Beazly recently presented a report about the cases of ransonware occurred last year.
In this report, Beazley Breach Response Services (BBR) noted that 70% of the total number of attacks targeted small and medium companies, especially those that do not block the remote desktop protocol (RDP). This report is based on 3300 analyzed cases. Continue reading 70% of Ransomware Attacks Targeted SMBs, BEC Attacks Increased by 130%
On the 20th February 2019, Alert Logic research teams began tracking vulnerabilities affecting users of Jenkins which could allow an attacker to run malicious software remotely. That same day new detection content was deployed to monitor for abuse and over the following hours teams in research and security operations began managing exploit attempts in the wild and raising incidents to customers. Continue reading Emerging Threat Jenkins Plugins Remote Code Execution
This blog is part of a series that responds to common confusion we see in the industry between Microsoft Teams and Skype for Business. Which option to choose and why? In this series you’ll find context, answers, and guidance for deployment and driving adoption within your organization. Here is the first installment of a 6 part series on deploying Microsoft Teams. Continue reading Moving to Teams, Why?
Kubernetes version 1.12 released in September 2018 includes new features, critical updates and changes. Here are some highlights of the latest release: Continue reading Find out what’s new in Kubernetes Version 1.12
As public cloud providers are evolving in release of service & solutions which has led to automation (and on-going), MSPs need to evolve from traditional model to hyperscale model. According to a BCC Research, the United States market will grow 11.5 percent year-on-year until 2021 with an entirely new breed of Managed Service Providers called “Hyperscale Managed Service Provider”. According to the research, the leading players have about 50% of the managed service market. IBM has the largest with 24% of the market, followed by DXC with 15%, Fujitsu with 14%, Atos with 8%, and Deutsche Telekom with 6%. Continue reading Healthcare Hyperscale Managed Service Provider (MSP)
Earlier this year, Embotics and Ponemon Institute released a study on the cost and impact of falling behind on the DevOps movement. This study surveyed over 600 IT leaders responsible for cloud management at their organization. It explores the gap between expectations of value from the public cloud, DevOps, containers, and microservice and what their organizations can do today. Continue reading Managed DevOps: Expectation vs. Reality
Every modern browser like Google Chrome, Mozilla Firefox, Apple Opera, and Microsoft Edge comes with a built-in password manager tool that allows the user to save their login information for automatic form filling. These browser-based password managers are designed to automatically detect login forms for the user on a webpage and automatically fill-in the saved credentials accordingly. Continue reading Is Managing your Password with Web Browser Safe?
Cloud computing occupies a unique spot in IT history. In its early beginnings, it was the latest in a series of new models for IT operations. Existing systems were migrated to cloud providers and companies found benefits in its cost and flexibility, while working through issues around security and integration. Today, the cloud offers a path for business transformation. Cloud computing trends among technology decision-makers include usage and plans across various cloud services and deployment models, investments, businesses, drivers, and impact on business strategies and plans. Continue reading State of Enterprise Cloud Computing 2018
Microsoft introduced a new service Azure Virtual WAN (wide-area network) which will significantly increase the security of Microsoft cloud services.
Azure Virtual WAN is a networking service that provides optimized and automated branch-to-branch connectivity through Azure. Virtual WAN lets you connect and configure branch devices to communicate with Azure. Which can be done either manually or by using preferred provider devices through a Virtual WAN partner. Using preferred provider devices allows you ease of use, simplification of connectivity, and configuration management. The Azure Virtual WAN built-in dashboard provides instant troubleshooting insights that can help save you time and gives you an easy way to view large-scale Site-to-Site connectivity. Continue reading What is Azure Virtual WAN?
In today’s world, one of the easiest ways of being hacked is by phishing. Phishing refers to the method of using misleading emails and websites to gather personal and confidential information about another person or organization. Phishing is a highly sophisticated cyber-attack that is becoming increasingly popular among hackers and affecting anyone who mistakes a deceptive email for a legitimate one. Continue reading Dual Authentication Prevents Phishing