Success stories

Our customers come in all shapes and sizes.

We work with organisations from all walks of life, with different ambitions and requirements. Explore how we’ve helped them reimagine everyday, and align technology with their culture and business goals.

Hybrid working: how technology can support your move to a hybrid workplace

Technology can support the move to hybrid working to ensure employees can be product, collaborate effectively, and stay secure, no matter where they are located. Learn more here.
View case study >

How Azure Virtual Desktop can improve your security posture

With remote and hybrid work, it can be difficult for businesses to maintain a strong security posture. If you want to find out how Azure Virtual Desktop can improve your security posture, read our blog.
View case study >

Data backup: are you backing up and protecting your business’s data correctly?

How does your business back up its data? There are many risks to a business’s data and not all data backup solutions are equal.
View case study >

Hacking humans: How to protect against social engineering attacks

Social engineering attacks rely on human interaction to manipulate users into breaching security policies or giving away sensitive information. Protect your business against social engineering attacks, read on.
View case study >

5 best practices for cloud security

What best practices will help you shore up your cloud security most effectively? In this post we explore 5 to protect your networks, data and people.
View case study >

What is zero trust security and how can it be implemented?

To stay safe in 2021, the entire approach to network security must be reconsidered. If you want to find out more about zero trust security and how it can be implemented, read this >
View case study >

What is an attack vector? 10 common attack vectors to watch out for in 2021

There are many different ways a hacker can gain access to a network or system. In this blog post we’ve complied a list of 10 common attack vectors to watch out for in 2021.
View case study >

The biggest cyber security threat 2021

What is the biggest cyber security threat of 2021? Like in 2020, phishing is still the go to attack vector for cyber criminals, a tried and tested way to access your data.
View case study >

How secure is the cloud?

In this video, Gary Duke, answers the common question "How secure is the cloud?" and explains what a Shared Responsibility Platform means in the cloud.
View case study >

How to make the hybrid working work effectively for your organisation

A recent study has shown that 73% of employees want flexible work options to continue once restrictions ease, and 67% are craving more in-person time with their teams. This combination of statistics show that business leaders would be wise to listen to employees and start planning for a hybrid work model.   A move to a hybrid workplace has many of the benefits of both remote working and a full-time return to the office. However, this decision should not be taken lightly as there are many factors that must be considered to ensure that a hybrid work environment is effective and sets employees up for success. Hybrid work needs to focus on employee wellbeing One of the key considerations for an effective hybrid workplace strategy is a focus on employee wellbeing. If managed correctly a flexible hybrid working model should increase employee wellbeing through better work-life balance, reduce commuting time and costs and increase motivation and communication. Although there are potentially many wellbeing benefits of hybrid working, business leaders must consider for some employees it will be a difficult adjustment period as many employees will not have been in the office for over a year. A sudden change to their place of work may be stressful and tiring due to a return to commuting, significantly more social contact, and the challenges of a new work-life balance. For business leaders, the best way to manage employee wellbeing is through communication and flexibility. Employees should be involved in the decision of when and how a return to the office will work and specific concerns and anxieties should be addressed. Leverage technology for collaboration and communication Technology has played a pivotal role in the move to remote working and will continue to if hybrid working is implemented. The difference will be that technology will have to support a seamless experience regardless of where employees are working.  From a hardware perspective this may be using a laptop with a dock in the office so employees can easily transport their device between work and home and not have to unplug cables each time. From a software perspective it is important to utilise communication and collaboration tools like Microsoft Teams to their full ability. This is especially important if there are employees working in the same team but in the office on different days to ensure they do not feel disconnected from the rest of the team. It is also important to provide training and support with hybrid working technology as all employees will rely heavily on these features to enable productivity in the workplace. Don’t forget security In March 2020, when the first lockdown was announced, the move to remote work was abrupt and this led to poor security procedures for many companies. Cybercriminals took advantage of this, with cyber crime increasing by 72% in the first month of lockdown.  After a year of working from home most organisations have implemented security policies and procedures to ensure that employees are working securely on their own networks. As there is more time to plan a hybrid workplace, security needs to be considered from the start. This may include deploying multi-factor authentication, Azure Virtual Desktops (previously Windows Virtual Desktop) and centralising data so employees stay secure and productive, regardless of where they are working. It won’t be perfect straight away Business leaders need to be thoughtful with their implementation of a hybrid work model and consider the research as well as employees’ opinions to form a comprehensive framework to set everyone up for success. That said, just as remote work was a new experience for many over a year ago, hybrid work will be the same, and there will be an adjustment period and issues that require the model to be adjusted to suit each company and individual. Although this adjustment period may be not ideal, business leaders should regularly review and optimise their hybrid work environment to ensure it works effectively for all employees. The move from remote working to hybrid working, if managed correctly, has a plethora of benefits and can be the best of both worlds for employees and business leaders alike. If you want to find out more on how to optimise your hybrid workplace model or manage your IT and technology strategy to suit hybrid working – get in touch today!
View case study >

Key cyber security considerations for the legal sector

The legal sector can be an attractive target for cyber criminals. Discover the key cyber security considerations for the legal sector here >
View case study >

Top cloud challenges for healthcare businesses

As healthcare businesses start to adopt the cloud at a startling rate, it’s becoming clear that there are significant hurdles when it comes to security. Our blog covers the skills gap, spiralling spending, increasing threats, and the route to combatting them both.
View case study >

Hybrid working: how technology can support your move to a hybrid workplace

The move to a hybrid workplace promises a myriad of benefits including increased collaboration, productivity and a better work-life balance. For this reason, it is no surprise that 91% of the global workforce expect to be working in some form of hybrid arrangement over the coming months. However, the hybrid workplace model will take some time to refine as there are many factors that must work together to support the changing workplace. One of the key factors that is integral to the long term success of hybrid working, is technology.

In the past 12 months most large technology companies have shifted their focus to adapting and creating technology that will suit hybrid working and provide a better experience for users, wherever they are working. 

In this article we identify key technologies to support your business’s move to a hybrid workplace.

Video conferencing with Microsoft Teams

Meetings with both physical and remote attendees are more complex than traditional meetings or virtual meetings. The key challenge is how to ensure that all attendees have the same experience, regardless of where they are located. Microsoft Teams aims to address these challenges with additional features such as the ‘Front Row’ along with changes to the user interface to increase productivity and collaboration in hybrid meetings. If you want to find out more about how to run an effective hybrid meeting read our recent blog.

Email protection

When employees moved from working in an office space to working from home there was a massive rise in phishing emails and phishing related cyberattacks. This trend will likely continue with the advent of hybrid work, with phishing being used as an attack vector to carry out ransomware attacks. User education and awareness is a key factor in avoiding a phishing attack, but it shouldn’t be the only line of defence. As businesses move to hybrid work, they should consider implementing a software defence to stop phishing attacks before they even enter an employee’s inbox. Mimecast uses AI to detect and quarantine any potential phishing attacks, keeping organisations safe from data breaches and ransomware attacks.

Work from anywhere with virtual desktops

Businesses that are trying to reduce hardware costs, or create more flexibility for employees, may have considered a Bring-Your-Own-PC (BYOPC) programme. A BYOPC programme seems ideal for hybrid working, however it poses a significant security risk as employees’ laptops may be infected with malware or may not have the same security policies as required by the business. This problem can be solved with virtual desktops through Azure Virtual Desktop and cloud PCs through Windows 365. These solutions allow users to connect to virtual desktops running on the Azure cloud. This gives the full Windows experience on any device, from any location with the security policies set up by the administrator. The recent release of Windows 365 has made it even easier for business to introduce cloud PCs to employees with simple per user per month pricing.

Employee experience platforms

The advent of remote and hybrid working can make it difficult for employees to stay connected with the wider business if not all employees work in the office on the same days. Similarly, many employees find it difficult to balance productivity and wellbeing whilst working from home. To solve these challenges, Microsoft has released Viva. Viva is an employee experience platform designed to foster an organisational culture where people and teams are empowered to be their best from anywhere. This solution contains modules to help employees stay connected to the wider business, increase productivity, organises content across the business and provide learning and development opportunities. The key to effective hybrid working is to focus on the employee experience, and Viva excels at this.

Phone call with Teams

For businesses that rely on telephone systems for day-to-day business, a traditional phone system may not be suitable for hybrid working. Transferring calls between an office and an employee’s home is difficult and can lead to a poor experience for customers. A cloud-based phone solution, such as Microsoft Business Voice, allows businesses to keep their existing phone numbers whilst allowing employees to make and answer calls from anywhere, on any device. Business Voice is also integrated with Teams, which means all calls, meetings, chats and files are housed in a single application. Moving to a cloud-based telephony solution is perfect for hybrid work and can reduce costs through streamlining technology.

Register for our next Microsoft Teams Business Voice Workshop here >

The move to hybrid marks a new era in the way the world views work. An effective hybrid work scheme can allow employees can be more productivity, have a better work-life balance and employers can potentially reduce overhead costs to increase profitability. For these benefits to be realised, technology will have to play a large part in supporting the new workplace.

How Azure Virtual Desktop can improve your security posture

One of the key challenges businesses have faced over the past 18 months of remote and hybrid working has been how to maintain a strong security posture whilst employees are not physically in the office. When employees work from an office space it is easier to manage the environment as it consistent and has more defined boundaries. When employees are working from home there are more unknowns, and this increases the risk of a cyberattack.

For businesses that are wanting to improve their security posture whilst remote or hybrid working there are many solutions that can be put in place, however few are as effective and comprehensive as moving workloads to the cloud with Azure Virtual Desktop (AVD)

Explore our Cyber Security Posture Assessment service to benchmark your security posture now and prioritise steps to increase your organisation’s security. Details here >

What is Azure Virtual Desktop?

AVD is a virtual desktop interface (VDI) solution that is deployed through Azure and allows users to access Windows 10 and all necessary applications, from anywhere, on any device. AVD has many benefits to businesses and users, including increased flexibility, especially for hybrid workers, reduced costs, centralised management capabilities and better security. 

Below are six ways Azure Virtual Desktop can improve your security posture.

6 reasons why Azure Virtual Desktop boosts security

Baseline images

When an IT administrator is setting up Azure Virtual Desktop, they start by creating a golden image. A golden image is a pre-configured computer template for all AVD users. This image includes all necessary applications, security protocols and user settings. Shadow IT creates One of the key security challenges many businesses face is when users install applications or services without the consent of the IT department. Shadow IT increases the risk of an attack as your IT team cannot ensure user apps are secure. Using golden images reduces this risk as the only applications on the virtual machine are the ones that were pre-configured from the beginning. 

Updates and patch management

A simple method to improve security posture and reduce the risk of an attack is to keep all systems and applications up to date and run patches as soon as available. Although this is simple in theory, many users will delay updates and patches, especially if they require the computer to be restarted. If these patches fix security flaws within an operating system or application, delaying the update can leave systems vulnerable to an attack. With AVD it is easy to update all virtual machines at the same time to ensure all computers within an organisation are updated and secure. These updates can be run outside of working hours to ensure that there is no downtime for employees. 

Timely recovery after an attack

Malware attacks have been a constant threat for IT teams for many years now. This is where a piece of malicious software executes unauthorised actions on a victim’s system. These attacks can be difficult to recover from as it often leaves the victim without access to their system. Using a VDI makes recovery more efficient as if a virtual machine becomes infected with malware it can be turned off and reverted to its golden image. This can simplify disaster recovery and ensure business continuity, regardless of where employees are working.

Conditional access policies

Conditional Access is the tool used in Azure Active Directory to ensure only authorised users are accessing information and systems. It means that if a user wants to access a resource, they must complete an action. For example, if someone from HR wants to access an employee’s address, they must first perform multi-factor authentication to ensure it is not a threat actor trying to access personal information. Conditional access policies can also be applied to users accessing a virtual desktop. It is possible to prevent access to a virtual desktop if the user has an IP address from outside the geolocation of its employees. This improves security as it ensures that only authorised users can access sensitive data and systems

Hosted on Azure

One of the key security benefits of running a VDI solution on Azure, is that you benefit Microsoft’s security tools and expertise. Everything within the Azure environment is automatically encrypted and has sophisticated detection methods to prevent many cyberattacks. Microsoft also has over 3,500 cybersecurity experts who work on your behalf 24/7 to ensure all workloads hosted on the Azure cloud stay secure. 

Intelligent defences

With Azure Virtual Desktop it is possible to identify threats with real-time cybersecurity intelligence. The Microsoft Intelligent Security Graph gives actionable insights based off machine learning, behavioural analytics, and application-based intelligence. This greatly improves a business’s security posture as it constantly monitors usage to discover anomalies before it is too late.

Implementing Azure Virtual Desktop within an organisation not only improves its security posture, but also enables a hybrid workforce and can support business growth. We can offer you a Proof of Concept service for Azure Virtual Desktop to explore whether it’s a good fit for your organisation. Click on the link below for more information and next steps >

Data backup: are you backing up and protecting your business’s data correctly?

Your data is one of your business’s most important assets. Without it your business wouldn’t be unable to operate. Most companies have a disaster recovery plan in place to protect its data, however 23% of businesses have never tested their plans. 

Business data is at risk from various threats, so it is important  to test and reassess your disaster recovery plans regularly to limit data loss. The backbone to any disaster recovery plan is proper data backup, in this article we will discuss the risks to your business’s data and how to ensure your backups effectively support your disaster recovery plan.

What is your organisation’s current Cyber Security Posture? To understand what risks to prioritise and where your vulnerabilities are, explore the benefits of a Cyber Security Posture Assessment here >

Key risks to a business’s data

When considering the importance of data backup, first you must consider the common causes of data loss within a business. In the past, the three main risks to data were hardware malfunction, accidental deletion and natural disasters. 

  1. Hardware malfunction is when a storage device ceases to work, this is most common in disk drives where the disk or the arm fails causing data to be lost. 
  2. Human error is a common cause of data loss, this occurs when employees permanently delete or overwrite critical data. 
  3. Physical disasters are not as common, however fire, floods and other natural disasters pose a risk to on-premises and off-premises data storage locations. 

Whilst these risks are remain relevant in 2021, in the past 5 years the most prominent risks to data have been cybersecurity incidents. 

This includes the rise of ransomware attacks and system breaches leading to data loss. With the prevalence of these attacks, it is no longer a case of ‘if’ a business will fall victim to an attack, it is ‘when’. For this reason, businesses should have a comprehensive backup plan in place to ensure business continuity when these incidents happen.

Types of backup storage

The simplest form of backup is data backup to local disks. This is where data is regularly backed up to another drive on a PC or to an external hard drive. Although this is a fast and convenient method of backup, it offers no protection against a natural disaster, or a ransomware attack if it is stored on the local drive. Depending on the amount of data and employees, this solution is often not suitable for large environments.

One of the most common form of backup storage is data backup to NAS. A NAS or Network Attached Storage is a network device that allows all users connected to the network to access and backup their data. As data is regularly backed up it can be quickly recovered in the event of a cybersecurity incident or accidental deletion. The main downside to this data storage method is, as it is on-premises it offers no protection to natural disasters.

To overcome the risk of natural disasters, at least one copy of data should be stored off-premises. A traditional method of off-premises storage is data backup to tapes. This is where data is stored on tape devices over 100 miles away from the business location. This enables business continuity if there is a data loss incident or natural disaster at the business location, however the time to recover is increased as the tapes need to be collected or shipped from the off-premises storage location.

The modern equivalent of tape storage is data backup to cloud storage. This has all the benefits of tape storage but can be quickly accessed to avoid downtime within a business. It is also a more flexible solution as it does not require any additional infrastructure within a business.

Data backup best practices

The traditional backup best practice is the 3-2-1 rule. This states that business should keep copies of all data, this includes one primary copy and at least 2 backups, copies of data should be on at least types of storage and copy of the data should be stored off-premises. Although this method is still effective, with businesses undergoing a digital transformation, the advent of cloud technologies and the ever-evolving cyber security threat landscape, this rule is being superseded by the 3-2-2 rule.

The 3-2-2 rule states that a business should keep copies of all data, one primary, a synced version through One Drive for Business and a cloud copy. The data should be stored on 2 different clouds. This means that the data is stored in off-premises locations for maximum redundancy. Moving to this rule allows for faster recovery from a data loss incident and easy access of all necessary data, regardless of where employees are working.

Backup software solutions

For a business to ensure that backups are completed regularly and effectively, a software solution should be in place to limit downtime after an incident and ensure business continuity. Look for solutions that combine backup, recovery, protection management and cyber security. Full-image and file-level backups should be completed regularly and stored in the cloud or on a NAS. Data backup solutions that deploy cyber security tools like AI-based behavioural detection for zero-day attack prevention and built in ransomware recovery, gives you an additional level of protection from cyber threats too.

To find out more about data backup and how to protect your business from cyber security threats, speak to our team >

Hacking humans: How to protect against social engineering attacks

When considering cyber attack methods a cybercriminal may use to gain access to a network or business’s IT system, the most obvious are cracking passwords, hacking computers or exploiting software vulnerabilities. However, one of the most dangerous methods is often not given enough attention. They are social engineering attacks.

What is social engineering?

Social engineering attacks rely on human interaction to manipulate users into breaching security policies or giving away sensitive information. These attacks are often highly effective as it is easier to find vulnerabilities in people than it is to find vulnerabilities in software or networks.

The first stage of many social engineering attacks is for the cybercriminal to perform research on the target employee or business. Through this research they formulate an attack by engaging and deceiving the victim to gain malicious access to a network or system. 

Common social engineering attacks

Phishing

Phishing is the most common social engineering attack, and one of the most common attack vectors in general. A phishing attack is where an attacker sends a fraudulent email disguised to be from a trusted source, with the goal of tricking the victim into clicking a malicious link or downloading a malicious file. 

Some phishing attempts may be sent out in bulk and be easily spotted through poor spelling and punctuation or if it is sent from an unknown email address. However, threat actors may do significant research before crafting a phishing email to tailor it to the victim. This may include making it look like the email is from a vendor or customer, or including information highly relevant to the target in order to gain their trust, making it more likely for them to open a link or download a file. 

Hackers can also spoof the email address to make it seem as though the email is sent from a trusted sender.

To protect your humans, employees, from phishing attacks consider instigating phishing and security awareness programmes to education and train your user community to spot potential attacks. 

Baiting

Baiting is the process of luring a victim into a trap that compromises a company’s network or a user’s personal information. A common baiting attack method is to leave a USB in a business or its car park. The USB may have a label on it with text that will pique the interest of a potential victim, such as ‘private’ or ‘important’. Once the USB is connected to a computer it will run malicious code and the hacker will gain access to the network or IT systems.

Pretexting

Pretexting is a method of social engineering attack whereby the attacker attempts to convince the victim to share valuable information or login credentials to a network or system. The attacker assumes a false identity, often a position of authority, in order to fool the victim. An example of this may be an email impersonating a CEO or business executive asking for login credentials for a system as they have ‘forgotten theirs’. This method of social engineering can be similar to phishing, however the focus in on creating a false narrative to obtain the information.

Watering hole

A watering hole attack is a social engineering method whereby the attacker identifies a website that is frequented by a target user or organisation and compromises the website with malware in order to infect the target. This is also a method of supply chain compromise as it uses the prior research to compromise a third party to breach the actual target.

How to protect against social engineering attacks

As social engineering attacks are focused on human interaction, the best method of preventing them is through education of employees and a strong security culture within an organisation. For phishing, baiting and pretexting, employees should be aware of the risk of an attack and methods that cybercriminals are using as this will make it more likely for an employee to notice and report an attempted attack before it is too late.

It can be difficult for a business to protect themselves against watering hole attacks as it is a third-party website that is infected. However, if a business keeps their software and operating systems up to date it greatly decreases the chance of the malware compromising a system. For phishing and pretext attacks it is also best practice to have protection in place that will flag phishing emails, email spoofing and malicious links before they even arrive in an employee’s inbox. Mimecast uses AI to do this and can run internal phishing tests to ensure employees notice and report phishing attempts, which can further strengthen an organisation’s security culture.If you want to find out more on how to protect your business against social engineering attacks, get in contact with us or explore our cyber security updates here >

Social engineering attacks rely on human interaction to manipulate users into breaching security policies or giving away sensitive information. Protect your business against social engineering attacks, read on.

5 best practices for cloud security

The cloud is a shared responsibility platform. This means that although most cloud technology companies provide excellent cloud security tools, it’s down to you to ensure that what you move to the cloud is secure. 

Follow these 5 best practices to strengthen your cloud security: 

  1. Identity and access control 
  2. Security posture management 
  3. Secure apps and data
  4. Threat protection
  5. Network security 

Cloud security best practices 

1: Identity and access control 

Cloud security practice number one is to “assume breach”. This means behaving as if an attacker has breached the network perimeter and you need to do everything possible to protect your data and systems. 

Identity and access control is where you can prevent attackers already instead your network perimeter from accesses the most sensitive data. Deploy the following: 

Multifactor authentication – two or more of the following authentication methods 

  1. Something you know (typically a password)  
  2. Something you have (a trusted device that is not easily duplicated, like a phone)  
  3. Something you are (biometrics)  

Conditional access – set conditions that only allow sensitive resources to be accessed in certain way. For example, blocking or granting access depending on a specific location. 

Operate a zero trust model – verify everything that wants to authenticate or connect to your IT environment. More on the zero trust model here > 

2: Security posture management 

Get ahead of the curve by prioritising and actioning recommendations to improve your security posture. This helps to get you out of reactive mode where you’re constantly responding to threats. If your IT environment is in 365 and Azure, a free Secure Score Analysis will help you understand what actions to prioritise. 

3: Secure apps and data 

A layered, defense-in-depth strategy across identity, data, hosts, and networks protects your apps and data. Use encryption for data at rest and in transit, make sure your open dependencies don’t have vulnerabilities, and remember the cloud is a shared responsibility model (so you don’t have to do everything.) 

Here’s what you’re responsible for, what’s shared and what’s down to your cloud provider: 

4: Threat protection 

Ensure threat detection is enabled for virtual machines, databases, storage, and IoT. Use a cloud provider that integrates threat intelligence, providing the necessary context, relevance, and prioritisation for you to make faster, better, and more proactive decisions. Consider a cloud-native security information and event management (SIEM) to scale with your needs. 

5: Network security 

You still need to protect your network perimeter but remember a firewall is only as good as the people who deploy and manage it! If you don’t have time to do this work consider a Managed Service that will do it for you. Protect online assets and networks from malicious traffic by deploying Distributed Denial of Service (DDoS) Protection. Use virtual networking, subnet provisioning, and IP addressing to create a micro-segmented network that is harder to penetrate. 

If you need support strengthening your cloud security, get in touch for an informal chat about your IT environment. 

What is zero trust security and how can it be implemented?

In 2020, the global average cost of a data breach was $3.86 million (USD). On average it took businesses 207 days to identify the data breach, and 73 days to contain it. Regardless of the size or industry, all businesses are at risk of a data breach as they store valuable information, especially customer data. 

For this reason, businesses and security professionals alike are constantly searching for the best method of securing a network from all threats. 

Traditionally, most businesses use a castle-and-moat approach to security. This is where the focus of security is on the network perimeter and most of the security investment is in firewalls, proxy servers and preventing intrusion from outsiders. In theory this approach seems logical, however it has some key limitations. 

The castle-and-moat approach allows those within the network access to all data. This means that even if the moat is effective at keeping intruders out, it doesn’t stop users with compromised identities or insider threats. It’s also outdated as it was built for traditional networks and does not consider how networks have changed as businesses move to the cloud. 

Is your organisation at risk? Book a free cyber security health check with our expert team to find out >

Cyber security and hybrid work

With the workplace fundamentally changing, as hybrid work becomes the new norm, the traditional castle-and-moat approach is no longer viable. When all employees worked in an office space if a machine tried to access a network from outside the office it would raise a red flag. Now with employees working from home it is important to be able to accurately authorise and authenticate users, regardless of where they are physically located.

In order to overcome these limitations businesses must change the way they view network security; this is where the zero trust security model comes in.

What is the zero trust security model?

The zero trust security model assumes that there are malicious actors both inside and outside a network. Therefore, no users or machines are automatically trusted, and all requests must be authenticated and authorised. This verification is based on all data points, including user identity, device health, service or workload, classification and anomalies. Another key principle of the zero trust security model is least-privilege access. This states that users should only have access to the data they need to do their job, and nothing more. 

Why move to a zero trust security model?

The zero trust model greatly increases security and is a security model that considers how digital transformations have fundamentally changed businesses and their networks. This is particularly important as many organisations keep their data in the cloud, rather than on-premise. 

The modern network does not have clearly defined perimeters to protect, so the zero trust model moves the perimeter to each individual file. This model, especially the least-privilege access principle, significantly reduces the risk of an insider threat. As users can only access the data necessary to do their jobs it means they cannot access sensitive data that could be shared maliciously or accidentally. 

How to implement a zero trust security model in your business

There are multiple principles in the zero trust security model, and your business may already have implemented some of the necessary technology. However, transitioning to a comprehensive zero trust security model takes time and significant planning as it involves completely rethinking how a business views security. 

The key to successfully implementing zero trust architecture is to first take inventory of existing mechanisms and technology. It is important to consider how traffic flows through the network and what is currently controlling the flow. From there the business must implement the necessary technologies and policies in line with the zero trust principles. This includes identity access management, endpoint management, in-app permissions, data protection, and infrastructure and network security. Once your business has implemented all the necessary technology and policies it should be regularly reviewed and iterated upon to dynamically enforce policy changes.

The zero trust security model is a modern rethinking of what constitutes a comprehensive security solution for a business. It overcomes the limitations of the castle-and-moat approach and greatly reduces the risk of a data breach, even one due to an insider attack. However, the road to zero trust is not simple, and it takes time and expertise to ensure that all the potential benefits are realised. If your business is considering moving to a zero trust security model, and need some expert advice, please get in touch with our cyber security practice.

What is an attack vector? 10 common attack vectors to watch out for in 2021

Cyber security incidents are becoming more frequent and the consequences more severe. In order to safeguard your business from an attack, first you must understand the tools and methods cyber criminals use to orchestrate these attacks. One of the key concepts to understand is what an attack vector is and what are the most common attack vectors.

What is attack vector?

An attack vector is the way a cyber criminal gains unauthorised access to a network or computer to carry out malicious activities. Once a hacker uses an attack vector to enter a network or computer they can then access confidential information on a business or individuals or infect the system with malicious programmes.

Book a free cyber security health check to get better visibility over your organisation’s vulnerabilities and risk profile >

The cyber security threat landscape is ever changing, so we’ve created a list of the 10 most common attack vectors to watch out for in 2021.

1: Phishing

Phishing is the most common attack vector and has been for many years. Phishing is where a cybercriminal contacts a target by email, telephone or SMS posing as a legitimate individual, or business to deceive the victim into clicking a malicious link or providing sensitive information, such as passwords or payment card information.

In the video below, Gary Duke discusses phishing attacks in more detail:

2: Lack of encryption

Whenever sensitive data is transferred is should be encrypted to ensure that even if it is intercepted it cannot be read without the encryption key. Many businesses still use unencrypted FTP sessions to transfer data, meaning that if a hacker intercepts the data, it is in plain text. It should also be noted that not all encryption is created equally. Low-level encryption is safer than no encryption at all, however, strong SSL/TLS encryption is favoured as it is significantly more difficult to obtain the encryption key.

3: Compromised or weak credentials

Compromised credentials is when a cyber criminal gain access to a network or system by obtaining the user credentials, such as a username and password. These credentials are often obtained through a phishing attack or poor password hygiene. Similarly, having weak credentials, such as a common password, allows cyber criminals easy access to a supposedly secure network.

4: Malicious insiders

When considering potential attack vectors, one that is often ignored is that of malicious insiders. These are individuals who are current or former employees that have legitimate access to company data and use this access to carry out malicious activities. This threat can be difficult to detect as employees need access to networks and data to do their jobs, however there are policies that can be put in place to reduce this risk. 

5: Distributed Denial of Service

Distributed Denial of Service or DDOS is a malicious attack where a cybercriminal overwhelms a target server, service or network with internet traffic to disrupt normal traffic. The goal of these attacks may be to stop legitimate traffic from visiting a site, or to overwhelm network equipment, such as firewalls, in order to launch another cyberattack.

6: Misconfiguration 

Misconfiguration is when a system is not configured correctly. For example, leaving the default username and password when configuring a device or in a setup page. This also includes not updating software when there are security patches and leaving unused features on a device enabled. This is particularly common with networking devices and database setups.

Many data breaches are because of poor configuration of a network, such as putting a CRM or HR server internet facing. Gary Duke explains why this happens in the video below:

7: Malware

Malware is one of the oldest forms of attack vector, first originating in the 1980s. Malware is any software that is intentionally designed to cause damage to a computer, server, or network. This includes viruses, ransomware and trojan horses. Malware is often distributed through malicious emails, websites and advertising.

8: Malvertising

Malvertising is a relatively new method of spreading malware, including ransomware. This attack vector is where a cyber criminal pays for legitimate advertising space on search engines and social networking platforms, but the website that is being advertising contains malware that when downloaded will infect the victim’s computer or network.

9: Brute force

A brute force attack is when a cyber criminal finds the correct login credentials to a secure device, account or network by submitting many passwords until they find the correct one. A hacker uses a programme to do this which can submit 1000s of login attempts per second. This attack vector is easy to negate with long, complex passwords that utilise numbers and special characters. 

10: Man-in-the-middle

A man-in-the-middle attack may include intercepting messages and emails between individuals that include sensitive data, or intercepting login credentials between a user and an IT system. There are many different methods that can be used to carry out a man-in-the-middle attack, however most of these can be avoided with firewalls, encryption, multi-factor authentication and a strong security culture within an organisation. 

These are the ten most common attack vectors. Some basic knowledge of each can help you identify attack attempts before they become a cyber security incident. However, for each of these 10 attack vectors there are multiple methods of execution, and each year they become more advanced. It can be difficult to stay up to date with each new method and best practice for avoiding an attack, so if you need help deploying a comprehensive cyber security solution to keep your organisation and data safe, let our cyber security services team know! 

The biggest cyber security threat 2021

The biggest cyber security threat we see in 2021 is phishing. In the last year phishing attacks have increased by 600% in part because of remote working, but also because they are a highly successful vector for cyber criminals.

In this video interview, Gary Duke, shares why this is and how you can protect your organisation from this cyber security threat.

Learn more about Phishing & Security Awareness as a Service here >

How secure is the cloud?

There is a common misconception that the cloud is not as secure as on-premise infrastructure. Even with a significant increase in cloud adoption over the last year, many organisations believe that keeping their data on site is safer than migrating it to the cloud.

In fact, you might find your data is more secure in the cloud. Protecting your data on premise is no easy task. A firewall doesn’t stop you getting hacked it’s the people who deploy that firewall and manage it that prevent data breaches. If you haven’t got the right in-house expertise, or cyber security services, your on premise infrastructure is vulnerable. Migrating your data to the cloud will provide many of the resources and skills you are currently missing. In Verizon’s 2020 Data Breach Investigations Report, cloud assets accounted for 24% of breaches, compared to 70% of on-prem assets.   

Cloud providers like Microsoft give you access to cyber security tools, best practice and governance protocols, continually updating their solutions to protect customers from evolving threats. 

The cloud is still a target for cyber criminals 

Of course, the cloud is still a target. In 2020 cloud-based attacks rose by 630% between January and April, as cyber criminals took advantage of vulnerabilities created by the pandemic and remote work. The most common threat vectors for cloud-based attacks are compromised credentials and misconfigured cloud servers.

In the video below, Gary Duke explains how the cloud is a Shared Responsibility Platform so it’s down to you as a business to make sure that the access to your data and systems is secure. 

According to Verizon’s findings, misconfigurations are the fastest-growing risk to web application security. Misconfiguration errors have increased significantly since 2017, from below 20% to over 40% of total breaches covered; now more common than malware and outranked only by hacking.   

How to secure your data in the cloud 

To get the security benefits of the cloud it’s important to make sure your cloud is configured by experts, regularly audited, updated and patched. As Gary says, it’s a Shared Responsibility Platform so the configuration and management of the cloud is shared between your organisation and your service provider. 

If you’re a Microsoft customer using 365, check your Microsoft Secure Score to understand your organisation’s vulnerabilities across identity, devices, information, apps, and infrastructure. Find out more about Microsoft Secure Score here >

How to make the hybrid working work effectively for your organisation

recent study has shown that 73% of employees want flexible work options to continue once restrictions ease, and 67% are craving more in-person time with their teams. This combination of statistics show that business leaders would be wise to listen to employees and start planning for a hybrid work model.  

A move to a hybrid workplace has many of the benefits of both remote working and a full-time return to the office. However, this decision should not be taken lightly as there are many factors that must be considered to ensure that a hybrid work environment is effective and sets employees up for success.

Hybrid work needs to focus on employee wellbeing

One of the key considerations for an effective hybrid workplace strategy is a focus on employee wellbeing. If managed correctly a flexible hybrid working model should increase employee wellbeing through better work-life balance, reduce commuting time and costs and increase motivation and communication.

Although there are potentially many wellbeing benefits of hybrid working, business leaders must consider for some employees it will be a difficult adjustment period as many employees will not have been in the office for over a year. A sudden change to their place of work may be stressful and tiring due to a return to commuting, significantly more social contact, and the challenges of a new work-life balance. For business leaders, the best way to manage employee wellbeing is through communication and flexibility. Employees should be involved in the decision of when and how a return to the office will work and specific concerns and anxieties should be addressed.

Leverage technology for collaboration and communication

Technology has played a pivotal role in the move to remote working and will continue to if hybrid working is implemented. The difference will be that technology will have to support a seamless experience regardless of where employees are working. 

From a hardware perspective this may be using a laptop with a dock in the office so employees can easily transport their device between work and home and not have to unplug cables each time. From a software perspective it is important to utilise communication and collaboration tools like Microsoft Teams to their full ability. This is especially important if there are employees working in the same team but in the office on different days to ensure they do not feel disconnected from the rest of the team. It is also important to provide training and support with hybrid working technology as all employees will rely heavily on these features to enable productivity in the workplace.

Don’t forget security

In March 2020, when the first lockdown was announced, the move to remote work was abrupt and this led to poor security procedures for many companies. Cybercriminals took advantage of this, with cyber crime increasing by 72% in the first month of lockdown. 

After a year of working from home most organisations have implemented security policies and procedures to ensure that employees are working securely on their own networks. As there is more time to plan a hybrid workplace, security needs to be considered from the start. This may include deploying multi-factor authentication, Azure Virtual Desktops (previously Windows Virtual Desktop) and centralising data so employees stay secure and productive, regardless of where they are working.

It won’t be perfect straight away

Business leaders need to be thoughtful with their implementation of a hybrid work model and consider the research as well as employees’ opinions to form a comprehensive framework to set everyone up for success. That said, just as remote work was a new experience for many over a year ago, hybrid work will be the same, and there will be an adjustment period and issues that require the model to be adjusted to suit each company and individual. Although this adjustment period may be not ideal, business leaders should regularly review and optimise their hybrid work environment to ensure it works effectively for all employees.

The move from remote working to hybrid working, if managed correctly, has a plethora of benefits and can be the best of both worlds for employees and business leaders alike. If you want to find out more on how to optimise your hybrid workplace model or manage your IT and technology strategy to suit hybrid working – get in touch today!

Book a discovery call advert

Key cyber security considerations for the legal sector

Regardless of the industry, business size, or revenue, all businesses are at risk of a cyber security incident. The advent of working from home has only amplified this risk with cyberattacks increasing by 400% in the initial weeks of the first lockdown. 

Law firms and companies in the legal sector make an attractive target for cyberattacks as they handle large volumes of sensitive information, and their transactions often include large sums of money. Law firms specialising in corporate or property law are particularly exposed due to the potential for financial gain. Smaller law firms are not exempt either, they are often viewed as easy targets and can result in quick wins for cyber criminals.

The true cost of a cyberattack in the legal sector can be difficult to quantify, the monetary cost is on average around £170,000 per incident. However, there can be an untold cost to a businesses’ reputation and an erosion of trust due to a data breach or cyber security incident. To stay safe, it is important to consider the top cyber threats in the legal sector and what businesses can do to avoid a cyber attack.

Explore how we help in-house legal teams and law firms manage security, compliance and risk. Click here >

Phishing attacks

The most common form of cyber security incident both in the legal sector and nationwide, are phishing attacks. These are social engineering attacks where cyber criminals impersonate a business or individual to influence users to disclose information or open a malicious file or link. This is most commonly through emails, however SMS, voice call and social media phishing attacks are becoming more frequent. These can also be targeted attacks, known as spear phishing, where the cyber criminal has researched the victim and tailored the messaging to the individual to appear trustworthy. This is a ‘popular’ attack vector due to the low cost and high reward for the cybercriminal.

Data breaches

Another threat to the legal sector are data breaches. Data breaches are often initiated through highly targeted phishing attacks and carry a large risk due to public backlash and reputational damage. In 2016, when the law firm Mossack Fonseca had a massive 2.6TB data breach they were unable to recover their reputation and had to close permanently. 

Ransomware attacks

Ransomware is a type of malware that restricts a user’s access to their computer or network.  The two most common methods of ransomware infection are infected email attachments and advertising with malicious links. Often with ransomware attacks all the files on a network are encrypted and seemingly the only way to receive the encryption key is to pay the ransom. Unfortunately, even when companies pay the ransom it is common for the hacker to not decrypt the files which can be devastating for a business.

Supply chain compromise

A recent threat to the legal sector is supply chain compromise. Even if a law firm has strong cybersecurity in place in their own network, a supply chain is only as strong as its weakest link. Supply chain compromise is where a third-party data store or software provider is compromised and therefore any company that uses their services is also compromised. Due to the amount of money and sensitive information that flows through the legal sector and their position in the supply chain it can make them a prime target for supply chain compromise.

How to avoid a cyber attack

  1. To avoid a phishing attack, employees should have training on how to detect a phishing attempt and never open attachments or links from senders they do not know or trust. However, even with training it is still possible to fall victim to a phishing attack, so one of the best methods of avoiding a phishing attack is by using a software such as Mimecast Email Security. This software uses AI and machine learning to identify potential phishing attempts and stops them from even entering an inbox.
  2. To prevent data breaches, it is important to comply with GDPR and manage security risks. All firm and client data should be protected and stored in a secure manner with software in place to detect potential security incidents and monitor user access.
  3. Ransomware protection. Employee education is paramount in avoiding ransomware, however this should be paired with software such as Mimecast Email Security to stop emails with malicious links. Devices should also be protected with updates being deployed as soon as they are released and data should be frequently backed up so in the case that there is a ransomware attack, a clean copy of the data can be easily accessed with little to no downtime.
  4. Due diligence prevents supply chain compromises. It is important to research each company in your supply chain and confirm they are security conscious to avoid supply chain compromise. A good place to start is to ensure that all third-party data stores and software providers have cybersecurity accreditations such as Cyber Essentials, Cyber Essentials Plus or any other relevant ISO accreditations. 
  5. Vendor consolidation. According to Gartner, 78% of CISOs have 16 or more tools in their cybersecurity vendor portfolio which, surprisingly, can leave them vulnerable to attack. There may be gaps are in the cyber security services you’re using, unknown to you, which is why vendor consolidation can not only help protect your organisation but also save money.

Cyber security should remain high on the list of priorities of all businesses in 2021, especially within law firms and in-house legal teams, as the risk and potential damage of a cyber attack is high.

To find out more about how we can help your legal teams, click on the link below.

Top cloud challenges for healthcare businesses

With lives and patient wellbeing potentially on the line, the healthcare industry has typically been cautious about new technology. Since the start of the Covid-19, pandemic, however, global healthcare providers have shown that they are more than ready to innovate quickly. 

According to a recent Trend Micro report, 88% of global healthcare organisations have accelerated their cloud adoption since the pandemic began. 47% of those said adoption has increased “considerably”, while 40% of healthcare IT leaders noted plans to make more applications cloud-native.

Unfortunately, though most would agree that this migration is positive, healthcare businesses face significant challenges when moving to cloud-based environments. One aspect that is especially difficult to solve is a shortage of skills. 43% of providers surveyed by Trend Micro said that skills gaps are a key challenge in migration to cloud security solutions. This and other inefficiencies have led to more capital expenses, with 43% spending more on contracted services and 39% on operational and training costs.

More concerning yet are the challenges the healthcare industry faces when it comes to vulnerability. Though the vast majority believe they are in control of their cloud security environment, far fewer are confident they understand their role in the shared cloud responsibility model. Many also admit to challenges protecting cloud workloads, particularly when it comes to policy management, patch management, and cloud misconfigurations.

Book a free cyber security health check to benchmark where you are now, and test your cloud security environment >

A route forward? While a lot of IT leaders already have plans to address these issues, further digital transformation using the cloud is one path forward. By further utilising cloud-based security tools, healthcare businesses can quickly improve security while reducing costs.

Ransomware is a security threat many healthcare providers will be familiar with. The WannaCry attack on the NHS in 2017 garnered global attention and cost it £92 million. However, while that variant has faded, other strains still pose a daily threat. The high value of patient records makes healthcare businesses a lucrative target for attackers.

So what cyber security services can protect your organisation and ensure you get all the benefits of the cloud?

Cyber backup solutions

Cyber backup solutions can help significantly with such threats. As well as reliable backup and recovery services, some solutions now integrate cybersecurity, data protection, and simple security management tools.

AI-based behavioural detection can also be very beneficial when it comes to zero-day attacks, catching and preventing them without the need for manual intervention. These tools can be fully integrated with the provider’s backup solutions, using backup data to improve detection rates, automatically recovering corrupt or locked data, and ensuring backup files are clean.

For healthcare providers, the ability to lean on these automated tools can prove invaluable. As well as reducing the total cost of ownership, they free up your IT team to focus on more active security and patch management, aided by a single, intuitive interface. 

Microsoft 365

Another big name in cloud-based security is Microsoft. In healthcare, Microsoft 365 can both empower clinicians to be more productive and improve security and compliance. Through tight integrations with Windows 10 Enterprise and Office 365, it looks to protect all aspects of a business. 

Healthcare providers can, for example, get a real-time overview of their compliance posture and use of AI to help them meet HIPAA/HITRUST standards. Meanwhile, Microsoft 365’s Advanced Threat Protection combats malicious emails, integrates AI-driven cloud app security, and automatically detects advanced endpoint threats.

If you’d like to explore Microsoft 365 and other solutions to protect your cloud IT environment, please get in touch. We can help you identify the right solutions for your organisation, and deploy and manage them in a cost-efficient way.

Cloud Business Logo - white
Microsoft Gold Partner Logo - Cloud Business

Cloud Business Limited
8 North Street
Guildford
GU1 4AF

Microsoft Gold Partner Logo - Cloud Business

2023 © Cloud Business Limited
Registered Company in England and Wales 06798438