Home
About
Contact Us

Home>blog
Fri, 08 Apr 2016/

Insider Threats: How to Counter Internal Cybersecurity Risks

If you ask people about cybersecurity, they will probably start talking about hackers breaking into a company's computers from hundreds of miles away. However, a threat just as destructive could be hiding inside that company's offices. This is commonly referred to as insider threats. These insider threats typically fall into two groups. The first group consists of careless employees who fail to properly secure their computers. The second group includes malicious workers with insider access. These people either steal information from within an organisation or allow cybercriminals to access their company's networks. Recognising Insider Threats After studying cases of insider threats, fraud, and embezzlement, criminologist Donald Cressey developed the Fraud Triangle theory. He claimed that these types of crimes occur when three elements are present. First, the criminal must feel pressure to commit the crime, either out of greed or desperation. For example, an employee who is in sudden need of a large amount of money might be tempted to participate in an insider attack. The inability to pay for a substantial medical bill is often cited as a popular example of this situation. The other two elements in the Fraud Triangle are opportunity and rationalisation. To commit the crimes, the perpetrators must have the ability to do so. However, they must also convince themselves that their actions are acceptable. This rationalisation twists the event in such a way that they do not consider it a crime. Instead, they usually convince themselves that they are just borrowing the money or that the company deserves the attack because it is corrupt. To identify these elements of an insider threat, organisations need to pay attention to their employees' actions, character traits, and personal circumstances. To this end, the U.S. Computer Emergency Readiness Team (US-CERT) — a division within the U.S. Department of Homeland Security — published the Combating the Insider Threat report. It lists character traits of insiders who are at risk of becoming a threat. The traits include: Introversion A sense of entitlement A lack of empathy An inability to assume responsibility for their actions A weak sense of loyalty toward the company An inability to accept or tolerate criticism While displaying a couple of these traits is fine, anyone who exhibits many of them should be flagged as a possible risk. There are also behavioral signs that can point to an insider threat. If staff members work at odd hours without authorisation, remotely access the company's network while on holiday, or unnecessarily copy documents, they may be preparing for or participating in an insider attack. Defending against Insider Threats Out of the three elements in the Fraud Triangle, companies have the most control over opportunity. By following the principle of least privilege (i.e., limiting employees' access to the minimal level that will allow them to perform their job duties) and using access control tools, organisations can more effectively prevent incidents involving insider threats, according to the Insider Threat Study. As part of these efforts, you should record when employees access the company's network and how many files they typically handle. This will help you discover when staff members are, for example, printing files in their off-hours or saving a substantial amount of files to a USB drive. Similarly, managers should set up a schedule for reviewing employees' network access levels. You can address the rationalisation and pressure elements of the Fraud Triangle by regularly interacting with your employees. Set up feedback forms and anonymous surveys so that they can express their frustrations constructively. For this strategy to work, you have to tackle these complaints in an open and honest manner. Companies can also improve workplace morale by instituting a program that recognises and praises outstanding employees. A warm attitude toward staff members makes it less likely that one of them will attack the company out of spite or anger. Since insider threats sometimes stem from carelessness or a lack of understanding, it is also important to educate employees about cybersecurity. You need to develop an IT training program that will teach your staff members about how to use their computers in a secure manner. Your best defense against insider threats By being proactive Multi IT has an incredible threat detection rate that has saved hundreds of businesses and people. Our advanced cyber security solutions detect possible threats and security breaches before they happen by identifying initial attempts. Contact us today or phone us on 011 435 0450 to discuss you requirements.
VIEW MORE
Mon, 09 Jan 2017/

Choosing a cloud provider

Many businesses are now looking towards “cloud computing” to provide them with the IT systems and services that they would have previously had in their office.   Cloud computing encompasses many different technologies and services with a huge variety of “as a service” providers.  This presents a considerable number of challenges for businesses over security, reliability, backup, performance and costs as well as other factors. The right cloud provider is essential if you are looking to use IT as a business enabler.  To help guide you down the road to making an informed decision about which Cloud provider can meet your particular needs, I’ve compiled some handy rules of thumb. 5 Handy Hints Compile a requirements list with the stakeholders in your business to ensure that you know exactly what you are looking for. Make sure your data (internet) connection will provide the performance you will require. Have a look at the cloud provider’s website, ask them for real-world case studies and try and get confirmation of their success such as industry recognition, association with industry bodies and awards. Check existing and past customer references.  Don’t take the cloud providers word for it!  Ask for references for similar-sized businesses in similar industries to your own. Engage with a trusted IT partner to help you through the process.   16 Great Questions to Ask How many years have you been providing cloud services? What class of data centre do you use and where are they? Do you replicate data to other sites? Where is your customer data held? What types of security audits do you perform on your systems to protect them from hackers? What policies do you have in place to protect the privacy of customer data? When and how do you notify your customers if there is a security breach? How scalable is your system? What level of support do your customers get and what are your customer guarantees? What is your pricing structure? What data do you backup and how is customer data protected from deletion and corruption? What is the system availability level? How much control do customers retain over their data? What happens if you lose customer data? What is the disengagement process including how do customers get all of their data back and in what timeframe? Have you any experience with my industry? While some of these may seem obvious, more often than not most of these questions are not considered until it’s too late.  These tips and questions will help you pre-qualify potential providers and will give you relevant and critical information that will help you make an informed decision. The right move in choosing your cloud provider Multi IT & Telephony Solutions have been trusted IT experts for over 30 years. We understand your business challenges and needs in order to advise on the best cost effective solution that will optimise your IT potential. Contact Us now to discuss your cloud migration.
VIEW MORE
Tue, 06 Dec 2016/

Unified Communications Benefits

If you are thinking about implementing Unified Communications Management in your business, it’s worth taking a deeper look into the many benefits. Here are my top 5 reasons why Unified Communications is a must in any business. 1. Incorporate different communication features to enhance collaboration What if you could multitask on different devices to get more done? With the the UCM series you can. A great feature of the Unified Communications Management (UCM) series from Grandstream is the ability to access a wide variety of different technologies on one powerful, integrated network. Where old phone systems could only support telephony/voice, IP-based UC networks can support pretty much any type of technology, allowing you integrate on one network. For example, integrating devices so that video cameras can call video phones when an alarm is triggered. 2. Create, unify and manage multiple networks under one roof Another powerful feature of UC is the ability to streamline IP communications. That’s because UC has centralised functionalities that allows businesses to peer with multiple spaces. The UCM series (also know as IP PBX) is ideal for businesses with multiple physical office locations and remote workers, as multiple UCMs can be peered together. It even offers a centralised UCM that can support multiple locations. Keeping everything on the same network (regardless of physical location) makes set up and maintenance as easy as possible. That’s unification at its best.  3. Ideal for supporting future expansion Expanding your network just got easier. Thanks to the broad SIP device support of IP (and the UCM), you can add any type of device and technology to your network at any time. This includes fax, video surveillance, video conferencing, facility access (door cameras), video calling, mobile phone support, security devices like session border controllers (SBCs) and more. Making expansion fast, easy and manageable.   4. SMBs can operate & compete under a global scale With different communication options from UC, a small business can multiply their communication flow, increasing their size but not their workload. This allows SMBs to compete with any business on a global scale thanks to cost-effective features that are easy to manage. Businesses can use Grandstream's UCM series to create and unify multiple technologies, including video conferencing and calling, video surveillance, door cameras, fax, plus more.   5. Save money & enhance your IP-based communications What’s better than drastically improving your IP-based communications? Saving money at the same time! IP communications reduce telecom and long distance costs between office locations and remote workers. It saves on cell phone bills by routing domestic and international calls made on a smartphone through VoIP. It also allows you to build one network that can be shared by all locations rather than having to build multiple networks for each office and each type of communication device.  The next steps to Unified Communications for your business Multi IT & Telephony Solutions have over 30 years in the ICT sector and as such are Telecommunication experts. Whether you need an enterprise 3CX solution or the more pocket friendly Grandstream PBX we are able to take your communications to the next level. Contact us today to discuss your communication requirements.
VIEW MORE
Tue, 06 Dec 2016/

SIP Technology and the evolution of the PBX

The idea that the PBX is simply a voice server requiring extensive wiring couldn’t be further from reality. As the discussion progressed about what the modern day PBX can accomplish, many heads in the room began to turn. People began to question whether the industry as a whole should adopt a new term to describe these powerful UC devices? Regardless, it’s important to continue educating the channel and end user businesses that the PBX has evolved – and SIP is to thank for that. In the past, terms like legacy, voice, and analog were used to describe the PBX. Today, terms like UC and open source now apply. SIP technology has forever changed the PBX (now known as an IP PBX) to the point where a new introduction is needed. SIP technology allows many different types of communication technologies to be integrated along with voice – thus evolving the IP PBX into a UC manager (which depicts the UCM acronym in the name of Grandstream’s IP PBX series). Where separate networks and complicated installations were the norm for every communication technology – from videoconferencing, voice calls, video surveillance, and data analytics – SIP offers a simple platform that easily converges these communications into one, easy-to-manage solution. SIP could also stand for simple integration process. Thanks to SIP and the rising popularity of the SIP-based PBX, UC has never been more accessible, easy to use and easy to install. An IP PBX gives any size business the ability to instantly deploy a robust UC network including voice; video calling and videoconferencing; video surveillance monitoring and recording; door cameras and facility access solutions; an intercom network; and more. Using an IP PBX for the backbone and SIP-enabled devices as endpoints, this powerful solution is built using the Internet infrastructure that most businesses have already invested in and use. Through web-based management, the entire solution can be quickly and easily set-up with a few clicks of a mouse. Most IP PBXs, including Grandstream’s UCM series IP PBXs, offer hundreds of features and functionalities that are fully customized for any business to access the most robust communication capabilities available in today’s marketplace. Using an IP PBX, this entire solution, regardless of where it’s located in the world, including all devices, all users, and all technologies, are fully manageable from one central location (even be managed remotely through the web). One of the most powerful aspects of an integrated solution comes from the way each endpoint can interact with all other network endpoints. SIP-based devices, from phones to surveillance cameras to the videoconferencing systems to door access cameras, can all communicate together via the IP PBX to add features, additional methods of communication, and stronger security protection to the solution. SIP UC application examples include: Employees can make and receive videoconferences while allowing in-office or remote employees to call in and call each other using voice or video phones, and workers can make video calls to employees or clients using the same extension without any configuration For surveillance, SIP cameras are set up as a SIP extension, allowing the cameras to proactively send out instant alerts to voice phones and video phones on the network. In conjunction to phone notification, alerts are also sent to any email address when a security event occurs – all while allowing anyone to call the camera’s SIP extension, at any time, to see the live feed of the camera or speak through the camera. A door access solution can be integrated with the IP PBX to allow door cameras to make SIP voice/video calls to registered phones when a guest appears and allow the door to be opened directly from the phone. An intercom system can be created – either through the SIP cameras and their audio inputs/outputs or built-in speaker/microphone, or through the SIP telephony system. Existing analog phones or cameras can be used. Investing in SIP solutions gives businesses the comfort of knowing that their UC network and applications are future-proof, fully scalable, and affordable. IP PBX solutions can also vary in size and price, including upfront purchase price as well as whether or not licensing fees and recurring costs apply. The next steps to your SIP PBX system Multi IT & Telephony Solutions have over 30 years in the ICT sector and as such are Telecommunication experts. Whether you need an enterprise 3CX solution or the more pocket friendly Grandstream PBX we are able to take your communications to the next level. Contact us today to discuss your communication requirements.
VIEW MORE
Mon, 28 Nov 2016/

Ransomware attacks - how to protect your business

The number of ransomware attacks is increasing at an alarming rate, making ransomware the biggest cyber threat that businesses are facing today. To see this disturbing trend, you only have to turn back the clock to the beginning of 2016. There was a 30 percent increase in the number of ransomware attacks in the first quarter of 2016 compared to the fourth quarter of 2015, according to Kaspersky Lab's "IT Threat Evolution in Q1 2016" report. The situation is getting so serious that the United States and Canada issued a joint cyber alert about the dangers and prevalence of ransomware attacks. The alert recommends that businesses take preventive measures to protect their computers from ransomware infections. So, what should you do to protect your business? First, you need to learn what ransomware is and how it is spread. Armed with this knowledge, you can take measures to secure the points at which ransomware might enter your business. You also need to prepare for the worst-case scenario — a ransomware infection occurring, despite your best efforts to prevent it. What Ransomware Is and How It Is Spread Ransomware is a type of malware that cybercriminals use to extort money from businesses and individuals. It usually encrypts files, but it also might lock computer systems. The cybercriminals then demand a ransom for the private key needed to decrypt the data. Cybercriminals use a variety of techniques to spread ransomware. One common way is to use phishing or spear phishing emails that try to trick the recipients into clicking links or opening attached files. If they fall for the ruse, their computers will likely become infected with ransomware. The Locky ransomware attack in February 2016 is a good example of this distribution technique. Cybercriminals sent out phishing emails that included an attached Microsoft Word document, which contained a malicious macro. Recipients who opened the attachment and enabled the macro had their computers infected with the Locky ransomware. Another common way that cybercriminals spread ransomware is through drive-by downloading. Cybercriminals either build a malicious website or post a malicious advertisement (aka malvertising) on a legitimate one. When users visit one of these websites, code is installed on their computers without their knowledge. The code usually redirects the users' browsers to a server where an exploit kit tries to find a known vulnerability. If one is found, it is used to install malware. In April 2016, cybercriminals delivered the Locky ransomware this way. They took advantage of a vulnerability in Adobe Flash Player to install Locky on users' computers. Cybercriminals do not just stick with their old tricks for delivering ransomware. They also come up with new ones. For example, in a series of attacks during March and April 2016, hackers exploited a known vulnerability in servers running Red Hat's JBoss software to install backdoors, which they then used to deliver ransomware. How to Protect Your Business from Ransomware Attacks When it comes to ransomware, you need to do all that you can to prevent the infection. Consider taking these preventative measures: Use anti-malware software. It helps detect and block known ransomware and other kinds of malware. Update operating system software and applications regularly. Cybercriminals like to target programs with known vulnerabilities. Patching these vulnerabilities reduces the number of exploitable entry points. Keep email filtering tools up-to-date. These tools use various filters to help weed out phishing emails and spam. Most email programs include filtering tools, but you can also purchase advanced filtering solutions. Teach employees how to spot phishing and spear phishing emails. Be sure to discuss how dangerous it is to click links and open attachments in emails, especially if they are from unknown senders. Make sure that Word macros are disabled on any computer running that application. A ransomware attack can be initiated by malicious commands hidden inside a Word macro. Educate employees about the importance of avoiding any websites marked as potential security threats by their web browsers or anti-malware software. Those websites might contain malvertising or other malicious code. Cybercriminals are constantly devising ransomware variants and new ways to spread them, so you need to prepare for the possibility of an infection. Specifically, you should regularly back up your files as well as test those backups. If you know you can recover your files from backups, you will not have to give into cybercriminals' ransom demands should your business fall victim to a ransomware attack. Waiting to Act Could Be a Costly Mistake Now is the time to take action to prevent ransomware infections if you have not yet started. Waiting could be a costly mistake. Besides the expenses incurred from having to restore your systems and files, there will be lost income due to the disruption of your business operations. Contact Multi IT & Telephony Solutions now to get a full free threat assessment for your business now. Multi IT have over 30 years experience in the IT industry and are leading IT security experts in South Africa. Contact us now
VIEW MORE
Thu, 24 Nov 2016/

Black Friday Cyber Crime

Black Friday cyber crime is probably the last thing you would think of when shopping online for unbelievable deals but it is a reality we must all face. Black Friday is a single day to take advantage of unbelievable discounts and limited stock. The day’s appeal is undeniable, but it’s also an opportune time for criminals to take advantage of you in the infamous black Friday cyber crime attacks. And they’ll use anything to con you – from fake coupons and malicious websites to forged banking emails. You need to be careful about who you’re giving your personal information to on November 25, especially over email. Here are tips to keep digitally safe over this period. If it seems too good to be true, it probably is All too aware that you’re on the hunt for a good bargain, cyber criminals will email you enticing offers from your favourite websites, hoping to tempt you long enough to drop your guard and click on the links provided. If you see an offer you like, visit the website the email purports to be from (typing it out yourself rather than following the link in the email), and make sure the deal is real. The same goes for financial emails. Rather navigate to your bank’s website yourself, and avoid potentially forged emails altogether. Pay attention to URLs Scammers are experts at replicating the look and feel of an official email. The only surefire way to determine the authenticity of an email is to look at the URLs contained within. So, look for errors. To the untrained eye “takalot.co.za” seems correct, but shouldn’t it be “takealot.co.za”? The wrong URL will often redirect you to a malicious site, created with the sole intent of ripping you off. And always check for the green padlock in the URL of any page where a monetary transaction is taking place. Update, update, update There’s no way around it. Letting your antivirus software fall behind on updates is guaranteed to get you into trouble. New threats are added to your antivirus’ database through updates, without which it has no way of recognising the latest malware or viruses or newly created malicious websites. The internet is your greatest ally There are any number of resources available online to assist you. Unfamiliar with the dangers presented by the Internet? Look for news and blogs about the latest events and techniques cyber criminals use, like spear-phishing, social engineering and ransomware. Don’t trust a retailer or URL? See what others have to say about it online, or use online tools to scan links and files for threats – try “scanurl.net” or “virustotal.com”. Use loyalty points instead We’ve all allotted up loyalty points over the course of the year – like eBucks or Greenbacks – and it’s the perfect time to use them. Because you’re not dealing with cash directly, or your banking credentials, your bank account is that much more secure. Stop and think How many times has your bank told you or advertised on its site that they will never elicit sensitive data over email? We’re willing to bet a lot. That goes for retailers too. Email is simply not a secure method of transaction, so we suggest you immediately avoid any entity that asks for personal information this way. Few events will bring an end to celebrations like being a victim of cyber crime, losing personal information, money, and perhaps more. Thankfully, following these tips will give you the advantage you need to stay one step ahead of cyber crime. Partner with Multi IT Black Friday cyber crime has been on the increase as hackers become smarter in their attempts to steal your personal information. Multi IT & Telephony Solutions are IT security experts and have over 30 years experience in IT. Contact us today to discuss how we can benefit you and your company.
VIEW MORE