The Question You Never Want to Have to Ask

Why MFA Shouldn’t Be Optional

“Do you offer any help for decrypting files due to ransomware?”

This is a question we are asked with more frequency than ever before. And, sadly, it is often followed up with the information that their files were on “an internal server that was missed in the backup protocol by IT”.

Email phishing and brute force attacks are the most common methods cyber criminals use to get into your business network where they can set up to initiate ransomware attacks. The ransomware (malware) encrypts your data, which becomes unrecoverable without the decryption key. Usually, the only way to recover from a malware/ransomware attack is to rebuild systems and restore data from backups. If you have backups.

A “brute force” attack is typically used to get personal information such as passwords or passphrases, usernames, and Personal Identification Numbers (PINS). Scripts or specialized apps are used to carry out a string of continuous attempts to get the information desired. Cybersecurity researchers at Coveware analyzed ransomware attacks during the second quarter of 2021 and found that phishing and brute force attacks on unsecured desktops (remote and local) are among the most popular entry points for starting ransomware attacks. This is at least partly because it is relatively cheap and can be highly effective.

Phishing attacks are when cyber criminals send emails containing a malicious file attachment or hyperlink directing to a compromised website that delivers ransomware. Attacks against desktop logins include methods where cyber criminals use brute force to leverage weak or default usernames and passwords – or even get access because they got legitimate login credentials via a phishing email.

Software vulnerabilities and web-based application services are also among the popular vectors for delivering ransomware or exposing corporate networks to cyber criminals. While this type of attack is somewhat less frequent than the others, they are often leveraged by some of the most sophisticated and disruptive ransomware groups and nation/state bad actors.

  • Sodinokibi – also known as REvil – is responsible for some of the most high-profile ransomware attacks this year, including the massive ransomware attack on customers of Kaseya.
  • Contij – one of the most high-profile attacks by the group was the attack against the Irish healthcare system. Healthcare services across Ireland remained disrupted for months.
  • Avaddon – ransomware distributed via phishing emails.
  • Mespinoza and Hello Kitty are new forms of ransomware recently identified.

All of these have a common purpose in that they take advantage of weaknesses in security and exploit phishing tactics to lay the foundation for an attack on your network and possibly others.

Keeping systems updated, applying security patches and application software updates is an important aspect to keeping things secure. Known vulnerabilities can be exploited to gain access to the network, so keeping up with updates as the vendor supplies them has become more important than ever.

To help protect networks from being compromised, businesses should also apply multi-factor authentication (MFA) to desktop and applications.

MFA is an important tool to help stop intruders from breaching accounts and gaining access to the corporate network, and it can be the difference between keeping your data safe and working or discovering your files are digitally encrypted and completely unusable. Data encryption changes the data into code, and only the decryption key can read the code and return the data to a useable form. If you don’t have the key, the data typically cannot be decrypted.

Cyberattacks continue to evolve in their sophistication and frequency, and consequences of such attacks are growing. Private companies and public agencies alike must adapt their security techniques and embrace new security technologies while providing more end-user education and training.

Mendelson Consulting and NOOBEH Cloud Services take security very seriously and we have the experience and expertise to assist businesses with transforming their operations to be more efficient and effective. Our cloud team works exclusively with private tenant accounts on Microsoft Azure, and offers MFA security and other solutions to protect local and remote resources, helping keep your valuable information safe and available when you need it.

“How can we get started?” is the question you should be asking.

jm bunny feetMake Sense?
J

Considering Cybersecurity as Cloud Work Expands

When the pandemic forced many business users to move to remote work, it also forced the network security “boundary” to expand greatly and with great speed. Companies quickly adapted their tools and work so that it could be done somewhat effectively even as the employee working environment changed.  But new security models to match with new working models have not as quickly been adopted.

Business cloud workloads grew, by some estimates, as much as 20% just in the first 6 months of 2020. Yet many of those businesses electing to bring cloud working models to their business also made of the mistake of not expanding their security as they expanded the cloud network. This leaves systems and information vulnerable. Phishing, ransomware, credential theft and web app attacks have increased, catching businesses in their vulnerable states.

“In April to June of 2020 alone, security incidents increased by 188%.”

Even more than on-premises systems, it was the external cloud-based data and applications that were under attack because so many companies expanded their use of cloud services without enhanced security as part of the plan. Any expansion to include the cloud as network also significantly increases security risks. One report found that 35% of businesses made their cloud storage openly accessible to the public, allowing anyone to access it via the internet.

Don’t let your critical information be exposed or put at risk. When you begin using a cloud service, make sure to also address security for the new working mode or it could lead to lost or leaked information or a system breach.

Mendelson Consulting and NOOBEH cloud services take security very seriously. We help our clients keep their applications and data working properly and have a focus on methods to keep information safe regardless of what cloud you work on.

jm bunny feetMake Sense?

J

1 ( https://duo.com/blog/growing-security-safely-in-canada )

Office 2013 Loses Support for Commercial Office 365 Services

If you’re not on a subscription for your Office desktop applications, you may lose access to your email box and other services.  Why? Because Microsoft announced that, effective October 13th, 2020, Office 365 services (like OneDrive, Hosted Exchange and more) will only support client connectivity from subscription clients or perpetual clients with mainstream support.

Basically this means that Office 2013 is about to be no fun any more.

You won’t be able to use Office 2013 Outlook to connect to your Microsoft-hosted Exchange mailbox, and your Word and Excel won’t connect to OneDrive.  If you are with a hosting provider who supplies your Office licenses as part of the service, cross your fingers and hope that it isn’t Office 2013. It will be pretty frustrating if your Outlook suddenly has problems accessing your Microsoft-hosted mailbox.

Like many other products, a lot of the functionality in the desktop software has been turned into web service and the Microsoft Office applications are a great example. With cloud connectivity being the focus, desktop solutions are more frequently leveraging online resources to extend and expand their capabilities. This also means they’re more frequently turning from one-time software purchases to subscription service.

After October, Microsoft’s ongoing investments in the Office 365 cloud services – including Exchange Online, SharePoint Online, and OneDrive for Business – will be made based on “post-Office 2013 requirements”.  Now is the time to migrate your Office 2013 to Microsoft 365 Apps (formerly Office 365 ProPlus). We highly recommend this move anyway, so businesses can take advantage of using their Office applications seamlessly on Azure servers as well as their local PC desktops and mobile devices.

Users of Office 2016 and Office 2019 have a little more time before their software no longer supports the cloud services. That end date is currently October 2023. You can find the support lifecycle site for Office mainstream support dates here.

It isn’t that Microsoft plans to actively block older Office clients from connecting to Office 365 services. It’s just that older applications may have performance or reliability issues when they try to connect to the constantly-updated cloud services.  Increased security risks are certain and users may even find that they are no longer compliant with certain requirements. The big thing is that Microsoft support will likely not be able to resolve issues related to unsupported connections.

The days of buying software once and running it forever are just about over.

Developers have recognized that cloud services can expand and enhance their solutions in ways that static local installation can’t. For many businesses, it becomes easier and ultimately more efficient to migrate to subscription service for IT platform and software. Azure cloud servers, for example, allow businesses to always have modern infrastructure that is more fault tolerant and agile than on-premises hardware.

Combing these benefits with software that is cloud-connected and always up to date means the business never faces lost productivity or revenues due to outdated systems or lost compatibility with newer solutions.

Make Sense?

J

Cloud for Small Business: Gain Hardware Independence

Small businesses tend to approach their business IT in terms of the tangibles.. the hardware and software they can see and touch.

The desktop PCs where the programs are installed, the server in the back room where the files are stored, and the backup that goes offsite (tapes? discs? usb drives?) is the stuff most small business owners think of when asked about the computing technology they use. This view isn’t very comprehensive when it comes to considering the costs of purchasing and maintaining IT in the business, yet it identifies a major problem with the typical small business IT approach.

The problem is the dependency on the hardware and the reliance of the small business on the operation of individual computers.

The solution to this reliance on on-premises hardware? The cloud.

The solution to the problem isn’t centered on using web-based applications. The real solution to this small business IT problem is cloud platform, like Microsoft Azure. When businesses deploy a private cloud server they get solution that allows them to run all their desktop and network applications and store their data on a virtual platform that isn’t tied to any particular piece of hardware in the office.

Microsoft Azure offers virtual computing resources, managed and secured on Microsoft’s hardware in Microsoft datacenters. Rather than purchasing and maintaining hardware on-premises, business can deploy virtual networks and servers on the Azure platform. This makes the systems far more versatile and resilient than would be affordable to do otherwise. Surprise server hardware failures become a thing of the past, and buying ahead for possible future needs is no longer required because the systems can be upgraded on demand.

Businesses still need desktops where users access their programs and data, but the “desktop” can be a cloud desktop rather than the local PC desktop.

Remote desktops on the cloud server keeps software licensing and business information securely stored on the cloud server rather than being resident on user computers where it is more easily compromised. Users may still browse the internet and do other things with the local PC desktop, but using the cloud desktop for business applications and data means that just about any PC could safely be used for work.

When applications and data are managed on-premises, it makes changing servers or workstations a big deal. 

Changing desktops or servers means that software must be uninstalled and reinstalled, data must be migrated and user profiles and permissions may need to be recreated. When the cloud server is where users get their desktops, computer workstations become interchangeable because nothing is really installed on them other than the connection to the cloud desktop. This is also why traveling laptops and home computers become more secure for business use, because the applications and data are really running on the cloud server and not on the local device.

The cloud platform provides what the business needs without the lock-in to on-premises hardware or SaaS/Web-based software.

Rebuilding servers due to hardware failures, upgrading systems to handle future growth or replacing aging hardware all contribute to the unpredictable cost of managing and maintaining on-premises computer systems. SaaS and web-based software solutions lock-in data and lock-out many future options, yet they don’t address user desktops and the rest of the applications and data the business needs.

Rather than risking outages and lost productivity, businesses are finding that running their systems on a managed cloud platform provides more stability and consistent performance for a reasonable and more predictable cost. Desktop and server software licensing is able to service multiple locations when installed on a cloud server, and workers at home can access the tools to be just as productive as they are in the office (maybe more).

Make Sense?

J

Windows Server 2012/R2 Not Aging Well, Loses Support for Microsoft 365 Apps

Lots of people loved (and continue to love and use) Windows Server 2012/R2. This Windows Server release introduced several new and improved features that made it a cornerstone of business and service provider networks worldwide. Notable improvements in virtualization with Hyper-V, along with improvements in storage, networking, remote access and server administration features, made 2012/R2 a necessary upgrade from the 2003 and 2008 versions still present in many networks.

Sadly, even though Release 2 (R2) for Server 2012 was largely a new OS due to its features and capabilities, it did not receive a new lifecycle end date and instead inherited the end dates for 2012 version. And an extended lifecycle end-date doesn’t guarantee extended usefulness or compatibility.

Windows Server 2012 began with mainstream support on October 30, 2012 and that mainstream support ended in January 2018, including for R2. Extended support for 2012/R2 goes through January 2023, but that is only if you are paying for Software Assurance for your licenses.

During this period where extended support may still be available for the OS, there is no guarantee that it will remain as a supported platform for your application software. An example of this is the Microsoft Office 365 Apps suite formerly known as ProPlus. The Office 365 apps, which include Outlook, Word, Excel, Powerpoint and more, are staples of business users worldwide. These applications are no longer supported on Windows Server 2012/R2.

Microsoft 365 Apps ended support on Windows Server 2012/R2 on January 14, 2020.

Innovative features and functionality continues to be released for the Microsoft 365 Apps and Microsoft needs to know that the platforms running the applications will work properly with those innovations. As the software is improved and new capabilities introduced, stability and performance issues can plague the install when it is running on older or unsupported operating systems.

Microsoft has pointed out that any Microsoft 365 Apps updated to version 2005 or later will result with functionality and stability problems because there are changes that are specifically not compatible with Windows 8 and Windows Server 2012.

The pace of change is increasing no matter what industry you are in. With technology adoption rates rising faster than ever in all sectors, business owners cannot rely upon outdated systems if their operations are to remain competitive. Application software as well as the operating system platforms it runs on must be regularly updated in order to provide the reliable performance and useful functionality demanded by today’s business users.

jmbunnyfeetMake Sense?

J

The New Not-So Normal

Millions of people are out of work. Restaurants and shops are shuttered… some permanently. Manufacturing production is largely halted, and the US economy comes to a screeching stop. “Essential” services are available and medical and service workers continue to perform their jobs, but things are anything but normal even for those who remain at work.

The global pandemic has impacted nearly every aspect of daily life and it feels like uncertainty is all we can expect for the time being.

Change is a normal part of daily life – adjusting to varying conditions and forces in and out of our control. But the current climate of not knowing is something none of us has ever faced before.

We take certainty for granted. Our society assumes that things will continue to go pretty much the way they have. We’re used to operating within a standard set of boundaries, and we are just beginning to understand what happens when those boundaries which define “business as usual” go away on a global basis.

We understand that things can happen to disrupt daily life, but there is always somebody or something there that remains… something there to prop up the impacted. You think about global relief efforts where people from all over the world gather to help those in need wherever that need occurs. What happens when the need becomes global? That’s where we are now.

Never in my lifetime did I believe we would see the northern and southern borders of the US closed to regular travel. I wouldn’t have believed that we would see all travel to other countries restricted in some manner, not to mention the locking down of cities, districts, counties and townships worldwide. Essential businesses and their employees continue to operate in increasingly difficult conditions, and hoarders are pillaging the available supply of goods, making things unnecessarily difficult on everyone.

It is kind of like a bad horror movie with all the stuff to freak you out…

  • Global pandemic.
  • Researchers working feverishly toward a treatment or cure.
  • Borders closed and travel restricted.
  • Shortages in medical and other supplies.
  • Field hospitals being setup and morgues being overloaded.
  • Gun and ammo sales skyrocket along with unemployment.
  • Limits on goods available due to hoarding.
  • National Guard deployed to cities.
  • Politicians trying to appear sincere while they take advantage of the situation.
  • Fake news and fear mongering.

The real kicker is that we don’t know when it will end. Maybe things will be better tomorrow… or in a few weeks, which is more likely. But still things won’t be as they were before. Not for a long time.

But there are a few things we have learned already. One of them is that we need to better-prepare businesses to operate with some agility… to be able to find ways to continue doing business even when the workforce isn’t able to go to the office. There are always some jobs that must be done on-site, like grocery, restaurant, factory or warehouse work. But there are also typically administrative and support staff that don’t necessarily need to be present in the building in order to be productive.

Supporting the work-from-home or anytime/anywhere access models aren’t just luxury items any longer. It isn’t just a matter of offering options to make the job more attractive. Having a means to continue the operation and allowing workers to do their jobs while away from the office has become a business imperative. Schools are forced into distance learning models, and physicians have instituted virtual doctor visits.

Via remote is the way most things are getting done right now.

And it isn’t really just about having that option to work from anywhere or keeping social distancing in mind. Consider also the resilience of the IT infrastructure. With travel restricted and people operating under stay-at-home orders, getting on-site IT repair or replacement service may not be an option. On-premises systems are completely dependent on the facilities and if something goes wrong there may not be a way to address it.

There are a great many reasons why moving your systems off-premises and into a cloud hosting situation is a good idea. Creating predictability in IT costs is a big one. Increasing the fault-tolerance of the systems is also important, as is improving performance while not over-purchasing for possible future needs.

But right now, today, it is all about having the access your workers need while building a level of agility in the system to meet changing requirements. And I think we can all agree that things are changing, so adapting your business IT strategy to address change is no longer an option. That is one thing that is certain and it is our new normal.

Make Sense?
J