How Intune Conditional Access Keeps Your Data Safe

pexels-photo-577210Have you heard about Intune conditional access? Intune is a cloud-offering from Microsoft that allows for secure mobile management. Intune is Microsoft’s solution for IT managers who feel a desperate need to secure mobile devices and apps and their access to email and other corporate data.

Their concern is legitimate; today’s networks have extended beyond a LAN or WAN to include personal smartphones, laptops, or other digital devices, accessing your corporate data from every Starbucks on the planet. These same devices are probably downloading apps for personal use. Microsoft has responded with Intune conditional access as a way to manage these devices in the Azure cloud

A subscription service, Intune is a great addition to the conditional access features already found in the Azure Active Directory. Together, these features give companies the security they need to manage email, data, network access, mobile devices, and more.

This article will help you understand how Intune Conditional Access will create a more secure infrastructure for your organization.

What is Microsoft Intune Conditional Access?

Microsoft Intune provides mobile application, device, and PC management. It’s an Azure cloud service designed to control who accesses corporate data and devices.

The software uses conditional access to allow validated users on their authenticated devices to reach your corporate data. Intune can be programmed to challenge users to authenticate their devices, as well as encourage them to enroll their devices under the security software. The benefit for the company is that it eliminates unrestricted devices and people from accessing the network. These features, ironically, can also be monitored or regulated via your (approved) smartphone.

With the Azure Active Directory, you can also manage conditional access through one system portal. From that hub, you can restrict what applications are downloaded and accessed from any device in your network. You set the rules, and the software helps the entire company follow them.

Intune conditional access in Azure allows the administrator to see every approved device on your network as well as devices attempting to enter, but failing. Also, robust reporting mechanisms allow you to spot trends over time.

Intune conditional access can reinforce corporate compliance policies by:

  • Restricting access to your network by blocking any device that isn’t managed by Intune or that is not IT compliant.
  • Enforcing password rules and multifactor authentication frameworks.
  • Creating and regulating security and compliance rules.
  • Restricting access to SharePoint or other tools that may be accessed remotely.
  • Enforcing application access and completely removing corporate data from the application level – the level that is currently most vulnerable to malware.
  • Encrypting data at rest.
  • Pin-locking devices to protect unauthorized users from accessing company data or email.

These are just some of the ways Intune conditional access can help keep your organization’s data safe. We believe it’s the perfect solutions for some of the biggest challenges that IT network managers are facing today.

Is Microsoft Intune Conditional Access Right for Your Company?

Intune can be purchased separately or as part of the Microsoft Enterprise Mobility + Security Suite. Contact CWPS to find out more about Intune conditional access. We’ve found it has helped eliminate our client’s biggest fears tied to BYOD policies that create a security risk for an organization.

Microsoft Office 365 Enterprise Mobility + Security Sweet Ebook 

4 Methods For Mitigating Zero-Day Vulnerabilities and Threats

pexels-photo-577585 (1)A zero-day threat is a security vulnerability that’s exploited by a hacker on the same day it appears. The problem is the breach happens so quickly; there’s no patch available to fix it. The first time you knew the vulnerability occurred was when the hacker used it to attack your organization.

The hacker, who may have been probing your network for months, usually is the one that discovers these vulnerabilities. Antivirus, intrusion prevention, and firewalls don’t always protect against the new, unknown threat. 

While no organization can completely protect themselves from a zero-day threat, there are a few things you can do to mitigate your risk. This article can help you stay prepared.

Stopping the Zero-Day Threat

“These brand new threats are by far some of the most difficult cyber attacks to defend against. Half the time, we never see them coming. Even when we do, we are too late.”
James Wang – Matt Williams, June 22, 2017

A DZone article from last year chronicled the zero-day threat:

  • In 2012 there were 14 zero-day vulnerability incidents reported.
  • In 2013 there were 23.
  • In 2014 there were 24.
  • In 2015, there were 54 – a 125% increase.

While 2015 was the last year data was available it is safe to assume that the number of zero-day vulnerabilities continues to rise. The same article suggested that 30% of malware in the fourth quarter, 2016, used zero-day vulnerabilities. 

An article in ComputerWorld suggests there are four key ways to potentially protect an organization from the zero-day vulnerability: 

1. Use preventative security practices. Keeping firewalls and antivirus protection up-to-date and matched carefully to corporate needs, while blocking attachments, and managing external devices, are all important. Installing patches for on-premise systems immediately upon issue as well as conducting vulnerability scans, are also important. Finally, use application whitelisting in addiction to blacklisting software to help spot malicious activity.

2. Use intrusion prevention systems (IPS). Look for an IPS that has network protection offering content validation and forensics, application integrity checking, third-party verification, and much more.

3. Establish disaster recovery procedures. Developing and practicing incident response that includes established roles and procedures is critical to mitigating the damage while it’s happening.

4. Silo the breach by preventing its spread. This includes establishing need-to-know-type protocols for document access 

It’s clear that today’s cyber security efforts must have multiple controls in layers across every piece of a network, including any personal devices accessing a network. In order to protect an organization from zero-day threats, IT administrators’ must enact security measures that offer a measure of granular control for all devices accessing the network. It must allow the admin to administer the network from a centralized hub and offer the flexibility to tailor policies for individual users as well as groups. 

Exploiting zero-day vulnerabilities is still a new discipline for hackers. This behavior is expected to increase as bad actors improve their techniques. Following these four steps are really the best way at the moment to mitigate the risk of the zero-day vulnerability.

Free MSP Consultation

Why a Next Generation Firewall is Essential

next generation firewallIf your organization is operating behind last year’s firewall, you are not protected. Don’t believe us?

Traditional networks were like a snake eating its tail; they had a beginning, middle and an end in a closed loop of sorts. Today all kinds of digital devices are accessing your network from anywhere there’s an internet connection. This means your in-house IT team is dealing with a whole host of new security threats. All it takes is one look at tomorrow’s headlines for the latest data breach to figure out that yesterday’s firewalls aren’t doing a great job at mitigating the risk of companies like Equifax, Yahoo!, or Uber. If some of the biggest companies on the planet (JP Morgan Chase, Anthem – need we go on?) are failing to keep their in-house data secure, it calls into question both on-premise networks and the IT teams that run them.

As these threats are evolving, companies are looking to solutions that can shield their network of ever-increasing endpoints. Among the various cyber security solutions available, you will find next-generation firewalls that, according to Gartner, have, “integrated deep packet inspection, intrusion detection, application identification and granular control.”

What Problems Can a Next-Generation Firewall Solve?

“Firewalls have become ubiquitous across enterprises over the past decade, but the combination of new and varied access methods combined with increasingly sophisticated attacks has forced network operators and security professionals to constantly evaluate their defenses.”
Network World

There are three primary areas why next-generation firewalls make sense in today’s hyper-digital environment:

1. Application Monitoring

HP says 84% of hacker breaches occur at the application level. Having application-level control is crucial to stay ahead of these risks. This is granular control down to user-specific rules by application.

2. Mobile Device Controls

2018 is the year of “mobile-first;” user activity on mobile devices and applications will far outpace any other type of digital usage. But these applications are filled with potential vulnerabilities that hackers could exploit. According to HP, 77% of mobile apps have these vulnerabilities.

3. Revolving Environments

Any organization housing data that hackers consider important is at risk. As the volume of our data captured increases, the more attractive we become to hackers. We must monitor advanced persistent threats (APTs), borderless networks, and enterprise risk environments. Traditional firewalls simply cannot keep up with collecting, storing, and analyzing activity data within a network that has no walls.

What to Look for in a Next-Generation Firewall

Network World suggests that a next-generation firewall include some of the following features:

  • Intrusion prevention systems
  • Deep packet inspection
  • SSL inspection

CWPS offers our customers a full cyber security suite of products including advanced next-generation firewall protection from Cisco Meraki. The firewall made Gartner’s latest Magic Quadrant as a best in class security solution for any business. We combine this next-generation product with a secure Internet gateway, NextGen Antivirus protection, and security awareness training that will help protect your organization from what’s next on the hacker’s radar. Contact us to discuss how these tools can keep your data safe.

You Should Never Have to Hire a Data Recovery Services Company (Here's Why)

cyber-attack-data-breach.jpgWhat would happen if you lost a portion of your business data? What critical business functions would be affected? How would it affect your clients? 

The Disaster Recovery Preparedness Benchmark survey says three out of every four companies are at risk of having no data recovery plan in place. In 2014, more than one-third of the organizations surveyed lost one or more crucial data applications over the year. Those outages ran from hours to days, according to the survey.

With ransomware and phishing emails increasing, your critical business data is at risk. Data recovery services are standing by to help you recover, but are they really necessary if you have a strong data recovery mechanism in place? 

Here’s the number one reason why you shouldn’t need to hire a data recovery services company: Your disaster recovery plan should include robust and constant data backups in the cloud. 

Data Recovery Services – Unnecessary in the Cloud

Data loss is a serious threat to any business. Whether it’s a data breach from cybercriminals or a natural disaster, housing your data onsite without offsite redundancies can be a risky proposition.

Typical scenarios that could affect your data include:

Hardware failure, such as the loss of an email server, could wipe out communications across your business. If you’re still running an email server in-house, do you have redundancies built into the infrastructure to counteract equipment failures?

Human error may be the most common reason for data loss. If you’ve ever trashed a document that you meant to save, or forgotten to save it in the first place, you know how easy it is to make a mistake.

Even worse, human error is the most frequent cause of malware infections; one click on a phishing email could infect your network with a virus. According to Barkly, every 1 in 131 emails contains malware.

via GIPHY

Creating a data recovery plan incorporating cloud technology is an important way to counteract all of these potential problems. Backing up your data – all of your data – is an important component of this approach. Some of the benefits of cloud backups include:

  • They occur constantly, and your data can be fully encrypted in transit and at rest in remote off-site data warehouses.
  • The infrastructure is state-of-the-art and backed by an enterprise-level multi-regional secure architecture.
  • Virtual machines can be developed in the cloud that allow you to continue to access your functions, even if you are in the thick of a weather-related disaster or man-made crisis.
  • Data storage is efficient, redundant, and backed by the best security features today, making the cloud more secure than most on-premise IT infrastructures.

 Managed service providers like CWPS can help your company migrate to the cloud and create a data backup and recovery plan that will ensure you never have to hire a data recovery services company. Data backups, secure cloud connections, and the development of virtual machines, are all important functions provided by managed service providers. Contact us today to find out how we can ensure the security of your data in the cloud.

Guide to Keeping company's data safe

Must-have Cyber Security Essentials for Your Business

cyber_security_tips.jpgManaging cyber security for your business should be a top priority for 2018. That’s because the threats from hackers are multiplying, whether your business is small or enterprise-sized.

It’s not melodramatic to suggest that your employees are all that stands between you and malware; every day they are one click away from infecting your company. That’s because the volume of phishing emails are the highest they’ve been in years. 

The threats are real, and your corporate information is vulnerable – unless you arm yourself with cyber security essentials to protect your data.

Cyber Security Essentials for 2018

“Malicious emails were the weapon of choice for a wide range
of cyber attacks during 2016, used by everyone from state- sponsored
cyber espionage groups to mass-mailing ransomware gangs.
One in 131 emails sent were malicious, the highest rate in five years.”
Symantec Corporation
Internet Security Threat Report, April 2017

From cyber attacks on political parties in the United States to a hack this month of 143 million Social Security numbers from the number one credit-reporting firm, incidents of data theft are all over the news. These are high-profile cases so you may believe that the data housed in your small to mid-sized company could simply fly under the radar of hackers.

We wish that were true. The New York Times reports 60% of all online attacks targeted the small to mid-size company.

Installing cyber security essentials for the small to mid-size business does not have to be expensive. Partnering with a managed services firm in a monthly subscription can be an affordable way to increase security. Whether you choose the help of an expert or do-it-yourself, here are seven cyber security essentials: 

1. Cyber security needs to be a part of your corporate culture. This means that you need to train employees in how to avoid physical and digital risks. This could include everything from teaching employees how to detect phishing emails, to never leaving a company laptop in your car, to how to select a secure password.

2. Develop a cyber security strategy that defines who is responsible for what in the event of a breach or attack.

3. Keep your operating systems up-to-data with the latest upgrades and patches. If you’re using software-as-a-service or storing your data in the cloud, security updates happen constantly as new threats emerge. But what if you have an email server tucked away in a back closet? When was the last time the operating system was updated?

4. Have a strong firewall and hide your data behind it. If your employees work from home, be sure they aren’t opening a backdoor to your data every time they dial in.

5. Backup all data in the cloud. Backups can be the best protection from ransomware.

6. Create and follow an action and security plan for cell phones. Users should encrypt their data, password protect all devices, and install security apps that prevent theft when accessing public networks.

7. Control access by creating user accounts with strong, frequently changing password protection.

8. Secure and encrypt all Wi-Fi connections.

Staying on top of data security is something you won’t have to worry about when you work with a managed service provider like CWPS. Contact us for a confidential assessment of your data vulnerabilities and the cyber security essentials to keep your company safe.

Guide to Keeping company's data safe

Cyber Security for Business - Why You Need an IT Recovery Plan

startup-593327_960_720.jpgInformation technology has evolved beyond being a tool for your business to being the central hub for all of your business operations.

That’s our best argument for developing an IT recovery plan in case something goes wrong.

One look at today’s headlines and you’ll understand that myriad threats have emerged to create the perfect storm with the potential for shutting down your business operations. From natural disaster to data breaches, mitigating the risk means creating an IT recovery plan to keep your business safe.

The Risk Landscape – Cyber Hacks

The actuarial assessment of risk for cyber breach is very high. Some of the most notorious hacks in history have happened in the last few years, including:

  • Home Depot lost billions to a cyber security failure.
  • The U.S. Veteran’s Administration had an external hard drive stolen from an employee’s home during a burglary, costing the agency $500 million.
  • Big box store Target had a cyber security failure that cost them $252 million to repair.
  • North Korea hacked Sony Pictures, causing reputational damage in addition to $151 million.

If you’re the owner of a small business, you may be rolling your eyes; surely the risk is not as high. However, NTT Security’s threat assessment shows that the risk of cyber hacks affects every size business in the form of phishing scams. Phishing are emails with embedded code that can spread viruses like ransomware, which encrypts your files until you pay a ransom.

All it takes is one employee to open the wrong email. In fact, 67% of all cyber attacks start in this simple, but effective way.

The Risk Landscape – Natural Disasters

Over the past few weeks we’ve heard about Hurricane Harvey and the devastation it’s bringing to Texas. CNBC says the cost could reach as high as $75 billion. How many of these businesses will simply close, in part, because their IT infrastructure has failed, stopping business as usual in its tracks?

From tornados to floods, most businesses are one disaster away from an irretrievable data loss. But the list of crises beyond catastrophic weather include electrical fires and burglary, vandalism or just plain equipment failure. With an IT recovery plan in place, your business stands a much better chance of surviving, no matter what human-made or natural catastrophe arises.

Elements of an IT Recovery Plan

Developing a disaster recovery and business continuity plan for your IT systems includes an assessment of your current network. Here is an overview of what your plan should encompass:

  • Asset inventories
  • Off-site data backup and recovery planning
  • Development of redundant IT systems
  • Creating a communications plan
  • Development of off-site workflows to encompass systems such as accounting, payroll, and client billing
  • Mitigation plan in the event of a data breach

For a more detailed look at what your plan should include, check out our earlier post on what every IT recovery plan should include.

Inc. says 40% to 60% of all small businesses that lack an IT recovery plan will close their doors after a major disaster. Don’t let this happen to your business.

Contact CWPS today to begin an assessment and threat mitigation process that will help keep your IT infrastructure safe in the event that an unthinkable event will occur.

New Call-to-action

How to Prevent Phishing Scams and Create a Culture of Security in Your Office

Defend against phishing.jpgIf you’re concerned about cyber security then phishing should be high on your worry list. That’s because phishing is one of the most common causes of cyber security breaches on the planet. In order to remain vigilant against this hacker’s technique, your entire workforce must be aware of how to prevent phishing, and the consequences of falling prey to an attack.

Let’s look at creating an office culture that focuses on to preventing these cyber threats.

Phishing 101

Phishing typically takes the form of fake emails designed to unleash a virus in your computer or steal personal information. Global security firm Symantec says 54.3% of all emails generated are spam with a potentially malicious intent.

Some of the phishing techniques today include:

  • Embedding a link in an email that takes you to an external site and asks you to enter information.
  • Attaching a file to an email that spreads a virus.
  • Requesting sensitive information via faked credentials that look very, very real.

Because these techniques are designed to exploit the individual within your company, it is imperative that your entire team understands how to prevent phishing attacks and what to do if they make a mistake and the unthinkable happens.

Training Staff in How to Prevent Phishing 

Creating a cultural emphasis on how to prevent phishing starts with training and education. The first step is to teach anyone that receives email in your organization how to recognize a potential phishing email. Here’s what to look for:

  • The email will likely be from a company you’re familiar with; it will have an easily recognizable logo stolen from a real business.
  • Do you see misspellings in the email? That’s always a red flag!
  • Never click on a link in an email. We used to suggest that you rest your mouse on the link (without clicking!) to see a string of digits that in no way match the URL of the supposed sender of the email to prove it’s a phishing scam. Today, it’s not even safe to do that; there’s a line of malware (viruses) now that have a new type of link. If you hover over the URL containing Zusy malware, it will release the virus.
  • If you receive an .exe file, that file is likely a virus just waiting to be unleashed.
  • If the web address (URL) resembles a popular company but the spelling is slightly off – it’s a scam.

Barkly reminds us the number one vehicle for computer viruses is email. The Verizon 2017 Data Breach Investigations Report said two-thirds of all the malware on infected computers in 2016 came from phishing emails. 

Is Your Business Prepared?

In addition to training your team to be alert for phishing scams, make sure your operating systems; firewalls and security intrusion systems are fully up to date. Make sure your IT team is backing up all of your data frequently. Also, always encrypt sensitive company information. 

CWPS offers security training in how to prevent phishing and other cyber security threats. Businesses depend on our managed services that include cyber security intrusion monitoring and mitigation. Contact us and keep your business safe.

New Call-to-action 

Markus Spiske

Cyber Security Training for Businesses - Why You Need It

58754912_s.jpgYour employees have constant access to the technology that your business relies upon -- and even if they are careful, it's likely that they are still a threat. Cyber security training is not relegated to the realm of IT professionals. All employees need to be aware of modern cyber security best practices if you want to reduce your risk.

Cyber Security is one of the Biggest Threats Today

Small businesses face cyber security threats every day. Not only are threats pervasive throughout many industries, but a single successful attack could result in business disruption for days or even weeks. Cyber security threats can cost an organization millions of dollars, shutting down their operations and adversely impacting their reputation. Cyber security threats may even result in employee or client information being stolen, requiring a costly mitigation that could last months. 

Most Threats Come from Within

Though businesses may have state-of-the-art technology protecting them, this does not help if the threats come from within. Employees may be negligent, malicious, or simply make a mistake. They may click on the wrong link, download the wrong email attachment, or simply not be paying attention to what they are doing on their network-connected personal device or phone. Regardless, an employee's actions can very easily lead to a network compromise, even if the company was already protected through its technology. This makes it critical for employees to understand the risks that they face -- especially when it relates to modern tactics, such as the phishing, that may now be associated with ransomware. If employees cannot even recognize a threat, it is impossible for them to defend against it. 

Many Employees Don't Understand the Need for Cyber Security

Though employees may understand cyber security in the abstract, they may not understand how it impacts their tasks on a day-to-day level. Employees need to be introduced to a culture of cyber security for a business to be able to truly defend itself from cyber threats. Cyber security training puts employees through the paces and runs simulations so they better understand what they should do when confronted by a threat. Preparedness empowers employees so they can act fast and with authority.

Are your employees prepared to protect your organization against cyber security threats? You can find out. CWPS offers cyber security training for businesses through training and simulations. Contact CWPS today to sign up for KnowBe4 training and make sure that your employees are ready for any threat.

Guide to Keeping company's data safe

Cyber Security Tips - The Importance of a Defense-in-Depth Strategy

cyber security tipsWhat is defense-in-depth and why is it an important security strategy for organizations today? Defense-in-depth is an IT security strategy that uses a multilayered security approach, with multiple security measures designed to protect the organization's most important data assets. In a defense-in-depth strategy, a company's most important data may be protected by many layers of security, whereas less important data may be less restricted. The average cost of a data breach is $4 million; a proactive defense can protect against this.

The Benefits of Defense in Depth

A multi-layered approach can be tailored to different levels of security. Not every asset needs to be completely secure; instead, only the most business critical assets, such as proprietary and confidential information, can be protected by the most restricted settings.

If one system fails, there are other systems functioning. It's impossible to guarantee the security of any single type of security application; there are always vulnerabilities and exploits. By using multiple systems to mitigate damage, the organization can ensure that even if one (or multiple) systems fail, the system itself is still protected.

There are many niche solutions -- and threats. Organizations today often need to maintain multiple cyber security applications, such as antivirus programs, anti-spyware programs, and anti-malware programs. Cyber security involves so many threats today that unique tools are often necessary.

Achieving a Defense-in-Depth Strategy through an IT MSP

An IT MSP can aid an organization in transitioning towards a defense in depth strategy in three major ways. IT MSPs are able to chart a course for the organization, so that they can better transition to this type of strategy without business disruption. IT MSPs can also identify the best technology, using their advanced knowledge of current cyber security measures and the threats that the organization is most likely to face. Finally, IT MSPs can leverage the power of cloud solutions to provide a defense in depth strategy that isn't going to utilize more resources than the organization has access to. Without cloud-based infrastructure, most defense-in-depth strategies would be prohibitively expensive in terms of infrastructure and resource costs.

Not only is a defense in depth strategy critical to modern organizations, but companies should switch to it as quickly as possible to fully protect themselves. CWPS can help your organization setup a multilayered, defense-in-depth strategy today. Contact CWPS for information about the benefits of defense-in-depth and to find the best way to transition your organization.

New Call-to-action

One Thing Every SMB Should Know About Choosing an IT MSP

55217092_s.jpgWhy are you interested in a managed IT service provider? For the most part, many SMBs look towards an IT MSP to improve upon their operations and manage their technology. But MSPs also provide a far more important service: they can manage a company's cyber security. And it isn't just that an MSP can help protect against some cyber threats. When you work with an MSP, you put the bulk of your IT infrastructure in their hands. You need an MSP that can protect your IT assets from all of the various types of cyber threats – not just one or two.

Maintaining Security in a Changing World

Why are SMBs so frequently targeted by cyber criminals? Because most small-to-midsized businesses are not properly secured. Whether it is because of a lack of time or resources, many SMBs find it prohibitively difficult to setup a reliable security system. There are three core challenges that SMBs run into when maintaining their security:

Staying up-to-date on current threats. Ransomware, ghostware, phishing -- all of these threats are constantly evolving. Cyber criminals are very smart, and they are continuously acting to defeat new security methods. Not only do businesses need to be aware of these threats, but they also need to be prepared to counter them.

Investing in the right technology. Firewalls, antivirus solutions, and DNS filtering are all required to create a complete security ecosystem. SMBs have to find the right technologies, ensure that they are well-integrated, and keep them updated. This can be an overwhelming task for a small business owner and their (often small) internal IT team.

Reacting in a proactive manner. When threats are detected, a business needs to be able to react quickly to both secure assets and mitigate the threat. SMBs often don't have the resources to monitor their systems continually -- and they may not have disaster preparedness plans for data loss and business disruption.

Selecting a Managed IT Service Provider

A solid MSP should be able to help a business with all of the above security issues -- this is the one thing any SMB needs to know about choosing an IT MSP. A good MSP will be able to setup the right technology infrastructure and manage and maintain it. They will be well-educated on all current security threats and they will be able to advise you on the best course of action to mitigate and defeat them.

Naturally, there are many things that a business should consider when they are choosing an IT MSP. But security is one of the most important factors. IT MSPs must be well-versed in all levels of IT security and must be able to provide consistent support and defense against modern security threats. If you want to learn more about securing your IT infrastructure, contact CWPS today.

New Call-to-action