Archivo de la etiqueta: security

KRACK & Adobe Flash Vulnerabilities: How to Protect Now & Prevent Later

Security VulnerabiilityAs you may know, there were multiple major security vulnerabilities announced yesterday. One specifically related to the WPA2 WiFi Security Protocol dubbed “KRACK” and another related to Adobe Flash. What happened and how can you protect your environment from the KRACK & Adobe Flash vulnerabilities? Below is what we shared with our current Managed Services customers, but even if you work with another provider or handle all of your IT system monitoring and management yourself, this may be helpful toward further understanding your risks and how to protect your environment.

WPA2 “KRACK” Vulnerability


What is it?: A critical vulnerability in the WiFi Protected Access II (WPA2) protocol which could allow someone within range of your wireless network to gain unauthorized access to traffic over that connection. 

This vulnerability applies to any device that utilizes the WPA2 protocol to establish secure connections, including Wireless Access Points, Endpoints (laptops, desktops), and Mobile Devices.

Microsoft has already released a patch and it is included in the October Security Rollup. For customers currently enrolled in our desktop patching program, this roll-up has been approved for immediate install. For customers enrolled in our Server patching program, we will apply the October Security Rollup per the normal patching schedule as servers typically will not have WiFi enabled. 

Further – some recommendations for your end users:

  • Avoid public WiFi (such as coffee shops, hotels, etc.)
  • When connected to WiFi, try to limit browsing to HTTPS sites
  • Consider using a VPN which will encrypt traffic end-to-end

While patching your endpoints will substantially mitigate the vulnerability, GreenPages will be watching for upcoming available patches and updates for the network devices in your environment in the coming days and weeks and will work with you to apply those expeditiously.

More specific details on this WiFi vulnerability can be found here.

Adobe Flash Vulnerability:

Adobe released a security update for a vulnerability that was recently discovered that could lead to remote code execution. 

  • If you are currently enrolled in a 3rd party patching program that includes Adobe Flash, we have already approved this patch for deployment to your environment.
  • If you are not enrolled, due to the risk potential for this vulnerability, it is highly recommended that you apply this patch to all devices in your environment. 

The Adobe Flash Security Bulletin can be found here.  

We’ll be writing a follow-up post next week about the KRACK & Adobe Flash vulnerabilities once the dust has settled to see how the industry has reacted and responded to these vulnerabilities so please check back then.

To learn more about GreenPages Server, Desktop, 3rd Party Patching, and Managed Services Programs, please call 800-989-2989 and we can set up a call to discuss.

By:

Jay Keating, VP Cloud & Managed Services
Aaron Boissonnault, Director, Hybrid Cloud Operations
Steve Stein, Director, Client Services

Allow Parallels System Extensions in macOS High Sierra

Parallels Program Manager guest author: Alex Sursiakov Apple® is constantly improving their operating systems—including security improvements so you, the Apple user, can be safe. Sometimes security improvements are under the hood and don’t bother you. Sometimes they require your attention and for you to make a decision. Here I will talk about the second type. Starting with macOS® High Sierra, Apple warns you […]

The post Allow Parallels System Extensions in macOS High Sierra appeared first on Parallels Blog.

Allow Parallels System Extensions in macOS High Sierra

Parallels Program Manager guest author: Alex Sursiakov Apple® is constantly improving their operating systems—including security improvements so you, the Apple user, can be safe. Sometimes security improvements are under the hood and don’t bother you. Sometimes they require your attention and for you to make a decision. Here I will talk about the second type. Starting with macOS® High Sierra, Apple warns you […]

The post Allow Parallels System Extensions in macOS High Sierra appeared first on Parallels Blog.

Emerging Security Trends with Tom Corn, SVP, VMware + VMworld Tease!

 

I recently sat down with Tom Corn, Senior VP of Security Products at VMware, after his keynote presentation at GreenPages’ Cloudscape Summit 2017. While most of his keynote announcements are under wraps until VMworld kicks off next week, he was able to discuss what security trends are emerging in the security industry as well as VMware’s role, including the importance of micro segmentation and how that technology is poised to continue to grow. Check out the video, including a little tease about the upcoming exciting news that will be unveiled at VMworld!

GreenPages’ Enterprise Consultant, Chris Williams, will be presenting at VMworld this year! His session will focus on how an architect designs for availability and recoverability in the cloud. It is on Tuesday, August 29th from 3:00pm t0 3:15pm at VMworld. Click here for more info.

By Jake Cryan, Digital Marketing Specialist

EndPoint Protection: Stopping Attacks Like WannaCry

Endpoint ComplianceIn the past few days, the WannaCry ransomware has attacked organizations all over the globe, in over 100 countries. It is believed to be the biggest attack of its kind ever. The malware enables the attacker to target endpoints without the users’ knowledge, which is exactly why endpoint protection is so crucial. This is causing massive issues in businesses all around the world. As of Sunday,

“More than 130,000 systems have already been compromised.” (Kessem, 2017)

Using a network monitoring tool is an ideal way to classify every PC, tablet, and smartphone on your network to determine if they are safe or not. An agentless monitoring tool gives your company the ability to see and control managed, unmanaged, and IoT devices.  In addition, 99% of computers are vulnerable to exploit kits, making unmanaged computers a serious threat to your network. The number of data breaches is growing exponentially, with more advanced malware and technology making it easier for hackers to get inside.

[Download Our Webinar on 20 Critical Security Controls Every Modern Company Should Have]

The Importance of Endpoint Protection

This is why a powerful endpoint compliance strategy is so crucial. There are no endpoint agents required for network access control authentication, which enables seamless visibility of every device and type connecting to your network. Network Access Controls can also help you detect and take action against suspicious endpoints the instant they access the network. It can also protect you against hacked Internet of Things devices, such as the Nest Thermostat, Phillips Hub, smart microwaves, smart ovens, security cameras, and much more. With hundreds of different, unsecured IoT devices connecting to your networks, it is vital for your company to know what they are. Using an agentless technology can help you discover, separate and assess devices on your network. Check out this great in-depth article on Network World.

Interested in learning more about how to protect your company?

Download our webinar recording on 20 critical security controls and learn what you can implement to gain understanding into the security of your environment and protect your company

By Jake Cryan, Digital Marketing Specialist

NGA wants to speed cloud deployment

Federal government has come to embrace the cloud in a big way, and many of its departments have already started moving their data and applications to the cloud. Though this is heartening from a technology and user perspective, what is painstaking is the process of approvals. Typically, it takes a minimum of six months for a cloud provider to get security clearance for its service. In fact, six months is when the approvals run at the fastest possible pace. Otherwise, clearance to use cloud service for federal government apps and data can take years. The National Geospatial Intelligence Agency (NGA) wants to change all this.

To those working in NGA this elaborate approval process feels like a super slow motion and this is why they’re doing everything they can to change it. According to Jason Hess, the cloud security head at NGA, many different processes are being put in place to reduce the time it takes for a cloud provider to get security clearance. Ideally, Hess wants all approvals to be cleared in a single day, so the cloud service can be up and running within 24 hours of its application. Currently, the NGA uses a combination of DevOps techniques to get approvals within seven days, but this hasn’t been easy by any breadth of imagination.

This is a big initiative, considering that the NGA is planning to move all of its data and applications to the cloud, in a big to “re-invent security.” The agency is looking to tap into the flexibility of cloud to break-down the IT architecture and re-build it every day, so hackers will experience a new operating environment every day. NGA believes that such a move can confuse hackers and the familiarity with the system, and in the process, will reduce the chances of an attack as well.

Though this idea is unique, its practical application is always questionable. Is it possible to build such a dynamic IT architecture that changes every day? Will there be a specific pattern that would be followed in choosing the architectural style? These are important questions that have to be answered if the NGA wants to use this strategy to prevent outside attacks on its system. If an architectural style is going to be repeated after every few days, then it becomes predictable for hackers. Also, if there is no randomization, then architectural styles can be guessed by sophisticated hackers.

Given these questions, we can say that the NGA’s approach to cyber security is not for everyone. Currently many federal departments have vast amounts of data and legacy systems that can make it almost impossible for them to tear down the IT architecture and build one from scratch each day. At the same time, simply installing cyber security measures at the edges of a network system is not going to work anymore.

So, federal departments have to strike a balance between the aggressive security approach of the NGA and its own problems of legacy systems and siloed data,

Overall, it’ll be interesting to see if NGA’s plan can be implemented across the board.

The post NGA wants to speed cloud deployment appeared first on Cloud News Daily.

Cloud Security Market to Grow to $13.93 Billion by 2024

Cloud security is one of the fastest growing market segments today. The latest report from Grand View Research Inc further accentuates this trend, as it predicts the cloud security market to grow to $13.93 billion by 2024.

Even if this sounds phenomenal, it’s still possible because of a host of factors. Firstly, more companies are moving to the cloud because of the many benefits that come with it. At the same time, the last few years has seen an increasing number of cyber attacks and data breaches that have resulted in millions of dollars of loss for companies. To counter this problem, cloud security strategies will be put in place. Already, many cloud service providers and client companies are working on addressing cloud security flaws, and this is only expected to increase over the coming years.

Secondly, many cloud service providers are investing heavily in security infrastructure in the form of additional infrastructure, research and innovation. Some are even acquiring other companies that have made remarkable progress in cloud security. All these investments are sure to bring in more customers, thereby increasing the size of cloud security market.

Thirdly, cloud computing is erasing geographical boundaries with its widespread reach. As more companies take to the cloud, this market will grow. Along with it, the security market will also grow to keep pace with the growing security needs of customers.

Another important factor that will fuel the growth of cloud security market is the changing government regulations. As cloud computing becomes a mainstream part of businesses, governments are forced to come up with regulations that will protect the interests of businesses and individual consumers. These regulations are more likely to make cloud access and security more stringent, and this in turn, will fuel the cloud security market.

For example, Germany and other countries in the EU are option for high data privacy by enacting legislation to keep data only within their geographical borders. In other words, data pertaining to German businesses and residents should be stored only within the territorial boundaries of Germany. Other countries like the U.S and France are striving to get greater visibility on Internet traffic. With such regulations in place, cloud security is sure to grow.

Along with government regulations, industry specific regulations such as Health Insurance Portability and Accountability Act (HIPAA) for the healthcare industry, Payment Card Industry Data Security Standard (PCI DSS) for the financial sector, Safe Harbor Act and European Union Data Protection Directive are likely to make enhance cloud security, and this could eventually help the cloud security industry to grow.

Due to these factors, the cloud security industry is well on its way to some astounding growth over the next decade.

According to the report, the major players in this market segment are CA Technologies Inc, Cisco Systems, IBM Corp, Intel Corp, TrendMicro and VMWare. Other companies that are vying for a market share in this industry are Whitehat Virtual Technologies, Snoopwall Inc and BMC Software.

The post Cloud Security Market to Grow to $13.93 Billion by 2024 appeared first on Cloud News Daily.

How to Set Action-based Password Requirements in Parallels Desktop

Support team guest author: Pradeep Raj Why do we use passwords – mainly to ensure the security and confidentiality of our data, right? But what if you want to include an extra step before you make any changes in your software? That’s exactly what I’m going to talk about in this blog. Whatever reason you […]

The post How to Set Action-based Password Requirements in Parallels Desktop appeared first on Parallels Blog.

Dyn’s DDoS Attack – What it Means for the Cloud?

Prominent websites like Twitter, Netflix, Airbnb, and Spotify were having sporadic problems since Friday, thanks to a Distributed Denial of Service (DDoS) attack on Dyn’s servers. Dyn is one of the largest ISPs in the world, so an attack on its servers meant a significant chunk of DNS (Internet’s address directory) went down.  DNS is something similar to a phone book, and it allows users to connect to different websites and applications. Thus, when the DNS servers were attacked, users could not connect to certain IP addresses.

In most DDoS attacks, the information is intact, but temporarily unavailable. But in this case, Dyn’s core Internet infrastructure was hacked, so any organization that is directly dependent on Dyn or a service provider that uses Dyn’s servers were affected.

Besides websites, a whole lot of Internet of Things (IoT) devices that are hooked to the Internet were also affected. Cameras, baby monitors, and home routers are some of the devices that were affected by the outage. Also, corporate applications that are used to perform critical business operations were affected, thereby raking up huge losses for different companies.

Out of these companies, the ones that were worst-affected are those that rely on SaaS for critical business operations. This attack, in many ways, exposes the vulnerability of cloud computing, and the consequences of depending on third-party servers for the most critical of operations. Had these companies used multiple DNS providers or if they had stored their critical business applications in local servers, the impact of such an attack would have been greatly negated.

Going forward, what does it mean for businesses that depend on the cloud?

First off, this is a complex attack that is believed to have been done by a large group of hackers. The nature and source of the attack is still under investigation, so at this point in time, it’s hard to tell who’s behind the attack. But such complex attacks can’t happen every day as it requires enormous amounts of planning and coordination. That said, Verisign came up with a report recently that showed a 75 percent increase in such attacks from April to June. How much of it translated to loss for companies? Only a miniscule when compared to the direct security attacks that companies face.

Secondly, we’ve come too far ahead with cloud, to imagine a world without it. SaaS, PaaS, and IaaS have become integral aspects of businesses, and the benefits that come from it are enormous as well. So, compromising on the huge benefits for a rare attack is not a sound decision.

From the above argument, we can say that this DDoS attack is not going to change the cloud market overnight. However, it will make users more aware of the vulnerabilities of the cloud, so they will be better prepared to handle such situations in the future. This is also a good learning experience for companies like Dyn, as it’ll look at ways to beef up its security arrangements.

In short, though the DDoS attack was dangerous and widespread, its impact on cloud may be minimal because the benefits from cloud are huge, and such attacks are seen as rare instances when compared to direct attacks on large companies.

The post Dyn’s DDoS Attack – What it Means for the Cloud? appeared first on Cloud News Daily.

Microsoft Rolls Out Custom Versions of Azure for the US DoD

Microsoft is known to provide customized products for government agencies at the federal, state, and local levels, to ensure that its products meet the necessary requirements and certifications laid down for these agencies. To add a feather to its cap, Microsoft announced on Tuesday that it would create custom versions of its cloud platform, Azure and Office 365, to meet the Impact Level 5 requirements laid down by the US Department of Defense (DoD). This product is expected to be available by the end of 2016, according to a press release.

In this version, Azure and Office 365 will be physically isolated and kept in two new regions dedicated for it. According to the company, these two regions will be located one each in Arizona and Texas, though the exact cities were not made public. To connect to these two centers, other DoD servers can use Microsoft ExpressRoute – Microsoft’s private connection that offers higher levels of security and lower levels of latency. Such a setup is expected to give an extra layer of security for data transmission, especially to access information that are considered to be critical for national security.

With this setup, Microsoft can meet the next level of security requirements namely the Impact Level 5 controls, that are laid down by DoD. This new addition is significant for Microsoft, as it means that Azure cloud products will be an integral part of National Security System Data and other mission critical information. In fact, Microsoft will be the only cloud provider to offer a cloud that meets these stringent requirements, and in this sense, it gives Microsoft an edge over its competitors in a crowded cloud market. Currently, Amazon’s AWS is Level4 compliant, whereas there are no such known certifications for Google.

Earlier, Microsoft’s cloud had the certifications to handle up to DoD’s Impact Level 4, which includes controlled but unclassified data such as privacy information, and protected health information. Though Impact Level 5 is also unclassified data, it includes those that are critical for National Security.

With this new addition, the total number of regions for Azure Government services will go up to six, and this includes Virginia, Iowa, and two unnamed data centers, apart from the new ones. Microsoft claims that its Azure services are being used by more than 70,000 customers in the government sector, and six million end users are accessing its various cloud products.

The post Microsoft Rolls Out Custom Versions of Azure for the US DoD appeared first on Cloud News Daily.