Feb 28, 2018 | Cloud Consultancy News
With the GDPR deadline passing the 100 day mark recently, the May 25th deadline looms closer. Many businesses have begun preparing for the new legislation, but its full implementation is likely to reveal some unforeseen challenges and it is anticipated that large fine...
Feb 27, 2018 | Cloud Consultancy News
The General Data Protection Regulation (GDPR), which began as a regulatory requirement, is increasingly seen as a long-term opportunity to establish greater trust with customers and further unlock employee collaboration and productivity in many businesses. The...
Feb 26, 2018 | Cloud Consultancy News
Last but not least, make sure that you are communicating with business leaders and end users about any changes to your firewall rules. Getting input from the business can help make sure that your firewall configuration is meeting end users’ needs. Having open...
Feb 25, 2018 | Cloud Consultancy News
It goes without saying, but as you update your firewall rules, it’s also a good time to make sure that you have installed all the latest patches to your firewall. The greatest list of firewall rules in the world won’t stop an attack if your firewall has a...
Feb 24, 2018 | Cloud Consultancy News
Another way to improve the performance of your firewall is to use your routers to handle some of the traffic-blocking activities. By offloading some work from your firewall, you may be able to eliminate some firewall rules and improve throughput for your network. As...
Feb 23, 2018 | Cloud Consultancy News
It isn’t true of every firewall, but most apply rules in the order that they are listed in your firewall configuration software or rule base. In other words, the firewall will start at the top of the list and keep going down until it reaches rule that would...
Feb 22, 2018 | Cloud Consultancy News
Mobile phone operator Vodafone has commenced trials of what it claims is the world’s first drone tracking and safety system. The technology, which it describes as an air traffic control system for drones, is aimed at monitoring unmanned aerial vehicles (UAVs)...
Feb 21, 2018 | Cloud Consultancy News
Local authorities across the UK have been exposed to more than 98 million cyber attacks in the past five years, according to a new study. After conducting freedom of investigation requests on councils around the country, privacy campaign group Big Brother Watch found...
Feb 20, 2018 | Cloud Consultancy News
Apple’s iOS 12, the next iteration of the company’s mobile operating system, will offer developers the opportunity to create iPhone apps that will also run on Apple’s desktop operating system. That’s according to Bloomberg’s Mark Guttman,...
Feb 19, 2018 | Cloud Consultancy News
Apple’s APFS proprietary file system is suffering from a disk image vulnerability that could lead to data loss, according to an Apple software developer. APFS, which simply stands for Apple File System, aims to fix core problems on MacOS, iOS, tvOS and WatchOS....
Feb 18, 2018 | Cloud Consultancy News
Every firewall comes with built-in reporting tools that provide details about your traffic. Another firewall rules best practice is to audit those logs regularly to look for changes or anomalies that might suggest modifications to your firewall settings. This log data...
Feb 17, 2018 | Cloud Consultancy News
As you go through your list of firewall rules and update your documentation, you may find that you have more than one rule serving the same purpose. If you can eliminate one of those rules or combine some rules to be more effective, that can speed up your network....
Feb 16, 2018 | Cloud Consultancy News
Your network is always changing. You are gaining new users and new devices. Those users and devices are accessing new applications and new services. And applications and devices that once accounted for a high percentage of network traffic may become far less popular...
Feb 15, 2018 | Cloud Consultancy News
The next major upgrade to its Office productivity suite, Office 2019, will be available to Windows 10 users only – leaving Mac users and users of Windows 7 out in the cold, or forcing users to upgrade to the cloud-based version, Office 365. The vast majority of...
Feb 14, 2018 | Cloud Consultancy News
Starting 6th February, Microsoft is offering OneDrive for Business for free for the remaining term of an existing contact for those companies using a competitors product. But, and there is a larger qualifier for the offer, you must have at least a 500 user commitment....
Feb 13, 2018 | Cloud Consultancy News
Microsoft is already planning to dump Windows 10 S, its stripped-down operating system intended to take on Chrome at the low-end. Instead, the software giant will install an “S Mode” on standard versions of Windows 10, locking them down to a...
Feb 12, 2018 | Cloud Consultancy News
Law enforcement agencies around the world have shut down what they claim was one of the world’s biggest cyber crime rings, behind as much as $530 million in consumer losses across the world. Thirty-six people have been arrested by authorities in Australia,...
Feb 12, 2018 | Cloud Consultancy News
Teams and individuals depend on Microsoft Planner to get organized quickly, work together effortlessly, and stay on the same page—no matter how large or small the project. Four new features for Planner will give you greater visibility into project schedules, let you...
Feb 11, 2018 | Cloud Consultancy News
One way to make sure that you are following your change procedures is to use an automation solution for any firewall configuration updates. Automation can also help prevent mistakes in the firewall setup process. As 99 percent of firewall breaches are caused by errors...
Feb 10, 2018 | Cloud Consultancy News
Before you begin changing any of your existing firewall rules, you should establish a formal process that you will use for any modifications, if you don’t already have such a process. A typical change procedure might involve the following steps: A change request...
Feb 9, 2018 | Cloud Consultancy News
Document your firewall rules Anyone who works on your IT security team should be able to tell very quickly what each of your firewall rules was intended to do by looking at your documentation. At a minimum, you need to keep track of the following data: – The...
Feb 8, 2018 | Cloud Consultancy News
Cloud risks have filled the news cycle of late, but the real cloud security landscape is nothing like the headlines would have you believe. For example, serverside ransomware attacks, despite their high public profile, account for only about 2 percent of recorded...
Feb 7, 2018 | Cloud Consultancy News
Security researchers have discovered a new variant of the Scarab ransomware, which threatens to delete 24 documents every 24 hours from victims’ PCs unless – or until – they pay the ransom. In June 2017, security researchers identified the...
Feb 6, 2018 | Cloud Consultancy News
WhatsApp has now released its desktop app on the Microsoft Store for Windows 10 PCs. Nearly 9 months ago, a mysterious listing of the WhatsApp desktop app showed up on the Windows Store. The listing was updated a couple of times over the last few months, but it was...
Feb 5, 2018 | Cloud Consultancy News
To create a filter that blocks a sender from your Gmail inbox and sends a reply to the (blocked) sender letting them know their message was automatically removed: 1 – Make sure the CANNED RESPONSES lab is enabled. (See note at the end of this blog) 2 –...
Feb 3, 2018 | Cloud Consultancy News
Windows 10 installations have finally overtaken Windows 7 installations – two-and-a-half years after it was released. That’s according to StatCounter, which regularly provides figures and research covering the desktop operating system sector. Its latest...
Feb 2, 2018 | Cloud Consultancy News
Almost all organisations are being peppered with phishing emails – also known as business email compromise (BEC) scams – intended to hook unwary executives. That’s according to a survey by security firm Agari, which claims that the losses in the US...
Feb 1, 2018 | Cloud Consultancy News
A new Imperva survey showed a heightened concern for CyberSecurity risk related to API use. Specifically, 63 percent of respondents are most worried about DDoS threats, bot attacks and authentication enforcement for APIs. APIs power the interactive digital experiences...