Security News

Office printers don't have to be security threats: with foresight and maintenance they're very easily threat-proofed. Hackers haven't forgotten about printers - not by a long shot.

With people working from home and connected to business applications running in the cloud, the notion of an office building representing the company network has vanished overnight. If that's the case, why would it matter whether that laptop is being connected to video conferencing in the company's conference room or a video conference being held from home? There is no more of a guarantee that the laptop in the company conference room is connected to the company's network than the one connected at home.

Avaya Holdings, a global leader in solutions to enhance and simplify communications and collaboration, and RingCentral, a leading provider of global enterprise cloud communications, collaboration and contact center solutions, announced general availability of the highly anticipated Avaya Cloud Office by RingCentral solution. Avaya Cloud Office enhances the way organizations communicate with customers, partners and with colleagues through an all-in-one solution that delivers seamless collaboration across multiple channels.

With so many people and organizations using Microsoft Office 365, phishers who exploit this brand can target a vast amount of people as a way to steal their account credentials, as described by Vade Secure. Phishing attacks that exploit Office 365 come in different varieties, according to Adrien Gendre, chief solutions architect at Vade Secure.

Avaya Holdings announced that Telarus, master agent of business cloud infrastructure and contact center services, has been named as a master agent for its Avaya Cloud Office by RingCentral offering. Avaya Cloud Office is an all-in-one collaboration solution providing seamless communications, file sharing, and collaboration capabilities across unified voice, video, messaging, digital customer engagement, and meetings.

NetApp, the leader in cloud data services, announced that it acquired Talon Storage, a leader in next generation software-defined storage solutions enabling global enterprises to centralize and consolidate IT storage infrastructure to the public clouds. The combination of NetApp Cloud Volumes technology and Talon FAST software, enterprises can seamlessly centralize data in the cloud while still maintaining a consistent branch office experience.

A new variant of the Paradise ransomware attacks rarely-targeted Microsoft Office Excel IQY files, providing a new and relatively inobtrusive way to infiltrate and hijack an organization's network, researchers have found. Paradise ransomware has been active since 2017, though it's not as well-known as other ransomware campaigns.

The menace of Business Email Compromise is often overshadowed by ransomware but it's something small and medium-sized businesses shouldn't lose sight of. Bang on cue, the FBI Internet Crime Complaint Center has alerted US businesses to ongoing attacks targeting organisations using Microsoft Office 365 and Google G Suite.

"From a security perspective," said Javvad Malik, security awareness advocate for KnowBe4, "The first things a company should look into are whether there is enough capacity for employees to work from home at the same time. It is also important to ensure the right policies and tools are put in place to enable employees to work remotely. Not having the right tools in place can lead to employees using unapproved or insecure apps, tools, or methods to try and get their job done. Most of all, expectations should be set as to how the organization expects its employees to operate under remote conditions and how to raise any issues." A Veritas Technologies spokesperson warned, "Many employees are habitual in the way they store data, saving to local drives on laptops or to the public cloud when working remotely. If large percentages of employees shift towards remote work over time, it could create a pool of unstructured data that would become invisible to the business-causing a new wave of data protection and compliance concerns." Given how quickly the coronavirus has spread, corporations may not have had time to implement necessary protocols.

Take your SOC to the next level of effectivenessOrganizations are turning to Breach and Attack Simulation integration with the SOC. BAS integration with SIEM and SOAR solutions enables SOC teams to continually evaluate the effectiveness of their security controls and improve the company's security posture with real-time, accurate metrics. SecOps teams face challenges in understanding how security tools workSecurity professionals are overconfident in their tools with 50% reporting that they have experienced a security breach because one or more of their security products was not working as expected, according to Keysight.