Managed Services

Application Ring-Fencing and Storage Control

In our previous edition of this newsletter, we had discussed how ZTNA (Zero Trust Network Access) can be used to whitelist applications so that your organization can have control over what applications are allowed to run on computers inside your network, thereby eliminating the threat of accidentally downloaded utilities with malicious software from causing havoc.In this edition,…

Read more
Managed Services

Zero-Trust Network Access

As users continue to work from anywhere and IoT devices flood networks and operational environments, continuous verification of all users and devices as they access corporate applications and data is needed. To protect networks and applications, network administrators must apply a Zero-Trust Access approach and provide least access privileges. Implementing zero-trust access includes requiring strong authentication capabilities, powerful…

Read more
Managed Services

Top 5 Cybersecurity Recommendations

There has been a sharp rise in cyber-attacks ever since the coronavirus (COVID-19) pandemic and global business have been suffering from it more than ever before. With the spread of COVID-19, increased demands for information technology (IT) support services are occurring across nearly all industries, as worldwide employees, students, university faculty, and others are being…

Read more
Managed Services

Top 13 Email Threats You Should Know About

A cyberattack can affect your business in many ways, depending on its nature, scope, and severity. According to the FBI’s Internet Crime Complaint Center (IC3), cybercrime cost $3.5 billion in losses in 2019 alone, with business email compromise (BEC) causing the most damages. That doesn’t include unreported losses, which are significant. IC3 received 467,361 complaints…

Read more
Managed Services

Six (6) Steps to address Zero-Day Exploits on Exchange Servers

Four (4) zero-day vulnerabilities in Microsoft Exchange Server are being actively exploited by Hafnium, which the State Department believes is a state sponsored group that typically targets US entities with the goal of exfiltrating data. The zero-day vulnerabilities in Exchange, according to Microsoft, include the following: CVE-2021-26855 – Vulnerability allowing outside party to make untrusted connection…

Read more
Managed Services

Serverless Computing

Serverless computing is a misnomer. Computing is impossible without the presence of a machine. Just like a virus needs a host, code can also not run in thin air, it needs machine resources to take input, process, and then produce output. So then what is serverless computing, and why is it gaining so much popularity? Basically serverless computing is…

Read more
Managed Services

What can we learn from recent AWS Outage

On November 28, 2020, the AWS outage took down a large portion of the internet and affected thousands of companies like Adobe, ConnectWise, etc., whose sites experienced outages in a domino effect. The outage was reported by many news sources like ZDnet and CNBC. The outage, which lasted several hours, occurred in AWS’ Northern Virginia, US-East-1 region, and the cause of…

Read more
Managed Services

Six Essential Components of a Business Continuity Plan

The terms Business Continuity (BC) and Disaster Recovery (DR) have often been used interchangeably. DR usually involves recovering data and software systems in a timely manner to save the business. The concept of disaster recovery with initial focus on natural disasters, in recent times has evolved to a more holistic concept of Business Continuity. We define BC…

Read more
Managed Services

4 Checks to Authenticate Sender of an Email

With phishing and spam emails on the rise, they not only pose cybersecurity threat to the recipient’s organization, but also end up wasting productivity of those who are on the receiving end. In most cases, people have to sift through such emails which requires opening emails and reading such emails before they are identified as suspicious…

Read more