Tag Archives: security

Technical Trainer Leverages Parallels Toolbox to Optimize Presentations

Parallels® Toolbox is helping users find new ways to increase productivity – especially if you need to optimize presentations! Recently released, Parallels Toolbox empowers users with more than 30 easy-to-use, one-click tools, all packaged within a simple interface for both Mac® and PC. This must-have, all-in-one application has helped Sean Bugler, a technical trainer, simplify […]

The post Technical Trainer Leverages Parallels Toolbox to Optimize Presentations appeared first on Parallels Blog.

macOS High Sierra Critical Update with Parallels Mac Management for Microsoft SCCM

Update: Apple® releases macOS® High Sierra security fix for critical root vulnerability for macOS High Sierra 10.13.1 (not impacted: macOS Sierra 10.12.6 and earlier). Make sure to install this update on all macOS computers affected, as described at support.apple.com/en-us/HT208315 As reported on CNET on November 28, 2017, a major bug has been uncovered that allows […]

The post macOS High Sierra Critical Update with Parallels Mac Management for Microsoft SCCM appeared first on Parallels Blog.

VMware NSX vs. Cisco ACI: Where Are We Now?

Just over a year and a half ago, GreenPages posted a video  and of Nick Phelps (below) and held a webinar discussing how it’s not VMware NSX vs. Cisco ACI, but the synergistic benefits of running both VMware NSX and Cisco ACI simultaneously which was, at the time, a bit “science-fiction-y.” Fast forward to present day and the tech world has had plenty of time to test how these two products work together. Check out Nick’s update on why using both technologies together can create “a beautiful orchestra of automation!”  

As a vendor agnostic solutions provider, GreenPages is in a perfect position to help you evaluate and deploy the best tech depending on your unique business goals. Please reach out to us or your account manager to get started.

By Jake Cryan, Digital Marketing Specialist

 

Eight Crucial Strategies for Strengthening Network Security

strengthening network security Strengthening Network Security

Strengthening network security is vital to your organization. Check out the tips below to ensure you are well protected.

Leave no host forgotten, know your hosts (all of them)

Any and every device capable of wired or wireless access with an IP address should be known in your environment. This goes beyond desktops, laptops, servers, printers, IP phones, and mobile devices. The “Internet of Things” presents a larger potential footprint of hosts including environmental monitoring and control devices, security cameras, and even things like vending machines. IoT devices all run operating systems that have the potential to be compromised by hackers and used as a platform for performing reconnaissance of your network for more valuable assets. Ensure inventory lists are valid by performing routing network scans to identify unknown devices.

Understand your users’ behavior

Knowing the culture and habits of users, like when and where they work, is important for establishing baseline behavior patterns. Also, the types of work they do online such as researching, downloading software, and uploading files will vary greatly by industry. For example, users at a law firm are not going to have the same internet usage behavior as users at a software development company. Even within an organization, there will be differences between administrative and technical engineering user behavior. Knowing the behavior of your users will make it easier to identify what is normal versus abnormal network traffic.

Understand what talks to what and why

The network traffic patterns in your organization should represent the usage of critical business applications that users need to do their job. Understanding these traffic flows is critical to building effective security policies for ACLs, stateful firewall policies, and deep packet inspection rules on network security devices. This applies to traffic within your internal private networks, what is allowed in from the outside, and especially the type of traffic allowed to leave your organization.

Control what is running on your hosts

The more applications and services running on a host, the more potential for exposure to software vulnerabilities.  Software updates are important for bug fixes and new features but security related fixes to applications are critical. Limit the types of applications users may install to reputable software vendors that take security updates seriously. Staying current with operating system security updates is even more important. Situations when legacy applications require older EOL operating systems to run on your network should be monitored very closely and if possible should be segmented to dedicated VLANs.

Know your data & control your data

Understand the data that is critical to your business and classify that data into different levels of sensitivity. You must ensure that encryption is used when transmitting highly sensitive data across the network as well as limit access to sensitive data to only those who require it. It is important to implement effective logging on all devices that store and transmit sensitive data and perform routine checks of your backup solutions to ensure the integrity of critical data backups.

Monitor and control your perimeter (egress too!!)

The network perimeter of your organization includes Internet and WAN connections but also wireless access points. All three of these perimeter pathways need to be protected with the highest levels of access restrictions.  Next-generation security appliances should be deployed on all perimeter segments to provide deep packet inspection, content filtering, and malicious URL inspection. Centralized logging of network and security devices using a security information event management (SIEM) solution is vital for analysis and correlation of logging data.

Train your users: they are your weakest link and your best defense

Deliver routine end-user security awareness training to keep users up to date on ways to recognize suspicious email content and websites. Perform routine experimental phishing campaigns to determine how well users are able to identify suspicious emails. Review policies with users on how to manage sensitive data. Make sure users are aware of non-technical methods used by hackers such as social engineering tactics to extract information about your organization.

Implement strong authentication controls

Use multifactor authentication for wireless and VPN remote access whenever possible. Restrict the usage of local user accounts and require complex passwords that must be changed regularly. Implement 802.1x security on wireless LANs as well as wired network connections that are accessible to common areas in your facility.

Utilizing the tips above can go a long way in strengthening network security, reach out to your account manager or contact us to find out more about strategies to strengthen your network.

By Kevin Dresser, Solutions Architect

Why did Akamai shift its focus to cybersecurity?

When you hear the word Akamai, the first thing that comes to your mind is its web traffic management system. Well, if you’re not familiar, Akamai is known for managing web traffic at busy sites, so the latency rates are low.

But today, Akamai is into a completely different line of business – cybersecurity. Why?

Companies like Apple and AWS began to have their own in-house solutions to handle traffic management, so they no longer needed the services of Akamai. In fact, this move made it difficult for Akamai to sustain its operations. So, it decided to give a shot at cybersecurity.

And that was probably the best decision by its management because it entered the market when cybersecurity was just beginning to grow. Also, there was a big need to fill the security gaps in the digital world, considering the many hacking incidents that were happening a few years ago. Specifically, the hacking of Target’s systems brought to the fore the immediate need to have sound cybersecurity solutions.

Due to these factrs, Akamai began to extensively grow in this business. Since it began operations, it has grown 27 percent year-on-year and today, it is making about $121 million in revenue each year. Undoubtedly, this is the strongest growing segment of Akamai’s business and one that is all set to grow even more in the coming years.

Akamai has created the right kind of products that will spruce the cybersecurity of companies today. For example, the Equifax breach exposed the records of more than 143 million Americans. A product called Kona Site Defender from Akamai is designed to prevent exactly such incidents from happening.

Also, this company is constantly working to improve its cybersecurity line of products, so it can stay one step ahead of hackers. So far, it’s been helping companies to protect their confidential data and through it all, has helped Akamai find its space again in an evolving tech world.

The post Why did Akamai shift its focus to cybersecurity? appeared first on Cloud News Daily.

KRACK & Adobe Flash Vulnerabilities: How to Protect Now & Prevent Later

Security VulnerabiilityAs you may know, there were multiple major security vulnerabilities announced yesterday. One specifically related to the WPA2 WiFi Security Protocol dubbed “KRACK” and another related to Adobe Flash. What happened and how can you protect your environment from the KRACK & Adobe Flash vulnerabilities? Below is what we shared with our current Managed Services customers, but even if you work with another provider or handle all of your IT system monitoring and management yourself, this may be helpful toward further understanding your risks and how to protect your environment.

WPA2 “KRACK” Vulnerability


What is it?: A critical vulnerability in the WiFi Protected Access II (WPA2) protocol which could allow someone within range of your wireless network to gain unauthorized access to traffic over that connection. 

This vulnerability applies to any device that utilizes the WPA2 protocol to establish secure connections, including Wireless Access Points, Endpoints (laptops, desktops), and Mobile Devices.

Microsoft has already released a patch and it is included in the October Security Rollup. For customers currently enrolled in our desktop patching program, this roll-up has been approved for immediate install. For customers enrolled in our Server patching program, we will apply the October Security Rollup per the normal patching schedule as servers typically will not have WiFi enabled. 

Further – some recommendations for your end users:

  • Avoid public WiFi (such as coffee shops, hotels, etc.)
  • When connected to WiFi, try to limit browsing to HTTPS sites
  • Consider using a VPN which will encrypt traffic end-to-end

While patching your endpoints will substantially mitigate the vulnerability, GreenPages will be watching for upcoming available patches and updates for the network devices in your environment in the coming days and weeks and will work with you to apply those expeditiously.

More specific details on this WiFi vulnerability can be found here.

Adobe Flash Vulnerability:

Adobe released a security update for a vulnerability that was recently discovered that could lead to remote code execution. 

  • If you are currently enrolled in a 3rd party patching program that includes Adobe Flash, we have already approved this patch for deployment to your environment.
  • If you are not enrolled, due to the risk potential for this vulnerability, it is highly recommended that you apply this patch to all devices in your environment. 

The Adobe Flash Security Bulletin can be found here.  

We’ll be writing a follow-up post next week about the KRACK & Adobe Flash vulnerabilities once the dust has settled to see how the industry has reacted and responded to these vulnerabilities so please check back then.

To learn more about GreenPages Server, Desktop, 3rd Party Patching, and Managed Services Programs, please call 800-989-2989 and we can set up a call to discuss.

By:

Jay Keating, VP Cloud & Managed Services
Aaron Boissonnault, Director, Hybrid Cloud Operations
Steve Stein, Director, Client Services

Allow Parallels System Extensions in macOS High Sierra

Parallels Program Manager guest author: Alex Sursiakov Apple® is constantly improving their operating systems—including security improvements so you, the Apple user, can be safe. Sometimes security improvements are under the hood and don’t bother you. Sometimes they require your attention and for you to make a decision. Here I will talk about the second type. Starting with macOS® High Sierra, Apple warns you […]

The post Allow Parallels System Extensions in macOS High Sierra appeared first on Parallels Blog.

Allow Parallels System Extensions in macOS High Sierra

Parallels Program Manager guest author: Alex Sursiakov Apple® is constantly improving their operating systems—including security improvements so you, the Apple user, can be safe. Sometimes security improvements are under the hood and don’t bother you. Sometimes they require your attention and for you to make a decision. Here I will talk about the second type. Starting with macOS® High Sierra, Apple warns you […]

The post Allow Parallels System Extensions in macOS High Sierra appeared first on Parallels Blog.

Emerging Security Trends with Tom Corn, SVP, VMware + VMworld Tease!

 

I recently sat down with Tom Corn, Senior VP of Security Products at VMware, after his keynote presentation at GreenPages’ Cloudscape Summit 2017. While most of his keynote announcements are under wraps until VMworld kicks off next week, he was able to discuss what security trends are emerging in the security industry as well as VMware’s role, including the importance of micro segmentation and how that technology is poised to continue to grow. Check out the video, including a little tease about the upcoming exciting news that will be unveiled at VMworld!

GreenPages’ Enterprise Consultant, Chris Williams, will be presenting at VMworld this year! His session will focus on how an architect designs for availability and recoverability in the cloud. It is on Tuesday, August 29th from 3:00pm t0 3:15pm at VMworld. Click here for more info.

By Jake Cryan, Digital Marketing Specialist

EndPoint Protection: Stopping Attacks Like WannaCry

Endpoint ComplianceIn the past few days, the WannaCry ransomware has attacked organizations all over the globe, in over 100 countries. It is believed to be the biggest attack of its kind ever. The malware enables the attacker to target endpoints without the users’ knowledge, which is exactly why endpoint protection is so crucial. This is causing massive issues in businesses all around the world. As of Sunday,

“More than 130,000 systems have already been compromised.” (Kessem, 2017)

Using a network monitoring tool is an ideal way to classify every PC, tablet, and smartphone on your network to determine if they are safe or not. An agentless monitoring tool gives your company the ability to see and control managed, unmanaged, and IoT devices.  In addition, 99% of computers are vulnerable to exploit kits, making unmanaged computers a serious threat to your network. The number of data breaches is growing exponentially, with more advanced malware and technology making it easier for hackers to get inside.

[Download Our Webinar on 20 Critical Security Controls Every Modern Company Should Have]

The Importance of Endpoint Protection

This is why a powerful endpoint compliance strategy is so crucial. There are no endpoint agents required for network access control authentication, which enables seamless visibility of every device and type connecting to your network. Network Access Controls can also help you detect and take action against suspicious endpoints the instant they access the network. It can also protect you against hacked Internet of Things devices, such as the Nest Thermostat, Phillips Hub, smart microwaves, smart ovens, security cameras, and much more. With hundreds of different, unsecured IoT devices connecting to your networks, it is vital for your company to know what they are. Using an agentless technology can help you discover, separate and assess devices on your network. Check out this great in-depth article on Network World.

Interested in learning more about how to protect your company?

Download our webinar recording on 20 critical security controls and learn what you can implement to gain understanding into the security of your environment and protect your company

By Jake Cryan, Digital Marketing Specialist