As a modern, forward looking organisation, you want your employees to have access to critical business data and applications at any time, from anywhere and from any device. You want to nurture collaborative working across teams, so you’re increasingly using tools such as Microsoft Office 365 and moving ERP systems such as CRM and accounting to the cloud too.
Benefits without Risk
The benefits of moving to the cloud include capital cost savings, increased flexibility and operational agility. Yet concerns over cloud security and the risk of a data breach persist among some C-level executives. These concerns can be addressed and overcome with the right cloud security technologies.Cloud Security Confidence
So you can have confidence in your cloud solutions, you need to implement a range of technologies including access encryption, application security, infrastructure security and to prevent hacking – as well as securing the VPNs used to connect remote teams. Setting policies and training end-users are both also important factors in the mix.
Weak access points are a common cause of data breaches and rogue access. To secure access points users should use high quality two factor authentication (2FA) technology, also known as multi factor authentication (MFA), from either Sophos or SecurEnvoy. Two factor authentication requires the use of a one-time password alongside a known password thus completely eliminating the risk of unauthorised access.
Why Use Multi Factor Authentication?
Two factor authentication technology can be used to secure VPNs, remote desktop working, WiFi access, web portals and laptop logon. Modern 2FA technology is easy-to-use because it is tokenless i.e. no additional hardware is required. The user simply receives a one-time password on their personal mobile phone to use in conjunction with a memorised personal password.
Securing Cloud Applications
Cloud-based applications such as Microsoft Office 365 and ERP systems such as Microsoft Dynamics Business Central and Dropbox are the future. So it’s vital to secure them against targeted threats and to protect sensitive data held within them. Sophos and Forcepoint provide IT Managers with visibility and control over apps to ensure that they’re being safely used.Controlling Compliance
Network user behaviour cannot always be controlled with policy alone, which means that not all apps used within the network can be officially sanctioned. Sophos and Forcepoint can identify cloud app security compliance gaps, enforce data access controls and manage network access for laptops, mobile phones and other devices brought into the network.
Your data and applications might be hosted in a private, public or hybrid cloud arrangement; whichever it is, your business processes depend on your cloud infrastructure, so you need to be confident that your hosted services are built on a solid architecture that guarantees 100% reliability and uptime, and are housed in secure data centres.Time to Focus on Your Services
Access Alto’s solid and secure hosting offers you the confidence and reliability you need, freeing you up to make the strategic and operational decisions about the services and applications your organisation needs. Services like Disaster Recovery as a Service, Backup as a Service, Software as a Service and Hosted Desktop services.
Secure Data Sharing
Employees need to share data securely across the organisation between multiple locations. This is key to enabling a mobile, flexible and productive workforce that can communicate and collaborate freely. An encryption solution such as Egress means emails and files can be transferred safely securely without the fear that it will get into the wrong hands.Any Time Anywhere Secure Data Access
Users need secure access to data at any time, wherever they are and IT managers need audit and compliance reports to monitor confidential data movement. For extra peace of mind, some secure data sharing solutions (including Egress) protect users — and the business — against mistakenly sending emails to the wrong recipient.
Working in the cloud increases exposure to distributed denial-of-service (DDoS) attacks, which overload servers with connections, preventing access for bona fide users. DDoS attacks are hard to mitigate so usually result in servers crashing. They are one of the fastest growing types of cyberattack so using sophisticated, automated, real time solution such as Radware is critically important.Flexible, Sophisticated, Always On
They keys to protecting against DDoS attacks include flexibility to deploy the solution according to your specific cloud configuration, the complexity to continuously adapt and respond to threat detection fast, and the option to deliver always-on (as well as on-demand or fully managed) service.
Keeping your private networks private between offices, sites and remote workers using the cloud adds a new layer of security complexity. The most cost effective and efficient way to connect users to their cloud resources, apps and system is to each remote site is to use highly featured VPN technologies to deliver secure, accelerated connectivity and high availability.Flexible, Sophisticated, Always On
By combing secure connectivity technology with high class firewall and encryption technology from providers such as Sophos and Forcepoint, network users can work as securely — and efficiently — at remote sites and home offices as they can at headquarters.
Changes to Chess ICT Ltd Terms and Conditions
Changes to Chess ICT Limited’s Terms and Conditions from 1 June 2020
Changes have been made to the General Conditions which apply to all our products and services as well as to some Schedules which are terms and conditions specific to our products and services. The Schedules which have been changed are Schedule 3.1 Voice Services, Schedule 3.2 Internet Services, Schedule 3.4 Cloud Voice Services, Schedule 4.1 Fault Management for Connectivity and Schedule 3.2 Maintenance Support Services.
The latest cyber crime report is never far from the headlines, whether it's a data breach, phishing attempt, or an email extortion campaign. However, one area that is often overlooked is phone fraud, where a hacker uses your phone system to either provide free calls to expensive foreign destinations or to gain some form of value from calling premium-rate numbers. If this happens you may be left with a significant bill.
At Chess, we offer a fraud monitor service where we check customer call profiles and lock them down if we notice unusual activity and I've noticed a definite uptick in fraud since the COVID-19 lockdown began. Here are a few security points that may be worth thinking about
BackUps and Recovery
Most people will by now have navigated the first month of lockdown and be working successfully from home. Your business may have moved to the cloud before COVID-19, or moved more recently. Many will still be working remotely on servers and devices with the data stored locally.
Wherever you are working and however you store your data, here are 5 key reasons to be taking BackUps and Recovery seriously.