Sales: 0845 470 4001 | Support: 0845 230 6001 | Contact Form | NPS

Wherever you are in your network transformation journey, is it time to consider SASE?

Is-it-time-to-conside-SASE_BlogHeader
From start-ups to global leaders, across the public and private sectors, organisations' ongoing growth and brand reputation rises or falls based on the quality of their networks. As a result, network transformation is a growing priority, with IT leaders looking to replace cumbersome legacy systems with flexible, scalable, and secure connections that support tomorrow's highly dynamic workflows.
  1181 Hits

Black Basta ransomware group's techniques evolve, as FBI issues new warning in wake of hospital attack

BLACK-1
Security agencies in the United States have issued a new warning about the Black Basta ransomware group, in the wake of a high-profile attack against the healthcare giant Ascension.
  114488 Hits

Offering clients the ultimate peace of mind – a new approach to security and remediation for legal firms

blog-header-legal-remediation-offering-clients-the-ultimate-peace-of-mind

Although the sector as a whole has traditionally been comparatively wary of the ever-increasing pace of technology, legal services are increasingly data driven, with an abundance of AI-related discussion emerging within legal technology circles. The core Document Management Systems (DMS) and Practice Management Systems (PMS) remain the centre of focus for how and where to deploy a variety of rapidly maturing SaaS platforms, or dedicated, highly customised suites.

  949 Hits

The Key to Establishing Ironclad Remediation and Disaster Recovery Processes

The-Key-to-Establishing-Ironclad-Remediation-and-Disaster-Recovery-Processes_Heade_20240322-102320_1

To Test or Not to Test?When it comes to IT disaster recovery and remediation processes, regular testing is not a 'nice to have' - it's absolutely essential!

This isn't hyperbole on my part. You just have to look at the news on any given day. We've all heard the horror stories of organisations in both the public and private sectors experiencing prolonged downtime during disasters due to inadequate preparation, lack of testing, and the unsuitability of their legacy remediation processes and systems.

  1061 Hits

What does the ICO’s new fining guidance mean for your organisation?

What-does-the-ICOs-new-fining-guidance-mean-for-your-organisation

On the 18th March 2024, the Information Commissioner's Office issued its updated guidance around the issuing of fines when organisations have been found liable for the integrity of their customers' or end users' data being compromised. It is already well-established now that failure to ensure critical data remains secure will result in costly fines, as we have seen repeatedly in multiple high-profile cases over the years.

  1253 Hits

Why SASE is so important in the new, data-driven retail landscape

Why-SASE-is-so-important-in-the-new-data-driven-retail-landscape

With fundamental shifts in consumer behaviour, changing economic conditions, and a rapidly evolving regulatory environment, it's a challenging but exciting time for the UK's retail sector, and technology has a key role to play. In particular, advances in IT and networking solutions are empowering retailers to enhance their operational efficiency, improve the customer experience, and retain their competitive edge in an increasingly online and interconnected world.

  2147 Hits

Has your AEC firm earned the Cyber Essentials / Cyber Essentials Plus accreditation? If you haven’t, don’t delay…

blog-header-AEC-CE_CE-min

The nature of AEC projects and the high volumes of sensitive data firms generate, transfer, and store on a daily basis make them a natural target for cyber criminals. Indeed, a recent Government study found that 5% of building firms have already fallen victim to some form of cyber-crime in the just a year, but that 26% of them still did not have adequate cyber security measures in place.

  1579 Hits

Developing a new breed of security to suit the new ways in which we consume content

Developing-a-new-breed-of-security-to-suit-the-new-ways-in-which-we-consume-content
The way in which we consume content has changed forever. Physical media and prescheduled TV and radio have rapidly given way to the convenience, accessibility, and range offered by streaming services. Independent content creators share the digital stage with the most well-established industry leaders, and numerous organisations have embraced the mantra that 'content is king', utilising online video as a key tool for building engagement with their prospects and customers.
  2493 Hits

The Finance sector’s relationship with its Cloud providers is evolving

The-Finance-sectors-relationship-with-its-Cloud-providers-is-evolving

For some years now, Cloud adoption has been steadily on the rise across the UK's Finance sector, with organisations including banks, insurers, and investment firms phasing out increasingly cumbersome legacy systems in favour of more scalable, agile, and cost-effective infrastructure. Indeed, more than 48% of UK banking services are now built on Cloud infrastructure.

  1691 Hits

Independent investment firm

Independent-investment-firm

Developing a first-class IT infrastructure for a leading independent investment firm

The past decade has been a challenging one for the Retail sector, to say the least. Much has already been written about the impact of online shopping and streaming services on the high street, and the rise of COVID-19 and recent supply chain disruptions have only compounded the challenges facing even the most established brick-and-mortar retailers.
  1263 Hits

Why the security of Unified Communications must be a key priority

UC-Security-blog
There's no doubt that Unified Communications have never been in such high demand as in recent months. The current global pandemic has meant the need for secure and reliable remote working tools has risen to an unprecedented level, with a wide range of solutions thrust into the limelight as a result. Platforms like Zoom and Microsoft Teams are now an established part of both our personal and professional lives, with Zoom alone hosting more than 300 million meeting participants in April 2020[1].

However, as with any technology that experiences a period of rapid growth, we are now moving beyond the initial emphasis on speed to market. As Unified Communications become an increasingly essential part of the virtual workplace, we must now establish exactly how this impacts users, how it meets compliance requirements, and how secure it is.

Our initial response to COVID-19, which focused on the rapid onboarding of UC solutions, has demonstrated that we should always be vigilant when implementing new systems. Technological developments to address immediate concerns are certainly essential, but users – both personal and professional – must be conscious of any security risks and ensure they follow best practice at all times, particularly with BYOD arrangements. For example, the importance of utilising strong passwords is already well-established, but its importance was highlighted once again by recent incidents where cracked passwords have been used to disrupt online meetings, taking advantage of platforms' lack of end-to-end encryption[2]. And whilst updates are regularly released for all platforms to rectify security issues as they are discovered, this doesn't eliminate the initial risk that is posed, which means users must take the time to educate themselves, with the support of their providers.

Data sovereignty is another serious concern, particularly in sectors like healthcare, legal and finance, which have strict requirements about how and where sensitive data is stored. Recent revelations that certain platforms routed user data through different countries to meet increasing demands for capacity[3] are putting organisations' security posture into sharp focus. Going forward, providers of UC solutions must offer their users complete confidence they are compliant with all local and international data protection regulations, such as the GDPR, which may mean maintaining data centres across multiple regions.

As organisations in both the private and public sectors become more conscious of the potential security risks surrounding UC solutions, we are sure to see the establishment of clear best practice amongst both providers and users. However, this will require close collaboration between all parties concerned if we are to take a proactive rather than reactive approach to the issue, ensuring robust security is inherent in the design of all UC solutions rather than offering fixes when a breach does occur.

If you're keen to find out more about the ongoing evolution of UC solutions and the best practises to ensure you are fully secure at all times, our Head of UCC Solutions, Gareth Hayes, and Head of Cyber Consultancy, Mark Belgrove, will be exploring these challenges and considering potential ways forward, with plenty of practical advice throughout. Register here.

  1976 Hits

Cyber breach prevention

cyber-security-advisory

With cyber breaches growing in volume and frequency (Carbon Black reported that 88% of UK organisations suffered a breach in 2018) you can guarantee that your organisation will be targeted by cybercriminals at some point.

  3453 Hits

Making sense of the Cloud-buzz: what quick wins are available to establish Business and Security value?

Making-sense-of-the-Cloud-buzz-what-quick-wins-are-available-to-establish-Business-and-Security-value
On Thursday 25th April, Exponential-e held a Financial Services and Insurance roundtable event at 'M Restaurant' in Victoria, London. The event brought together leading figures from these two sectors to share their experience of Cloud adoption and the benefits it can provide to businesses.

The conversation was kicked off by guest speaker Steve Deakin, Head of Development and Operations at Lloyds of London, discussing his experiences of Cloud and the client perspective. Next followed Nick Robinson, Systems Engineering Manager at Palo Alto Networks, who provided a view of real world innovations and shared Cloud success stories that he has seen from his clients across EMEA.

Here is a high level summary and description of the quick wins that were discussed:

The Process:

  • Learn -> Hack -> Iterate


Horizon Scanning & DevOps with an AGILE mind-set

  • Microsites and Micro services that are already trialled, tested and robust from an architecture and security perspective - this enables one to rapidly deploy new products and services, websites etc. with security peace of mind.
  • Serverless - just focus on writing codes and you can make changes in microseconds! It is easy to deploy, low cost, gives you more time to focus on UX and is more efficient for developers by ensuring you are keeping code backed up and in a secure environment.
  • Grid Data Analyst - overcome floods and complexity of big data and unlock the power of analytics with the right data in the right place.


Cybersecurity

  • OWASP Top 10 - whilst the threat landscape remains consistent year on year, everyone should make sure they are aligned to the latest as it evolves. Assuming the top 10 remains unchanged or that changes are incremental such as low priority to action, can lead to vulnerabilities. www.owasp.org
  • NCSC - The National Cyber Security Centre is an organisation of the United Kingdom Government that provides advice and support for the public and private sector on how to avoid computer security threats. www.ncsc.go.uk
  • Ethical Hacking - this should be continuously implemented - leverage Pen testers and vulnerability scanning as much as possible in order to follow best practices and processes - Learn -> Hack -> Iterate.
  • Social Engineering was also discussed, not so much as a quick win due to the complexity (get the simple things right first) however, advised to leverage Pen testers to protect your business from bad actors that use social engineering tactics.
  • Multi Factor Authentication – we discussed how this is a very low hanging and important measure to put in place. Leverage MFA to 1) require individuals to provide two or more authentication factors to confirm their identity for online transactions or to gain access to corporate applications, networks and servers and 2) insight and reports on the user's activity. Identity (IAM) and Privilege Access Management (PAM) were also mentioned as a further way to secure your business.
  • Security Information and Event management (SIEM) - leverage SIEMS as a means to log attacks. An IT Service Provider can provide an important layer of service to proactively manage, monitor and report on what the SIEM is seeing on a 24/7 365 basis.


Cloud Patterns


Data Lakes

  • Building out centralised repository for enterprise data, for tasks such as reporting, visualization, analytics and machine learning - leveraging cloud partners to build out big data solutions.


A debate for another day

  • DevOps and Open Source software is and will continue to be the main target for bad actors, they hold the code (the crown jewels). Should such resources have locked or unlocked internet access? On one hand it offers flexibility and agility, on the other it is more locked down and has a stronger argument from a security perspective.


#Azure #AWS #CloudPatterns #Cybersecurity #OWASP #NCSC #DevOps #HorizonScanning #EthicalHacking #Digital Transformation

  3212 Hits