Following a string of outages affecting Azure services, Microsoft has officially confirmed that the cause behind these disruptions was Distributed Denial-of-Service (DDoS) attacks. The company’s acknowledgment comes in response to the incidents that resulted in the unavailability of Azure services. Given Microsoft’s prominent position as a leader in Cloud services, the second-largest company on planet Read More »
What is Identity and Access Management and How Does it Work?
IAM Introduction Identity and Access Management is a set of processes, policies, and technologies that organizations use to manage and secure digital identities and control access to resources. It involves the creation, management, and deletion of digital identities and the management of user access to resources such as applications, data, and systems. IAM helps organizations Read More »
Implementation of Enterprise Identity and Access Management Solution
Our Implementation Methodology 1. Define the Vision for Enterprise Identity and Access Management Understanding Identity and Access Management (IAM) as a combination of technology solutions and business processes to manage identities and access corporate data and applications, is a critical foundation for successful IAM implementation. Beginning with the concept stage, commence by tying business processes Read More »
Firewall Management Maturity Process
Firewall Management Maturity Stage 1: Basic Firewall Management A firewall comes with base configuration instructions that provide some level of immediate protection. The firewall remains one of the key components of any company’s security approach and should be configured to take full advantage of all its functionality. Firewalls, out of the box, come with the Read More »
Educational Institutes are increasingly becoming the targets of cybercrimes
When the Public Sector IT leadership is taking a stand against paying ransom, the attacks have changed to steal money, instead of holding hostage. Even though Backup is essential and a lot of value against cyber-crimes, it cannot be the primary (or only) protection against cybercrimes. It is one of the tools in the arsenal Read More »
US Mayors Vow to Reject Ransomware Payment Demands
The U.S. Conference of Mayors has unanimously resolved not to give in to any ransom demands from the hackers. This is coming after a series of cyber shakedowns that have extorted millions from city governments. Considering the number of ransomware targeting cities and municipalities has grown both in frequency and intensity, the resolution, while not Read More »
Cybercriminals hit MSP software to launch Ransomware
Hackers have leveraged Managed IT Services Provider (MSP) software to spread ransomware to their customers’ systems. The attackers have hacked and gained access into an MSP-centric cybersecurity console from Webroot, while also exploiting Remote Monitoring and Management (RMM) software from Kaseya. Both software makershave saidthat the issues involve compromised credentials and not any software vulnerabilities Read More »
Department of Homeland Security: Some IT Consultants weaken Office 365 Security
The DHS has issued a memo essentially stating that some IT consulting firms and Managed IT service providers (MSPs) involved in Office 365 migrations are not properly securing the cloud productivity suite for customers. The statement, from the US-CERT arm of the DHS, represents both a challenge and an opportunity for MSPs and MSSPs. On Read More »
Baltimore Robbinhood ransomware attack
The City of Baltimore was attacked with a very aggressive variant of the Robbinhood ransomware on May 8 for the second time in 14 months. Some city departments, including the police, inspector general’s office, and the city’s departments of transportation and public works reported problems with email and phone systems. While the attack didn’t affect Read More »
Customers are struggling with lack of visibility & threat detection
Six uncomfortable truths Although, more than half of the organizations surveyed were hit by a cyberattack in the last year, a lack of visibility remains high, threat detection is problematic, false alarms cost time and money, according to a new research. The study surveyed over 3,000 IT decision makers at organizations ranging from 100 to Read More »