In July, the National Cybersecurity Center of Excellence hosted a virtual workshop for industry experts to discuss practical approaches to preventing and recovering from ransomware and other cyberattacks.
Mark Simos, Lead Cybersecurity Architect at Cybersecurity Solutions Group offers three simple steps for small businesses who might be struggling with where to start:
Read the full article.Don’t forget to back up your data!?
Imagine logging on tomorrow and every document, database and file in your organisation being encrypted. Now think of the consequences of not being able to recover that data…
You can never be 100% protected from ransomware (that’s a fact) so securing your Microsoft 365 environment is crucial – and backing up your data is critical. Once an organisation has been hacked, having good backups can make the difference between that company continuing to operate or going bust.
If you’re not backing up your data effectively, we urge you to start now!
For more tips on how to secure your Microsoft 365 environment, check out our latest white paper From minnows to whale sharks: why securing Microsoft 365 should be a top priority for all businesses.Scoring high for security with Microsoft Secure Score.?
Recognising the sudden growth in cyberattacks, Microsoft developed a benchmarking system to help companies reduce their risk of attack.
Secure Score marks organisations out of 100 for various security elements including Identity and Access Management, devices, data, apps and infrastructure. With a score for each element and an overall score, you can watch your business moving up the ranks as security posture improves. Warning, it can become mildly addictive.
If you’d like to find out more about Microsoft Secure Score and how it can help businesses of every size, check out our latest white paper From minnows to whale sharks: why securing Microsoft 365 should be a top priority for all businesses.Preparing for a flexible future?
It’s no secret that working from home and cyber attacks are both on the increase. An IoD survey found that almost 75% of businesses planned on ‘maintaining the increase in home working’. And if that trend is likely to continue, it would be ignorant not to follow suit and step up the IT security that makes your business possible (for all those devices, applications, passwords that can make or break a day at the office).
🧐 For instance, did you know that at least 65% of people reuse passwords on multiple sites… despite 91% of them knowing that it’s risky?
…sound like anyone you know? 🤷♂️🤦♂️
💡Sometimes what we need is a team of people who really know their stuff to put together a really useful guide with interesting information, best practice and practical tips. And sometimes, someone like HTG – People-first Technology pops up and…BAM 💥
And they’ve done just that. Download the white paper today.
#HTG #Azured #MicrosoftAzure #MS365 #EmailSecurity #CyberattacksHuman operated ransomware is “preventable disaster”?
Human-operated ransomware campaigns are one of the most significant and impactful trends in cyberattacks today, according to the Microsoft 365 Defender Threat Intelligence Team.
Hands-on keyboard attacks start small, but in the background, something bigger is happening. Watching your every move. Noticing patterns. Identifying weaknesses. And then BOOM.
We’ve helped some pretty big players over the years. But we know that businesses prefer to keep these things on the DL, so we’ll never share this information – and you certainly won’t find any case studies or testimonials. You’ll just have to take our word for it on this one. Offering a discreet service lets our clients know that we’re serious about their security.
And if you haven’t watched the webcast from Microsoft yet, we’re going to share it again.Protecting cloud and on-prem. It’s time to plan!?
We’re always banging on about cloud-based security. But it’s important to remember that human-operated ransomware attacks aren’t a cloud-only problem. These highly sophisticated attacks know no boundaries and can impact on-prem, too. In fact, it’s easier to protect your cloud environment than it is your on-prem environment. Weird eh.
If you’d like to know why, get in touch and we’ll delight in telling you more! We don’t like to be pushy – it’s just not in our nature. But when it comes to something as serious as this, we implore you to get your security plan in place. And, if you do have one, implement the darn thing. This is the party you can never be too early to.
Whether or not your security plan is in place, we’re offering free 1-2-1 30-min sessions with one of our wizards of tech. We can guarantee that you will take at least one thing away that will improve the security posture of your business. And that will make us sleep better at night. It’s a win/win.
But if a free security review is not for you, we really really really want you to watch this instead.Human-operated ransomware: what we all need to know?
Human-operated ransomware is different to the cyberattacks that we usually hear about. They’re incredibly sophisticated and inherently difficult to spot.
As the name suggests, they require a human touch: invaders infiltrate, watch for patterns, highlight weak points – and then strike many months, or even years, later. By which point the attackers will know more about you and your business than you do.
And as they move laterally across your business, they can (and will) cause immeasurable damage as they go. Microsoft’s Principle Cybersecurity Consultant, Jim Moeller, warns that “we’re facing one of the greatest threats to cybersecurity, ever seen.” And that should’t be taken lightly.
We don’t like to be pushy. But when it comes to something as serious as this, we are…a bit. It’s so important to have a security plan in place. If you do, implement it. And if you don’t, get in touch! This is the party you can never be too early to.
https://info.microsoft.com/ww-thankyou-Human-Operated-Ransomware-webcast.html?LCID=EN-GB&ocid=eml_pg235439_gdc_comm_mwThe new kids on the cyber-security block?
Human-operated ransomware attacks. They’re the new kids on the cyber security block. And they mean business. Well, they actually mean potential catastrophic damage to your business. And by business, we actually mean your data, identities, and a demand that runs in to thousands (or even millions) of pounds.
We don’t like to be pushy or overbearing. But this is serious. Businesses must have a security plan in place. And if you do have one, implement the darn thing!
We feel really strongly about keeping businesses secure. And, of course, once personal passwords are being used in a business environment, we’re not just talking business. We’re talking about the security of you and your family’s personal data, too.
In fact, we feel so strongly about it, that we’re offering free 30 min 1-2-1 no obligation security reviews for our new or existing customers.
Human-operated ransomware attacks are a threat to us all. To understand more about their risks and how to securely safeguard your business, this webinar from Microsoft is an eye-opener – even for the non-techies!
https://info.microsoft.com/ww-thankyou-Human-Operated-Ransomware-webcast.html?LCID=EN-GB&ocid=eml_pg235439_gdc_comm_mwBP announces post-pandemic shift to home working?
This week, BP announced that 25,000 of its office-based staff will be expected to work from home two days a week. Of course, for some businesses this is nothing new. But for corporate giants like BP, it demonstrates the huge shift in attitude towards remote working.
It will be interesting to see over the coming months, how many businesses – from the giants to the SMEs – make this move in their post-pandemic approach to their working patterns.
To anyone making the move, although it might seem like a complex task, moving your business over to the cloud doesn’t have to be daunting. And it can reduce your overall running costs, as well as keeping your data, devices and network secure – regardless of the multiple locations of you and your team.
#cloud #azure #microsoft #workfromhome #wfh #remoteworking #BP #azured #technology #workforce
We’re often telling our children that the best ideas come from boredom, yet it’s a notion that, as adults, we struggle with – we simply don’t allow the time to be bored.
Manoush Zomorodi’s TEDEd is FULL of interesting information… A decade ago, we shifted our attention at work every three minutes – and now, it’s every 45 seconds. Every day. On average, we’re switching IT tasks 566 times a day – and checking emails 72 times a day. It really is exhausting stuff!
We’re always “on” – replying to emails and booking calls when previously we would have just enjoyed a brief moment of “down time”. But when we slip in to “default mode”, the results can be staggering. Awesome ideas, brilliant problem solving and great strategies…all appear with such clarity.
Watch Manoush Zomorodi’s TEdEd: How boredom can lead to your most brilliant ideas