This week, we hosted a Live Webinar where we outlined the upcoming changes to how Microsoft sell their licences and it affects organisation of all kinds – what Microsoft are calling their New Commerce Experience (NCE).
🚨 As a Microsoft Gold Partner. we were one of the first in the UK to present this. We were so early in fact, that only a couple of short hours after the webinar, Microsoft announced that they will be pushing back the release date for New Commerce Experience from October 14 2021 to January 2022! 🚨
The reality is, that it is still happening. This just gives us a little more time to decide on the licences that best suit your organisation.
So please still watch the webinar recording below. All the information is still key to making the right decision for your business. To ask any specific questions about your situation, reach out to your Planet IT account manager or email firstname.lastname@example.org.
✅ Open licensing is moving to CSP. How will this affect you?
✅ How the Enterprise Agreement resizing will affect you.
✅ How CSP licensing terms are changing.
✅ How these changes effect your existing licensing
Did you miss it? Or would you like to watch it again? Well, the good news is that we recorded it and you can check it out here:
Your Questions, Answered.
We received lots of questions throughout the webinar and did our best to answer them. Watch the recording to see if your questions would be answered at the end, however if you have any more, please reach out to James himself on 01235 433900 or email directly: email@example.com.
Remember to ask him about our Microsoft 365 health Checks!
https://www.planet-it.net/wp-content/uploads/2021/10/CSP-Title-2.png6751200James Dellhttps://www.planet-it.net/wp-content/uploads/2020/07/pitheaderlogo-margin.pngJames Dell2021-10-08 11:18:162021-10-08 11:21:39Webinar Recap: Microsoft New Commerce Experience – Big changes are coming!
We are all too aware that the cybersecurity landscape is changing and will continue to change as the technology we use every day continues to adapt, develop, and alter our daily lives.
Put very simply, this trend is clear when you compare your 2010 Honda Civic to the latest release from Tesla; technology is embedded into every corner of our lives and it now even governs your driver safety.
Because of this, the drive to protect business and individuals from threat actors has never been more important. With an ever-shifting set of cybersecurity goalposts becomes the need to understand, adapt and overcome whatever threats may come your way.
As such in this article I am going to take you through five trends we are seeing when looking a cybersecurity and the defence of your IT infrastructure.
1. The Expanding Cyber-Attack Surface
According to cybersecurity ventures, the world will store 200 zettabytes of data by 2025. This data is coming from thousands upon thousands of different sources and a considerable amount of the data is now being driven by IOT and smart technologies.
As I mentioned in my introduction, think of all the data that every Tesla on the road today is generating, the pure volume of telemetry data, decisions, battery health and all the other statistics these mobile computers are generating is staggering. Now think about your smart home, with fridges that can be remotely controlled, lighting, cooling, heating and even garage doors that can triggered from anywhere across the globe, then add into the mix home security systems link Ring Doorbell. All of this sits outside the realm of what for many would have previously considered data that needed to be secured. However, it is easy to see how data like the time you leave your house, the speed you drive and direction you travel, could be of value to a threat actor and even worse could be data they leverage against you.
This however is just to the point, the fact that as businesses are having to daily adjust the scope of what is and is not part of the business attack surface, this leaves the threat actors room to move and the gaps they need to turn your secure system into Swiss cheese.
5 years ago, CCTV may or may not have been the responsibility of the IT department. Today, with digital cloud driven solutions, this firmly sits within a business IT attack surface and is a clear technological risk.
Similarly, take the smart card reader that opens your office doors and your car parking barrier. This is a business attack surface which in the traditional IT model we would have simply been able to ignore. This is no longer the case. It sits on the list which will continue to grow of new areas where CISO, cyber security experts and IT teams in general need to protect.
This trend will of course continue. As IT professionals we must adjust our
security posture and consider how this effects the technologies we use to protect our data and our systems.
There is by no means a golden bullet but there are key markers for success in this area.
2. Ransomware as a Cyber Weapon of Choice
Ransomware has been around for almost two decades and has grown in popularity because it can more easily bring financial rewards to hackers. It is estimated that there are now 124 separate families of ransomware and hackers have become very adept at hiding malicious code.
The reason is that ransomware became a weapon of choice for hackers in the last 18 months was drive by the COVID-19 pandemic. This instantly altered a digital landscape that for many businesses had been slowly changing. In fact, most were stuck to the traditional walled garden of onsite infrastructure and controlled working environments. Now, with the transformation of so many companies and how we operate as a mostly digital, this creates more targets for extortion. According to a research, ransomware increased by 435% in 2020 as compared with 2019.
In 202, the estimated cost of ransomware was £14.5 billion – a rise from £8 billion in 2019 and £5 billion in 2018. That trend will continue to grow.
The likely impact for the near-term future is that there will be more ransomware attacks against institutions and corporations who are less cyber secure and cannot afford to have operations impeded. This includes health care, local governments, and educational institutions. For these sectors the need to adapt and overcome the finical challenges of protecting their businesses has never been more paramount.
3. Increase in adoption of cloud services
Cloud vulnerability continues to be one of the biggest cyber security industry trends. Again, the rapid and widespread adoption of remote working following the pandemic increased the necessity for cloud-based services and infrastructure drastically, with huge security implications for organisations. For many, these implications where not understood or ignored as the business threw themselves into a cloud strategy in sheer panic in 2020.
Don’t get me wrong, cloud services have become essential and offer a range of benefits – scalability, efficiency, and cost savings – but they are also a prime target for attackers.
Misconfigured cloud settings are a significant cause of data breaches and unauthorised access, insecure interfaces, and account hijacking. All of these are avoidable but for many businesses they simply don’t know the vulnerabilities are there. During our webinar series, I often talk about the shared responsibility model. It is key to keeping the door closed to attack but is greatly misunderstood or even ignored by a lot of businesses.
4. Social engineering attacks getting smarter
Social engineering attacks, like phishing, are by no means new threats but have become more troubling amid the widespread remote workforce of the last 18 months. Attackers target individuals connecting to their employer’s network from home because they make easier targets. The attack looks to exploit the weak link in most businesses’ security posture, the end user.
As well as traditional phishing attacks on employees, there has also been an uptick in whaling attacks targeting executive organisational leadership. This trend sees CEO, CFO and other business managers being impersonated to other employees or customers to gain financial details or gain credentials.
SMS phishing – sometimes known as ‘smishing’ – is also gaining prominence, thanks to the popularity of messaging apps such as WhatsApp, Slack, Skype, Signal, WeChat, and others. Attackers use these platforms to try to trick users into downloading malware onto their phones, which for many are now heavily linked to the corporate network be that via email or shared file access. For many businesses, MDM or MAM are technologies they still haven’t invested in.
Organisations are increasing their protection against phishing, but criminals are always looking for new ways to stay ahead. This includes sophisticated phishing kits which target victims differently depending on their location. To stay ahead of these trends, businesses need to ensure their staff understand and can act as the human firewall against these attacks – social engineering is not something that technology alone can protect your business from.
5. The Future, Privacy-enhancing computation techniques.
To change pace slightly now and look less at the trends around attack vectors and how the threat actors are getting in and more around how the cyber security industry is helping us all fight back.
Privacy-enhancing computation (PEC) techniques are emerging that protect data while it’s being used — as opposed to while it’s at rest or in motion.
This marks a dramatic shift in the level of protection we can leverage onto data and how we can continue to work to lock out the threat actors from data at all stages of its life cycle. This technology will also enable secure data processing, sharing, cross-border transfers and analytics, even in untrusted environments.
This technology is rapidly transforming from academic research to real projects delivering real value, enabling new forms of computing, and sharing with reduced risk of data breaches.
I would expect to see these products in your security portfolio in the next 12 months.
With the landscape continuing to move beneath our feet daily, as IT professionals, we need to stay ahead of the trends and ensure that we are looking at what threats are just over the horizon.
No IT team can afford to rest on their laurels as the successes of yesterday will not protect you from the threats of tomorrow.
If any of this is of concern to you, whether you are an IT professional, a business leader or simply have cybersecurity fears, please reach out to me or one of my team and we will be more than happy to assess your situation. We are in this war together, and we can’t let the bad guys win!
https://www.planet-it.net/wp-content/uploads/2021/08/2021-cybersecurity-trends-01.png6281200James Dellhttps://www.planet-it.net/wp-content/uploads/2020/07/pitheaderlogo-margin.pngJames Dell2021-08-25 16:38:162021-08-25 16:38:16Top 5 Cybersecurity Trends So Far This Year
Microsoft has just announced a new “Cloud PC” product where users can stream windows devices from anywhere!
When COVID-19 hit, many people in offices were forced to start working from home. Because of this, Microsoft sped up into the development of Windows 365 so people, wherever and whenever, can work more collaboratively.
Windows 365 will work similarly to what we know as game streaming. The computer will be hosted in a data centre, somewhere remotely, and then streamed to local technology.
This means all sorts of devices from anywhere, ranging from family computers in your home to monitors in the office, that runs Windows desktop can leverage Windows 365 and then you can close the session knowing that your data is safe, secure and saved.
Security Is Key
It is way more secure than working on a local PC, as your local PC is most likely full of personal applications, data and untrustworthy applications, which may go against your business practices. Windows 365 then solves multiple problems such as keeping Word documents and important PDFs where they belong, in business cloud storage, and not at risk of exploitation.
Additionally, Windows 365 will have ultra-fast connections to Azure and Office 365 data, which is very useful when it comes to handling data and finding sufficient ways of sharing workload amongst peers.
Microsoft is marketing it as the new way of using a PC, they want to find a way of demonstrating and solving the difficulties of working from home, so as they state, it is a “hybrid Windows for a hybrid world”.
So when do we get to see it, and how does it work?
The software will launch in August for business customers of all sizes however under the technical covers of it all, it is built on Azure Virtual Desktop and managed through Microsoft Endpoint Manager (MEM), Microsoft’s cloud-hosted device and application management solution and for those without MEM, tools are directly integrated into the Cloud PC portal. A MEM licence is therefore not essential.
Windows will also use multi-factor authentication capabilities and admins can apply security policies using MEM if needed. Furthermore, Microsoft has designed a custom “security baseline” meaning a set of policies can be applied to Windows 365 as a simple baseline, however, you can modify this to fit your criteria.
There are even plans in the future for an offline mode, though this will not be included in the initial release. When that happens, they would then be supporting an offline mode where the whole virtualisation environment can run locally and be isolated from your local operating system. When your connection gets restored then that workload will automatically move back up into the cloud. In the complex cybersecurity environment we have seen, businesses need a solution that helps their employees collaborate, share and create while also keeping their data secure.
If you want further information about Windows 365 and how this could change your business practices, then please feel free to reach out and get in contact using the details below
This article was written by 17 year old Harriet Besford, a Didcot Sixth Form student who joined us at Planet IT for a week’s work experience. Harriet has a keen interest in Cyber Security with plans to study it at University. I think from reading this article, you will agree that she has a strong future in this field!
https://www.planet-it.net/wp-content/uploads/2021/07/Cloug-PC-Hero-01.jpg13092500Harriet Besfordhttps://www.planet-it.net/wp-content/uploads/2020/07/pitheaderlogo-margin.pngHarriet Besford2021-07-15 14:38:112021-07-15 14:51:50Windows 365 – Windows 11 Comes to your Browser!!
For now, we can ignore the fact that Microsoft promised that Windows 10 was the last Windows version…. and all the other misleading info around this new version even existing. Windows 11 is here, and it has LOTS of improvements and design changes.
However, this article is not to talk about those. As Windows users, we all know that the move from OS to OS can be hard. Businesses struggle to get the user base, applications and configuration from your current version of Windows to a new one. It can be a mammoth task!
You won’t have a choice to keep Windows 10
That said we know Microsoft will ultimately force your hand. In 2025 Windows 10 will lose support and join XP and 7 in the list of operating systems people continue to use even though they are not supported or safe.
The big change with Windows 11 is that a number of hardware items that were previously supported with Windows 10 will no longer be supported. This is what drove me to write this article. It means many businesses will need to replace a lot of machines. So, I wanted to highlight the devices you may have that are now on a limited life span, a ticking clock as it were, to the end of support.
The official Windows 11 requirements:
Two Process cores of 1Ghz or higher
4GB of RAM
64GB of Storage
TPM 1.2 or higher with Secure Boot Capabilities
What this therefore means, is that Intel’s i3, i5 and i7 processors from the 6th and 7th get are not eligible to update to Windows 11. While on the AMD side all A and Fx Series processors are not supported. Ryzen 1000 and 2000 chips will also not support Windows 11.
Now this is a big change as Microsoft. In the past they have done their best to only remove a small number of devices from support. This was truefor upgrades to Windows 8, 8.1 and 10 all supporting the same devices which could run Windows 7.
For many this won’t be an issue. But for some education and small businesses, this is going to be a large finical burden. These changes can also hit companies using custom built PC’s which use hardware which may be from cross generations. There’s a chance these will not support the Windows 11 software.
If you are struggling to understand which devices will and won’t accept Windows 11, there is a tool from Microsoft which will tell you in your device is eligible to run the Windows 11 which you can get here: https://aka.ms/GetPCHealthCheckApp
If you would like to discuss with myself or any of the Technical Architecture team at Planet IT about how you can get ready for Windows 11 you can reach us usin:
https://www.planet-it.net/wp-content/uploads/2021/06/hero_animation_poster_4K_Sharpened-scaled.jpeg14402560James Dellhttps://www.planet-it.net/wp-content/uploads/2020/07/pitheaderlogo-margin.pngJames Dell2021-06-28 11:33:432021-06-28 11:35:19Windows 11. Huge Steps Forward, But The Death Of Many Devices
Many organisations pre-COVID, were simply “getting by” with copper variants such as FTTC (fibre to the cabinet) and GEA (generic ethernet access). These were previously adequate for the business requirements of the SME market. However, the epidemic has increased the need for reliable, sizeable, and dedicated managed data circuits.
Accessible to the masses
Historically, ethernet circuits or leased lines (as they are commonly referred to) were deemed cost prohibitive to the masses (unless you were a large corporation). But, they relied heavily on available infrastructure, exchange capacity or location. This is no longer the case. In fact, many rural locations are surprisingly well supported. They are no longer suffering with poor speeds or service restrictions, as a direct consequence of outdated equipment or lack of infrastructure in the exchange.
Currently the UK is undergoing a major fibre roll out utilising underground fibre optic cables to transmit data far quicker and with fewer reliability issues than copper wires. This has resulted in the cost to deploy such services reducing considerably, making ethernet circuits accessible to all, without a high price tag.
Furthermore, many ISP’s will absorb the first £2,800 of ECC’s (excess construction charges) previously passed on to the end user, as these covered the costs to determine the route required to deliver circuits to site.
It’s simple! Just look at the benefits:
Speed: Synchronous dedicated bandwidth (simply put, you get the same speeds up and down)
99% SLA – Faster engineer response and fix
Flex up & down to help cope with peak times and demand.
Real time bandwidth management and reporting
Exchange and Carrier diversity
As an aggregator, Planet IT offer managed ethernet circuits at a price which do not involve a sharp intake of breath, strong coffee, and a seat!
In fact, why not challenge us to beat your price? We are so confident that we will be able to beat your current price, that if we cannot, we’ll buy you lunch!
Best case scenario, you save on your ethernet. Worst case, you eat for free.
https://www.planet-it.net/wp-content/uploads/2021/06/Now-its-time-to-embrace-the-fibre-roll-out-01-1.png13092500Farah Nazir-Chapmanhttps://www.planet-it.net/wp-content/uploads/2020/07/pitheaderlogo-margin.pngFarah Nazir-Chapman2021-06-01 09:31:242021-06-11 11:27:33NOW it’s time to embrace the fibre roll-out!
This week, our panel of special guests came together for an educational virtual round table event. Our panellists discussed the challenges they have faced in their education provider and how as IT professionals, they overcame these challenges.
We also opened the floor up to our selected guests so that the panel could try to help them with their challenges.
Our panel included:
David Higgs, Security and Service Experience Centre Lead at Imperial College London
Mike Pearce, ICT Network Manager at St. Cuthbert’s Roman Catholic Academy Trust
Did you miss it? Or would you like to watch it again? Well, the good news is that we recorded it and you can check it out here:
Remember, if you you have any questions or challenges that you dafe in your Education IT career, then please reach out to James Dell and he would be more than happy to talk you through the solutions he found to any similar obstacles. Call 01235 433900 or email firstname.lastname@example.org
https://www.planet-it.net/wp-content/uploads/2021/05/Education-IT-Social-Image-01.png6281200James Dellhttps://www.planet-it.net/wp-content/uploads/2020/07/pitheaderlogo-margin.pngJames Dell2021-05-28 09:57:492021-05-28 09:57:49Virtual Roundtable Recap: Facing and Overcoming IT Challenges In Education
Internet explorer is finally coming to the end of its long slow walk to its grave. As of the 15th of June 2022, all devices not running an LTSC or Long Terms Servicing Channel version of Windows 10 or Windows Server will lose the application as part of the 15th of June update.
However, this is much larger than many would initially perceive. Many custom-built or 3rd Party applications use the IE framework to deliver content and allow users to interact with their platforms. The removal of internet explorer, which long advertised and overdue, will affect many businesses adversely.
To make your life a little easier there are actions you can complete now to engage the Microsoft Edge support for many of these legacy programs, and to make life easier, you can follow the steps on page 5 and 6 of this document, from Microsoft that will help you make your business Microsoft Edge ready.
Does It Matter?
For many of you, this won’t be an issue, but remember now is the time to be testing this; if you have any application that opens on IE11 session by default on Windows 10 or Windows Server, you need to ensure it runs in Microsoft Edge before the 15th or move the server/ desktop to the long-term servicing channel if you cannot support the application.
As a side note, it is worth noting that Office 365 and all Microsoft services will not support Internet Explorer from the 17th of August in any form, so while you can use IE on LSTC to support custom applications, you will struggle to use the product for anything outside of these products and Microsoft. Many other vendors are moving fast to drop Internet Explorer from their supported browsers lists.
If you have 3rd party applications which rely on Internet Explorer, now is the time to be reaching out to my team at Planet IT to start looking at how you move away as not only is this issue going to become worse but with no updated Internet Explorer is likely to be a source for vulnerabilities we see when scanning people’s networks.
If you want to talk to one of our team about how we can help you move away from Internet Explorer and associated 3rd party applications. Then please call 01235 433900 or you can email email@example.com or if you would like to speak to me directly, you can reach out to me via DM or at firstname.lastname@example.org.
https://www.planet-it.net/wp-content/uploads/2021/05/MicrosoftTeams-image-7.png321845James Dellhttps://www.planet-it.net/wp-content/uploads/2020/07/pitheaderlogo-margin.pngJames Dell2021-05-20 09:51:172021-05-20 09:52:06Internet Explorer is Dead – What you need to do now
There comes a point in the academic year where exams ramp up, teachers, lectures and support staff are focused on getting student’s through their end of year exams and keeping the momentum up until the summer break.
Meanwhile in the cool dark of the server room, the IT Support teams across all academic settings are preparing for the calm before the storm.
This year, while we may not be seeing exams like we previously would, the IT Teams in our educational establishments are preparing for their busiest summer refreshes ever. The woes of 2020 are behind us and the shift to classroom learning returning for 2021/22, the push is on to make the infrastructure improvements that were put off during COVID.
Saying all that, budgets are likely to also be tighter than ever. So how can IT teams get the absolute most out of their IT projects?
To help we have put together 5 top tips for smashing your summer projects in 2021
When it comes to any form of IT project the further ahead you are planning the better chance of success you have, so start early!
Engage vendors and technology partners. Test the market and understand your options. If you are looking 6 months ahead of where you need to be, then when do you have to make the choice on the technology or the vendors you are going to use? Be armed with all the information you need so you can overcome the challenges the project throws at you.
Have a contingency plan
As you begin to plan your project, look at the what if’s…
For example, if you are replacing a server infrastructure, what happens if the new servers fail? Or before you have moved the data, if the old servers fail, do you have a backup? Have you tested it?
By implementing a rock-solid contingency plan you are positioning yourselves in such a way that you can overcome whatever challenges come your way.
Choose a partner you can trust
Remember you are not in this alone.
Whatever the chosen project you are undertaking there are partners who will help you achieve the goals of your organisation. However not all partners are equal. Not all partners have the same approach.
Find a partner who has the certifications and accreditations with the vendors you want to work with, i.e Dell Gold Partner or Microsoft Gold Partner with certified engineers. Don’t settle for “the local firm” as 9 times out of 10 they will get out of their depth very quickly. They’ll can end up making the challenges of delivering IT in education much worse.
So, pick a partner you can trust, and you know when you’re up against it, will have your back!
Only choose best of breed technology and don’t settle for last generation.
Lots of companies see education as an opportunity to move stock which the corporate world no longer wants – for example, servers which are now end of sale or software which has been pushed into its last few operational years.
You should never settle for anything other than the best in breed technology for your establishment. If budgets constrain that, reduce the scope of the project or limit the technology used. Don’t settle for old, refurbished or reconditioned equipment just to hit a financial goal. In the long term, you will pay the price when the equipment cannot be serviced and needs replacing before the business has got the full value from the solution.
Maximise gains using operations leasing
When making purchases in education, you have a great opportunity to access low cost or even free finance offerings for all of your large purchases. So, leverage these deals to extend your budget.
Limit the capex spend and get the best solution you can and prevent the project delays of stretching upgrades over 2-3 years which really need to be done today.
Using these top tips, your organisations should be able to avoid the pitfalls of so many education providers in the past and make sure you take step in the right direction when making your upgrade this summer.
Just remember you are not alone. At Planet IT we have a team of specialists who can not only support you with the decision making and selection of new equipment, but can support with the role out, implementations and upgrades to your systems.
If you want to talk to one of our educational team about how we can help you with your summer projects then please call 01235 433900 or you can email email@example.com or if you would like to speak to me directly you can reach out to me via DM or at firstname.lastname@example.org.
https://www.planet-it.net/wp-content/uploads/2021/05/Blog-image.jpg6281200James Dellhttps://www.planet-it.net/wp-content/uploads/2020/07/pitheaderlogo-margin.pngJames Dell2021-05-11 10:27:402021-05-11 10:27:40Education in Focus: Biggest IT Refresh Year Ever
This week, we hosted a Live Webinar based all around the Uncomfortable Truths about your Backups.
Our resident Backup guru, Michael Davey was joined by Arcserve expert, Steve Butterfield and between them they covered
✅ Microsoft 365 data protection
✅ Immutable storage & Ransomware Protection
✅ How are you storing your data & the 3-2-1 rule
✅ Scaling your infrastructure with Backup & DR
✅ How to combat storage creep
Did you miss it? Or would you like to watch it again? Well, the good news is that we recorded it and you can check it out here:
Your Questions, Answered.
We received lots of questions throughout the webinar. Unfortunately we weren’t able to answer them all during the live session so we have compiled them all and asked Michael and Steve to answer them again.
Remember, if you you would like to find out more about backup in general or speak about your own backups specifically, get in reach out to your Planet IT account manager, call 01235 433900 or email email@example.com
Would cycled tapes not be immutable being out of the drive most of the time?
Tape and especially WORM tape were the original air-gapped / immutable storage
While out of the drive then tapes are largely immutable outside of extremes involving strong magnets, But you do have to put them in the libraries to use them which brings two issues,
1. They are available to be overwritten while in the library.
2. They require manual intervention to remove/replace.
However, definitely a big improvement over no airgap.
What is the licensing model? Is it based upon per user for 365 and per source TB for onsite storage?
Universal licensing which runs on your own hardware or VM covers all data sources including O365 and so is
licensed per TB of protected data, no limits on retention and can be any mix of Physical machines, Virtual machines and O365
Per user licensing is also available and may be of interest if you are adding it to existing Arcserve licensing.
Per user or per TB licensing is available from our cloud (SAS Offering )subject to a max of 100 users per TB for capacity based licensing )
The reason people do Full backups is because incremental backups all depend on the previous ones , isn’t that a disaster waiting to happen with incremental forever ?
Our Incrementals act and restore like Full backups, they do not depend on any other incremental backup therefore one “Broken” incremental affects neither the incremental before or after it.
What is the most common security breach you see that can also impact backups?
I think Michael answered this but a stat for you from Sophos “The state of Ransomware 2021”
37% of the 5400 respondents surveyed were hit by Ransomware in the last year
Ransomware is still the major threat
A pretty bold statement was made “Completely Ransomware Safe” Can you back this claim with something factual?
Like Unsinkable ships, Completely ransomware safe is conditional on the type of attack i.e. Nothing is completely safe if Physical access is allowed for instance , however we believe that our Ransomware capability is the strongest and most complete in the industry and we are the only backup vendor to offer a Money Back Guarantee.
For 0365 backup only do we need an onsite appliance?
You have choice, You can purchase Arcserve UDP and have it protect O365 in the following ways
An Appliance running on Prem or in hosted Colo
Software running on your own hardware, VM or in your own public or private cloud instance
Software as a service running from our Cloud based from our Datacentre in Manchester or AWS in London ( Other Geo’s are available )
While On-Prem may seem an odd choice to some for a cloud based service, do remember the 3-2-1 rule and the fact that even in the event of an Internet or Azure outage you could still access your data locally. The main thing is it is held elsewhere so we would always caution against any service backing up O365 which is hosted in Azure
https://www.planet-it.net/wp-content/uploads/2021/05/Social-Image.png6281200Michael Daveyhttps://www.planet-it.net/wp-content/uploads/2020/07/pitheaderlogo-margin.pngMichael Davey2021-05-04 15:23:372021-05-04 15:26:29Backup Webinar Recap: The Uncomfortable Truths
By now, you should be aware that the modern digital landscape is full of threat actors. That are always looking for any opportunity to find a weakness in a business’s security posture and then leverage this to gain unauthorised access to data for malicious reasons.
To protect against these attacks, we often look at antivirus and anti-ransomware technology and products like MFA or Two-factor authentication. The truth is that MFA is part of much larger protection that can be afforded a system through an approach known as Conditional Access.
How does Conditional Access work?
Conditional Access (CA) is the process of defining entry vectors and criteria; in its most simplistic form, consider CA to be a door that only opens if you are wearing the right clothes, have arrived in the right vehicle, and are holding your ID. In real terms, CA allows a business to define controls around what can be accessed by who, from where and under what circumstances.
I feel that conditional access is an underutilised part of any defence arsenal. This is partly due to a lack of understanding in the IT community about the technology and a misconception about its limitations. These beliefs and options come from a legacy of Software as a Service (SaaS) and on-premises infrastructure being integrated minimally, however with modern SaaS, IaaS, PaaS and on-prem working in a heavily integrated way. Conditional Access allows you to take advantage of the proper protection that can be afforded a system without comprise.
Is it widely used?
All the major SaaS, IaaS and PaaS vendors support conditional access, and an optimum way to deploy the technology is as such.
Limit access to login to Geo Locations that are trusted and used by the business
Allow internal networks or trusted networks to have fast passed authentication
Only allow data access from trusted and complaint enrolled devices
Require MFA in any location that is not inside a trusted network
Remove support for legacy authentication methods
Deploy true Single Sign-on across all platforms and devices
Limit access to the data and services a user needs based on the roles of that user
Only enable devices that have the latest operating system updates
Integrate all systems into a single platform, use Conditional Access and MFA to protect the whole network, not just cloud services.
By undertaking this approach, you can reduce the attached surface of your infrastructure and protect data while not limiting your staff’s functionality by placing unwanted security barriers in place.
The diagram below shows how the conditional access approach works.
Conditional Access Explained
Do you think your business could benefit from the technologies of conditional access? Do you want to know more? Then please reach out to a member of the Architecture team at Planet IT via firstname.lastname@example.org or call 01235 433900, and we can talk to you about the options available that work with your more comprehensive technologies.
https://www.planet-it.net/wp-content/uploads/2021/04/What-is-Conditional-Access-01.png6281200James Dellhttps://www.planet-it.net/wp-content/uploads/2020/07/pitheaderlogo-margin.pngJames Dell2021-04-06 07:38:232021-04-06 07:38:23What is Conditional Access, and why is it an essential part of your security posture?