We are now in an era where it’s hard not to make use of new technologies such as Cloud Storage. With your data available anywhere you are through the connection of the internet, this has helped many businesses become more flexible in their operations. However, we are always skeptical on how safe our data is since our data is stored somewhere we do not know and if these locations are secure from cyber criminals.
Now if you are an Office 365 user, you can rest easy as they have just recently announced that they are now integrating their Antimalware Scan Interface (AMSI) to the app! AMSI was integrated to Office 365 as a way to help improve security against attacks that make use of malicious macros and scripts that target office documents by detecting them early on or by stopping them from executing. Below is a quote from the Microsoft Security Team for their reasoning in bulking up security against macro attacks:
“Macro-based threats have always been a prevalent entry point for malware, but we have observed a resurgence in recent years. Continuous improvements in platform and application security have led to the decline of software exploits, and attackers have found a viable alternative infection vector in social engineering attacks that abuse functionalities like VBA macros.”
If AMSI is familiar to you, it might be because it isn’t something new as it was already being used by Microsoft as early as 2015 when they announced that Powershell adopted it as well for security purposes. To give a background on AMSI, it is an open interface available on Windows 10 for applications to request, at runtime, a synchronous scan of a memory buffer by an installed antivirus or security solution. Any application can interface with AMSI and request a scan for any data that may be untrusted or suspicious.
If you want a more in depth read on how AMSI is helping protect you from attacks, you can read the original blog post from the security team here or you can contact us at 893 9515 and we will be happy to help you!
With data mobility’s rise, you would expect that security of data would increase as well. However, many of the controls to mitigate the risk of data exposure still rely on traditional protection. Direct attacks, simple mistake, and even negligence are still major reasons as why data is lost. Below are some of the most common examples of common security pitfalls:
Loss or destruction of endpoints
Using consumer-grade collaboration and file sharing tools
Transferring files over insecure media including USB drives
Emailing sensitive information to personal email accounts
Social engineering (i.e. phishing) – the human factor and malware
These days, we use new IT services built on multiple cloud infrastructures to work in conjunction with the legacy and custom applications (business critical apps) built on-prem, this results in business data sprawled across multiple devices and locations. This makes the traditional enterprise perimeter almost completely eroded. The industry’s response has been to solve each gap in security with slew of security products, which each have their own unique policies, capabilities and limitations. This creates even more complexity in the already complex problem which can do ultimately do more damage than help.
In the global study from Citrix and The Ponemon Institute, they discovered that:
64 percent of respondents say their organization has no way to effectively reduce the inherent risk of unmanaged data (e.g. downloaded onto USB drives, shared with third parties, or files * with no expiration date)
79 percent of respondents are worried about security breaches involving high-value information
52 percent of respondents do not feel that their security infrastructure facilitates compliance and regulatory enforcement with a centralized approach to controlling, monitoring and reporting of data
That requires a purpose-built architecture, one that is designed and hardened for security from the ground up. Integral to this architecture is the inherent security Citrix provides by:
The solution to the problem? Control must be given back to IT while delivering security to the business without affecting the users experience. This type of architecture is inherent in the security Citrix provides by:
Centralizing and keeping data off endpoints
Containerizing and encrypting data on mobile devices
Controlling access to data contextually
Using file level access and control (DLP and IRM) for data in motion
Enterprises and organizations are facing next-tier, multifaceted threats that are both familiar and uncharted. As the cloud and the Internet of Things (IoT) ecosystem become more interconnected, it is essential for organizations tore-evaluate and redefine their understanding of threats, risks, and solutions in an ever-changing landscape.
With that, organizations and enterprises must ask: what threats should they prepare for? What risks are involved? What processes and procedures should be implemented?
In the face of next-tier threats, businesses must step up their game and LEVEL UP their defence against these threats.
In lieu of this, CT Link Systems, Inc. has joined Trend Micro’s Security TRENDs 2017 Executive Threat Defence Summit as an exhibitor to help educate businesses in the Philippines on the importance of Cyber Security.
To learn more or register to the event, please visit the site Here!
Cloud technology is being used more by many companies due to its operational and economic benefits it can provide to them. This in turn puts more importance into securing your virtualized data centers, cloud deployments and hybrid environments. Leaving any gaps or neglecting any aspect in your security can now expose you and your company to more threats and serious breaches such as ransomware and other malicious attacks.
CT Link Systems, Inc., in partnership with Trend Micro, invites you to attend our upcoming event, Pushstart, to learn more on how you can better secure your company from the growing threats on Cloud platforms such as Microsoft Azure and Amazon Web Services!
Business IT environments are now at bigger risks as more and more malware, such as Ransomware, are becoming more sophisticated. The results of malware gaining access to your IT environment could lead to as much as disruption of your business operations – mainly your service, productivity, and more importantly – your reputation. Cyber criminals do this through business process compromise (BPC), halting your access to business critical applications and data which can last for days if not months..
Contrary to common belief that cyber threats are an endpoint issue, ransomware and other advanced attacks are also focused on your servers. Servers are high value easy targets for cybercriminals due to the combination of readily available infrastructure via the public cloud and the increased speed of application delivery to create competitive advantage. Server and endpoint security hugely differ in the sense that the applications and operating systems that run enterprise workloads in the data center, in the cloud and even in containers can be extremely dynamic.
Fundamentals DO matter – Patching
As servers are the driving force that pushes any business forward, tasked with housing your most valuable data, it is only natural that cybercriminals would start targeting it – whether it’s on premise or in the cloud. Cybercriminals will take advantage of vulnerabilities found on your servers. A good example of this is the recent WannaCry Ransomware attack a few weeks ago which leveraged on a Microsoft Windows SMB vulnerability to inject itself onto servers and endpoints. OS Patching is the best solution to these as to prevent the attack from executing. However, there are many reasons why servers are left unpatched one of which is server downtime. It is estimated that enterprise firms take an average of 250 days for their IT (205 days for retail businesses) to fix the software flaws in their enterprise applications.
Hybrid Cloud infrastructures are complex, and these complexities can have gaps which can be exploited. So what can be done to prevent situations such as compromised endpoints accessing a vulnerable file server? Here is where advanced server security solutions such as Trend Micro Deep Security comes in. Designed to protect workloads across physical, virtual, cloud and container environments with host-based security to shield servers from a wide range of threats. With its range of cross generational security techniques, it will be able to enable you to easily:
Stop network attacks and shield vulnerable applications & servers, leveraging Intrusion Prevention (IDS/IPS) and firewall techniques;
Lock down systems and detect suspicious activity on servers, using techniques like application control and integrity monitoring that have been optimized for the hybrid cloud; and
Prevent malware and targeted attacks from successfully infiltrating your servers, leveraging proven anti-malware and advance techniques like behavioral analysis & sandboxing
Learn more about Trend Micro Products from our product page here!