Security News
With so many people and organizations using Microsoft Office 365, phishers who exploit this brand can target a vast amount of people as a way to steal their account credentials, as described by Vade Secure. Phishing attacks that exploit Office 365 come in different varieties, according to Adrien Gendre, chief solutions architect at Vade Secure.
Avaya Holdings announced that Telarus, master agent of business cloud infrastructure and contact center services, has been named as a master agent for its Avaya Cloud Office by RingCentral offering. Avaya Cloud Office is an all-in-one collaboration solution providing seamless communications, file sharing, and collaboration capabilities across unified voice, video, messaging, digital customer engagement, and meetings.
NetApp, the leader in cloud data services, announced that it acquired Talon Storage, a leader in next generation software-defined storage solutions enabling global enterprises to centralize and consolidate IT storage infrastructure to the public clouds. The combination of NetApp Cloud Volumes technology and Talon FAST software, enterprises can seamlessly centralize data in the cloud while still maintaining a consistent branch office experience.
A new variant of the Paradise ransomware attacks rarely-targeted Microsoft Office Excel IQY files, providing a new and relatively inobtrusive way to infiltrate and hijack an organization's network, researchers have found. Paradise ransomware has been active since 2017, though it's not as well-known as other ransomware campaigns.
The menace of Business Email Compromise is often overshadowed by ransomware but it's something small and medium-sized businesses shouldn't lose sight of. Bang on cue, the FBI Internet Crime Complaint Center has alerted US businesses to ongoing attacks targeting organisations using Microsoft Office 365 and Google G Suite.
"From a security perspective," said Javvad Malik, security awareness advocate for KnowBe4, "The first things a company should look into are whether there is enough capacity for employees to work from home at the same time. It is also important to ensure the right policies and tools are put in place to enable employees to work remotely. Not having the right tools in place can lead to employees using unapproved or insecure apps, tools, or methods to try and get their job done. Most of all, expectations should be set as to how the organization expects its employees to operate under remote conditions and how to raise any issues." A Veritas Technologies spokesperson warned, "Many employees are habitual in the way they store data, saving to local drives on laptops or to the public cloud when working remotely. If large percentages of employees shift towards remote work over time, it could create a pool of unstructured data that would become invisible to the business-causing a new wave of data protection and compliance concerns." Given how quickly the coronavirus has spread, corporations may not have had time to implement necessary protocols.
Take your SOC to the next level of effectivenessOrganizations are turning to Breach and Attack Simulation integration with the SOC. BAS integration with SIEM and SOAR solutions enables SOC teams to continually evaluate the effectiveness of their security controls and improve the company's security posture with real-time, accurate metrics. SecOps teams face challenges in understanding how security tools workSecurity professionals are overconfident in their tools with 50% reporting that they have experienced a security breach because one or more of their security products was not working as expected, according to Keysight.
Victims of dodgy IT support from Office Depot will start receiving compensation checks, a US consumer watchdog said Thursday. The payouts come from a 2019 settlement the retail giant reached with the FTC, after the biz was accused of letting employees and a computer support provider trick punters into paying for unneeded malware cleanup and security software.
America's Homeland Security this week disclosed it recently responded to a ransomware infection at an unnamed natural gas plant. It did spread from an office computer through the plant's IT network to the operational network of PCs that monitor the plant, overwriting documents and other data as it went.
Many novice Office 365 shops do not know where platform-specific security vulnerabilities lie, or even that they exist. Companies get themselves into trouble when they do not fully understand the way data moves through O365 or they apply on-premise security practices to their cloud strategy.