Tag Archives: security

Eight Crucial Strategies for Strengthening Network Security

strengthening network security Strengthening Network Security

Strengthening network security is vital to your organization. Check out the tips below to ensure you are well protected.

Leave no host forgotten, know your hosts (all of them)

Any and every device capable of wired or wireless access with an IP address should be known in your environment. This goes beyond desktops, laptops, servers, printers, IP phones, and mobile devices. The “Internet of Things” presents a larger potential footprint of hosts including environmental monitoring and control devices, security cameras, and even things like vending machines. IoT devices all run operating systems that have the potential to be compromised by hackers and used as a platform for performing reconnaissance of your network for more valuable assets. Ensure inventory lists are valid by performing routing network scans to identify unknown devices.

Understand your users’ behavior

Knowing the culture and habits of users, like when and where they work, is important for establishing baseline behavior patterns. Also, the types of work they do online such as researching, downloading software, and uploading files will vary greatly by industry. For example, users at a law firm are not going to have the same internet usage behavior as users at a software development company. Even within an organization, there will be differences between administrative and technical engineering user behavior. Knowing the behavior of your users will make it easier to identify what is normal versus abnormal network traffic.

Understand what talks to what and why

The network traffic patterns in your organization should represent the usage of critical business applications that users need to do their job. Understanding these traffic flows is critical to building effective security policies for ACLs, stateful firewall policies, and deep packet inspection rules on network security devices. This applies to traffic within your internal private networks, what is allowed in from the outside, and especially the type of traffic allowed to leave your organization.

Control what is running on your hosts

The more applications and services running on a host, the more potential for exposure to software vulnerabilities.  Software updates are important for bug fixes and new features but security related fixes to applications are critical. Limit the types of applications users may install to reputable software vendors that take security updates seriously. Staying current with operating system security updates is even more important. Situations when legacy applications require older EOL operating systems to run on your network should be monitored very closely and if possible should be segmented to dedicated VLANs.

Know your data & control your data

Understand the data that is critical to your business and classify that data into different levels of sensitivity. You must ensure that encryption is used when transmitting highly sensitive data across the network as well as limit access to sensitive data to only those who require it. It is important to implement effective logging on all devices that store and transmit sensitive data and perform routine checks of your backup solutions to ensure the integrity of critical data backups.

Monitor and control your perimeter (egress too!!)

The network perimeter of your organization includes Internet and WAN connections but also wireless access points. All three of these perimeter pathways need to be protected with the highest levels of access restrictions.  Next-generation security appliances should be deployed on all perimeter segments to provide deep packet inspection, content filtering, and malicious URL inspection. Centralized logging of network and security devices using a security information event management (SIEM) solution is vital for analysis and correlation of logging data.

Train your users: they are your weakest link and your best defense

Deliver routine end-user security awareness training to keep users up to date on ways to recognize suspicious email content and websites. Perform routine experimental phishing campaigns to determine how well users are able to identify suspicious emails. Review policies with users on how to manage sensitive data. Make sure users are aware of non-technical methods used by hackers such as social engineering tactics to extract information about your organization.

Implement strong authentication controls

Use multifactor authentication for wireless and VPN remote access whenever possible. Restrict the usage of local user accounts and require complex passwords that must be changed regularly. Implement 802.1x security on wireless LANs as well as wired network connections that are accessible to common areas in your facility.

Utilizing the tips above can go a long way in strengthening network security, reach out to your account manager or contact us to find out more about strategies to strengthen your network.

By Kevin Dresser, Solutions Architect

Why did Akamai shift its focus to cybersecurity?

When you hear the word Akamai, the first thing that comes to your mind is its web traffic management system. Well, if you’re not familiar, Akamai is known for managing web traffic at busy sites, so the latency rates are low.

But today, Akamai is into a completely different line of business – cybersecurity. Why?

Companies like Apple and AWS began to have their own in-house solutions to handle traffic management, so they no longer needed the services of Akamai. In fact, this move made it difficult for Akamai to sustain its operations. So, it decided to give a shot at cybersecurity.

And that was probably the best decision by its management because it entered the market when cybersecurity was just beginning to grow. Also, there was a big need to fill the security gaps in the digital world, considering the many hacking incidents that were happening a few years ago. Specifically, the hacking of Target’s systems brought to the fore the immediate need to have sound cybersecurity solutions.

Due to these factrs, Akamai began to extensively grow in this business. Since it began operations, it has grown 27 percent year-on-year and today, it is making about $121 million in revenue each year. Undoubtedly, this is the strongest growing segment of Akamai’s business and one that is all set to grow even more in the coming years.

Akamai has created the right kind of products that will spruce the cybersecurity of companies today. For example, the Equifax breach exposed the records of more than 143 million Americans. A product called Kona Site Defender from Akamai is designed to prevent exactly such incidents from happening.

Also, this company is constantly working to improve its cybersecurity line of products, so it can stay one step ahead of hackers. So far, it’s been helping companies to protect their confidential data and through it all, has helped Akamai find its space again in an evolving tech world.

The post Why did Akamai shift its focus to cybersecurity? appeared first on Cloud News Daily.

KRACK & Adobe Flash Vulnerabilities: How to Protect Now & Prevent Later

Security VulnerabiilityAs you may know, there were multiple major security vulnerabilities announced yesterday. One specifically related to the WPA2 WiFi Security Protocol dubbed “KRACK” and another related to Adobe Flash. What happened and how can you protect your environment from the KRACK & Adobe Flash vulnerabilities? Below is what we shared with our current Managed Services customers, but even if you work with another provider or handle all of your IT system monitoring and management yourself, this may be helpful toward further understanding your risks and how to protect your environment.

WPA2 “KRACK” Vulnerability


What is it?: A critical vulnerability in the WiFi Protected Access II (WPA2) protocol which could allow someone within range of your wireless network to gain unauthorized access to traffic over that connection. 

This vulnerability applies to any device that utilizes the WPA2 protocol to establish secure connections, including Wireless Access Points, Endpoints (laptops, desktops), and Mobile Devices.

Microsoft has already released a patch and it is included in the October Security Rollup. For customers currently enrolled in our desktop patching program, this roll-up has been approved for immediate install. For customers enrolled in our Server patching program, we will apply the October Security Rollup per the normal patching schedule as servers typically will not have WiFi enabled. 

Further – some recommendations for your end users:

  • Avoid public WiFi (such as coffee shops, hotels, etc.)
  • When connected to WiFi, try to limit browsing to HTTPS sites
  • Consider using a VPN which will encrypt traffic end-to-end

While patching your endpoints will substantially mitigate the vulnerability, GreenPages will be watching for upcoming available patches and updates for the network devices in your environment in the coming days and weeks and will work with you to apply those expeditiously.

More specific details on this WiFi vulnerability can be found here.

Adobe Flash Vulnerability:

Adobe released a security update for a vulnerability that was recently discovered that could lead to remote code execution. 

  • If you are currently enrolled in a 3rd party patching program that includes Adobe Flash, we have already approved this patch for deployment to your environment.
  • If you are not enrolled, due to the risk potential for this vulnerability, it is highly recommended that you apply this patch to all devices in your environment. 

The Adobe Flash Security Bulletin can be found here.  

We’ll be writing a follow-up post next week about the KRACK & Adobe Flash vulnerabilities once the dust has settled to see how the industry has reacted and responded to these vulnerabilities so please check back then.

To learn more about GreenPages Server, Desktop, 3rd Party Patching, and Managed Services Programs, please call 800-989-2989 and we can set up a call to discuss.

By:

Jay Keating, VP Cloud & Managed Services
Aaron Boissonnault, Director, Hybrid Cloud Operations
Steve Stein, Director, Client Services

Allow Parallels System Extensions in macOS High Sierra

Parallels Program Manager guest author: Alex Sursiakov Apple® is constantly improving their operating systems—including security improvements so you, the Apple user, can be safe. Sometimes security improvements are under the hood and don’t bother you. Sometimes they require your attention and for you to make a decision. Here I will talk about the second type. Starting with macOS® High Sierra, Apple warns you […]

The post Allow Parallels System Extensions in macOS High Sierra appeared first on Parallels Blog.

Allow Parallels System Extensions in macOS High Sierra

Parallels Program Manager guest author: Alex Sursiakov Apple® is constantly improving their operating systems—including security improvements so you, the Apple user, can be safe. Sometimes security improvements are under the hood and don’t bother you. Sometimes they require your attention and for you to make a decision. Here I will talk about the second type. Starting with macOS® High Sierra, Apple warns you […]

The post Allow Parallels System Extensions in macOS High Sierra appeared first on Parallels Blog.

Emerging Security Trends with Tom Corn, SVP, VMware + VMworld Tease!

 

I recently sat down with Tom Corn, Senior VP of Security Products at VMware, after his keynote presentation at GreenPages’ Cloudscape Summit 2017. While most of his keynote announcements are under wraps until VMworld kicks off next week, he was able to discuss what security trends are emerging in the security industry as well as VMware’s role, including the importance of micro segmentation and how that technology is poised to continue to grow. Check out the video, including a little tease about the upcoming exciting news that will be unveiled at VMworld!

GreenPages’ Enterprise Consultant, Chris Williams, will be presenting at VMworld this year! His session will focus on how an architect designs for availability and recoverability in the cloud. It is on Tuesday, August 29th from 3:00pm t0 3:15pm at VMworld. Click here for more info.

By Jake Cryan, Digital Marketing Specialist

EndPoint Protection: Stopping Attacks Like WannaCry

Endpoint ComplianceIn the past few days, the WannaCry ransomware has attacked organizations all over the globe, in over 100 countries. It is believed to be the biggest attack of its kind ever. The malware enables the attacker to target endpoints without the users’ knowledge, which is exactly why endpoint protection is so crucial. This is causing massive issues in businesses all around the world. As of Sunday,

“More than 130,000 systems have already been compromised.” (Kessem, 2017)

Using a network monitoring tool is an ideal way to classify every PC, tablet, and smartphone on your network to determine if they are safe or not. An agentless monitoring tool gives your company the ability to see and control managed, unmanaged, and IoT devices.  In addition, 99% of computers are vulnerable to exploit kits, making unmanaged computers a serious threat to your network. The number of data breaches is growing exponentially, with more advanced malware and technology making it easier for hackers to get inside.

[Download Our Webinar on 20 Critical Security Controls Every Modern Company Should Have]

The Importance of Endpoint Protection

This is why a powerful endpoint compliance strategy is so crucial. There are no endpoint agents required for network access control authentication, which enables seamless visibility of every device and type connecting to your network. Network Access Controls can also help you detect and take action against suspicious endpoints the instant they access the network. It can also protect you against hacked Internet of Things devices, such as the Nest Thermostat, Phillips Hub, smart microwaves, smart ovens, security cameras, and much more. With hundreds of different, unsecured IoT devices connecting to your networks, it is vital for your company to know what they are. Using an agentless technology can help you discover, separate and assess devices on your network. Check out this great in-depth article on Network World.

Interested in learning more about how to protect your company?

Download our webinar recording on 20 critical security controls and learn what you can implement to gain understanding into the security of your environment and protect your company

By Jake Cryan, Digital Marketing Specialist

NGA wants to speed cloud deployment

Federal government has come to embrace the cloud in a big way, and many of its departments have already started moving their data and applications to the cloud. Though this is heartening from a technology and user perspective, what is painstaking is the process of approvals. Typically, it takes a minimum of six months for a cloud provider to get security clearance for its service. In fact, six months is when the approvals run at the fastest possible pace. Otherwise, clearance to use cloud service for federal government apps and data can take years. The National Geospatial Intelligence Agency (NGA) wants to change all this.

To those working in NGA this elaborate approval process feels like a super slow motion and this is why they’re doing everything they can to change it. According to Jason Hess, the cloud security head at NGA, many different processes are being put in place to reduce the time it takes for a cloud provider to get security clearance. Ideally, Hess wants all approvals to be cleared in a single day, so the cloud service can be up and running within 24 hours of its application. Currently, the NGA uses a combination of DevOps techniques to get approvals within seven days, but this hasn’t been easy by any breadth of imagination.

This is a big initiative, considering that the NGA is planning to move all of its data and applications to the cloud, in a big to “re-invent security.” The agency is looking to tap into the flexibility of cloud to break-down the IT architecture and re-build it every day, so hackers will experience a new operating environment every day. NGA believes that such a move can confuse hackers and the familiarity with the system, and in the process, will reduce the chances of an attack as well.

Though this idea is unique, its practical application is always questionable. Is it possible to build such a dynamic IT architecture that changes every day? Will there be a specific pattern that would be followed in choosing the architectural style? These are important questions that have to be answered if the NGA wants to use this strategy to prevent outside attacks on its system. If an architectural style is going to be repeated after every few days, then it becomes predictable for hackers. Also, if there is no randomization, then architectural styles can be guessed by sophisticated hackers.

Given these questions, we can say that the NGA’s approach to cyber security is not for everyone. Currently many federal departments have vast amounts of data and legacy systems that can make it almost impossible for them to tear down the IT architecture and build one from scratch each day. At the same time, simply installing cyber security measures at the edges of a network system is not going to work anymore.

So, federal departments have to strike a balance between the aggressive security approach of the NGA and its own problems of legacy systems and siloed data,

Overall, it’ll be interesting to see if NGA’s plan can be implemented across the board.

The post NGA wants to speed cloud deployment appeared first on Cloud News Daily.

Cloud Security Market to Grow to $13.93 Billion by 2024

Cloud security is one of the fastest growing market segments today. The latest report from Grand View Research Inc further accentuates this trend, as it predicts the cloud security market to grow to $13.93 billion by 2024.

Even if this sounds phenomenal, it’s still possible because of a host of factors. Firstly, more companies are moving to the cloud because of the many benefits that come with it. At the same time, the last few years has seen an increasing number of cyber attacks and data breaches that have resulted in millions of dollars of loss for companies. To counter this problem, cloud security strategies will be put in place. Already, many cloud service providers and client companies are working on addressing cloud security flaws, and this is only expected to increase over the coming years.

Secondly, many cloud service providers are investing heavily in security infrastructure in the form of additional infrastructure, research and innovation. Some are even acquiring other companies that have made remarkable progress in cloud security. All these investments are sure to bring in more customers, thereby increasing the size of cloud security market.

Thirdly, cloud computing is erasing geographical boundaries with its widespread reach. As more companies take to the cloud, this market will grow. Along with it, the security market will also grow to keep pace with the growing security needs of customers.

Another important factor that will fuel the growth of cloud security market is the changing government regulations. As cloud computing becomes a mainstream part of businesses, governments are forced to come up with regulations that will protect the interests of businesses and individual consumers. These regulations are more likely to make cloud access and security more stringent, and this in turn, will fuel the cloud security market.

For example, Germany and other countries in the EU are option for high data privacy by enacting legislation to keep data only within their geographical borders. In other words, data pertaining to German businesses and residents should be stored only within the territorial boundaries of Germany. Other countries like the U.S and France are striving to get greater visibility on Internet traffic. With such regulations in place, cloud security is sure to grow.

Along with government regulations, industry specific regulations such as Health Insurance Portability and Accountability Act (HIPAA) for the healthcare industry, Payment Card Industry Data Security Standard (PCI DSS) for the financial sector, Safe Harbor Act and European Union Data Protection Directive are likely to make enhance cloud security, and this could eventually help the cloud security industry to grow.

Due to these factors, the cloud security industry is well on its way to some astounding growth over the next decade.

According to the report, the major players in this market segment are CA Technologies Inc, Cisco Systems, IBM Corp, Intel Corp, TrendMicro and VMWare. Other companies that are vying for a market share in this industry are Whitehat Virtual Technologies, Snoopwall Inc and BMC Software.

The post Cloud Security Market to Grow to $13.93 Billion by 2024 appeared first on Cloud News Daily.

How to Set Action-based Password Requirements in Parallels Desktop

Support team guest author: Pradeep Raj Why do we use passwords – mainly to ensure the security and confidentiality of our data, right? But what if you want to include an extra step before you make any changes in your software? That’s exactly what I’m going to talk about in this blog. Whatever reason you […]

The post How to Set Action-based Password Requirements in Parallels Desktop appeared first on Parallels Blog.