• 11 May 2024, 15:32 PM

Author Archives: DSM Group

Cyberterrorism – The Silent Threat?

The business benefits of cloud computing are widely recognised but, for many organisations who have to comply with regulatory requirements, there is a need for evidence of enhanced security from their Data Centre partner.  Stolen or corrupt data can lead to loss of customers, high recovery costs and – most of all – a damaged reputation.  If an organisation is using a cloud solution they must rely on their supplier to provide the necessary level of security technology and processes.  In the Data Centre environment both physical and virtual security requirements must be demonstrated to the satisfaction of their customers.

The physical security of a data centre plays a significant role in ensuring information is kept safe.  Access to the site should be restricted to authorised people only and have round the clock surveillance.  Electronic access control systems as well as interior and exterior high resolution CCTV is a must and Data Centre managers must ensure that security is not compromised by failure of resources such as electricity.

Not only must the site be physically secure, the network infrastructure must also be safe from unauthorised penetration.  The scope of system security in the Data Centre should include security policies and practices, firewall protection, anti-virus software and continuous monitoring for incidents.  Automated solutions can be used to detect security breaches and to replicate data for regulatory compliance requirements.

“Data Centre security is of vital importance.  It’s up to the owner to ensure that the infrastructure is safe and all security procedures are fully documented and rigorously followed.   This allows our clients to focus on their core business without having any concerns over the safety of their data,” said John Morton, Sales Director, DSM.

New solutions are being introduced constantly to counter threats and meet compliance requirements in web application security and data security.  There is a wide range of security ‘add-ons’ including alerts to network events and real-time visibility into routing and traffic anomalies.  Many Data Centres are now using smart monitoring features such as Intrusion Detection which quickly identifies and alerts if human attackers, network worms or bots are attempting to compromise the system.

Only by ensuring their Data Centre partners are well protected and incorporating the latest security technologies can organisations be confident that their data remains safe.

colocation-hosting

Benefits of Colocation

Why Colocation?

Over the last few years you will certainly have noticed the rise of technology – how it is becoming increasingly part of our daily lifestyle, oh, and this thing called the Internet.  Well, as this has all been growing around us, protecting our data and access to our applications has become an even more vital part of business operations.  The Internet has led to the introduction of Cloud computing which is one of the most popular ways of managing data and business processes. However, many organisations have recognised that Cloud solutions may not be secure or reliable enough for their needs, especially if they operate in a regulated industry.

This is why Colocation is still a highly popular and effective solution as you can partner with a company who specialises in hosting your equipment in a secure and robust environment with full accountability for ensuring your data is not lost or compromised.  As a company that offers colocation, we would like to suggest a few reasons why it may be the best solution for your business:

Stability
First of all, stability is really the main reason people use Colocation. If your premises are hit by a disaster such as flood or a fire (though unlikely, it is possible and something you should plan for) then your data can still be accessed and recovered. Data centres used for colocation should have full resilience for power to eliminate downtime.

Security
Not only is your data not vulnerable to events in your premises, it is safe. Typically, companies that offer colocation services operate to high levels of security to ensure only authorised personnel can access your information.

Connectivity
Providers of colocation services ensure that your equipment is hosted in a controlled environment with high bandwidth speed so your equipment will run smoothly and efficiently. It is far more cost effective to use a colocation provider than to create such conditions in your own premises.

Money
Though there is no guarantee that using a colocation solution will increase your revenue, it will definitely save you money.  This saving could be re-invested in your business to grow income and profits, so there’s really no down side to this as you’re saving money either way.

So if you are not already using a colocation solution, why not consider it? DSM is a specialist company based just outside Peterborough offering a range of services such as colocation, managed hosting, system recovery and IT support to companies across the UK.

For more information on how we can help your business, please feel free to check out our Twitter pages or contact us on 03333 221100.

Top Tips For Business Continuity Management

The why and how of introducing a Business Continuity Management strategy
Business Continuity involves building resilience in your organisation by identifying its key products and services and the critical activities that underpin them, then devising strategies so that you can trade through a disruption and recover afterwards.
Most organisations recognise that they should have a Business Continuity plan in place but see it as too expensive and time consuming to address, however this doesn’t have to be the case.
The benefits of introducing continuity awareness within the company far outweigh the risks associated with just hoping bad things won’t happen (although statistically they will!). Companies are looking ever more carefully at their supply chain to identify potential weaknesses and are asking for evidence of a documented and tested strategy to prove service level agreements can be maintained in any event.
The biggest mistake is trying to do the whole process in one fell swoop which, if ever completed, is likely to be a huge document that is put on a shelf and ignored for a few years. By breaking the process down into simple manageable phases where you can tick off the “quick wins” and demonstrate progress you introduce a culture of ongoing review; it is vitally important to constantly update your recovery plans in line with business growth and operational changes.
 
Top tips for Business Continuity Management:
 

  1. Carry out regular risk assessments and take steps to eliminate, or at least minimise, potential threats to the operation of your business.
  1. Consider possible scenarios and analyse their impact on your business – forewarned is forearmed.
  1. Compile an action plan of what should be done in order to maintain Business As Usual in any event. Put formal contracts in place which will enable fast recovery of vital operations.
  1. Document key business processes and ensure no critical activities can be done only by a single individual.
  1. Review the resilience of your suppliers and their capability to meet Service Level Agreements. Consider multiple sourcing to reduce reliance on a single supplier.
  1. Protect your company information and ensure it can be accessed or rapidly restored in any event without compromising on security.
  1. Carry out regular tests to prove you can continue to function should you lose access to your premises or vital services, or in the worst case, your entire business environment.
  1. Encourage all employees to get involved with the preparation and testing of Business Continuity plans so they buy in to the importance of keeping your business alive.

To discuss your Business Continuity strategy further please contact us.
 
 
 

Reality remains in the office

Working from home – the new normal or the new risk?

So, working from home is the new normal – right? We’ll never go to the office again – really?  The kitchen worktop or the chest of drawers in the spare bedroom makes for a great office – yes?  The kids screaming– isn’t an issue, the cat/dog pawing at your leg doesn’t intrude on your train of thought or interrupt the flow of the important client meeting on Zoom or Teams?  All is sweet then – carry on!

If you’re fortunate to have an office at home you may be spared some of these intrusions….  but note….. it’s an ‘office’.  For most, the home ‘office’ is a ‘make do’.  ‘Make do’s are either a pain or a novelty that eventually become a pain.  ‘Make do’ spaces are often a borrowed resource with such borrowing sometimes lasting only minutes.

The current crisis is sure to bring about some changes but, is going to the ‘real’ office a thing of the past?  For many reasons, we think it unlikely – although for sure, on the back of the novelty factor, the ‘we-can-work-from-home’ brigade , which range from those counting the pennies (believing it will save a fortune) to those with imaginations of a paradise, will strive to prove it is the new normal.

So why do we think the ‘real’ office is still here for a while longer……

Well for one, the majority of businesses are technically not ready.  Cyber criminals, though, are very ready!  The ‘real office’ may be well firewalled but, the likelihood of this extending to the home office, is small.  Wrapped within pages of GDPR legislation, businesses have many legal obligations for securing  data – especially that which is personal.  Aside the possibility of all company data being encrypted and ransoms demanded, those that flout the regulations can be heavily fined and Directors held accountable.    Home working – is it the new normal or is it the new  risk – a very big risk!

 

 

 

 

 

5 key information security rules that are vital to follow

Every day we hear of new rules to follow, but many of them are really not necessary. To make it simple for you we have collected up the five rules we believe are so essential you’d be at a huge loss without them.

1: Passwords!
Passwords are a basic, key rule you are taught from the first time you use a computer.  But the trouble is that people use simple passwords which are easy to crack, use the SAME password for multiple accounts (so imagine if somebody has already cracked/guessed your password to one account, what they can do now!), and passwords can be stolen from a third party that stores it. So as great as passwords are, they can be almost ineffective. This is where we come in, advising you on how to make your password secure enough (and they can be!).

For starters, you’ll want to make sure that you use a long and complex password, with different passwords for each account. Don’t forget to use a mixture of numbers, upper and lowercase letters, symbols such as: @, !, ? etc. and try not to use anything that somebody might guess like your children’s names as that will be a go-to guess for anyone who knows you well enough. Understandably it would be hard for you to remember lots of different complex passwords so we recommend using a password manager with a single long and complicated password which will remember all the others for you.

2: Backup
Probably the easiest tip to follow. Doing a frequent back-up of your important and confidential information is essential because, if you only do it occasionally, you risk losing any data that has been created or edited since the last one.  Our advice is to set the back-up to run automatically so you can restore even you most current critical data in the event of an attack.

3: Web Security
Though you may only access the safest Internet sites, it’s still possible for your computer to pick up some nasty malware from web-based “drive-by downloads” where malicious code from a website searches for a soft spot where they can access your system software. Around 90% of that web code is said to come from popup advertising which you can get even when only visiting the most secure sites.
It’s for all these reasons that we advise you to use either a web reputation solution to keep you away from viciously malicious sites (the solution can either run straight through your computer or through a network to all of your devices which is our recommendation), or a web script management tool which will stop attacks through software and plugins like Flash, JavaScript, and Java. You can use great browser plugins such as Google Chromes ‘Click to Run’ tool, which stops videos from playing the minute you open a site, which can stop the many dangerous (and irritating!) ads from playing.

4: Update
This should come as no surprise to you, but yes, the more often you update your system, the safer you will be against viral threats. It’s another very simple tip that we are always told to do, purely because it works and not being able to use your computer for a few minutes shouldn’t be too much of an inconvenience considering the benefit you’re getting out of it.

Cyber-Baddies are very skilled at finding vulnerabilities in your system nowadays so, to stop them from getting into your computer and corrupting/stealing your files and destroying your computer from the inside, you need to apply updates regularly.

5: Watch out for fishing
The most common mistake that people make is that they open all their emails without any suspicion. You know which ones we’re talking about, the ones that make no sense as to why you have received them, that try to attract our gullible side to open them and then click on whatever links they’ve left there. They may read things like “Congratulations You are the winner of …!!!” or “Look John, check out this life-changing new secret you’ll never be able to live without!!” etc.  They will be inconsistent in tone and have a hyperlink at the end that will take you to a dodgy or irrelevant site, which is where they get you. The key is to be careful when looking at your emails, don’t open one if you’re not sure about it, and NEVER open one of the links in one of the emails. This is how hackers can trick you, it is called social engineering and can often be convincing so make sure you’re always cautious when opening emails.

Another method they use is to find out information about you (where you work, your age, where you live etc.) and then craft an email that appears as if it’s from someone you know with a subject line that relates to something specific in your life and looks very convincing. This is known as Spear Phishing and can be very difficult to determine if it is safe to open.  The e-mails will often appear to be from a family member, friend, or even an invoice for a recent ‘purchase’ that you never made. So we recommend that you protect yourself against these fraudsters by having a very careful look at your emails before you open them. Unfortunately there isn’t any software that can deal with this issue but, now that you have read through this article, you should be more aware and primed to delete the offending e-mails before they can cause harm.

Was this article helpful? We always love to hear your feedback, so please feel free to let us know!