01.jpg6281200James Dellhttps://www.planet-it.net/wp-content/uploads/2020/07/pitheaderlogo-margin.pngJames Dell2021-12-14 09:41:112021-12-14 09:41:11Log4J Zero-Day Flaw – Are you are risk? And How Do you Protect Yourself?
Just over a year ago, I sat down to write a technology review of 2020. We had just seen the single biggest transformation that had happened to global businesses in the last 20 years!
The digital acceleration forced upon businesses as COVID-19 hit and government lockdowns continued changed the way that businesses needed to operate. Those who had failed to invest in their IT systems very quickly came unstuck. Businesses looked at their IT teams and demanded their systems be brought up to date.
(If you missed it, you can still read last year’s article HERE)
Entering 2021, I knew it was going to be the year of the cloud, and it very much has proven to be. The global silicone shortages impacting chip production alone assured this. For many business the only choice has to been to go to public cloud and leave the traditional on-premise infrastructure behind. Because of this, and what has turned into a challenging year for different, but somewhat the same reasons as 2020, here is my list of the 2021 winners and losers…
Both Microsoft and Amazon have this year continued to gather businesses in their ever growing datacenters. This proves that business are finally coming around to the fact that some things can be done better if you let the industry giants do it. I have long believed the future was public cloud. 2020 proved this point with 2021 then accelerating this at a rate that was far beyond anything we thought possible. Business who were steadfast against the cloud removed barriers to get into Microsoft, Amazons and Google’s systems.
Public cloud will in my option continue to be one of the biggest drivers in 2022, with many businesses having an approach of either on-premise with hybrid cloud or full public cloud in 2022. The focus on compliance and data security by the big three continues to make private cloud a challenge to uptake for many businesses as they struggle to complete with the tools and level of protection that Amazon, Microsoft and Google can invest in. Just remember, when moving to Public Cloud that it is a shared responsibility model!!!
What a difference a year can make! 12 months ago Intel was a shell of its former glory and was looking like a Marvel hero at the end of Infinity War (*Spoolers the hero’s don’t do well in that movie).
With the desktop processor being stuck on an architecture which AMD and Apple had long since surpassed limited to core counts and feeling like it could be a tough 2021 for big blue. Well this all changed with the return of a titan in Pat Gelsinger, after his stint with VMware. Pat returned to put Intel back on the path that he had started them on some 8 years before and successfully accelerated the new chip design out the door.
Dubbed “Alder Lake” the new Intel desktop processor line-up moves away from the traditional design to mirror that of Apple with E and P Cores (Efficiency and Performance). The focus being that E cores can use less power and thus make your laptop battery run for longer. The P cores can be activated to drive the system forward when it needs to complete some heavy compute tasks. These processors were released under the 12-Generation banner and have received praise from across the technology landscape. Windows 11 has specifically taking advantage of the core design and then have shown an experience well above that of the AMD processor with their all power core design.
This has been a good year for Intel and with Pat back in charge, I think we are likely to see them continue to battle Team Red for years to come.
Microsoft Windows 11
Windows 10 will be the last operating system you ever need, said Microsoft in 2015.
Well, 6 years later we are all upgrading to Windows 11, a very well thought-out and great overhaul of the Windows operating system. We now have some of the best features of MacOS and Linux with the trusted platform of Windows 10 providing its core.
I am a massive advocate of Windows 11, even if the naming convention is getting a little stupid (but then they could have called it Windows 21 then we all would have been in a much worse place).
In my review of Windows 11 I warned that early upgrades for business can be risky and that Windows 11 offers some challenges. Well I am glad to say, 3 months on my daily driver still remains on Windows 11 and my home device has even been given the upgrade with no real issues to speak off.
I think Microsoft have placed Windows 11 in a great position to be the operating system for businesses and home users in 2022. Hopefully by the later part of 2022 most devices will have moved from Windows 10 and we will finally see the death of Windows 7 (well, a man can dream right?)
On the exact reverse of the rise of public cloud we continue to see the need for private data center hosting reduce.
Many businesses are asking the question; “what can you do better that AWS, GCP or Azure?”. In the past, this difference was a clear winning feature for private cloud, however as time moves on the realisation that what are ultimately smaller players in the hosting market aren’t able to compete with the uptime, security, financial protection and costs that public cloud offers.
While I still strongly believe there are use cases for private cloud, I think the salesman’s arguments of it being “safer” than the public cloud have all been proven to be subjective and businesses should ultimately choose the best solution for them.
Second year in a row for Apple in this category, and no it’s not Apple Hate!
Apple have been hit pretty hard this year by two factors: the chip shortages and then a lack of interest in the products in a year where many people upgraded midterm.
2020 has seen Apple’s shares drop quite heavily against the backdrop of a lack of device production and thus device sales. Hopefully for Apple this gives them a kick to invent something new or dramatically different in 2022. As the company that coined the phrase “Think Different” it’s about time they did exactly that.
The downturn of on premise infrastructure continued in 2021 with devices being hard to source due to the chip shortage. Add this to the move to the cloud and we can easily see the onsite infrastructure requirement drop down to a new low. However, we expect this to come back with a vengeance in 2022 as kit becomes available and business adjust to a hybrid approach.
Unfortunately for on premise infrastructure this is being held back considerably by the global supply issues and less so by peoples want for the technology.
There has been many more winners this year, with business firing on all cylinders in 2021. However, we have also seen that this year some of the losers have taken a much bigger hit than expected.
I think the major take away for 2022 is that the IT landscape was changed by 2020 in a major way. The needs and wants of business have adjusted and now, as IT professionals, we need to fit around the needs of 2022 and onwards and stop looking to legacy for the solutions.
Whatever 2022 brings I am excited to be at the forefront of matching our customers to the latest and greatest technical solutions.
https://www.planet-it.net/wp-content/uploads/2021/12/TEch-2021-Winners-vs-Losers-01-1.png6281201James Dellhttps://www.planet-it.net/wp-content/uploads/2020/07/pitheaderlogo-margin.pngJames Dell2021-12-13 18:02:132021-12-13 18:02:132021 – The Big Technology Winners & Losers
You won’t believe this. I tell a lot of business owners and IT Managers that they need to ensure they have a robust, well architected and industry leading anti-virus and anti-ransomware product at the core of any cyber security programme. I am shocked by how many businesses rebuff with “we have never had a virus, so why do we need these products”. Unfortunately this level of naivety is exactly what threat actors are betting on. They are leveraging your lack of belief or understanding in the value of protection to slip onto your system undetected and carry out whatever heinous activity they wish.
“We don’t need protection!”
First of all I must address the elephant in the room; “We have never had a virus“.
The simple question would be, how do you know? Gone is the age of pop-ups and loud annoying virus sent more to disrupt. Modern attacks focus to data extractions, data corruption/encryption or device harnessing. For all of these, bar corruption/encryption, the aim is to remain undetected. For the most part if you are trying to pull data from a device or harness the computer as a salve for your attack network then you don’t want the device owner knowing you are there. Therefore, the argument that you have never had a virus falls over. You should be saying “We have no idea if we have had or have a virus or suffered a cyber-attack as we don’t have the tools to detect such attacks” .
“I barely use that laptop”
Secondly, I need to address the obvious. Any device is at risk regardless of how little you use it, how infrequently it is turned on and how expensive it was when you bought it. This principal also applies to servers, virtual, physical and on cloud platforms. If it is running an operating system based on Windows, Linux, Unix or MacOS there will be an attack out there that is designed for that system. This even applies to appliances provided for dedicated applications like, phone voicemail systems, door access control and system controllers. Because of this, you need to ensure that your servers also have the protection in place and if they cannot have the protection directly installed that you have a product that can protect at network and hypervisor level against incoming attacks.
Therefore it is critical that your business protects itself with the minimum protection being put in place in the form of endpoint security. This said, while you can pick up these products for a few pounds from certain vendors, we would always recommend looking at a industry leading vendor. Choose one who specifically work within your business space and have the full suite of tools that can be used. This will help ensure that you reduce the risk your business faces from cyber threats.
If you would like to discuss with myself or any of the cyber security team at Planet IT about how you can better protect your business, should that be with new technology, strategies or even better backups you can reach us using the contact details below;
Contact me at – LinkedIn Message James Dell or Email : email@example.com
https://www.planet-it.net/wp-content/uploads/2021/12/Endpoint-protection-01.jpg6241200James Dellhttps://www.planet-it.net/wp-content/uploads/2020/07/pitheaderlogo-margin.pngJames Dell2021-12-06 14:34:172021-12-06 14:34:17Why Endpoint Protection is still a key line of defence
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.