A recent global survey of 450 security professionals conducted by ResearchScope finds organizations are increasingly augmenting their next-generation firewall (NGF)/intrusion detection systems (IDS) with investments in deception technologies that rely on traps and decoys to discover how malware is proliferating across their internal systems.Main goals of cybersecurity pros: Stop threats from getting into the environment, and aggressively hunt anything that makes it past the perimeter. Click To Tweet
Yesterday, Office 365 experienced a significant outage for more than a day across Europe, leaving customers unable to log in to Exchange Online to read, respond, send, or receive new emails. This isn’t the first time that Microsoft has experienced outages. Just a few months ago, in November 2018, Office 365 users experienced issues trying to log in to their accounts.
With email being a primary communication tool for most organizations, email outages mean losses in employee productivity, communication, and revenue. Organizations that migrated to the cloud with Office 365 gave up control of their uptime and failover. When Office 365 goes down, their email communication goes down with it.
How Email Continuity Service can help
But it doesn’t always have to be this way. While the most recent Office 365 outage is unfortunate, organizations that have Barracuda’s Email Continuity Service in place have nothing to worry about. In the event of an Exchange server failure, or in this case an Office 365 outage, our Email Continuity Service allows IT administrators to failover to third-party cloud-based email servers to continue email operations until services are restored.
During this failover time, Barracuda’s Email Continuity Service allows end users to send, receive, compose, and forward emails when email services are unavailable. This keeps the company moving and employees productive so that orders can be processed, customer and vendor communication can continue, and any other operations that require email continue seamlessly.
Barracuda Essentials includes Email Continuity Service, which ensures that email operations continue. An emergency mailbox lets users continue to send and receive emails, staying productive until your primary servers are back online.
Security has been a big concern with IoT devices, though. Although improvements have been made, new types of vulnerabilities remain. For example, the Barracuda Labs teams recently used an IoT security camera to help illustrate a new threat: IoT credential compromise, which uses web and mobile application vulnerabilities to compromise IoT devices. [Read more…] about Threat Spotlight: IoT application vulnerabilities leave IOT devices open to attack
At a time when an Internet of Things (IoT) phenomenon is seeing more of these systems than ever connected to the Internet, a global survey of 370 managers conducted by Bloor Research on behalf of TÜV Rheinland, a provider of cybersecurity testing services, finds 40 percent of respondents admit they had never assessed the risks posed by a potential cyberattacks on their OT systems. In fact, 34 percent of survey respondents admit they do not know whether their own company has ever investigated these risks. In addition, only one in five companies has adjusted its cybersecurity strategy to include OT systems.Recent survey: only one in five companies has adjusted its cybersecurity strategy to include the operational technology in embedded systems. Click To Tweet
Barracuda Forensics and Incident Response automates incidence response and provides remediation options to address issues faster and more efficiently. Admins can send alerts to impacted users and quarantine malicious mail directly from users’ inboxes with a couple of clicks. Discovery and threat insights provided by Forensics and Incidence Response platform helps to identify anomalies in delivered email, providing more proactive ways to detect email threats.
The challenge cybersecurity professionals have, of course, is identifying what data that has the highest value to the business and then crafting cybersecurity controls commensurate with the actual value of that data.Recent survey: Business managers must do a better job at communicating the value of data to their cybersecurity teams. Many IT professionals overestimate the importance of low-value data.Click To Tweet
The cloud is transformational – but the cloud is different. Companies migrating to the cloud quickly – and sometimes painfully – learn that translating their on-premises security framework to the cloud is more difficult than they presumed. Not all on-premises solutions will work the same if at all in the cloud, cloud infrastructures themselves contain numerous security services that need to be incorporated, and the very mechanisms behind operating securely in the cloud are different than traditional on-premises solutions.
CFOs and finance staff are one of the most targeted employees in the company when it comes to email fraud. Hackers choose Finance employees due to their access to company finances and other sensitive information. Most of CFO attacks begin with a targeted phishing attacks, where attackers impersonate other executives within the organization to request wire transfers.
But now much of that data is being removed to comply with the mandates of the General Data Protection Rule (GDPR) rule enacted by The European Union. Without access to that data it becomes a lot more challenging to white list domains of known trusted entities versus all the fake domains that cybercriminals rely on to launch malware that needs to communicate back to a command and control mechanism somewhere on the Web.