Webinar: Securing the Modern Enterprise with Fortimail Secure Email Gateway

Webinar: Securing the Modern Enterprise with Fortimail Secure Email Gateway

Get Visibility into the Amount of Unwanted, Malicious, and Risky Email Reaching Your Users

As a Fortinet Select partner we see firsthand how email remains the most utilised attack vector for cyber criminals. At the same time, customers are increasingly moving to cloud email providers, like Microsoft 365 and Google G-Suite, and are struggling to secure their email traffic. The built-in, native security tools available in these platforms are by themselves insufficient to guard against attacks, protect valuable data, and ensure compliance objectives are met.

In a webinar on Thursday May 13 at 10 am we will discuss how FortiMail is used by tens of thousands of customers worldwide to protect well over a hundred million mailboxes. FortiMail has been independently validated and was recently awarded a ‘AAA rating’, the top rating a vendor can receive, by SE Labs.

Book your place here

All attendees will be offered the chance to avail of a limited number of bespoke email security assessments in consultation with an NSE 7 certified Security Engineer.

You will learn what type of email threats are getting through your current filters, how much spam is landing in your user’s inboxes, your level of email bandwidth usage and more. Plus you will have an understanding of whether your email is protected sufficiently and if not what steps can be taken to improve it.

I sincerely hope you will be able to join us on Thursday May 13 at 10am.

How to prevent a Successful Phishing Attack when Employees are Working Remotely

How to prevent a Successful Phishing Attack when Employees are Working Remotely

Cyber attacks have doubled over the last 12 months as workforces around the globe moved to a distributed or remote working model. Now communication that would usually take place inside a corporate network is being conducted outside the existing security measures and frequently over third party platforms. The pandemic has presented cyber criminals with the perfect opportunity to exploit unprotected systems to access sensitive data. Many phishing attempts are related to the virus or now more so the vaccine in an attempt to allure people to click on a malicious link. And all are financially motivated.

Often phishing attempts utilise domain names that a user is familiar with which lulls the user into a false sense of security as they recognise the company or organisation that the email appears to be coming from.

If you are managing a remote team here are some steps you can take to prevent an employee falling for a phishing attempt.

Improve Email Security

Preventing suspicious emails from reaching staff inboxes is an effective way of minimising the risk of cyber attack. There is some level of security includedIT services and support in a standard M365 licence that can block span and standard phishing attacks but for truly reliable email security it is best to adopt a layered approach. Consider a solution from a dedicated cyber security provider such as Fortinet. Their Fortimail solution delivers advanced multi-layered protection against the full spectrum of email threats. Talk to an IT Service Provider who partners with Fortinet to learn more about this solution.

Utilise Web filtering

Web filtering involves preventing a browser from loading suspicious urls or webpages. So in the event that an employee clicks on a link in an email that connects to a suspicious url your web filter will prevent that site from loading. Your IT Services Provider will be able to set up web filtering for you adding another layer to your defence mechanisms.

Implement 2FA

2FA or Two factor Authentication is a simple step that can be used in the fight against cyber crime. Most users will be familiar with 2FA in some form as many banks and internet services such as payment platforms utilise it. 2FA involves inputting unique user information to prove your identity. Sometimes it’s in the form of a code that is sent by SMS to your mobile number. Or it could be your finger print or a piece of information such as your mother’s maiden name. 2FA is a form of identity management and means that access to systems is not purely reliant on passwords as passwords can be easily stolen or guessed. Again your IT provider can help set up 2FA across all users especially those who are working outside the security of the office firewall.

Adopt Patch Management

Patch management process involves identifying and deploying updates or patches to a variety of endpoints including PCs, laptops, mobile devices andAutomated Patching servers. Automated Patch Management Solutions mean that known vulnerabilities are dealt with in a timely and effective way, reducing resource time by automatically updating endpoints as patches become available. An IT Services Provider will be able to advise you on Patch Management.

Engage in User Training

Email remains the dominant vector for entry for cyber criminals. And user error remains the number one issue in the fight against preventing cybercrime. The more savvy your employees are the more protection your business will enjoy. Cyber Security training is necessary for all employees at all levels. Even the boss can fall for phishing attempts. Online cyber security training is a great way to reach employees who are based remotely.

Watch out for Keyloggers

Keyloggers, also known as spyware, are a type of software that is designed to record keystrokes and are one of the oldest forms of cyber threat. Keyloggers are used to steal personal or financial information such as bank details. Some types of keyloggers especially those on mobile devices can record calls, messages and GPS locations. Many keyloggers now come with ransomware that can be activated at the attacker’s discretion.

Your IT Provider will be able to advise you on the best security measures for your business. There is no silver bullet when it comes to adequate IT security. The most effective approach is a multi-layered one that combines a variety of mechanisms to deliver robust cybersecurity to your business. With remote working looking set to stay in some capacity for many businesses and cyber crime at it’s most prevalent now is the time to act.

Talk to your IT Services Provider or contact us for an IT Security review.

Webinar April 1st: Reinventing the Modern Workplace

Webinar April 1st: Reinventing the Modern Workplace

Like everyone else, we’re feeling really positive that COVID’s coming to an end. But as the world begins to get back to normal, many companies are reflecting on how they’ve managed to work effectively in a remote set up – and how employees are keen to continue doing so.

However, this means enhancing their current working environment and migrating more services to the cloud – to ensure the safety, security, and productivity measures needed to sustain remote working long term.

To show you a number of different ways you can get the most from the systems your teams are using – and to help you continue to evolve the way everyone works in a manageable way – we’re holding an online webinar on April 1st.

Interested? Sign up here for your free ticket to our ‘Reinventing The Modern Workplace’ webinar

Reinventing the Workplace with Windows VD

Reinventing the Workplace with Windows VD

What is Windows Virtual Desktop and what are the key benefits?

Windows VD is a desktop and app virtualisation service that runs in the cloud. It allows users to access their desktop and applications from anywhere and from any device. With built in intelligent security it can be deployed in minutes and can bring down existing costs with its pay for what you use model. As part of the Microsoft Cloud Services suite, Windows VD can be used within your existing M365 or Windows per user licence.

Access from Anywhere

Windows VD delivers a virtual desktop experience to any device making it an ideal IT solution for remote workers. Thanks to the Covid pandemic the remote workforce is now well established in most businesses and is likely to continue. To maintain productivity levels the remote workforce is more dependent on Cloud Services than ever before. With Microsoft’s Cloud Services and infrastructure, businesses can set up multi session Windows 10 deployments which are optimised to run in multi-user virtual environments. From a user’s perspective the desktop experience, no matter what device they use, is exactly the same as sitting in the office at a traditional PC.

Cloud technology

Reduced Cost of Ownership

From a cost perspective Windows VD is an ideal IT Solution that negates the need to purchase, deploy and maintain physical hardware. If your business already subscribes to Microsoft Cloud Services, M365 or an enterprise version of Windows you can create a virtual desktop for each user for free. Talk to your IT Service Provider to find out what is involved in setting up Windows VD for your business.

Scalability

Windows VD is managed through the Microsoft Azure Portal. You can scale up and down as your business dictates. Azure admins can allocate virtual RAM, create additional CPUs, allocate more storage etc.. quickly and easily through the Microsoft Azure Portal.

Security

If employees are working remotely it is inevitable that sensitive company data will be transferred and stored locally at some point which opens a business to risk. Throw in that many employees will be using personal unsecured devices and the risk is increased. With Windows VD the virtual machines are secured within Azure cloud. Data is protected by built in security protocols including Azure Firewall, Azure Sentinel, MFA and Advanced Threat Protection. Role based access can be determined also using the Azure infrastructure. Your IT Service Provider will be able to advise you on the best mix of IT security measures to suit your business needs.

Simplified IT Management

Through the Azure portal admins can easily configure a network and deploy desktops and security measures with just a few clicks. Centralised management means changes in policy can be easily rolled out across the estate. New users can be added quickly regardless of their location.

Seamless User Experience

No matter where, when or on what device a user signs into their virtual desktop they will enjoy the same experience. Whether they are managing their inbox in outlook, sharing files on OneDrive or using Teams to collaborate with colleagues the experience is the same, enabling them to pick up from where they left off with ease.

Microsoft Cloud Services

Reduced Downtime

With built in Site Recovery and Back up, Microsoft Cloud Services can help keep your team running during outages.  Your employees can continue working keeping productivity levels up and customers happy.

Why Now?

Virtualising desktops is the next step in digital transformation. If you’ve already migrated applications and data to the cloud hosting desktops there too gives you even more flexibility and agility. With centralised management and advanced built in security measures Microsoft’s Cloud Services, including Azure and Windows VD, deliver an ideal IT Solution to a progressive business. With more power, better performance, reduced costs and enhanced security Microsoft’s Cloud Services and Windows VD will help a business to run more efficiently, reducing capex costs and enabling innovation.

What Next?

Since its release Windows VD has been gaining traction across the business world. It delivers a better user experience with the latest security features inbuilt and it reduces cost. Windows VD took on extra importance from March 2020 as it enables easy and secure access to critical applications for remote workers. As working from home and BYOD become the norm a business needs an IT Solution that will deliver an efficient user experience, high levels of security and cost savings.

 

Talk to a reputable IT Service Provider with the right Microsoft Cloud Services accreditations. They will conduct a review of your current IT and devise a migration plan to move your business to a virtual environment.

Talk to our experts about moving to the Cloud and Windows VD

What is SD WAN Infrastructure?

What is SD WAN Infrastructure?

SD WAN stands for Software Defined Wide Area Network. It is a virtual architecture that allows businesses to combine transport services including MPLS, LTE and broadband internet to securely connect users to applications. Delivered through the cloud SD WAN reduces capital expenditure and simplifies network administration. A centralised control function intelligently directs traffic across the WAN delivering higher performance and a better user experience. The agility inherent in an SD WAN environment makes it a more cost-effective solution reducing ongoing IT operating costs and improving connectivity to branch offices and the cloud.

How does it differ from a traditional WAN?

A typical WAN uses conventional routers that were not designed for the cloud. They typically route all traffic including cloud traffic to a hub or data centre causing a delay that leads to poor application performance. Traditional WAN solutions use MPLS to assign preference and timelines for delivery of traffic and they usually leverage internet-based backup as a secondary transport should the designated path be unavailable. A traditional WAN may hinder growth and agility needs. For example failover is dependent on the state of the link which may be up or down and this can lead to outages and dropped video or phone calls. Configuration is distributed across each individual router making changes difficult to manage. New sites can take a long time to set up due to the complexities of the network.

How does an SD WAN work?

An SD WAN is designed to securely support applications in the cloud, on premise and SaaS services whilst delivering a high level of performance. An SD WAN delivers application aware routing across the WAN that is managed and administered from a centralised point. With single pane of glass management, policies can be set and maintained centrally and then pushed out across each SD WAN node. This hands off configuration makes it much quicker and easier to administer. Once the policy is set links are intelligently monitored and traffic is routed accordingly.

Why would you need an SD WAN?

Nowadays enterprises are using cloud and SaaS applications more frequently. A traditional WAN does not support a cloud first model as all traffic, including that destined for the cloud, is diverted from branches to the HQ resulting in lagging and poor performance. Traditional WANs are no longer meeting the needs of today’s modern digital business, that coupled with easier administration and lower capital expenditure makes SD WAN a more attractive solution. IT teams can quickly and easily define rules to prioritise the most important network traffic, such as voice and critical applications. SD Wan also allows new sites to be added to the network very easily.

The Benefits of SD WAN

  • Lower Networking Capital Expenditure
  • Improved Application Performance
  • Enhanced Agility and Responsiveness
  • Advanced Control
  • Robust Security

What business is suited to SD WAN

SD WAN adoption is seeing significant growth across sectors and company size. Any business accessing cloud services would benefit but especially those with distributed locations, individuals and devices. Financial Services, Retail and Education sectors are seeing an uptake in SD WAN deployments as they increasingly need cloud services to function. Other needs such as secure networks to process sensitive financial information, fast and reliable access to databases to service customers, the ability to prioritise traffic and applications, lower costs and higher bandwidth makes SD WAN an attractive solution.

Fortinet Secure SD-WAN delivers true Security-Driven Networking

Our partner Fortinet have been named a leader in the 2020 Gartner Magic Quadrant for SD WAN Infrastructure. FortiGate SD-WAN tackles the most difficult challenges of secure SD-WAN deployment and was the only Next-Generation Firewall (NGFW) security vendor to receive a “Recommended” rating in NSS Labs’ first-ever software-defined wide area networking report.

We bring Fortinet SD WAN solutions to businesses across Ireland. Learn more about Fortinet SD WAN solution.

Contact an Infrastructure Expert

To request a call from an expert on SD WAN send us an email.
Improve Security for Home Workers with Multi Factor Authentication

Improve Security for Home Workers with Multi Factor Authentication

Multi Factor Authentication (MFA) also known as Two factor Authentication (2FA) is one of the key measures to protecting home or remote workers from cyber attack. Many businesses were ill prepared for the sudden move of significant portions of their staff to a remote working environment. Their infrastructure was not designed to support remote staff. In the rush to move people to home working cybersecurity tended to get overlooked.

What is MFA?

Multi factor Authentication is a security system that requires a user to identify their identity using multiple credentials. It requires a user to provide 2 or more verification factors to gain access to a resource like an application, VPN or an online account. Rather than just providing a username and password MFA requires the input of one or several additional pieces of information – often a numeric code sent by SMS or/and a fingerprint scan – to enable access.

M

Why is MFA Advisable?

Passwords can be fraudulently attained, MFA increases security in the event that a hacker gets hold of a username and password rendering their attempts ineffective. This significantly reduces the likelihood of a cyber criminal gaining access.

How Does MFA Work?

With MFA a user is required to enter additional information to confirm their identity. This additional piece of information (factor) is unique to them and known only by them. If a criminal attempts to gain access to an account using a stolen username and password they will be denied entry without this additional piece of information.

Types of Authentication

The most common MFA factor used is a One Time Password (OTP) which is a 4 to 8 digit code usually received by SMS or email or generated by a smartphone app. A new code is generated periodically or each time a request for authentication is submitted. Other factors include biometrics like fingerprint or voice recognition or something you possess like an access badge or fob or a piece of information such as an answer to previously submitted security questions.

MFA during COVID 19

With the increase in use of cloud technology and workers accessing accounts remotely MFA is more important now than ever. Additional security is needed to ensure that hackers are not able to access systems. MFA can help prevent bad actors gaining access by prompting for additional authentication factors that are difficult for imitators to produce. This in turn significantly reduces the frequency of unlawful access.

MFA for Microsoft 365

Many cloud operating systems such as AWS and M365 have their own MFA offerings. However it is critical that MFA is deployed correctly and this requires expertise. If your business for example has more granular sign-in security needs, conditional access policies give more control. Risk base conditional access can also be configured. To be sure that MFA works as best it can for your business it is best to consult with an IT Services company. Their experts will ensure that all the features available to you are utilised and mapped to your business’s operational needs. They will also advise if additional measures should be taken.

Get in touch with us and we can ensure that MFA is switched on and properly configured for your business. Learn more about HCS IT Security services.