Microsoft 365 makes Multi-Factor Authentication easier

Multi Facto Authnetication made Easier

Microsoft is planning to enable Multi-Factor Authentication (MFA) directly in its Outlook app for many 365 business users.

MFA is a vital tool to help protect your online accounts from cyber criminals. It works by generating a second, single-use passcode every time you log into an account. It’s usually sent to an authenticator app on your phone that you have to download and set up first.

Security codes can also be sent via SMS text message, by a phone call, or you might be given a special USB key to plug into your computer.

The process is often made quicker by using a biometric login like your fingerprint or face ID. It’s a minor chore, but the protection it offers far outweighs the couple of extra seconds it takes to access your account.

Microsoft isn’t so sure about those extra seconds, though. If the tech giant can save you that time, it’s going to do it. That’s why it’s looking to streamline MFA for Microsoft 365 business accounts.

It’s rolling out the improvement by building MFA directly into the Outlook app in a feature called Authenticator Lite. Until now, it’s relied on a separate authenticator app or sending login codes.

There’s no news yet for those of us who want faster authentication on our personal PCs. If Microsoft does announce plans to make this feature available to more hardware or operating systems, we’ll update you with any news.

If you don’t already use MFA for your apps and online accounts, we recommend that all businesses implement it as soon as possible. The additional security it offers protects against the vast majority of today’s cyber threats.

For more help and advice about implementing MFA or getting the best from Microsoft 365, just get in touch.

Published with permission from Your Tech Updates.

Read more

The Bad Bots!

Bot malware is a growing security threat

If we talk about ‘bots’ you’d be forgiven for thinking of the amazing AI chatbots that have been all over the news lately.

But this isn’t a good news story. Bots are just automated programs, and bot malware is a worrying new security risk you need to defend your business against.

Malware bots are particularly dangerous because they steal whole user profiles – that’s a complete snapshot of your ID and settings. This potentially allows cyber crooks to bypass strong security measures like Multi-Factor Authentication (MFA).

Usually, if a criminal steals your username and password, they still can’t access your account because they don’t have access to your MFA authentication method. But with your whole profile available to them, using your cookies and device configurations, they can trick security systems and effectively switch off MFA. 

Once profile information is stolen, it’s sold on the dark web for as little as £5.

And it’s not even super-sophisticated cyber criminals deploying this technique. Just about anyone can obtain your details and use them for phishing emails, scams, and other criminal activity.

Since 2018, 5 million people have had 26.6 million usernames and passwords stolen, giving access to accounts including Microsoft, Google, and Facebook.

All this means there are things you need to do – right now – to keep your profiles and your business protected from bot malware.

  • Update your antivirus software and keep it on at all times.
  • Use a password manager and Multi-Factor Authentication to keep your login credentials safer
  • And encrypt all your files so that, if anyone does access your profile, there’s very little to steal.

These are the things we help our clients with every day. If we can help you, just get in touch.

Published with permission from Your Tech Updates.

Read more

Cyber Security – What about your Mobile.

Don't forget your phone when you think about cyber security

Our phones are a goldmine of private information. Just think of all the financial details, personal messages, banking apps, photos and contact information that live behind that little glass screen.

And if your team use phones for work, they’ll often have access straight into company systems – email, contact lists, network access, file systems. So if they’re not kept as secure as any other device in your workplace, they can become a gaping hole in your cyber security.

Criminals know this, of course, which is why they target us through our phones just as much as they do through our networks and servers.

But cyber crime isn’t the only concern. Just losing your phone, or having it stolen, can put your data at huge risk.

So, whether you issue company smartphones, or your employees use their own, you should make sure everyone implements some simple security steps to protect your data and avoid disaster.

What to consider

Start with making sure your people set up a PIN and a biometric login (like a fingerprint or face scan) to open the device.

Only install apps from trusted sources to make sure you’re using genuine software.

And enable Multi-Factor Authentication on all apps that store even a small amount of sensitive data.

Be careful about where you connect to Wi-Fi. If you work remotely or often connect to public networks, consider using a VPN – a Virtual Private Network – to add another layer of security. You never know who’s monitoring traffic on a public network.

Finally, ALWAYS make sure your phone is running the latest version of its operating software, and keep all apps up to date.

Smartphones have changed so much about the way we live – at home, and at work – but it’s too easy to take them for granted. And that could be a costly mistake.

If you need help to keep your smartphones safe, just get in touch.

Published with permission from Your Tech Updates.

Read more

Cyber attacks are getting smarter and bigger. Is your protection?

Cyber Attacks are getting Bigger and smarter

Have you ever tried to buy tickets for a huge event and found that the seller’s website has collapsed under the weight of thousands of people all trying to do the same thing at the same time?

The ticket site falls over – usually temporarily – because the server is overloaded with traffic it doesn’t have the capacity for.

Criminal Distributed Denial of Service attacks – DDoS, for short – exploit the same principle.

When a DDoS attack targets a business, it floods it with internet traffic in an attempt to overwhelm the system and force it to fail.

This results in the business and its customers being unable to access services. That may trigger a temporary failure, or it could be more serious. Last year, the average DDoS attack lasted 50 minutes.

That may not sound like a long time, but it’s enough to create angry customers, or to bring business to a grinding halt. And downtime can be costly.

The really bad news is that DDoS attacks are not only lasting longer, but they’re becoming bigger, more sophisticated and more common.

Recently, the biggest ever reported DDoS attack was reportedly blocked. At its peak, it sent 71 million requests per SECOND to its target’s servers. Prior to that, the biggest reported incident stood at 46 million requests per second.

Worse still, more businesses are reporting being targeted by DDoS attacks where criminals are demanding huge ransoms to stop the attack.

What does this mean for you?

It’s important you check all your security measures are up-to-date and working as they should be. Are your firewalls up to the task, with DDoS monitoring and prevention tools set up? And is your team fully aware of the importance of staying vigilant?

We can help make sure your business stays protected. Just get in touch.

Published with permission from Your Tech Updates

Read more

Phishing Emails are getting better thanks to AI

AI is making phishing scams more dangerous

AI chatbots have taken the world by storm in recent months. We’ve been having fun asking ChatGPT questions, trying to find out how much of our jobs it can do, and even getting it to tell us jokes.

But while lots of people have been having fun, cyber criminals have been powering ahead and finding ways to use AI for more sinister purposes.

They’ve worked out that AI can make their phishing scams harder to detect – and that makes them more successful.

Our advice has always been to be cautious with emails. Read them carefully. Look out for spelling mistakes and grammatical errors. Make sure it’s the real deal before clicking any links.

And that’s still excellent advice.

But ironically, the phishing emails generated by a chatbot feel more human than ever before – which puts you and your people at greater risk of falling for a scam. So we all need to be even more careful.

Crooks are using AI to generate unique variations of the same phishing lure. They’re using it to eradicate spelling and grammar mistakes, and even to create entire email threads to make the scam more plausible.

Security tools to detect messages written by AI are in development, but they’re still a way off.

That means you need to be extra cautious when opening emails – especially ones you’re not expecting. Always check the address the message is sent from, and double-check with the sender (not by replying to the email!) if you have even the smallest doubt.

If you need further advice or team training about phishing scams, just get in touch.

Read more

Is you Cyber Security looking at the right things?

Is your security focusing on the right things

When we look to protect our homes, we start with shutting and locking the doors and windows. Then we will add extra measures like alarms, security lights, fences etc.

But there’s no point going to all that effort if someone’s already broken in and set up camp in the basement.

Yet, by deploying the latest must have cyber security product to protect your business and it’s data that is exactly what you may be doing.

What businesses currently do.

Businesses generally do many of the right things. They invest in security software. They take a strong, multi-layered approach to security – including all the things we recommend, like multi-factor authentication, encryption, reliable backup systems and staff training.

But they don’t pay enough attention to detection and response. That involves constantly scanning systems for any sign that a crook may have gained entry somewhere, and having a process to stop an attack in its tracks.

A new study shows that only a third of businesses place detection as their main priority, while two thirds say prevention is their primary focus.

That means, they could be building 10-foot walls around their systems with intruders already inside.

In-house security teams might be super-confident in the security measures they’ve put in place. But the data suggests that they’re being too complacent. The study reveals that more than eight in ten businesses experienced more than one data breach last year – even with good security in place.

Criminals are constantly finding ways to evade security. That tells us that we need to take a rounded approach, with strong prevention AND detection policies providing the best protection against today’s determined criminals.

If you need world-class security, get in touch today.

Read more

Young Employees, what is their attitude to cyber crime.

Young Employees, have different attitudes to cyber crime

Do you employee staff aged 16 to 19? then read on and take notes!

If the above statement applies to you then you need to pay special attention to the cyber security training you are providing them.

A new study has revealed that a host of worrying online behaviour has become almost normalised among many young people. And much of this activity is illegal.

This isn’t the serious cyber crime such as ransomware attacks or stealing data.

But one in three 16 to 19-year-olds have admitted to digital piracy; and a quarter have tracked or trolled someone online.

Most of these behaviours may not directly affect your business. But some are so commonplace that too many young people view them as a part of everyday life.

That’s not something you want them bringing to work.

Casual software piracy or illegal downloads on devices used for work could open the door to a massive security breach.

What is the answer

The answer is simple: Hold cyber security training for all your employees on a regular basis.

This training should:

  • Highlight the impact of bad online behaviour and potential for security breaches
  • Help everyone understand how this kind of activity can harm people – and your business
  • Make everyone aware of the scams and attacks that your business is vulnerable to, as well as the part they play in keeping everyone protected
  • Make the consequences clear for anyone found to be engaging in this behaviour

If this is something you need some expert help with, it’s what we do. Get in touch.

Read more

Devious new Phishing Scam – Take action to avoid

Devious new phishing scam - take action to avoid.

New day, new scam, and this one is very sneaky.

Cyber criminals are getting smarter. And this recent malware threat is very smart. It impersonates a highly trusted brand name to get a foot in the door.

What happens

Targets receive a convincing looking email that appears to come from a widely used e-signature platform.

This email has a blank image attached. The image is loaded with empty svg files, which are carefully encoded inside an HTML file attachment. (Sorry for getting slightly technical, hang on we are getting there).

In short, it’s very clever and it’s tricking its way past a lot of security software.

And because it is getting past a lot of security software, it is putting businesses like yours at risk. Because code within the image sends people to a malicious URL.

Open the attachment and you could unwittingly install malware onto your device – or even your network – which risks exposing your data and leaving you open to a ransomware attack.

Recently, there’s been a wave of HTML attachment attacks on small and medium sized businesses, so it’s clear that companies need to take action to stay ahead of the criminals.

What you can do

If you use software to sign documents electronically, double-check that emails are genuine before opening any attachments.

There’s a reason why the criminals have chosen to impersonate a trusted name.

Taking things a step further, you could block all emails with this type of attachment, to prevent employees from being exposed to scam emails in the first place.

If you’d like any further advice, or help implementing extra security measures, get in touch.

Read more

When did you last have a health check?

When did you last have a health check?

Did you start a January Health kick? How is it going?

January is that time of year when a lot of us take our health seriously, well for a month or so! It is a good thing to look after yourself, and do something about it.

Your doctor would probably like to see you once a year for a health check, just to find any small problems and stop them from progressing.

It is the same principle with your technology.

So why not book in for an IT check-up, to make sure everything is in great shape for the coming months.

After all we do this for Ourselves, or our car, and it’s a good plan to do the same with your workplace tech. After all it might be working really hard in the year ahead.

What would we do

We will help pick up any minor-but-urgent fixes, that could help prevent a disastrous breakdown in a few months time. (we have just seen this where we identified an issue with a server, which went on the break, and was unable to be repaired just 4 months later)

If there are bigger, but no-urgent jobs that you can safely leave for another day, we will tell you that too.

And if you get a clean bill of health, you can carry on with confidence for the coming months.

It may also be a great time to think about new technology and prioritise your IT projects. We can look at what you need to do with your systems as your business grows.

Our experts carry out top to toe IT health checks for all kinds of businesses, and we will give you honest jargon-free advice on the best solutions for a trouble-free tech set up.

To book your check-up, get in touch

Read more

Holiday Cyber Attacks

Holiday time is coming and so are the Holiday cyber-attacks!

Before working in IT, and Cyber Security, I was in the Military, and whenever we were operating during holiday periods, we knew in the back of our minds that if something was going to happen it would happen during holiday time.

The same is true of cyber-attacks and cybercrime. This year we might see more than previous years, already in early October there was an attack on some of America’s largest airports websites.

It isn’t just the Christmas holiday period that we see the increase

  • Colonial Pipeline (Mother’s Day Weekend (US))
  • Kaseya 4th of July
  • Sony and Microsoft Christmas Eve)

Holiday Cyber Attacks, why and what you can do.

The bad guys are aware that during holiday periods there are fewer employees around to look after the infrastructure. Also we are all preoccupied with thoughts of the festive season. So may click on items that we might not normally do.

Security tips:

  • Train empolyees in cybersecurity and phisihing awareness.
    User error is still the number one cause of malware attacks, make sure all employees undergo an annual social engineering training.
  • What are the internal threats, including scanning and patching software?
    If you are able to make sure these are taken care of this will help in securing your organisation from exploits whilst there is limited supervision during this period.
  • Who has access to your Systems.
    Have you implemented a strategy to restrict who has access to data stores, and applications. Only allowing team members access to what they need and having the right levels of privileged access will help.
  • Protect the Network
    Although perimeter firewalls will assist in a strong defence, you should also deploy firewalls at the endpoint, and this should block applications and traffic, unless it is required.

Don’t get caught out this year! If you need any help on this please call 01752 546967 and we will be happy to help.

Read more