10 Things You Need to Know About Ransomware

Some cyber security experts call ransomware attacks an epidemic.

In 2016, the FBI estimated that ransomware attacks resulted in over $1 billion in income for cybercriminals*. Experts attribute the ransomware epidemic to people’s carelessness in clicking on phishing emails and infected advertisements.

Here are 10 things organisations should know about ransomware:

  1. Ransomware was first reported in 1989
  2. Ransomware doesn’t discriminate when it comes to platforms and devices
  3. Ransomware can be distributed through various channels
  4. Ransomware often goes undetected
  5. Organisations should change their mindset from a reactive-based model to a prevention-oriented one
  6. Organisations should develop a prevention and response plan
  7. Organisations should identify a prevention and response team
  8. Organisations should perform a compromise assessment
  9. Organisations should complete a security tools assessment
  10. Organisations should respond and future-proof

Download the full infographic here – Infographic courtesy of Cylance Consulting

As threatening as ransomware sounds, damage can be avoided with increased user awareness coupled with the right security practices. Businesses need to be aware of the risks and take adequate precautions to minimize the impact in the event of an attack.

See Cylance in action for yourself? Register here to join our workshop at The Metal Box Factory in London on the 25th May and see the capabilities for yourself.

*Source: CNN

 

Network Utilities and EfficientIP partner to help customers become GDPR compliant

In July 2016 Network Utilities and EfficientIP announced their partnership agreement to provide UK based customers with EfficientIP DDI solutions and draw on Network Utilities’ recognised expertise in the market and expand EfficientIP’s existing partner network in the UK region. Both company’s solutions will help organisations in a variety of public and private industries – particularly telecom – to protect their critical applications from growing threats, as well as integrate advanced network infrastructure.

With new legislation coming into effect in May 2018, this is a critical time for all organisations to focus on the strength, resiliency, and intelligence of their networks to avoid data breaches and ensure GDPR compliance. Now is the time to start building a GDPR-compliant infrastructure and providing sufficient security at the DNS level can save companies huge amounts of money and help avoid unnecessary GDPR proceedings.

David Silsby, Network Utilities Sales Director, believes this continued partnership will be beneficial to prospects and customers: “This new GDPR legislation puts the responsibility on companies to make sure their networks are as secure as possible, which will mean much more than just protecting the companies data it means protecting the whole infrastructure. No one can afford to ignore GDPR and working together with EfficientIP, Network Utilities will be able to offer customers a more enhanced security offering.”

David Williamson, EfficientIP CEO, is also looking forward to a continued partnership: “The addition of Network Utilities to our partner group is key to bringing new adaptive security solutions to their customers. The past two years have seen a dramatic increase in cyber security attacks, and DNS has been confirmed as being a weak point of the network infrastructure. We have the solution for this in our 360° DNS Security, and Network Utilities has the expertise to apply it as part of their offering.”

Network Utilities will be hosting a webinar with Martin Wellsted from EfficientIP on the 3rd May.  Register here and find out more about DNS exfiltration and how to prevent the unauthorised transfer of data from your organization.

EfficientIP webinar Twitter v2

 

Webinar – GDPR It’s coming, and it will impact your business

Are you confident in how to use and process your customer information in the light of GDPR?

  • Will your data processing involve the collection of new information about individuals?
  • Will your data processing compel individuals to provide information about themselves?
  • Are you using information about individuals for a purpose it is not currently used for, or in a way it is not currently used?
  • Will the processing require you to contact individuals in ways, which they may find intrusive?

If you answered YES to any of the above questions then you should take the time to watch our on demand webinar and find out about your obligations and how GDPR will affect you and your organisation.

Register your interest to attend our GDPR workshop – If you would like to join our GDPR workshop on the 19th April, please fill in your details below to register your interest and I will be in touch with an invitation and full agenda.

Thank you
Kara

Webinar recording: Network Security in the Cloud – Join the Revolution

Cato Networks is rethinking network security from the ground up and bringing it into the Cloud. Cato connects your branch locations, mobile users, physical and Cloud infrastructure into a secure and optimised global network in the Cloud.

Cato is making Network Security Simple Again.

Watch this recording to learn how Cato’s Cloud-based Secure Network offers a simple and affordable platform to securely connect all parts of your business.

Find out more about Cato Networks here.

Securing Your Network & Keeping You Compliant in 2017

Happy New YearWishing you a very Happy New Year and a warm welcome back to the office after the Christmas break.

We’ve been working hard to continue to make sure that we offer you the best IT networking & security solutions the industry has to offer. This short update will give you links to valuable resources you may find useful at the start of this year to help you keep your networks secure, fast & compliant. So please take a look and sign up for (and share!) the webinars & events coming up over the next few weeks some of the topics include; cloud security, AI and machine learning, endpoint security, threat prevention and the GDPR.

Cato Networks logo

Security in the Cloud – Are you ready to join the revolution?
Webinar – 25th January

We are delighted to announce our partnership with Cato Networks. Cato Networks is rethinking network security from the ground up and bringing it into the Cloud. Cato connects your branch locations, mobile users, physical and Cloud infrastructure into a secure and optimised global network in the Cloud. Intrigued? Join our webinar on the 25th January to find out more.

Register here for the Cato Networks webinar.

Blackfoot UK logo

GDPR – What you need to do NOW to make sure you are compliant in 2018
Webinar – 22nd February

One of our best attended webinars at the end of last year was around GDPR, so here’s another chance for you to get up to speed. Your customers are more and more aware of their entitlements around data protection; they want privacy rights and strong protections. But are you confident in how to process your customer information in the light of GDPR? Join our webinar for invaluable hints and tips on how to get GDPR compliant NOW.

Register here to attend our GDPR webinar.

Palo Alto Networks logo

Threat Prevention & Advanced Endpoint Protection
Workshop – 8th March

We continue our strong partnership with Palo Alto Networks in 2017 and are pleased to announce our first Ultimate Test Drive workshops for 2017 will be taking place on Wednesday 8th March at Palo Alto Networks, 140 Leadenhall Street, London, EC3V 4Q.

We will be running 2 free sessions on this day, you are welcome to register for one or both sessions.

Session 1: 09.30 – 13:30
Threat Prevention, Ultimate Test Drive

Session 2: 14:00 – 16:00
Advanced Endpoint Protection, Ultimate Test Drive

Register here to attend one or both Ultimate Test Drive sessions.

Cylance logo

Know the Truth
Workshop – 23rd March

Another partnership we are keen to announce is with Cylance. Cylance protects your endpoints against advanced malware with the world’s first antivirus built on artificial intelligence and machine learning. It’s AI and machine learning-based tools prevent threat execution, before the damage is done. It doesn’t simply protect against known threats, it identifies and defuses never-before-seen attacks.  Join our ‘Know the Truth’ workshop on Thursday 23rd March 2017 in central London to find out more.

Register here to join our Cylance endpoint protection workshop.

That’s it for now. If you would like further information on any of the above – and you just can’t WAIT until the dates listed – please get in touch. We’ll be on the case.

Happy January,
Network Utilities Team

GDPR – It’s coming, and it will impact your business

Your customers are more and more aware of their entitlements around data protection; they want privacy rights and strong protections. But are you confident in how to process your customer information in the light of GDPR? Watch our video for invaluable hints and tips on how to get GDPR compliant.

Busting The Top Four Myths About Hacking

By Torben Andersen, CCO, SMS PASSCODE

Are you protecting your data with just a password? If your answer is no, and you have strong multi-factor authentication in place, then good job: you are free to go out and enjoy the sunshine. If you answered yes, then stick around for a few more minutes to learn why a password alone is not enough to secure access to your corporate networks and applications.

Still here? Okay then, allow me to start by busting some of the typical myths about hacking today.

1# Myth – Hackers only target the big brands
blog-image-1

When big brands like Target, eBay, Adobe, and Sony are hacked, it’s big news for business and mainstream publications. Don’t be fooled: big companies aren’t the only ones being targeted. In fact, research shows that 31 percent of all hacking attacks were aimed at businesses with fewer than 250 employees.

2# Myth – You have nothing valuable for hackers to steal

blog image 2.jpgFair enough. Not everyone is fortunate enough to be storing breakthrough research with the potential to revolutionize your industrythe world if only you can keep it secret long enough to secure a patent. But what about your business email? Email often contains highly sensitive data, such as competitive bids, investment plans or pipeline information. Imagine the damage if these details were to fall into the wrong hands.

There’s even more low-hanging fruit to steal if hackers breach your network. Customer records, credit card information and even employee user credentials are worth as much as $50 USD per record when sold on the Internet. An entire shadow economy has emerged online with brokers selling stolen user records; according to the FBI, cybercrime has become even more profitable than drug-related crimes. This makes everyone a target.

3# Myth – Your anti-virus and network vulnerability tests will keep you safe

blog-image-3Patch management, updated anti-virus applications and frequent network vulnerability tests are all good weapons in a defense against hackers. However if you are not securely authenticating your users when they access your corporate networks or applications, then you’re leaving the front door open for the hackers. Research shows that weak or stolen passwords are exploited in 76 percent of all network breaches. So, yes, this really is the hackers’ preferred way in.

4# Myth – Hackers are teenagers lurking in a basement somewhere

For most of us, the word “hacker” prompts images of pale teenage boys with long hair, black t-shirts and a serious grudge against Microsoft. While many hackers probably still fit this description, the reality is that the hacker has evolved. Today’s hacker is highly-educated, well-connected, and well-equipped, enjoying a high-income profession as a professional cybercriminal. The hackers have some powerful tools at their disposal, and many poorly-protected victims has made hacking easier than ever before, resulting in cybercrime becoming the fastest growing crime type in the world.

Hackers’ motive is most often financial gain, but “hacktivism” is also becoming a growing threat to nations and organizations that don’t sympathize with the hacker’s cause.

Knowing what’s myth and what’s fact is essential to avoid running unnecessary risks to your business. SMS Passcode have created an infographic and short video that capture the key facts from the latest research about the threat companies face from hacks.

Additional Resources: