The tournament may be crazy. But what’s crazier is the number of businesses that don’t have a solid cybersecurity strategy. That’s why we’re dedicating the month of March to helping as many organizations as we can strengthen their defense against modern security threats. We call it Security Madness.
In this webinar, you’ll learn the latest security landscape and current concerns, how to utilize the NIST Security Framework in your security strategy , how data backups fit into your security strategy and five steps to keeping your systems protected.
https://www.isgtech.com/wp-content/uploads/2020/04/NEW_Cloud_Banner2016_2-scaled.jpg17072560ISG Tech/wp-content/uploads/2018/02/isg-logo.pngISG Tech2020-03-12 14:57:002020-04-22 04:07:22Webinar: Data Protection Fundamentals To Strengthen Your Cybersecurity Strategy
While Microsoft has sound internal security and is capable of managing Office 365 infrastructure, third-party services are needed to ensure comprehensive data protection and compliance. Let’s take a look at 5 key reasons why you need a dedicated backup service when you’re using Office 365.
Protection against internal accidents and threats
Regardless of how careful you are with your data, accidents can and do happen. Whether it’s the accidental deletion of a user, the incorrect merging of fields, or the failure of a key service, accidental deletion can be replicated across an entire network and lead to serious problems.
Simple accidents have been responsible for serious damage over the last few years, with an outage on Amazon Web Services costing up to $150 million dollars in 2017.
A backup service can restore data and services quickly and with minimum disruption, either to the on-premise Exchange or the Office 365 cloud network. In addition, dedicated backup services can protect you against internal security threats and manage the risk of malicious data loss or destruction.
Protection against external security threats
Along with internal security threats, many businesses have experienced a rise in malware, viruses, data theft and other security threats from the outside.
Kaspersky blocked almost 800 million attacks from online resources across the globe in the first quarter of 2018 alone.
While Microsoft 365 and other cloud suites do have some security controls, they’re not robust or reliable enough to handle every case scenario. Having access to a high-grade, third-party backup service is the best way to reduce your exposure and manage the risks associated with data loss and destruction.
Retention and recovery management
Cloud-based services are popular for many reasons, with Office 365 and other solutions featuring better integration between applications, more efficient data exchange and delivery, and the ability to utilize transparent services regardless of location.
Many of these benefits come at a cost, however, with enterprises losing control over data retention and recovery.
While Office 365 does have its own retention policies, they are ever-changing and difficult to manage. In fact, confusing and inaccessible data retention is one of the reasons why so many businesses refuse to move to the cloud.
In addition to running a business and ensuring access to key data and services, organizations have a responsibility to meet certain legal and compliance obligations.
A cloud backup service allows you to retrieve important data instantly and with minimal disruption to critical business systems.
Whether it’s retrieving user data for law enforcement, accessing your mailbox during a legal action, or meeting regulatory compliance standards, dedicated cloud backup makes it easier to meet your responsibilities.
Managing the migration process
With more businesses moving to the cloud all the time, the migration process is often presented as a seamless and natural transition.
While the benefits of SaaS are valid and well-known, managing hybrid email deployments and other critical services during migration can be more challenging than Microsoft would have you believe.
https://www.isgtech.com/wp-content/uploads/2018/12/sectionBG.png7181366ISG Tech/wp-content/uploads/2018/02/isg-logo.pngISG Tech2019-02-20 09:02:132019-02-20 09:02:135 reasons why you need a backup service, even if you’re using Office 365
Freddy’s is now ready for tremendous future growth with the flexibility and security of ISG’s cloud solution with our straightforward approach to implementation and willingness to execute outside of business hours, ensuring both client satisfaction and business success.
It’s no secret that the economy has transformed faster than most businesses can keep up. The digital economy makes it easier for smaller, agile companies to quickly spin up applications and compete with established companies that rely on traditional IT infrastructures.
To compete, companies must respond quickly to customer and market needs. However, traditional IT infrastructures hamper this goal. Ongoing IT operations can be cumbersome and complex, and siloed infrastructure means lots of moving parts, many of which don’t talk to each other.
Additionally, the process of provisioning compute, storage, and networking resources to support new business applications or seasonal capacity requirements can be slow and painstaking.
To simplify operations, achieve higher performance, speed up provisioning, and keep costs in line, many organizations are looking to the cloud to supplement their on-premises infrastructures. However, for companies that want or need to keep their core applications and sensitive data in-house, a cloud-only approach isn’t feasible.
Using hyperconvergence, IT can now cost-effectively deploy their business applications in a virtualized environment while achieving cloud-like performance. Hyper converged solutions such as the Hewlett Packard Enterprise SimpliVity 380, powered by Intel® Xeon® processors, deliver a revolutionary IT infrastructure that delivers lower-cost, high-performance data efficiency, and built-in data protection, all within an integrated modular package.
HPE SimpliVity: Purpose-Built for Performance, Scalability, and Operational Efficiency
The powerful HPE SimpliVity 380, powered by Intel® Xeon® processors, gives IT the lower-cost, easier-to-manage option they need to future-proof their data center, manage capacity, and build a flexible virtual infrastructure. This translates to several benefits for virtual infrastructure initiatives:
Lower total cost of ownership — save through reduced storage requirements (data deduplication), and integrated virtualization solutions
Flexibility — scale easily and less expensively by adding additional HPE SimpliVity 380 systems, and managing through a single interface
Improved operational efficiency — increase time spent on new projects by 80%
Rapid service agility — deploy, clone, or restore VMs in just seconds
Superior data protection — reduce backup and recovery times from hours to seconds
Resource silos across business units dissolve, providing fluid resource pools that any group can access. These are all steps in the process to transform IT into a strategic value creator and broker of resources whenever they are needed.
To learn more about HPE SimpliVity and if it’s right for you, contact us. As an HPE Platinum Partner with deep technology and industry expertise, we are committed to helping you find the right solution for your business, from among a broad array of high-quality options from Hewlett Packard Enterprise.
https://www.isgtech.com/wp-content/uploads/2019/04/tfe-security.jpg266702ISG Tech/wp-content/uploads/2018/02/isg-logo.pngISG Tech2018-11-04 15:14:172020-05-29 14:19:42Power and Protect Business-Critical Apps With Cloud-Like Agility
The school year is underway, and Backup School with ISG is back! Join ISG and Veeam as we educate our clients and their organizations about how they can keep their business up and running and eliminate downtime – even when the unexpected happens.
Is downtime simply an unacceptable thing in your mind? Then this webinar is for you. Go beyond backup to better understand business continuity.
https://www.isgtech.com/wp-content/uploads/2019/04/bell-concierge-hotel.jpg266702ISG Tech/wp-content/uploads/2018/02/isg-logo.pngISG Tech2018-09-25 15:09:292020-04-20 19:50:18Webinar: Going Beyond Backup To Ensure Zero Downtime
The school year is underway, and Backup School is back! Together, ISG and Veeam focus on educating our clients and their organizations about how they can keep their business up and running and eliminate downtime – even when the unexpected happens.
Office 365 is a powerful suite of products – but it lacks a comprehensive backup of some of your most critical data. Learn how to protect yourself in this webinar.
https://www.isgtech.com/wp-content/uploads/2019/04/woman-laptop-office.jpg266702ISG Tech/wp-content/uploads/2018/02/isg-logo.pngISG Tech2018-09-24 23:04:492020-04-20 19:49:50Webinar: Everything You Need to Know About Backup for Office 365
Cloud computing has been gaining popularity in the business space over the last couple years. Organizations are abandoning server-based data centers in favor of a third-party-provided solutions. Yet as more data is stored digitally, the danger of hacking grows. Companies are losing significant income to data breaches, and cybercriminals are developing new, sophisticated ways to steal data.
So why are companies taking their information to the cloud? Many executives want to push their businesses to the cloud but don’t fully understand how it works. As such, they may be wary over the idea of removing confidential information from complete corporate oversight. However, the cloud is not as penetrable as its name might imply.
Three factors driving cloud safety According to Forbes, there are three principal factors helping to keep data secure when it is in a cloud platform. The first is redundancy. Losing data can be almost as harmful as having it stolen. When a server fails or a hacker gains access to a corporate network and deletes or attempts to ransom vital information, companies can lose months of productivity. Most cloud networks, however, typically keep data in at least three locations.
This means that lost data at one location, such as data loss caused by a server failure, will not have the disastrous impact that it could in an organization relying on an on-premise data center. By keep copies of each file, cloud solutions are making sure mission-critical data is accessible until the user no longer wants it.
The second factor is the safe sharing policy. Anyone who has ever used the popular Google Docs knows how file sharing works. Rather than making a copy, the user must enter the email address of anyone they want to see the file. These extra users can’t share the file on their own (unless given express permission), they simply have access to the information. This is how safe sharing works. It prevents any unauthorized copies from being created or distributed. Users have access to their own data and can control exactly who sees it.
The last factor driving cloud safety is encryption. Provided a user keeps track of their password, it is very difficult for a hacker to gain access to the files. They are being stored either entirely in the cloud or at a secure, remote facility in an unknown location. Since the user’s connection to this information is encrypted, following it to gain access would be difficult, if not impossible for a human hacker.
“Cybersecurity today is more about controlling access than managing data storage.”
It’s all about access As TechTarget pointed out, cybersecurity today is more about controlling access than managing data storage. When hackers breach data, they typically do so because they have access to sensitive information. This can be a password or even a corporate email address. Cybercriminals infiltrate and steal information based on the access they’ve gained, typically from an unknowing authorized user.
Cloud solutions help monitor this access, keeping secure data under control. The providers offering these platforms have the expertise and the resources to keep cybersecurity evolving alongside the threats. In most cases, they have more resources than the client companies using their solutions.
The cybersecurity arms race One popular cloud vendor is Microsoft. Each year the company invests over $1 billion into cybersecurity initiatives for its Azure platform. The money, explained Azure Government CISO Matthew Rathbun in an interview with TechRepublic, isn’t just about maintenance, it is about innovation:
“Ninety percent of my threat landscape starts with a human, either maliciously or inadvertently, making a mistake that somehow compromises security,” said Rathbun. “In an ideal state, we’re going eventually end up in a world where there’ll be zero human touch to an Azure production environment.”
Overseen by talented specialists with ample resources, cloud solutions are a safe form of data protection in today’s digital business space.
https://www.isgtech.com/wp-content/uploads/2019/04/technician-server-room-laptop.jpg266702ISG Tech/wp-content/uploads/2018/02/isg-logo.pngISG Tech2018-08-08 15:41:152020-05-29 14:19:42Why cloud computing is safe
Cybersecurity is a paramount issue facing businesses in the digital world. The average costs of a successful cybercrime in 2017 were roughly $1.3 million for large enterprises and $117,000 for small- to medium-sized businesses, according to Kaspersky Lab. These figures include the cost of data theft but do not encompass the additional potential price of a damaged reputation and ensuing legal action. Data also indicates that cyberattacks will become only more expensive and damaging in the coming years.
Defending an organization against cybercrime requires a multi-channel approach. Companies should be open to software solutions, employee training and hardware upgrades whenever necessary. However, another avenue for cybercrime is occasionally overlooked. Physical theft of connected mobile devices, laptops and even desktop computers can lead to an open pathway for cyberattacks. In addition, some businesses simply sell their used electronics without first doing a proper data cleanse.
But can information to completely and permanently removed from a hard drive?
The levels of data destruction Deleting data is not as secure as some might assume. In actuality, when information on a computer is "deleted," the files themselves are not immediately removed. Instead, the pathing to that information is expunged. The data is also designated as open space, so the computer will eventually overwrite it. However, until this rewrite occurs, it is relatively easy for the information to be restored and accessed by any tech-savvy user.
Fortunately for organizations trying to permanently dissolve their data, deletion is only the first step of the process. Lifewire recommended three additional methods to ensure that information remains lost.
First comes software – using a data destruction program on the hard drive. This method has been met with approval from the National Institute of Standards and Technology as a secure way to permanently remove information from a hard drive, according to DestructData. However, drawbacks include resource consumption, as this can be a time-intensive process. In addition, some overwriting tools can miss hidden data that is locked on the hard drive.
The most secure method to completely remove data is degaussing. Hard disk drives operate through magnetic fields, and degaussers alter those waves. The result is a drive that can never be read again. In fact, the computer will not even register it as a hard drive from that moment on. However, the downside in this process is twofold: One, the drive is useless after degaussing. Two, this method can on only hard disk drives. Solid state drives and flash media do not use magnetism in the same way, so a degausser will be ineffective.
The final option is to physically destroy the data drive. While many people think that this task can be done with patience and a hammer, it is unfortunately not that simple. Hard drives can be rebuilt with the right tools and expertise. According to the Computer World, NASA scientists were able to recover data from the charred wreckage of the Columbia shuttle after its disastrous explosion and crash in 2003.
The resiliency of hard drives In short, it can be difficult to permanently expunge data from a hard drive. This reality is in part why businesses are opting for less internal data centers and more dependency on cloud solutions. According to TechTarget, cloud solutions represent a more secure method of data organization than traditional IT infrastructure.
While data can be safely deleted, the reality is, unless a degausser is used, there is always some chance of information recovery. Cybercriminals are becoming more sophisticated, and given the expensive nature of dealing with data breaches, it is understandable why the cloud is becoming the preferred solution.
https://www.isgtech.com/wp-content/uploads/2019/04/random-digital-numbers.jpg266702ISG Tech/wp-content/uploads/2018/02/isg-logo.pngISG Tech2018-07-31 12:29:062020-05-29 14:19:43Is physical data destruction completely secure?
The digital revolution has brought a host of new opportunity and challenges for enterprises in every sector of business. While some organizations have embraced the wave of change and made efforts to be at its forefront, others have held back. These institutions may not have sufficient staff to implement the changes or may be waiting for a proven added-value proposition.
In other words: No technology upgrades until the innovation is proven useful. There is some wisdom in this caution. Several reports have noticed that productivity and efficiency are not rising at expected levels alongside this technology boom. However, as Project Syndicate noted, this lag may be a case of outgrowing the traditional productivity model, meaning that not every employee action is measured in the old system.
However, there is another reason to explain why more technology does not automatically equal greater efficiency and higher profits. If a company buys some new software, it will see a minor boost. However, it will reap the full rewards only if staff properly learn to use said platforms.
Part of this problem stems from the misunderstanding that technology can only improve current work processes. This is not true. When looking at a basic enterprise operation like data visualization, technology has created an entirely new workflow.
Examining the traditional business model In the traditional business model, all data visualization was manual. Employees would gather data from various endpoints and then input it into a visual model. Common examples of this process included pie charts and bar graphs. The employee would then present the data to the executive, who would use it to make information-based decisions.
While acceptable, this process is far from optimized. Most data had to be generated in spreadsheets before it was collected, using formulas made by staff. Collecting and framing the information is a time-consuming process that will absorb at least one individual. As employees are involved at every step of this workflow, there is a potential for human error.
The time involved prevented companies from acting on real time information. In the interim, intuition and "gut feeling" were used as substitutes for data-backed decisions. The people involved raised the level of risk that the data in question may be inaccurate or misleading.
Unlocking data analytics Of course, with the arrival of the internet of things, companies have a lot more data collection at their disposal. Connected devices have provided a whole new network of information. This gold mine, also known as big data, has one downside: There is too much of it. A human cannot hope to categorize and analyze the information in any acceptable timeframe.
Enter data analytics. Using advanced technology like machine learning, companies can create and implement this software to study their data, creating automatic visualizations based on trends and prevalent patterns. According to Fingent, these software solutions employ mining algorithms to filter out irrelevant information, focusing instead on only what is important.
However, companies cannot simply go from a traditional system to a fully fledged data analytics solution for one reason: data segmentation. Many enterprises divide their information based on different departments and specializations. Each group works internally, communicating primarily with itself. While this method is helpful for organization, it greatly impedes data analytics potential.
If companies have siloed their data, the program will have to reach into every source, work with every relevant software and bypass every network design. In short, it will have to work harder to communicate. While modern data analytics solutions are "smart," they cannot navigate barriers like this easily. They are designed to optimally read only the information that is readily available.
For organizations to fully capitalize on the potential of internal data analytics, infrastructure overhaul is needed. Departments – or at least their data – must be able to freely communicate with one another. This process entails implementing a common software solution that is in use across the entire company.
The good news is that many modern solutions fit this need. Solutions like cloud platforms store relevant data in accessible locations and train employees to not segment their work. By creating an infrastructure that is open to the data analytics program, organizations can start to act on information, rather than relying solely on their gut.
https://www.isgtech.com/wp-content/uploads/2019/04/teamwork-collaboration.jpg266702ISG Tech/wp-content/uploads/2018/02/isg-logo.pngISG Tech2018-07-26 17:26:122020-05-29 14:19:43Why companies must change their infrastructure for optimal data visualization
Blockchain has been turning heads since it was first unveiled in 2008 to become the backbone of then relatively unknown cryptocurrency, bitcoin. Since then, blockchain and Bitcoin have skyrocketed in public awareness, with the latter becoming the most successful cryptocurrency in history. A large portion of bitcoin's success is due to its blockchain infrastructure, which prevents the duplication of funds (preventing double-spending) and automatically time-stamps every transaction.
The developer (or developers) behind blockchain created the software to be resistant to alteration or hacking, making it one of the more inherently secure systems that companies can use to manage secure infrastructures. Some have heralded blockchain as the ultimate tool to promote cybersecurity and reduce the risk of data breaches.
Then bitcoin, in addition to several other cryptocurrencies, were hacked. According to CNN, the attack erased the equivalent of billions of dollars and sent the value of the affected cryptocurrencies plunging. The incident has many questioning just how secure blockchain is and whether the software was simply a temporary fix, like so many others, against the ever-present threat of cyberattacks.
"Blockchain can give each registered device a specific SSL certificate for authentication."
The case for blockchain While buzzwords are common in the tech industry, there are several legitimate reasons why blockchain has been celebrated as a secure platform. According to Info Security Magazine, one of blockchain's primary appeals is its decentralized data storage. While users can access blockchain data on a computer or mobile device, the program itself is typically stored throughout the network.
If one access point – or block – is targeted by hackers, then the other blocks will react to it. The attempted cyberattack will likely alter the data on the block in a way that is immediately noticeable by the rest of the chain. This block will then simply be disconnected, isolating the malicious data before it can impact the system.
Another helpful advantage of blockchain is its effectiveness against dedicated denial of service attacks. These cyberattacks target the domain name system, flooding it with so much data traffic that it essentially shuts down. Using blockchain software would allow the DNS to spread its contents to more nodes, reducing the effectiveness of the DDoS attack before it reaches a crippling stage.
Networks using a blockchain infrastructure can also bypass the need for passwords in certain situations. Instead of using the human-oriented password system, blockchain can give each registered device a specific SSL certificate. This mode of authentication is a lot more difficult for outside sources to access, reducing the likelihood of a hack.
Removing dependence on passwords may sound less secure but it is actually seen as an improvement. Employees can be careless with their login information or choose passwords that can be easily deduced by third parties. Eliminating the human factor from authentication actually goes a long way by removing one of the most common exploit points.
However, no system is 100 percent secure.
The McAfee Report While many companies preach the value of blockchain, global computer security software company McAfee recently released a critical report on the software, stating that industries have every reason to expect cyberattacks. McAfee looked at early blockchain adapters, namely cryptocurrencies, and studied the types of cyberattacks still occurring within these companies.
The report identified four primary attack types: implementation exploits, malware, phishing and general technology vulnerabilities. Certain cryptocurrencies themselves have been used to help the spread of advanced malware, including ransomware. Coin miner malware alone grew by 629 percent in the first quarter of 2018, according to McAfee data.
Cybercriminals have also been using cryptocurrencies to mask their identities, taking advantage of blockchain's secure features to help them evade the law.
What companies can learn from the cryptocurrency attack Lastly, however, the attack of the cryptocurrencies themselves should highlight the limitations of blockchain. While the program may be innately secure, it is not an excuse to abandon other forms of caution. Technology is spreading at a rapid pace with information security specialists struggling to catch up.
In short, blockchain should be seen as just another tool and not a cure-all for cyberattacks. Its architecture can be helpful but must be implemented in a thorough, professional manner. Even then, it should also be paired with other programs and employee training to best reduce the risk of cybercrime.
https://www.isgtech.com/wp-content/uploads/2019/04/lighting-storm-weather-city.jpg266702ISG Tech/wp-content/uploads/2018/02/isg-logo.pngISG Tech2018-06-14 10:59:022020-05-29 14:19:43Is blockchain the antidote to all cybersecurity woes?