Most public spaces from coffee shops through to shopping malls now contain some form of public WiFi, but are these public networks 100% safe to use?

When your office based employees connect to the internet, they’re making this connection through your own network. And this means that you’re able to monitor all incoming and outgoing activity. Rather that monitoring which websites your employees are visiting, though, the main reason for monitoring these connections is to make sure that nothing malicious is entering your network. Remote workers, however, are likely to take advantage of public WiFi as a considerable amount of their work will be completed away from your work connection.

Due to the unique nature of each and every public WiFi network, it’s crucial that you understand the concerns surrounding these types of connections.

The Dangers of Public WiFi

Public WiFi may appear to be extremely convenient, but there are a number of security issues attached to connecting to public hotspots such as:

  • Lack of Details: When you connect to a public WiFi network there’s no way of knowing exactly what you’re connecting to. This, in itself, is a dangerous move and is one of the main reasons why public WiFi is frowned upon by security experts. 
  • WPA2 Vulnerability: Most public WiFi uses WPA2 encryption to protect data, but the security of WPA2 has been called into question over the last few years due to the discovery of a major vulnerability in its code. 
  • Malware Threat: Due to the lack of security surrounding public WiFi networks, it’s very easy for a hacker to position themselves in between the connection point and, for example, your laptop. This allows the hacker the opportunity to discreetly upload malware to your device and execute its malicious payload.

Should You Use Public WiFi?

Clearly, there are a number of risks involved in using public WiFi and the simplest way to avoid these dangers is by completely avoiding these connections. However, there are certain scenarios where it’s crucial that your remote employee needs to connect to whichever network is available. And in these cases you should follow these best practices:

  • Use a VPN: A virtual private network (VPN) is a service that creates an encrypted connection between your device and the remote server of your VPN. Any hacker who manages to intercept this connection will only be able to view a highly encrypted message which will be absolutely useless to them. 
  • Verify the Connection: One of the simplest ways to evaluate the connection on offer is to double check the legitimacy of the available connections with an employee at the location in question. At the very least they will be able to confirm whether the connection is genuine or fake. 
  • Use Anti-Malware Software: Protecting yourself with anti-malware software should be a given, but when people are using remote devices they fail to appreciate just how vulnerable these are. Even the simplest form of anti-malware software provides an effective defense, so make sure your device is protected.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


Cloud storage and infrastructure is the way forwards for organizations due to the massive range of benefits it offers, but how secure is your cloud?

Security is the single most important factor when it comes to an organization’s IT operations, so it’s essential that it’s treated with the utmost attention. However, cloud networks are a relatively new platform and, as a result, the level of security knowledge behind these platforms is lacking compared to more traditional networks. Hackers, of course, are keen to this fact and invest substantial time and effort in uncovering security vulnerabilities that they can exploit. Combating this threat, therefore, is paramount to your organization’s security.

As I’ve already stated, cloud networks are a new phenomenon and the wider community generally isn’t as clued up on them as they perhaps should be. And this leads to common mistakes that can cost dearly. However, by taking a look at the biggest cloud security mistakes you can make, you can hopefully avoid them.

Multi-factor Authentication is Vital

Administrative accounts on cloud networks have significantly more privileges than your standard employee’s privileges. Mostly, this is down to the amount of IT knowledge required to carry out these system admin tasks. A non-IT employee simply doesn’t need these privileges. Accordingly, an administrative account is much more attractive to a hacker, so security needs to be tightened. Any cloud platform that understands security risks should have an option for multi-factor authentication, so make sure this is rigorously enforced for all administrative accounts.

Limit the Use of your Admin Account

The root account is the first account you create when you sign up with a cloud provider. It’s a highly privileged account as it contains access to every aspect of your cloud network. If this account is compromised then your entire cloud network is at the mercy of hackers. And this is why you need to limit usage on this account to only the most necessary tasks e.g. do not use the root account for general day to day tasks that put you more at risk of being infected by malware etc.

Check the Encryption Methods

Security moves at a rapid pace and the level of encryption that is now available on cloud networks such as TLS-based encryption is fantastic. Unfortunately, there are also plenty of cloud networks that still operate with less security encryption methods such as the SSL protocol. To minimize the risk of your cloud account becoming compromised, you need to investigate the encryption method used on your network. If it’s even slightly outdated, then it’s time to upgrade.

Restrict the Availability of Sensitive Information

The beauty of cloud storage is that it can be accessed from anywhere, so this opens up your data to a much larger audience if you grant them access to it. While this allows you to collaborate with other organizations and remote employees much more easily than ever before, it also puts your data at risk. Your organization needs to bear this in mind and access controls need to be thoroughly thought through to prevent sensitive data being accessed outside of your organization. Ensure that your employees are aware of the open nature of cloud networks when saving data to such public drives.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


 

Cloud networks are the most important newcomers to storage and networking in a long, long time, but why are cloud networks at risk of being hacked in 2018?

With cloud network revenue set to hit $228 billion in 2019, it’s clear to see that cloud networks have become phenomenally successful and their popularity doesn’t appear to show any signs of slowing down. However, hackers are exceptionally interested in this new slice of digital real estate and, accordingly, are beginning to tailor attacks towards cloud providers. Naturally, new technology is prone to teething issues, but when there’s so much data at risk, it’s understandable that organizations may be a little concerned by the risk of cloud networks being hacked.

Let’s take a look at exactly why there’s a risk of your cloud network being hacked and having all its data compromised.

Hackers Like to Target Big and Sensitive Data

Cloud networks have been readily adopted by many organizations due to the vast benefits they offer, so it should come as no surprise that hackers have followed consumers to the cloud. Organizations are frequently storing entire databases packed full of confidential data which, to a hacker’s eyes, is the ultimate prize. Rather than embarking on time consuming hacking strategies which yield only one employee’s details, hackers are going to go straight to the cloud to obtain as much data as possible.

 

The Cloud Brings New Technology

While organizations are more than aware of firewalls and passwords, cloud networks bring a whole new range of technology that has shifted the goalposts of cyber-security. For example, the cloud is a virtual network rather than a physical network and, accordingly, can’t be treated in the same way as previous technology that organizations have used. New security tools are required to marshal data warehouses in the cloud and, at present, the level of knowledge is, even in many IT professionals, at a naive level.

Human Error is Always an Issue

Employees of any organization that accesses a cloud network are perhaps the biggest threat to cloud security. All it takes is one mistake for a hacker to gain access to your network and, if they access your cloud, this could have catastrophic effects for your organization’s data. As ever, the risk of falling for phishing scams puts the security of your cloud network at risk, but, as covered earlier, the new technology also brings a number of problems to the table such as configuration errors. Amazon, for example, exposed nearly 48 million data profiles earlier this year due to not configuring their cloud correctly.

The Danger of State Sponsored Attacks

Huge organizations that are integral to the running of the country have invested heavily in cloud networks to help store the vast amounts of data that they generate. The result of this is that hackers are continually searching for new and innovative ways to breach cloud security. While their main target may be major corporations, the knowledge that these hackers are gaining means that the ease with which cloud networks can be hacked is increasing. As this knowledge builds and builds, attacks on cloud networks will become easier to execute and more commonplace.

For more ways to secure and optimize your business technology, contact your local IT professionals.

 

Read More


Storing files in the cloud is becoming increasingly popular for businesses, but how do you choose the right cloud storage provider when there are so many?

There are a wide range of factors to consider when choosing a cloud storage provider, so it’s no surprise that settling on one is difficult. All providers will offer different options and plans, but the good news is that there are set basics which will apply to your business. The first step is making sure you can find a provider who can satisfy your basic needs..

To help you get started, we’re going to look at what these foundations of cloud storage are and how they apply to your organization.

Data Volume

The amount of data that your organization processes is important when it comes to choosing a cloud storage provider. After all, different providers are going to have different capabilities when it comes to storing data. The basic plan available through Dropbox, for example, is 2GB and while that may be fine for an individual running their own business, an organization with 250 employees is going to need a little more. Obviously, numerous pricing plans are available for different providers depending on your storage needs, so it makes sense to calculate your storage needs (and future needs) and compare prices.

Uptime

Cloud servers are not infallible and they can fail just as easily as your own servers can. However, certain service providers’ networks fail more than others. And this can present a serious problem for your operations if your data is unavailable when you need it most. Therefore, you should always ask cloud storage providers to demonstrate their contingency plans in the case of server failure and, more importantly, statistics which show the reliability of their servers in terms of uptime.

Speed

Download speeds are one of the most essential elements of cloud storage for you to consider. The speed at which you can download your data can have a significant impact on your ability to do business. Say, for example, you’ve suffered a data disaster and need your data restored as soon as possible, if your cloud storage provider has a cap on their download speed then it’s going to take longer to get back up and running. That’s why you need to make sure you understand the download speeds that are available from your cloud storage provider.

Security

If your data becomes compromised then cloud storage provides a useful backup. However, there’s no guarantee that your cloud storage provider is safe from security breaches. And, if they are compromised, then the safety net of their backup is suddenly removed. This leaves you in a precarious situation whereby the safety of your data is significantly reduced. Therefore, understanding your cloud storage provider’s security measures are paramount. The main factors to consider are the provider’s physical security of their servers and the level of encryption they apply to stored data.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


Backing up data is crucial for any organization, but it’s even more important that a good backup is performed or it may not be worth backing up at all.

Wasting time and resources on the wrong type of data or failing to backup data effectively can spell disaster for your restore options, so it’s essential you maximize the efficiency of your backup process. Understanding how you can improve and enhance your backup process, though, is a major struggle that many organizations face.

Therefore, we’ve put together a few pointers on how you can begin to reorganize your backup process and ensure that the data you need is available when you need it.

Keep Three Copies of Your Backup

The more sure-fire way to protect the availability of your data is by making multiple copies. The minimum you need is three, but what’s most important are the locations these backups are stored in. Naturally, you will want one copy based on site, but to minimize a loss of data you will also want two copies that are based off site. By storing these in, for example, a cloud based server or a remote data center, your organization can rest assured that a successful restore is almost guaranteed in almost all data loss scenarios.

Monitor Your Backups

As data gets bigger and bigger, the complexities behind backups increase accordingly. And this is why monitoring and analyzing your backups is more important than ever. To better understand how your system is coping then you will need to implement systems which can automatically survey servers and monitor how effective your backup process is and list any failures. Performing this kind of analysis manually is incredibly labor intensive and involves a lot of spreadsheets, so investing in specialized, automated software is vital to safeguard future backups.

Cloud Backup is Crucial

Cloud servers provide a highly elastic option for all your backup and restore needs, so there’s no excuse for not integrating them into your backup process. Not only can cloud servers help to counter the rapid increase in data size, but, as a remote system, they deliver fantastic protection from ransomware and other data disasters. Data can be transferred/accessed from cloud servers exceptionally quickly compared to traditional wide-area networks, so a cloud server can get your organization back on track quicker than ever before.

Protect Everything

While Windows is the primary target of most data attacks, it’s impossible to say that other services – such as the virtual application host Citrix – will not become the focus of attacks in the near future. Protecting all your servers and applications, therefore, allows you to keep your defenses fully manned and minimizes the amount of data loss that could occur. It’s important, however, that you don’t complicate your backup process with numerous pieces of software to help backup individual components. Instead, look for an all-in-one solution that can automate all the various backups and keep all your data safe.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More