Webinar recording: Network Security in the Cloud – Join the Revolution

Cato Networks is rethinking network security from the ground up and bringing it into the Cloud. Cato connects your branch locations, mobile users, physical and Cloud infrastructure into a secure and optimised global network in the Cloud.

Cato is making Network Security Simple Again.

Watch this recording to learn how Cato’s Cloud-based Secure Network offers a simple and affordable platform to securely connect all parts of your business.

Find out more about Cato Networks here.

Securing Your Network & Keeping You Compliant in 2017

Happy New YearWishing you a very Happy New Year and a warm welcome back to the office after the Christmas break.

We’ve been working hard to continue to make sure that we offer you the best IT networking & security solutions the industry has to offer. This short update will give you links to valuable resources you may find useful at the start of this year to help you keep your networks secure, fast & compliant. So please take a look and sign up for (and share!) the webinars & events coming up over the next few weeks some of the topics include; cloud security, AI and machine learning, endpoint security, threat prevention and the GDPR.

Cato Networks logo

Security in the Cloud – Are you ready to join the revolution?
Webinar – 25th January

We are delighted to announce our partnership with Cato Networks. Cato Networks is rethinking network security from the ground up and bringing it into the Cloud. Cato connects your branch locations, mobile users, physical and Cloud infrastructure into a secure and optimised global network in the Cloud. Intrigued? Join our webinar on the 25th January to find out more.

Register here for the Cato Networks webinar.

Blackfoot UK logo

GDPR – What you need to do NOW to make sure you are compliant in 2018
Webinar – 22nd February

One of our best attended webinars at the end of last year was around GDPR, so here’s another chance for you to get up to speed. Your customers are more and more aware of their entitlements around data protection; they want privacy rights and strong protections. But are you confident in how to process your customer information in the light of GDPR? Join our webinar for invaluable hints and tips on how to get GDPR compliant NOW.

Register here to attend our GDPR webinar.

Palo Alto Networks logo

Threat Prevention & Advanced Endpoint Protection
Workshop – 8th March

We continue our strong partnership with Palo Alto Networks in 2017 and are pleased to announce our first Ultimate Test Drive workshops for 2017 will be taking place on Wednesday 8th March at Palo Alto Networks, 140 Leadenhall Street, London, EC3V 4Q.

We will be running 2 free sessions on this day, you are welcome to register for one or both sessions.

Session 1: 09.30 – 13:30
Threat Prevention, Ultimate Test Drive

Session 2: 14:00 – 16:00
Advanced Endpoint Protection, Ultimate Test Drive

Register here to attend one or both Ultimate Test Drive sessions.

Cylance logo

Know the Truth
Workshop – 23rd March

Another partnership we are keen to announce is with Cylance. Cylance protects your endpoints against advanced malware with the world’s first antivirus built on artificial intelligence and machine learning. It’s AI and machine learning-based tools prevent threat execution, before the damage is done. It doesn’t simply protect against known threats, it identifies and defuses never-before-seen attacks.  Join our ‘Know the Truth’ workshop on Thursday 23rd March 2017 in central London to find out more.

Register here to join our Cylance endpoint protection workshop.

That’s it for now. If you would like further information on any of the above – and you just can’t WAIT until the dates listed – please get in touch. We’ll be on the case.

Happy January,
Network Utilities Team

GDPR – It’s coming, and it will impact your business

Your customers are more and more aware of their entitlements around data protection; they want privacy rights and strong protections. But are you confident in how to process your customer information in the light of GDPR? Watch our video for invaluable hints and tips on how to get GDPR compliant.

Busting The Top Four Myths About Hacking

By Torben Andersen, CCO, SMS PASSCODE

Are you protecting your data with just a password? If your answer is no, and you have strong multi-factor authentication in place, then good job: you are free to go out and enjoy the sunshine. If you answered yes, then stick around for a few more minutes to learn why a password alone is not enough to secure access to your corporate networks and applications.

Still here? Okay then, allow me to start by busting some of the typical myths about hacking today.

1# Myth – Hackers only target the big brands
blog-image-1

When big brands like Target, eBay, Adobe, and Sony are hacked, it’s big news for business and mainstream publications. Don’t be fooled: big companies aren’t the only ones being targeted. In fact, research shows that 31 percent of all hacking attacks were aimed at businesses with fewer than 250 employees.

2# Myth – You have nothing valuable for hackers to steal

blog image 2.jpgFair enough. Not everyone is fortunate enough to be storing breakthrough research with the potential to revolutionize your industrythe world if only you can keep it secret long enough to secure a patent. But what about your business email? Email often contains highly sensitive data, such as competitive bids, investment plans or pipeline information. Imagine the damage if these details were to fall into the wrong hands.

There’s even more low-hanging fruit to steal if hackers breach your network. Customer records, credit card information and even employee user credentials are worth as much as $50 USD per record when sold on the Internet. An entire shadow economy has emerged online with brokers selling stolen user records; according to the FBI, cybercrime has become even more profitable than drug-related crimes. This makes everyone a target.

3# Myth – Your anti-virus and network vulnerability tests will keep you safe

blog-image-3Patch management, updated anti-virus applications and frequent network vulnerability tests are all good weapons in a defense against hackers. However if you are not securely authenticating your users when they access your corporate networks or applications, then you’re leaving the front door open for the hackers. Research shows that weak or stolen passwords are exploited in 76 percent of all network breaches. So, yes, this really is the hackers’ preferred way in.

4# Myth – Hackers are teenagers lurking in a basement somewhere

For most of us, the word “hacker” prompts images of pale teenage boys with long hair, black t-shirts and a serious grudge against Microsoft. While many hackers probably still fit this description, the reality is that the hacker has evolved. Today’s hacker is highly-educated, well-connected, and well-equipped, enjoying a high-income profession as a professional cybercriminal. The hackers have some powerful tools at their disposal, and many poorly-protected victims has made hacking easier than ever before, resulting in cybercrime becoming the fastest growing crime type in the world.

Hackers’ motive is most often financial gain, but “hacktivism” is also becoming a growing threat to nations and organizations that don’t sympathize with the hacker’s cause.

Knowing what’s myth and what’s fact is essential to avoid running unnecessary risks to your business. SMS Passcode have created an infographic and short video that capture the key facts from the latest research about the threat companies face from hacks.

Additional Resources:

Webinar Recording – Traps Demo Palo Alto Networks

AV can no longer stop today’s threats. Traps™ advanced endpoint protection is the only product offering that replaces AV with “multi-method prevention”: a proprietary combination of malware and exploit prevention methods that pre-emptively block both known and unknown threats.

If you are concerned about uptime, reputation and IP then view our webinar to learn how to secure the endpoint with Traps™.

Privacy Is a Human Right; do you understand your data obligations?

On Thursday we gathered together with clients at information security consultants Blackfoot UK’s head office in London to talk about a trending topic in the IT world today.

Data and Cyber Security Matters in a Post Brexit World.

David Silsby our Sales Director welcomed us on this very chilly morning reiterating the Network Utilities ethos of “Identity should be at the heart of everything we do; the identity of the individual and the device is key! Remembering Who is on your network, What they are trying to access and How is critical to ensuring your network remains secure, fast and compliant.”

Next up was Matthew Tyler, CEO of Blackfoot UK and our keynote speaker for the day. Giving us a time hop into the past where we learned some interesting facts. The European Convention on Human Rights (ECHR) came into effect in 1953 and is an international treaty to protect human rights. The definition of privacy as in Article 8 states “A right for one’s ‘private and family life, his home and correspondence’ to be free from unlawful searches”.  In the UK human rights are protected by the Human Rights Act 1998. Matthew went on to explain how the internet has changed the economics of data and contributed to the erosion of privacy, he also detailed current privacy laws and how Brexit will change the future. Below you can see the 8 principles of the Data Protection Act, governing the use of personal information which we must comply with, unless an exemption applies, the principles state that data must be:

  • Used fairly and lawfully
  • Used for limited, specifically stated purposes
  • Used in a way that is adequate, relevant and not excessive
  • Accurate
  • Kept for no longer than is absolutely necessary
  • Handled according to people’s data protection rights
  • Kept safe and secure
  • Not transferred outside the UK without adequate protection

Data is an extremely powerful tool in today’s business world. Knowing your customer well can create a tailor made customer experience. The future of business intelligence is evolving and we will soon start to see new services and businesses arise to help us harness the power of this business intelligence.

iot_of_ransomware

Protecting your customer’s data has never been more critical

The cost of a data breach can have a huge impact on you and your business including; bankruptcy, reputational damage, legal implications and of course loss of data. You need to have the appropriate security in place depending on the value of the data you hold i.e. credit card details or email addresses. Do you know the value of your data? Do your staff know what risky looks like? And are they fully trained and aware of the implications of clicking on a malicious links, for example? Research tells us you are only as strong as your weakest link, and that in most cases is your staff.

This brings me onto 5 key questions posed by Matthew around what you need to be asking yourself and your business to truly understand the type of data your business holds.

  1. Do we know what data we have?
  2. Do we understand its potential value and the associated risk?
  3. Do we know who could want our data (for good or bad)?
  4. Do we understand where our data is and who can access it?
  5. Do we know what protection our data needs?

The cost of a data breach

The Cost of a Data Breach

* IBM Security 2016 – Cost of a Data Breach Study

If you would like to know more about European regulations and what’s changing in the UK, how to keep your customers data safe and the implications of personal data being lost or misused then you can download Protecting Data and Privacy to get a full overview. Remember you are only as strong as your weakest link!

Will the defenders ever be faster than the attackers?

Our Principal Technology Strategist, Malcolm Orekoya shared his research on the current threat landscape. Did you know that 89% of breaches had a financial or espionage motive?

In order for us to understand cyber security we need to understand the cyber-crime world. These attackers have the same technology advancements that we do and they are always one step ahead. The resources are available for anyone online and you can even pay for “cyber-crime” support. Organised crime is evolving quickly due to underground criminal networks and the so called dark web. The tools are getting smarter and depending on what these criminals are after they will attack in different ways.

“Analysis of known bad malware found that the 91.3% of that malware uses the Domain Name Service (DNS) to carry out campaigns.” Cisco Annual Security Report 2016

There has been an explosion in ransomware and exploit kits are sophisticated. “The Angler exploit kit is one of the largest and most effective exploit kits on the market. It has been linked to several high-profile malvertising (malicious advertising) and ransomware campaigns. And it has been a major factor in the overall explosion of ransomware.” Cisco Annual Security Report 2016

“33% of the malware observed in 2016 research used encryption.” Trustwave Global Security Report 2016

Most legacy platforms cannot see encrypted traffic therefore there is a loss of visibility. Malicious users are aware of this vulnerability and that you don’t have visibility so exploit this lack of visibility to insert their malware into your network. It’s crucial for you to have network visibility in order to be able to effectively apply security policies.

Education

People are your best network defence, but only if they are educated to understand the risks. We advocate creating a data security awareness culture. The one constant factor that exists in all layers of security is the human element. The idea here is to educate people on common threats and their various guises, test their understanding and responses to this education over time, review the results of such tests and then repeat the entire cycle periodically over and over again. You can read Malcolm’s full blog Stop Phishing Attacks – Harness the Power of Your Human Sensor Network – Here.

It’s not if; it’s when!

You need to collaborate to stay ahead of the trends and the cyber security landscape. Think ahead to prevent future attacks. Think of the cost and rewards of investing in your network security vs the risk of not doing so. Ask yourself, can you afford to lose it all when you do get attacked?

SC Magazine recently ran a survey on 900 business and IT decision makers across the UK – EU GDPR – nine out of ten don’t understand it. A staggering 91% of respondents have concerns about their organisation’s ability to comply with GDPR. This regulation will come into effect in 2018 and the penalties will be high, that might seem like a long way away but it’s just around the corner, and you’ll need to be prepared.

Talk to specialists who are confident about compliance and threat prevention. Talk to Network Utilities.

Upcoming events:

We will be hosting another webinar on the 22nd February 2017. To find out more on your obligations and how GDPR will affect you and your organisation join our webinar with information risk, security and compliance specialists Blackfoot. You can register here.

t: 020 8783 3800 e: sales@netutils.com

About Network Utilities
Identity Centric Networks & Security

Network Utilities (Systems) Ltd have been providing identity centric network and security solutions to organisations ranging from Telecoms and ISPs to large corporates and SMEs for over twenty three years. Partnering closely with both industry leading and niche technology vendors to bring customers the best solutions the industry has to offer. Read more at www.netutils.com.

Webinar Recording: No DNS, No Internet, No Business

Following the increase in the number of companies being attacked on their DNS servers, Efficient IP released four major security innovations: Hybrid DNS Engine, DNS Blast, DNS Cloud and DNS Guardian. It is the only Adaptive DNS security solution on the market capable of guaranteeing 100% availability during a DDoS attack.

View the recording of our recent webinar and learn how to:

  • Ensure business continuity
  • Protect customer data and intellectual property against exfiltration
  • Preserve your brand reputation and customer trust
  • Reduce TCO and deliver fast ROI