Blog

by Neroli Baird Neroli Baird No Comments

How to stop ransomware attacks in 2017

In May 2017, an ominous message greeted workers in the UK’s National Health Service (NHS): “Oops, your files have been encrypted!”

This is how malware known variously as WannaCry, WannaCrypt or WannaCryptor 2.0 announced itself to the wider world. With systems locked and critical files encrypted, doctor’s surgeries had to close and hospitals turned patients away from essential treatments.

How did this happen? Security experts believe an NHS user clicked a link or opened a file they shouldn’t have. Others pointed the finger at the NHS’s network of antiquated hardware and unsupported software as the main factor that facilitated the spread of WannaCry.

The worm spreads

Distributing ransomware isn’t hard. This type of malicious software is easy and cheap to spread. In the case of WannaCry, and its related variants, it can infect connected systems without any user interaction, much like a worm that continually replicates itself. The victim then has a powerful incentive to pay up and, if they don’t, the criminals’ investment has been minimal.

The victim then has a powerful incentive to pay up and, if they don’t, the criminals’ investment has been minimal.

Why is healthcare vulnerable to ransomware?

Hospitals and other organisations in the healthcare sector are attractive targets, specifically because of the:

  • Ageing hardware, software and security systems that they often run.
  • Misconfigured systems, specifically security software that is easy to bypass.
  • Valuable data they hold, including sensitive patient health records and personal information.

Should you pay hackers a ransom?

Cybersecurity experts advise against paying a ransom to hackers.

In the first instance, there is no guarantee you will gain access to your encrypted files. An Australian study found that close to a third of affected organisations who did pay failed to recover their data. Paying may also encourage the criminals to continue their activities, and they could even re-target your organisation.

How to stop ransomware infecting your organisation

Like any infection, prevention is better than cure, especially when it comes to the security of your network. Even if you are dealing with a tight budget, skeleton IT staff and minimal cybersecurity expertise, you don’t necessarily have to spend big to ensure your network remains free of malware like WannaCry.

Your users should be the first line of defence. If employees don’t know what to look for, how can you hope to remain malware free? As a matter of priority, you need to:

  • Train your staff so they know how to identify phishing attacks that could contain malicious ransomware.
  • Ensure your organisation is running updated software with the latest security patches.
  • Regularly back up your systems to physical sources and the cloud.
  • Have a clear email security protocol that discourages users from clicking on suspicious links, attachments or emails.
  • If a computer is infected, isolate it from the network and alert all staff.
  • Invest in hardware that’s up to the task of warding off threats.

Ransomware is constantly evolving, so it’s a case of mitigating the threat to ensure your networks, data and reputation aren’t compromised.

by Neroli Baird Neroli Baird No Comments

Office 365 advances the learning process

Cloud-based technologies are revolutionising teaching and learning, and Microsoft’s Office 365 Education offers sophisticated tools to do just that.

Office 365 comes with a lot of the usual Microsoft software offerings, now bundled together in a subscription-based model. However, more importantly for school CIOs and IT education decision-makers, Office 365 features Education, a state-of-the-art collaboration product that has the potential to improve teaching and learning processes.

Office 365 Education offers students and teachers a whole new way to communicate via cloud-based email, web conferencing and document-editing tools. It also provides access to applications and files from any connected device.

Recognising the popularity of apps, Office 365 also has apps that can complement its Education package. These include OneDrive, which offers 1TB of file storage per user and accounts that can customised according to a school”s needs; Yammer, a private social networking app that lets students and teachers communicate at any time; and Lync Online that enables audio and video calls.

Additionally, students and teachers can share Excel, Word and PowerPoint files and simultaneously work on them from different locations, doing away with the hassle of needing to integrate document versions later.

Classrooms for the digital age

Office 365 Education includes Microsoft Classroom, a homepage where teachers can manage classes and assignments online. This can help with tasks such as organising multiple class sections (e.g. History or Geography A and B), creating assignments, collaborating with other teachers on syllabuses and providing students with feedback.

Students can engage with teachers and classmates as well as access class materials if they”re off sick, while apps such as Sway allow teachers to design interactive online lessons, assignments and even newsletters from a phone, tablet or browser.

Office 365 also comes with protection against spam and viruses, making it a secure place to share documents. As a cloud-based service, it”s also logical to use Office 365 for data backup and storage.

A long way from blackboards and chalk

Office 365”s education tools allow for anytime, anywhere learning. They also incorporate new ways for teachers and students to collaborate on assignments and projects while allowing for better management of files on all devices including mobiles.

Technology has advanced rapidly since the first Apple IIs and IBM PCs arrived in classrooms around the world. Today, schools have access to digital tools that were once the exclusive domain of the workplace. Student engagement is just one of the many benefits – because we know how much the typical K-12 pupil loves technology.

by Neroli Baird Neroli Baird No Comments

The hidden costs of purchasing a PC

This article first appeared on ThinkFWD.

Contributor: Stuart Corner

“Procurement and deployment of the PC and other devices is about to be dragged, kicking and screaming, into the 21st century as a growing number of companies explore the potential benefits of PC-as-a-Service (PCaaS) and Device-as-a-Service (DaaS),” says Tom Mainelli, program vice president of devices and displays at IDC.

According to a IDC survey from earlier this year, almost 25 per cent of IT decision-makers are already actively considering PCaaS, and a further 20 per cent say they plan to do so within 12 months. And it’s not difficult to see why.

At one extreme, running a fleet of PCs in a corporate environment requires considerable capital outlay for their purchase and for the provision of the IT resources needed to maintain them. At the other extreme, these functions can be outsourced through leasing and support contracts, but that typically requires three separate relationships: hardware supplier, finance company and support provider.

Most organisations will have a PC procurement and support regime that sits somewhere between these two extremes, but in any variant there are many hidden costs. IT consulting firm Nash Networks estimates that the purchase of hardware and software typically accounts for less than 50 per cent of the total direct costs.

Nash Networks lists a whole set of indirect costs that it says can account for as much as 50 per cent of the total cost of ownership, and are often completely hidden. These costs generally arise through suboptimal maintenance and/or inadequate user support. They include lost or reduced productivity because of downtime and time spent by staff providing informal IT support to colleagues.

The DIY system

A good indication of what’s involved in supporting a fleet of PCs under a do-it-yourself (DIY) model is MTC Training’s course, Managing Enterprise Devices and Apps Using System Center Configuration Manager (SCCM). SCCM is a product from Microsoft designed to facilitate the management of Windows PCs. The course is intended for experienced IT professionals who are typically enterprise desktop administrators. These are people who deploy, manage and maintain PCs, devices and applications.

Here’s a list of topics covered – that is, what someone in such a role is expected to undertake:

  • Managing desktops and devices in the enterprise.
  • Preparing the infrastructure to support desktop and device.
  • Deploying and managing the configuration manager client.
  • Managing inventory for PCs and applications.
  • Distributing and managing content used for deployments.
  • Deploying and managing applications.
  • Maintaining software updates for managed PCs.
  • Implementing endpoint protection for managed PCs.
  • Managing compliance and secure data access.
  • Managing client status, power management and remote administration.
  • Maintaining configuration manager sites and site systems.

If not leaving it up to a provider, a business would have to single-handedly conquer all of this. It could represent a costly undertaking, and might also be well beyond the capabilities and resources of an organisation.

The PCaaS alternative

PCaaS replaces these with a single contract and a per-device monthly fee. PCaaS contracts are based on a fixed hardware refresh cycle, generally three years, with hardware and software support that includes ensuring software is kept up to date and, in particular, that the patches needed to keep systems secure are applied expeditiously.

There’s also a strong argument for PCaaS purely on the grounds of optimal deployment of capital. Every business needs access to capital to fund its growth, and while PCs are vital to the operation of most businesses, the operation of the PCs is not core business. Capital can be more usefully applied to business growth if PC provision is made an operating expense.

This is particularly true for startups and small businesses. The advent of Software-as-a-Service has reduced business small business costs enormously in recent years. Provided under an ‘as-as-service’ model, the PCs needed to access that software remove yet another barrier to entrepreneurship.

PCaaS allows businesses to not only outfit their offices without having to buy everything outright, but also streamlines their IT support costs as part of the service. It’s important to be aware of these costs, as you don’t want to be left unexpectedly out of pocket when you budget in your PCs.

by Neroli Baird Neroli Baird No Comments

Four ways to enhance your endpoint security

It’s quite likely you use several devices, such as a smartphone and a laptop or desktop PC, to run your business. Each device, however, represents an access point for threats like viruses and malware. Endpoint security aims to secure these network ‘endpoints’ so that suspicious online activities are blocked at the point of entry.

The need for endpoint security has risen sharply, particularly in response to the rise in mobile threats and the growing internet of things (IoT). Most vulnerable are SMBs with offsite employees who need to access the company’s network. But the reality is that all businesses are at risk, given today’s ever-shifting and undefinable security perimeter.

So, what are today’s SMB leaders doing when it comes to endpoint security? How can you ensure every tech outpost in your business is secure? Here are four key strategies.

1. Remove or limit administrative access

Most employees don’t need administrative rights to perform their day-to-day jobs. If an endpoint app does require administrative access to your network, it can be added to a database of approved programs by an access control tool. Limiting administrative access in this manner can greatly limit damage within your core network caused by an attacker who is targeting the endpoint device.

2. Use advanced authentication

Many successful endpoint breaches are the result of employees using the same password across multiple sites. If just one site is compromised, it’s only a matter of time before yours is broken into. Two-factor authentication fixes this problem by requiring extra credentials to access the system, such as a token code or smart card. This blocks attackers even if the password has been stolen.

3. Keep your systems up to date

New security vulnerabilities are being discovered all the time. Hackers are constantly keeping watch – and using them against SMBs to find out which ones neglected to patch their systems. If you use various endpoint devices in your business, it’s important to ensure your business apps, anti-malware programs and other security tools are kept up to date with the latest security patches and virus definitions.

4. Conduct security training and awareness sessions

A recent IBM study found that 60 per cent of business data breaches originate from employees, with about a quarter of these being accidental. Ongoing awareness and training on security best practices, in areas such as data encryption, password security and BYOD (bring your own device), can help keep your network safe.

As your data network gains more endpoints, the number and variety of cyber risks will only increase. These steps will help to ensure that your SMB is better protected and more resilient against online attacks.

by Neroli Baird Neroli Baird No Comments

Secure and stable storage strategies for businesses

Even the smallest of businesses can generate a huge amount of data, and that data has to go somewhere.

Government regulations require businesses to keep and back up certain data for legal reasons; many firms choose to retain information like employee records, emails and instant messages; and every new version of a software application has to be stored somewhere. All that information must then be backed up to protect the business against viruses, ransomware and spyware that might infect their system and put a halt to trading. And that’s not even considering those firms that want to analyse their big data to further profits and business goals.

What are the options?

Despite the mission-critical status of all this data, many small and medium sized businesses lack an overarching storage strategy that can ensure the business keeps trading no matter what. There are a number of options, and the good news is the price-per-gigabyte of storage has never been cheaper – even outside the cloud.

Small and medium sized businesses can opt for:

  • Direct attached storage (DAS): Devices connected to PCs or servers, usually via USB. Good for information that’s frequently accessed.
  • Network attached storage (NAS): Devices that connect directly to the network and operate as a file server. Good for storing large files.
  • Cloud storage: Online storage that comes in public, private or hybrid configurations. Good for mobile access.
  • Offline media: Backing up data on to tape drives, DVDs or Blu-rays sounds a bit old-fashioned, but Google still backs up Gmail onto tape as a last resort and Facebook has its Blu-ray Cold Storage Data Center. Good for archiving.

How to choose your storage strategy

For most small and medium sized businesses, a combination of these storage solutions will make up a good strategy, but figuring out the ideal combination can be challenging. Small and medium-sized businesses need to analyse their storage needs closely, looking at which applications generate the most data, how quickly and from where most data needs to be accessed. They also need to assess how old the data is, if it’s being unnecessarily duplicated, and if it’s business related or operations related.

Mission-critical data, like operations-related software applications and the business website, is the most important regardless of the size of the company. Firms need to consider having at least two complete separate copies of this – with one offline – to ensure business continuity.

In the end, the budget and volume of data will help determine the combination of solutions an SMB requires. However, careful assessment of the data, the legal and regulatory ramifications, and business continuity are all essential for a secure and stable storage strategy.

by Neroli Baird Neroli Baird No Comments

Do you need to upgrade your network?

Upgrading your company’s network isn’t likely to be cheap or straightforward. Your network affects every aspect of your business’ ICT, and downtime or making the wrong decisions will impact everyone.

Whether you’re replacing outdated technology or expanding your network infrastructure, regular upgrades are essential for keeping your business productive and profitable as well as your data secure. On the other hand, if your network is already fit for purpose, upgrading too early will mean unnecessary expenditure and hassle.

If you’re the one responsible for making that call, you should be able to evaluate your network’s suitability and decide whether it really needs an upgrade right now, what type of upgrade and how to make the switchover with as little impact on the day-to-day as possible.

What types of upgrades?

Networks aren’t a one-size-fits-all solution — they’re as diverse as your business needs them to be. Networks can be upgraded to:

  • Expand your range or capacity: As your business grows, so does your network. You could be adding more computers to your office, linking to remote locations or hiring more cloud storage to host your growing data.
  • Improve security: Network upgrades are an opportunity to improve your business’ resilience to cyberattacks. Updating hardware and software will help protect your company’s data and the privacy of your staff.
  • Boost productivity: Like any good investment, your network upgrade should pay for itself before long by improving productivity, saving time and reducing maintenance.

Figuring out what you need

Everyone on your network has unique needs and, while an upgrade may not be able to satisfy them all, you should aim for the best compromise. Talking to department heads and sending out surveys can offer valuable insights that you might not have considered.

You should also check capacity and usage statistics to see whether network speeds and storage need improvement. If you don’t have the resources or the know-how to evaluate your network capabilities, you can hire consultants to do it for you.

Planning the upgrade

Your survey results offer an idealistic guide to work from, but you first need to think about practicalities, such as:

  • How many devices need to connect to your network?
  • Will people connect to your network outside the office?
  • What type of software will they be using?
  • How much data is sent and received every day?

Any upgrades you make should primarily help your business achieve its objectives, which also means minimising the negative impact on the business and on users as much as possible.

You’ll never truly be finished upgrading your network but, through careful planning and projections, you can establish a flexible network capable of supporting future growth. Technology comes and goes, but the infrastructure you lay down today can future-proof your business for years to come — not to mention making subsequent upgrades a lot easier.

Wired or wireless?

One decision you could face when rolling out your new network is whether to replace your wired connection with a wireless network hosted in the cloud.

While wireless connections are more convenient, on-premise networks have traditionally been faster and more reliable, as they experience less downtime and don’t have the same range of limitations. This has started to change, however, and cloud services also offer adequate security for most business needs.

For many companies, a hybrid model is the ideal middle ground — storing less sensitive data and apps in the cloud while keeping more critical data on your premises. This can reduce costs and improve convenience while ensuring you’ll always have access to your data when you need it.

And that’s the key consideration — are you providing the people who use your network the speed, access and capabilities they need? If not, then it’s time to upgrade and ensure you’re not holding your business back.

by tara tara No Comments

Securing Your BYOD Policy

Securing Your BYOD Policy

Work practices have undergone a revolution in the digital age. Networked devices and more mobility have blurred the line between work and home as vast numbers of people perform their jobs across multiple platforms, often far from the office.

An accompanying phenomenon is the bring your own device (BYOD) policy which allows employees to use their own laptops and smartphones in the office or, alternatively, to use those devices to work from home.

BYOD has its pros and cons, and organisations that already have a policy in place or are contemplating implementing one need to tick some boxes to make sure it runs as smoothly and securely as possible.

The Good

BYOD has obvious advantages for staff who like the convenience and familiarity of working on their own devices. It could also lead to productivity gains, as users have an affinity for their own personal devices and how they use them.

Personal laptops, tablets and smartphones are usually more cutting edge, given that companies often don’t update their desktops for years on end. BYOD also allows staff to carry only one or two devices around with them, rather than different ones for work and personal use.

BYOD policies can save organisations money, as they don’t have to spend as much on their IT hardware while allowing workers increased mobility.

The Bad

Having said that, BYOD practices are not free from security concerns. More and more mobile devices provide greater scope for ways to breach a company’s IT infrastructure.

Some employees may not be as stringent as they should be about the information they bring home that could be highly sensitive or confidential. Once they take it out of the office, there’s nothing stopping them from sharing it across devices, networks, emails or even showing it to their family and friends.

Disgruntled employees about to walk out the door pose an even bigger threat. If they are leaving to work for a competitor, BYOD makes it easier for them to take intellectual property with them. Alternatively, if an employee uses a smartphone to access the company network then loses it or it’s stolen, an unauthorised person could retrieve unsecured data on the device. Staff can also sell their devices or give them away and forget to wipe company data beforehand.

And the Necessary

A good BYOD policy should contain two critical components: an application or software program for managing the devices connected to your organisation’s networks, and a written agreement that clearly states the responsibilities of employers and staff.

For example, IT departments wishing to monitor the use of personal devices must ensure that they only monitor activities that access company information.

Software developers and device manufacturers are constantly releasing security patches and updates for threats such as viruses and malware. BYOD policies should have the necessary processes in place to automatically apply those patches across all the agreed BYOD devices.

Additionally, organisations can simplify the whole process by limiting the number or make of devices allowed in their BYOD programs and the systems they have to support. Supporting a broad range of devices could become an administrative nightmare.

The IT department should also have permission to remotely wipe the device if it’s lost, the employee leaves or if it detects a data breach, virus or any other threat to its infrastructure.

BYOD should satisfy employees and management alike, as long as there’s a clear understanding of everyone’s responsibilities. Before settling on the best BYOD policy for your organisation, it’s worth getting input from HR, IT, finance, legal and anyone else who has a stake in the matter.

by tara tara No Comments

Does your business have a storage strategy?

Secure and stable storage strategies for businesses

Even the smallest of businesses can generate a huge amount of data, and that data has to go somewhere.

Government regulations require businesses to keep and back up certain data for legal reasons; many firms choose to retain information like employee records, emails and instant messages; and every new version of a software application has to be stored somewhere. All that information must then be backed up to protect the business against viruses, ransomware and spyware that might infect their system and put a halt to trading. And that’s not even considering those firms that want to analyse their big data to further profits and business goals.

What are the options?

Despite the mission-critical status of all this data, many small and medium sized businesses lack an overarching storage strategy that can ensure the business keeps trading no matter what. There are a number of options, and the good news is the price-per-gigabyte of storage has never been cheaper – even outside the cloud.

Small and medium sized businesses can opt for:

  • Direct attached storage (DAS): Devices connected to PCs or servers, usually via USB. Good for information that’s frequently accessed.
  • Network attached storage (NAS): Devices that connect directly to the network and operate as a file server. Good for storing large files.
  • Cloud storage: Online storage that comes in public, private or hybrid configurations. Good for mobile access.
  • Offline media: Backing up data on to tape drives, DVDs or Blu-rays sounds a bit old-fashioned, but Google still backs up Gmail onto tape as a last resort and Facebook has its Blu-ray Cold Storage Data Center. Good for archiving.

How to choose your storage strategy

For most small and medium sized businesses, a combination of these storage solutions will make up a good strategy, but figuring out the ideal combination can be challenging. Small and medium-sized businesses need to analyse their storage needs closely, looking at which applications generate the most data, how quickly and from where most data needs to be accessed. They also need to assess how old the data is, if it’s being unnecessarily duplicated, and if it’s business related or operations related.

Mission-critical data, like operations-related software applications and the business website, is the most important regardless of the size of the company. Firms need to consider having at least two complete separate copies of this – with one offline – to ensure business continuity.

In the end, the budget and volume of data will help determine the combination of solutions an SMB requires. However, careful assessment of the data, the legal and regulatory ramifications, and business continuity are all essential for a secure and stable storage strategy.

by tara tara No Comments

3 Things Your Mobile Employees Expect

You ask workers to travel for the company, to work far away from the office. In return, they quite reasonably ask for seamless workflow, because they’re working in a 24/7 world. That’s why they also need that long battery life. Possibly, they’re out of the office to wow clients. They can do that better with higher-quality displays. And it doesn’t hurt if the device looks good, whomever they’re meeting, because the appearance of your equipment says something about the quality of your organisation.

And if it could survive the odd bump, so much the better.

When it comes to buying your next work laptops, how can you give your out-of-office workforce an edge?

1. Touch technology for seamless device changes

According to Gartner, touch screens will be on one-third of all mobile PCs by 2018. Productivity is boosted when form and function are standardised across a full range of mobile devices.

And when you’re crammed into an airplane seat, being able to touch the screen could change everything. For the road warrior in the air, touch screens are less about fingers than elbows. What might sound trivial isn’t when you spend hours every week in cramped places.

2. Lighter high-performance materials

Whether your employees are carrying their laptops between meeting rooms or airports, they want them to be lightweight. Previously weight had been in a trade off with fragility. Today, there are plenty of laptops on the market that are lightweight and look good but are tough enough to withstand the wear and tear of the road (or the corridor).

One thing to look for when you’re specifying your next generation of laptops is carbon fibre. It’s high-strength and lightweight enough for NASA. And even glass is tougher these days, too, which is great, especially when paired with edge-to-edge display capabilities.

3. Wireless docking

It’s possible that one thing keeping workers out of the office and on the road was the thought of messing around with cables to dock their laptops when they get back to the office.

The latest in wireless docking technology will make coming back to the office seem like a treat. There’s a one-time set-up (isn’t there always?) but once it’s done, the user can wirelessly connect external displays, a keyboard, a mouse, speakers, and other peripherals to their laptop.

When it’s set up, all the user has to do is walk within range of the wireless dock on their desk and hey—presto.

Disconnecting is as simple as walking away. If only everything in business were that simple.

by tara tara No Comments

The Familiar USB is Coming to an End

The USB ports we’ve come to know and love are coming to an end—and that’s a good thing, or a disaster, depending on who you listen to among industry pundits.

For most organisations, though, the move to USB Type C is going to be a good thing, because it will offer greater peripheral flexibility and functionality while ultimately reducing costs. The process of migration could be a bit complicated, but with a bit of planning you should be able to avoid the worst problems while keeping users and accountants happy.

IT professionals on the job for a long time remember this same sense of worry from years ago when the USB Type A port began replacing the RS-232 9-pin port and Centronics parallel ports that were the standard connectors between personal computers and peripherals for two decades. Even after USB connectors became common in the late 1990s, many users insisted on the bulky serial and parallel ports because of legacy device concerns and worries about compatibility and speed.

Ultimately, though, manufacturers and users adapted, and today parallel ports are unheard of and 9-pin serial ports are rare on both desktop and laptop workstations. Just as USB Type A simplified peripheral decisions by creating a unified standard for connecting devices, USB Type C promises to further simplify the market by creating a single connection standard for peripheral devices, displays, and power connections. To hear some experts, though, this standardisation will cause the fall of Western civilisation rather than a simplification in your device inventory.

The complication…

The complication is that there are multiple device connections that use the same physical connector—and not all of them are compatible. Here’s a secret, though: if you start buying equipment and peripherals now and make sure that you’re buying products with the most up-to-date version of USB Type C, you won’t have any problems. Issues occur when you try to incorporate older devices into a newer fleet without educating users and staff. Keep your fleet up to date and educate your users on the necessity of having any legacy devices checked out by the IT staff before being connected to a workstation and you won’t have any problems.

Newer laptops equipped with USB Type C will allow you to have:

  • Auxiliary batteries that can work for both laptops and mobile devices.
  • Printers, input devices, two-factor authentication scanners, and other peripherals that work across your entire hardware fleet.
  • External displays that can easily be re-deployed across every device you procure.
  • The days of having to keep separate peripheral inventories for each device type in your fleet are coming to an end, and it’s all courtesy of USB Type C.

You’ll ensure that your transition to the new peripheral connection is as smooth and cost-effective as possible if you follow three simple steps:

  • Buy the right computers.
  • Educate your users.
  • Make sure that legacy peripherals are kept to limited applications with careful use instructions.
Top