24 09, 2020

Public Cloud’s Impact on Enterprise Networks

2021-02-19T16:45:55-06:00September 24th, 2020|Tags: , , , , , , , |

Corporations are moving to public cloud in growing numbers, and the increasing use of these services is having an impact on enterprise networks. Potential bottlenecks are shifting away from the company data center to network entry and exit points. Corporations must understand why the changes are occurring and their impact, and then take steps to ensure their networks deliver acceptable response times. Organizations are embracing cloud computing. Worldwide spending on public cloud services was forecasted to increase from $227.8 billion in 2019 to $266.4 billion in 2020, a 17% annual jump, according to market research firm Gartner, Inc. As workloads move from the company data center to the public cloud, enterprise network traffic patterns shift. The first change is corporations are deploying more applications: mobile, social media, data analytics, and artificial intelligence and machine learning. The result is they work with more information and need to carry it over their corporate networks. The volume of data generated annually is expected to grow from 33 zettabytes (1 trillion gigabytes) in 2018 to 175ZB in 2025, a Compounded Annual Growth Rate (CAGR) of 61%. Changing Traffic Patterns Faster networking techniques are required as more information flows over enterprise networks. Recently, vendors started to roll out Wi-Fi 6, which increases wireless networks’ top speed from 1G bps to 2G bps to 10G bps. In addition, traffic flows shift. In the past, processing was monolithic: almost all was done in central data centers. Cloud distributes computing infrastructure: keeping some work on site but moving some off to public [...]

13 05, 2019

Communicating after a Cyber Attack

2021-02-19T16:55:22-06:00May 13th, 2019|Tags: , , , , |

Organizations of all sizes are at risk for cyber attacks that can cripple operations and cause lasting damage. Businesses must have a plan in place for communicating with customers in the event of an attack so as to minimize losses. We are happy to share some information from our partners at Pronto Recovery about planning your communication and response after a cyber attack. The costs of a cyber crime The price tag of a security breach is staggering, with an average cost of $1.2 million. Cyber crime will cost the world in excess of $6 trillion annually by 2021 and financial costs are not the only consequences. Ransomware attacks are the #1 cyber threat to businesses and are growing at a yearly rate of 350%. These often start with a simple phishing email and can lead to the complete shutdown of business operations. One-third of companies surveyed claimed their company lost intellectual property due to a cyber-attack and 36% of them believe the attack reduced their competitive advantage. In today’s globalized business environment, organizations of all sizes face the prospect of falling victim to a cyber-attack or IT outage that could cause serious damage to its infrastructure and ability to operate. Despite the improvement of cybersecurity techniques, criminals continue to develop sophisticated ways to disrupt systems and steal data. The need to prepare for cyber-attacks is more important than ever. According to Cisco’s 2017 Annual Cybersecurity Report more than one third of the organizations that experienced a cyber breach in 2016 reported a loss of customers, business opportunities and [...]

25 01, 2019

Strengthening Your Cybersecurity Plan

2019-08-29T21:27:20-05:00January 25th, 2019|Tags: , , , |

Is your business safe from cybersecurity threats? Do you have a plan to proactively improve and protect against new types of attacks? We want to help you improve your cybersecurity plan. By implementing even one or two of the suggestions below, you’ll be taking a step toward reducing the likelihood of data loss, downtime, reputation damage, and lost revenue. Laying the groundwork Before writing any cybersecurity plan, it’s important to have a risk assessment under your belt. Risk assessments highlight exactly where and how your workforce, technology, and physical environment are exposed and therefore where you need to allocate your risk-reducing budget dollars. An upfront risk assessment is also THE key input into your cybersecurity plan. After all, the whole point of a cybersecurity plan is to reduce the vulnerabilities uncovered by a risk assessment. Chances are you probably already have a cybersecurity plan for your organization. It may be a plan that was written to meet regulatory requirements. Alternatively, it may have been written because you value the continuous operation of your organization and want to protect the private data it stores and processes. Whatever your goals, it is important to make sure your cybersecurity plan includes several key points. Your cybersecurity plan should state: The organization’s general attitude toward risk – averse, neutral, or accepting The importance of cybersecurity from leadership to individual contributors Commitment to adhere to any applicable regulations such as HIPAA, PCI, 23 NYCRR 500, etc. Specific incident response procedures outlining what each internal and external stakeholder will do [...]

10 01, 2019

Cybersecurity Trends – BEC Phishing

2019-05-16T17:55:45-05:00January 10th, 2019|Tags: , , , , , |

Ransomware may be the number one cyber threat but there is another, newer cyber attack that is not being talked about enough. This threat can result in the loss of millions of dollars for companies who are affected by it and lead to the complete shutdown of their email systems – Business Email Compromise. We are happy to share some information from our partners at Pronto Recovery about BEC attacks and how you can protect your business. Business Email Compromise or BEC is an exploit in which the attacker gains access to a corporate email account and spoofs the owner’s identity to defraud the company or its employees, customers or partners of money. Unlike the typical phishing attacks that target everyone, BEC specifically targets high level business executives such as the CFO or corporate attorney to initiate a wire transfer. BEC scams have three main versions: The Bogus Invoice Scheme: this scheme involves a business that has an established relationship with a