OneNeck https://www.oneneck.com Fri, 19 Jul 2024 16:34:29 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.5 Cybersecurity Wake-Up Call: AT&T Data Breach https://www.oneneck.com/blog/cybersecurity-wake-up-call-att-data-breach/ Fri, 19 Jul 2024 16:34:29 +0000 https://www.oneneck.com/?p=7298 The recent AT&T data breach shows that even big businesses aren’t immune to cyberattacks and highlights the critical need for strong cybersecurity. This incident shows just how risky the digital world can be for businesses and why it’s crucial to always stay vigilant about security. Note: This incident did NOT involve any of OneNeck’s services […]]]>

The recent AT&T data breach shows that even big businesses aren’t immune to cyberattacks and highlights the critical need for strong cybersecurity. This incident shows just how risky the digital world can be for businesses and why it’s crucial to always stay vigilant about security.

Note: This incident did NOT involve any of OneNeck’s services or systems.

The AT&T Data Breach: What Happened?

In March 2024, AT&T revealed customer information had been compromised. AT&T stated that data was “illegally downloaded from our workspace on a third-party cloud platform.” AT&T didn’t name the service, but it’s been linked to recent data thefts on the Snowflake platform.

The breach impacted almost every AT&T wireless customer, as well as MVNO users and even landline customers who interacted with mobile numbers. Data stolen included call and text message logs from May 1, 2022, to October 31, 2022, and a smaller batch from January 2, 2023​. Ultimately, this incident affected nearly 109 million customer accounts.

Thankfully, the contents of calls and texts were not exposed. However, scammers could use the metadata to guess personal details and carry out phishing attacks.

Cybersecurity Recommendations

To protect you and your organization from suffering such a breach, it is crucial to adopt proactive security measures. Here are a few essential recommendations:

  1. Regularly Update and Strengthen Passwords: Make sure your accounts have strong, unique passwords, and update them regularly, especially if you think they might be compromised.
  2. Use Multi-Factor Authentication (MFA): Turn on Multi-Factor Authentication (MFA) for extra security. This extra step makes it much harder for unauthorized access.
  3. Monitor for Suspicious Activity: Review account statements and credit reports regularly for unusual activity. Set up alerts for large transactions or changes to account details.
  4. Educate and Train Employees: Education on security best practices is vital. Conduct regular training sessions to help employees recognize phishing attempts and other common scams.
  5. Encrypt Communication: When discussing sensitive information, use encrypted messaging apps and email services to protect the data from interception.
  6. Regular Security Assessments and Audits: Conduct regular security assessments and audits to identify and resolve system vulnerabilities.

Shared Responsibility for Cybersecurity

Cloud Service Providers (CSPs) are responsible for securing the infrastructure and services they provide, which includes protecting against threats to their data centers, managing physical security, and ensuring robust safeguards against external attacks.

However, businesses must still ensure data protection and access controls. They should vet their CSPs to understand the security measures they use and discover any potential vulnerabilities. Communication and transparency between businesses and their CSPs are key. Both parties must work together to identify and mitigate risks and respond quickly to incidents.

Broader Implications for Businesses

As attacks become more complex, the obligation to protect customer information increases. Companies should invest in robust security technologies and adopt a proactive and holistic approach to cybersecurity. The AT&T attack is a stark reminder that even companies with extensive resources are vulnerable.

This incident shows why having a thorough cybersecurity plan is so important. This plan should include tech solutions, regular employee training, and awareness programs. Cybersecurity is not solely the responsibility of the IT department; it requires a company-wide commitment to best practices and vigilance.

Reach Out and Get in Touch with an Experienced Partner

Keeping yourself updated on the latest threats, using solid security practices, and always thinking ahead are crucial to keeping your data safe.

However, navigating security can be challenging. This is where an experienced partner can make a difference. OneNeck offers comprehensive IT security services, including our robust vCISO services, to help you navigate these challenges. Our team of experts is dedicated to providing your business with the highest level of protection. Contact OneNeck today to see how we can help protect your organization against future threats.

grey line for AT&T cybersecurity blog

]]>
Identity and Going Passwordless https://www.oneneck.com/blog/identity-and-going-passwordless/ Thu, 18 Jul 2024 17:34:28 +0000 https://www.oneneck.com/?p=7295 Monthly Security Workshop: Identity and Going Passwordless This month we explore the latest advancements in securing user identities without relying on traditional passwords. We highlight methods such as biometric authentication, Windows Hello for Business, FIDO2 security keys, and the use of the Microsoft Authenticator app. This presentation also delves into Microsoft Identity Protection’s robust features, […]]]>

Monthly Security Workshop: Identity and Going Passwordless

This month we explore the latest advancements in securing user identities without relying on traditional passwords. We highlight methods such as biometric authentication, Windows Hello for Business, FIDO2 security keys, and the use of the Microsoft Authenticator app. This presentation also delves into Microsoft Identity Protection’s robust features, including risk-based conditional access and real-time threat detection, designed to safeguard user accounts and sensitive data from potential security breaches.

Additionally, we provide an overview of how passkeys in Microsoft Authenticator work, emphasizing their role in streamlining secure access across devices.

 

 

]]>
July Patching Update: Bolstering Security in the Blistering Summer Heat https://www.oneneck.com/blog/july-2024-patching/ Wed, 17 Jul 2024 17:10:49 +0000 https://www.oneneck.com/?p=7288 Welcome to July’s edition of the OneNeck IT Solutions patching blog. As the summer heat intensifies, so do the risks posed by unpatched vulnerabilities. Staying vigilant in our cybersecurity efforts is crucial protection and will help keep your organization from getting burned. This month, we bring you critical updates from Microsoft and significant patches within […]]]>

Welcome to July’s edition of the OneNeck IT Solutions patching blog. As the summer heat intensifies, so do the risks posed by unpatched vulnerabilities. Staying vigilant in our cybersecurity efforts is crucial protection and will help keep your organization from getting burned. This month, we bring you critical updates from Microsoft and significant patches within the Linux environment to ensure your systems remain secure and efficient.

Microsoft’s July Patching Overview

This month, Microsoft has addressed a total of 142 vulnerabilities, categorized as follows:

  • 26 Elevation of Privilege Vulnerabilities
  • 24 Security Feature Bypass Vulnerabilities
  • 59 Remote Code Execution Vulnerabilities
  • 9 Information Disclosure Vulnerabilities
  • 17 Denial of Service Vulnerabilities
  • 7 Spoofing Vulnerabilities

Two actively exploited zero-day vulnerabilities were patched this month for Microsoft products. CVE-2024-38080 is a Windows Hyper-V Elevation of Privilege Vulnerability that could allow attackers to gain elevated access to affected systems. CVE-2024-38112 is a Windows MSHTML Platform Spoofing Vulnerability that could deceive users into interacting with malicious content. These vulnerabilities require immediate attention to prevent potential exploitation and maintain the security of your systems.

Highlighted Patches for July:

  • CVE-2024-38080: Windows Hyper-V Elevation of Privilege Vulnerability
  • CVE-2024-38112: Windows MSHTML Platform Spoofing Vulnerability
  • CVE-2024-35264: .NET and Visual Studio Remote Code Execution Vulnerability
  • CVE-2024-37985: Arm: CVE-2024-37985 Systematic Identification and Characterization of Proprietary Prefetchers

Exchange Updates

Microsoft’s Hotfix for Exchange, released in April, addresses numerous known issues from the March Exchange Security Update. Since OneNeck’s customers have not been affected by these issues, we have postponed applying the Hotfix to their Exchange Servers and will wait for the next Exchange Update.

In the Hotfix, Microsoft introduced support for ECC certificates and Hybrid Modern Authentication for OWA/ECP, which are available exclusively for Exchange Server 2019. These features will be included in the next Security or Cumulative Update for Exchange 2019.

Additionally, Microsoft has acknowledged the need for DKIM and DMARC for Exchange Server On-Prem following Google and Yahoo’s Q1 2024 announcement. However, no updates are currently available to the public. Customers routing their mail through MS365 should be mostly unaffected by the changes from Google and Yahoo.

As mentioned last month, Microsoft has released an Exchange Server Roadmap update, defining their plans for Exchange Server SE (Subscription Edition). This edition is aimed to be released early in the third quarter of 2025, coinciding with the end-of-life date for Exchange Server 2016 and 2019. Exchange Server SE will be the code equivalent to Exchange Server 2019 CU15. OneNeck encourages all its customers using Exchange to upgrade to Exchange Server 2019. If you have any questions about how OneNeck can assist you with your upgrade decisions, please contact the Service Desk.

Linux Patching Insights for July

This month’s Linux updates are crucial for maintaining the security and stability of your environment. Noteworthy patches include:

  • CVE-2024-32462: Security update for flatpak
  • CVE-2024-5688, CVE-2024-5690, CVE-2024-5691, CVE-2024-5693, CVE-2024-5696, CVE-2024-5700, CVE-2024-5702: Security update for firefox
  • CVE-2022-27635, CVE-2022-36351, CVE-2022-38076, CVE-2022-40964, CVE-2022-46329: Security update for linux-firmware
  • CVE-2023-4408, CVE-2023-50387, CVE-2023-50868: Security update for bind, bind-dyndb-ldap, and dhcp
  • CVE-2024-32487: Security update for less
  • CVE-2024-2961, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602: Security update for glibc
  • CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465: Security update for git
  • CVE-2023-6597, CVE-2024-0450: Security update for python3.11
  • CVE-2024-33871: Security update for ghostscript
  • CVE-2023-6597, CVE-2024-0450: Security update for python3.9 available for Red Hat Enterprise Linux 9
  • CVE-2022-23816, CVE-2022-29901: Oracle Linux Unbreakable Enterprise kernel security update

These updates address a wide range of vulnerabilities essential for protecting your Linux servers against potential breaches and ensuring robust system functionality. Please apply any applicable patches immediately.

Microsoft Office & SharePoint Updates

While our scheduled patching activities are comprehensive, they are designed to complement your internal update processes for a wide range of products, including Microsoft Office and SharePoint. We encourage our clients to regularly review and apply updates across all software to ensure the highest level of security. For insights on integrating these updates seamlessly into your security strategy or how OneNeck can support your efforts, do not hesitate to reach out to our Service Desk.

Closing Thoughts

Maintaining a solid cybersecurity posture through regular patching is crucial as we continue through the summer months. Just as sunscreen protects you from the sun’s harmful rays, promptly applying these updates will help safeguard your systems against potential threats. If you need assistance or have questions, OneNeck supports your cybersecurity efforts.

Stay secure and patched, while keeping yourself protected from the heat of summer’s vulnerabilities.

grey line for July patching blog.

Each month, OneNeck engineers review newly released updates from vendors, like Microsoft, to understand any known issues, actions required and understand the priority of each. This is done immediately following Patch Tuesday releases, and we monitor for adjustments to patches throughout each month.

The information above is gathered monthly during this review and posted for awareness to our customers. This information is generally updated only once per month and is based on our engineers’ review of the information provided by the vendor at that time. As always, for the most up-to-date patching information, please see the vendor’s website or contact us.

Note: If OneNeck actively manages a device or software that is impacted by any of these vulnerabilities, when necessary, OneNeck will be in direct contact with you regarding remediation.

 

]]>
Disaster Recovery as a Service vs. Backup as a Service: Understanding the Difference https://www.oneneck.com/blog/disaster-recovery-as-a-service-vs-backup-as-a-service/ Mon, 15 Jul 2024 16:41:41 +0000 https://www.oneneck.com/?p=7284 Two methods to protect your organization’s data and IT infrastructure are Backup as a Service (BaaS) and Disaster Recovery as a Service (DRaaS). While both services provide data backup and recovery, each solution offers functions you may or may not need.  Why You Need Data Backup and Disaster Recovery  Companies today depend on their data […]]]>

Two methods to protect your organization’s data and IT infrastructure are Backup as a Service (BaaS) and Disaster Recovery as a Service (DRaaS). While both services provide data backup and recovery, each solution offers functions you may or may not need. 

Why You Need Data Backup and Disaster Recovery 

Companies today depend on their data to carry out daily operations, decision-making and customer interactions. This data can include sensitive information, financial records, customer data and intellectual property. 

Data loss or downtime can have severe outcomes such as financial loss, reputation harm and legal repercussions. With a reliable backup and disaster recovery strategy in place, you can ensure uninterrupted business operations and minimize the impact of data loss or system failures.

What is Backup as a Service?

Backup as a Service (BaaS) is a managed, cloud-based solution that provides automated and secure backup of your organization’s data. With BaaS, your data is stored in an off-site location such as a secure data center to ensure its safety and accessibility in the event of a disaster or system failure. 

BaaS is simple. Instead of relying on tape drives or physical storage devices, you can automate the backup process and eliminate the need for manual intervention. This keeps your data backed up regularly without any hassle or disruption to your daily operations.

Why Use Backup as a Service Providers?

One main benefit of BaaS is data protection. With BaaS, your data is securely stored off-site, protecting it from physical damage, theft or natural disasters, and ensuring it can be easily restored when needed.

Backup as a Service providers offer cost-efficient subscription-based services. By paying a subscription fee based on your storage requirements, you eliminate the need for expensive hardware like tape drives or additional servers and the associated maintenance and management costs. 

As your organization grows and your data storage needs increase, BaaS allows you to easily scale up your storage capacity without additional hardware or infrastructure upgrades. This flexibility ensures that your backup solution can adapt to your changing business needs.

What is Disaster Recovery as a Service?

While BaaS focuses on data backup, Disaster Recovery as a Service (DRaaS) covers your entire IT infrastructure. DRaaS solutions back up your data and replicate servers and applications to a secure offsite location. They also include failover mechanisms and testing procedures to ensure business continuity. 

In the event of a disaster, you can quickly and seamlessly switch to the replicated environment, minimizing downtime and ensuring your business operations can continue without interruption.

Benefits of DRaaS Providers

In addition to data backup, Disaster Recovery as a Service offers the benefit of near-instant recovery, as your replicated environment is readily available and can be activated with a few simple steps. This minimizes downtime so your business can continue operating without significant disruptions.

With the comprehensive disaster recovery capabilities of DRaaS, your organization can maintain business continuity even in the face of major disruptions. Whether it’s a natural disaster, hardware failure or cyber-attack, DRaaS solutions ensure that your critical systems and data are protected and available when you need them. Additionally, DRaaS providers often offer regular testing and verification of their disaster recovery capabilities to ensure that your disaster recovery plan is effective and that your systems can be recovered successfully. 

Evaluating DRaaS and Backup as a Service Providers

DRaaS and BaaS providers offer many solutions. Before you choose, consider these factors:

  1. Reliability and performance: The provider should have a good track record. Check customer reviews and testimonials to gauge their reputation and ensure their services meet your organization’s needs.
  2. Security and compliance: DRaaS providers must have robust security measures to protect sensitive and confidential information, including encryption, access controls and regulation compliance.
  3. Support and Service Level Agreements (SLAs): Check the provider’s level of support and SLAs, and look for guarantees regarding recovery time objectives (RTOs) and recovery point objectives (RPOs) to ensure they can meet your organization’s recovery needs.

Finding the Right Backup and Disaster Recovery Solution for Your Business

Your business can’t afford to be down, even after a disaster. That’s why data backup and disaster recovery are essential for the continuity and security of your business. Whether you opt for Backup as a Service or Disaster Recovery as a Service, OneNeck’s Reliacloud can provide the protection your organization needs. 

Reliacloud has flexible options to get your organization’s perfect fit, with numerous hyperscale cloud and on-premise backup and disaster recovery options that help protect your organization from downtime and data loss. To learn more, read how OneNeck’s Reliacloud can protect your organization from downtime and data loss.

grey line for disaster recovery as a service vs backup as a service blog.

]]>
Your Guide to DRaaS: What to Know About Disaster Recovery as a Service https://www.oneneck.com/blog/your-guide-to-draas-what-to-know-about-disaster-recovery-as-a-service/ Fri, 05 Jul 2024 14:30:54 +0000 https://www.oneneck.com/?p=7264 Disaster Recovery as a Service (DRaaS) is an important part of modern business continuity planning. When your business relies on its data, you must have a robust disaster recovery strategy for unexpected events. What is Disaster Recovery as a Service? DRaaS is a cloud-based solution that helps your business recover its IT infrastructure and data […]]]>

Disaster Recovery as a Service (DRaaS) is an important part of modern business continuity planning. When your business relies on its data, you must have a robust disaster recovery strategy for unexpected events.

What is Disaster Recovery as a Service?

DRaaS is a cloud-based solution that helps your business recover its IT infrastructure and data after a disaster. Unlike traditional disaster recovery methods such as setting up and maintaining a secondary data center, DRaaS uses the cloud to eliminate the need for another data center and reduce costs while simplifying the recovery process. 

How Does DRaaS Work?

When you put a DRaaS solution in place, your critical systems and data are replicated to a secure cloud environment. This replication can happen in near real-time, ensuring that your data is always up to date. 

When disaster strikes, such as a natural event or cyberattack, your DRaaS solution provides failover, meaning your replicated environment automatically takes over, allowing you to continue operations. Failover is quick and efficient and it minimizes the impact of the disaster on your business. When you restore your primary infrastructure, your data and operations will automatically fail back—switch back from the DR environment—ensuring a smooth transition back to normal operations. 

Why Your Business Needs Disaster Recovery Services

All businesses can benefit from implementing a robust disaster recovery strategy. Some of the key benefits of DRaaS include:

  1. Minimized downtime: DRaaS provides quick failover and failback so your operations can resume promptly after a disaster.
  2. Cost savings: Traditional disaster recovery methods can be expensive due to the additional infrastructure, hardware and maintenance costs. DRaaS saves money by eliminating upfront investments and offering a pay-as-you-go model.
  3. Scalability: As your business grows, so does your data. DRaaS lets you scale your disaster recovery capabilities based on your evolving needs. 
  4. Reliability: DRaaS solutions are built on robust and redundant cloud infrastructures, ensuring high availability and data integrity. 

What to look for in a DRaaS solution

When selecting a DRaaS solution for your business, consider these key factors:

  1. Data security: Look for a DRaaS provider with a secure infrastructure, backed by certifications such as ISO 27001 and SOC 2.
  2. Ease of implementation: The solution should be easy to implement and integrate with your existing systems and come with adequate support from the vendor. 
  3. Recovery Time Objective (RTO) and Recovery Point Objective (RPO): RTO is the maximum acceptable downtime, while RPO signifies the maximum acceptable data loss. Choose a DRaaS solution that aligns with your RTO and RPO requirements.
  4. Testing and monitoring capabilities: The DR solution should provide comprehensive testing and monitoring tools for an effective disaster recovery strategy.
  5. Support and SLAs: Evaluate the DRaaS vendor’s support and their Service Level Agreements (SLAs) which guarantee uptime, response and resolution times.

How to Implement Disaster Recovery Service

Implementing DRaaS requires careful planning and execution. Here are some best practices to consider:

  1. Assess your business requirements: Identify critical systems and data that need protection and conduct a thorough risk assessment to prioritize your disaster recovery efforts.
  2. Define your RTO and RPO: Determine your maximum acceptable downtime and data loss for each critical system.
  3. Regularly test your disaster recovery plan: Ensure that your disaster recovery plan works as expected with regular tests to identify any gaps or areas for improvement.
  4. Train your team: Provide regular training and conduct drills so your IT team is well-versed in the DR solution and understands its roles and responsibilities during a disaster recovery event. 
  5. Monitor and update: Continuously monitor your DR solution, update it as your business evolves and regularly review your disaster recovery plan to incorporate any changes in your IT infrastructure or business processes.

Flexible, Reliable Disaster Recovery Service

When disaster strikes, the last thing you want to worry about is data loss and downtime. OneNeckIT Solution’s ReliaCloud DRaaS offers a comprehensive and reliable solution for your disaster recovery needs. With a robust cloud infrastructure, industry-leading security measures and a wide range of service level options, ReliaCloud DRaaS ensures the highest level of data protection and availability.

OneNeck’s ReliaCloud DRaaS gives you reduced downtime, scalable recovery capabilities and 24/7 support from a team of experts. With OneNeck’s extensive experience and expertise in disaster recovery, you can trust that your business is in safe hands. Learn more by reading about OneNeck’s ReliaCloud DRaaS and how it can help safeguard your data.

grey line for DRaaS / Disaster Recovery blog.

]]>
Incident Response: Its Critical Cybersecurity Role https://www.oneneck.com/blog/incident-response-its-critical-cybersecurity-role/ Tue, 25 Jun 2024 19:01:56 +0000 https://www.oneneck.com/?p=7172 Cyber incidents are no longer a question of if but when. Today’s organizations must be prepared to respond effectively to these incidents to avoid minor disruptions potentially becoming catastrophic breaches. This is where Incident Response (IR) becomes indispensable. Today I will cover the critical aspects of Incident Response, focusing on the concepts of “left of […]]]>

Cyber incidents are no longer a question of if but when. Today’s organizations must be prepared to respond effectively to these incidents to avoid minor disruptions potentially becoming catastrophic breaches. This is where Incident Response (IR) becomes indispensable. Today I will cover the critical aspects of Incident Response, focusing on the concepts of “left of boom” (before an incident) and “right of boom” (after an incident).

Understanding “Left of Boom” and “Right of Boom”

Imagine preparing for Hurricane Ian, which my family and I experienced in 2022. “Left of boom” covers all the proactive steps we took before the hurricane hit, such as practicing the installation of hurricane shutters (making sure all parts and tools were ready), stocking up on essential supplies, and planning evacuation routes. In cybersecurity, “left of boom” is similar: it involves threat hunting, conducting regular security assessments, training employees, and developing and testing Incident Response plans.

Conversely, “right of boom” pertains to the reactive measures taken after the hurricane has passed. This involved assessing home, property, and neighborhood damage, cleaning up debris, and restoring normalcy. The aftermath can be chaotic and challenging, requiring swift and effective action to return to a state of normalcy. In cybersecurity, the “right of boom” includes detecting the breach, containing the threat, eradicating malicious actors, recovering from the incident, and conducting post-incident reviews to improve future responses. Just as in a hurricane, the speed and efficiency of your response can make a significant difference in minimizing damage and disruption. 

The Cost of Cybersecurity Incidents

The financial implications of a cybersecurity incident can be staggering. According to IBM’s 2023 Cost of a Data Breach Report, the average cost of a data breach was $4.45 million. This figure includes direct costs such as legal fees, regulatory fines, and notification expenses, as well as indirect costs like reputational damage and lost business opportunities.

However, the same report highlights a significant silver lining: organizations with a well-developed Incident Response plan saw an average decrease of $2.66 million in financial impacts. This substantial reduction underscores the value of being prepared and having a robust IR plan in place.

The Growing Rate of Cyberattacks

The frequency and sophistication of cyberattacks are increasing at an alarming rate. A recent study by Accenture revealed a 31% increase in cyberattacks between 2020 and 2022. This surge underscores the urgent need for businesses to not only invest in advanced security technologies but also to develop comprehensive Incident Response strategies.

Key Elements of an Effective Incident Response Plan

Developing an effective IR plan involves several critical components:

  • Preparation: Establishing and training an Incident Response team and developing policies and procedures.
  • Identification: Detecting and determining the nature and scope of the incident.
  • Containment: Implementing short-term and long-term containment strategies to limit the damage.
  • Eradication: Removing the incident’s root cause and ensuring the system is free from malicious actors.
  • Recovery: Restoring and validating system functionality ensures systems are back to normal operations.
  • Lessons Learned: Conducting a thorough post-incident review to identify lessons learned and improve future response efforts.

Industry Statistics on Incident Response

According to Help Net Security, astonishingly, 47% of mid-sized businesses do not currently have an incident response plan. This lack of preparedness puts organizations at a severe disadvantage in effectively managing and mitigating security incidents. This is supported in Fortinet’s Global Threat Landscape Report that highlights 68% of organizations with an incident response plan were able to mitigate at least some impacts of cyberattacks within hours, compared to 27% of those without such plans.

Additionally, Microsoft’s Digital Defense Report highlights that organizations with incident response plans experienced 58% fewer successful ransomware attacks compared to those without.

Covering Both Sides of the IR Boom

The importance of a robust Incident Response plan cannot be overstated. By incorporating both “left of boom” and “right of boom” strategies, organizations can significantly mitigate the impact of cyber incidents. The proactive measures taken before an incident and the effective actions implemented afterward are crucial for reducing financial losses and maintaining business continuity. Focusing on both aspects strengthens the overall response. Neglecting one can leave the organization vulnerable and the other less effective.

As cyber threats continue to evolve, staying prepared and resilient is paramount. Investing in Incident Response not only protects your organization but also ensures you are well-equipped to handle the inevitable challenges ahead. By prioritizing Incident Response, businesses can transform potential crises into manageable events, safeguarding their operations, reputation, and bottom line.

At OneNeck, we take a holistic view of cybersecurity, offering numerous services, including comprehensive security assessments and Virtual CISO services. Ensure your organization is prepared and resilient against evolving cyber threats by partnering with us. Our expertise and tailored solutions will help safeguard your operations, reputation, and bottom line.

grey line for incident response and cybersecurity blog.

]]>
Mastering Incident Response https://www.oneneck.com/blog/mastering-incident-response/ Wed, 19 Jun 2024 15:36:45 +0000 https://www.oneneck.com/?p=7111 Monthly Security Workshop: Mastering Incident Response This workshop dives into the critical topic of Incident Response. This session explores the concept of “left of boom” (proactive measures before a security incident) and “right of boom” (reactive measures after an incident has occurred). We discuss the various considerations under the umbrella of Incident Response, from preparation […]]]>

Monthly Security Workshop: Mastering Incident Response

This workshop dives into the critical topic of Incident Response. This session explores the concept of “left of boom” (proactive measures before a security incident) and “right of boom” (reactive measures after an incident has occurred).

We discuss the various considerations under the umbrella of Incident Response, from preparation and detection to containment and recovery. Learn how to effectively manage and mitigate security incidents to protect your business. Discover the comprehensive services OneNeck IT Solutions offers to support you on both sides of the “boom.”

 

]]>
June Patching Update: Securing Systems as Temperatures Rise https://www.oneneck.com/blog/june-2024-patching/ Sun, 16 Jun 2024 19:03:10 +0000 https://www.oneneck.com/?p=7123 Welcome to June’s edition of the OneNeck IT Solutions patching blog. As we approach the Summer Solstice; the longest day of the year, it’s a perfect reminder to shed light on and address vulnerabilities within your systems. Staying proactive in patching and updating is essential as we move into the summer months. This month, we […]]]>

Welcome to June’s edition of the OneNeck IT Solutions patching blog. As we approach the Summer Solstice; the longest day of the year, it’s a perfect reminder to shed light on and address vulnerabilities within your systems. Staying proactive in patching and updating is essential as we move into the summer months. This month, we highlight critical updates from Microsoft and significant patches within the Linux environment to ensure your systems remain secure and efficient.

Microsoft Patching Overview

This month, Microsoft has addressed a total of 51 vulnerabilities, categorized as follows:

  • 25 Elevation of Privilege Vulnerabilities
  • 18 Remote Code Execution Vulnerabilities
  • 3 Information Disclosure Vulnerabilities
  • 5 Denial of Service Vulnerabilities

Notably, one zero-day vulnerability was patched this month for Microsoft products CVE-2023-50868. This vulnerability involves the NSEC3 Closest Encloser Proof and can exhaust CPU resources, potentially leading to a denial of service. When combined, these updates address an array of critical issues, including remote code execution, privilege escalation, and security feature bypasses. Promptly applying these patches is crucial to prevent potential exploits and maintain system integrity.

Highlighted Patching for June

This month’s critical updates include:

Exchange Updates

As mentioned in last month’s blog, Microsoft released a Hotfix for Exchange late in April to cumulatively address the issues resulting from the March Exchange Security Update. OneNeck’s customers have not been affected by these issues; as such, our team has held off on applying the Hotfix and will wait for the next Exchange Update.

In the April Hotfix, Microsoft introduced support for ECC certificates and Hybrid Modern Authentication for OWA/ECP, available exclusively for Exchange Server 2019. The following Security or Cumulative Update for Exchange 2019 will also include these features.

Microsoft has recognized the need for DKIM and DMARC for Exchange Server On-Prem following the Q1 2024 announcement from Google and Yahoo. However, at his point in time there have not been any further updates. Customers routing their mail through MS365 should be mostly unaffected by the changes mentioned above rather than sending mail directly from their On-Prem Exchange Server.

Additionally, Microsoft released an Exchange Server Roadmap update this month, outlining their plans for Exchange Server SE (Subscription Edition). This edition is expected to be released early in the third quarter of 2025, coinciding with the end-of-life date for Exchange Server 2016 and 2019. Exchange Server SE will be the code equivalent to Exchange Server 2019 CU15. OneNeck encourages all customers using Exchange to upgrade to Exchange Server 2019. If you have any questions about how OneNeck can assist you with your upgrade decisions, please contact the Service Desk.

Linux Patching Insights for June

This month’s Linux updates are crucial for maintaining the security and stability of your environment. Noteworthy patches include:

  • CVE-2023-25775: Kernel Security and Bug Fix Update addressing critical kernel vulnerabilities.
  • CVE-2023-20592: Linux-firmware security update to enhance hardware compatibility and security.
  • CVE-2023-45235: Edk2 Security Update to improve firmware security.
  • CVE-2023-50868: Bind and DHCP security update to secure DNS and network configuration.
  • CVE-2024-0450: Python3 Security Update to fix vulnerabilities in the Python programming language.
  • CVE-2024-1394: Grafana Security Update and Oracle Linux grafana security update to enhance performance monitoring security.
  • CVE-2024-23213: Webkit2gtk3 Security Update to secure web content rendering engines.
  • CVE-2024-24549: Tomcat Security and Bug Fix Update to improve web server security.
  • CVE-2024-3019: Oracle Linux pcp security update to enhance performance monitoring security.
  • CVE-2024-31083: Tigervnc / Xorg-X11 Security Update to secure remote desktop and graphical server environments.
  • CVE-2024-32487: Less Security Update to fix vulnerabilities in the less file pager.
  • CVE-2024-33602: Glibc Security Update to address critical issues in the GNU C Library.
  • CVE-2024-4777: Firefox Security Update to ensure secure web browsing.
  • CVE-2023-1989, CVE-2023-40551, CVE-2024-1086: Oracle Linux Unbreakable Enterprise kernel security update to address multiple kernel vulnerabilities.
  • CVE-2024-2201: Oracle Linux shim security update to improve boot loader security.

We recommend that you promptly apply all relevant patches to safeguard Linux servers, provide system functionality and ensure robust security.

Microsoft Office & SharePoint Updates

While our scheduled patching activities are comprehensive, they are designed to complement your internal update processes for a wide range of products, including Microsoft Office and SharePoint. We encourage our clients to regularly review and apply updates across all software to ensure the highest level of security. For insights on integrating these updates seamlessly into your security strategy or how OneNeck can support your efforts, do not hesitate to contact our Service Desk.

Closing Thoughts

Maintaining a solid security posture through regular patching is crucial as we move into the heart of summer. Just as applying sunscreen shields you from the sun’s harmful rays, quickly applying these updates will help safeguard your systems against potential threats. If you need assistance or have questions, OneNeck supports your cybersecurity efforts.

Stay secure and patched, and let’s keep your systems cool and protected this summer.

grey line for June patching blog

Each month, OneNeck engineers review newly released updates from vendors, like Microsoft, to understand any known issues, actions required and understand the priority of each. This is done immediately following Patch Tuesday releases, and we monitor for adjustments to patches throughout each month.

The information above is gathered monthly during this review and posted for awareness to our customers. This information is generally updated only once per month and is based on our engineers’ review of the information provided by the vendor at that time. As always, for the most up-to-date patching information, please see the vendor’s website or contact us.

Note: If OneNeck actively manages a device or software that is impacted by any of these vulnerabilities, when necessary, OneNeck will be in direct contact with you regarding remediation.

 

]]>
FinOps & Azure: Transforming Cloud Cost Management https://www.oneneck.com/blog/finops-and-azure-transforming-cloud-cost-management/ Tue, 28 May 2024 17:35:49 +0000 https://www.oneneck.com/?p=6875 As businesses increasingly migrate to the cloud, effectively managing associated costs is crucial. IT budgets dedicate significant amounts to cloud services, with predictions suggesting this will escalate. This surge in cloud investment makes Financial Operations for cloud environments— FinOps —an essential discipline for managing costs in cloud environments. Importance of FinOps in Cloud Management Moving […]]]>

As businesses increasingly migrate to the cloud, effectively managing associated costs is crucial. IT budgets dedicate significant amounts to cloud services, with predictions suggesting this will escalate. This surge in cloud investment makes Financial Operations for cloud environments— FinOps —an essential discipline for managing costs in cloud environments.

Importance of FinOps in Cloud Management

Moving to the cloud often presents organizations with tremendous opportunities, offering scalability, flexibility, and initial cost savings. However, without a disciplined approach, cloud expenses can quickly become unpredictable and may spiral out of control. This is where FinOps plays a crucial role. By adopting FinOps practices, organizations can ensure cloud costs are transparent and predictable, avoid needless expenses and make smarter cloud investments. They can also maintain agility to adjust resources in real time, match spending with demand and avoid over-provisioning and underutilization.

Key Elements of FinOps in Cloud Management

  • Collaboration Across Teams: Foster cultural change to enhance cost efficiency, requiring real-time collaboration to the second as resources are managed and act as a catalyst for continuous improvement and quick decision-making.
  • Decisions Driven by Business Value: Focus on unit economics and value-based metrics rather than aggregate spending, encouraging strategic trade-offs between cost, quality, and speed to drive innovation and enhance market responsiveness.
  • Cultural Shift Towards Accountability: Empowers individual teams to manage their cloud usage and budgets, promoting cost as a critical factor alongside uptime and performance. Ensures decisions are supported by real-time financial data, clean data practices, and benchmarking against industry standards.
  • Centralized Management: Advocates for centralized management and executive sponsorship to streamline FinOps practices, utilizing automation to reduce duplication and efficiently manage resources and discounts.
  • Maximizing the Variable Cost Model: Treats the cloud’s variable cost model as an opportunity for optimization. It advocates for just-in-time resource management to avoid over-provisioning and underutilization and recommends continuous adjustments to cloud usage for optimal efficiency.

Optimizing Azure Resource Management within FinOps Framework

Through its robust toolkit designed to operate within the FinOps framework, Microsoft Azure helps businesses manage and properly align cloud resources. The key is to discover these tools, many of which you likely already have access to, and then understand how to utilize their insights and recommendations.

Right-Sizing Azure Resources

Right-sizing is crucial for aligning resource consumption with actual demand. Azure’s capabilities allow for dynamic resource adjustment—scaling up during peak usage times and scaling down in quieter periods. This flexibility is critical to maintaining performance without overspending. Azure Advisor analyzes resource usage and configurations to offer tailored recommendations, helping to identify underutilized resources.

Enhancing Cloud Management with Strategic Tools

Beyond right-sizing, Azure provides tools that support broader cost optimization and cloud management. Azure Cost Management delivers analytics and insights that enable businesses to monitor and control spending. This tool is instrumental in implementing financial accountability through showback and chargeback, which attribute cloud costs to specific departments or projects, promoting responsible usage and precise budgeting.

Automation and Multi-Cloud Flexibility

Azure supports extensive automation capabilities that reduce manual overhead and minimize costs. Automation is critical in implementing routine tasks like performance tuning and cost adjustments, preventing resource wastage and improving operational efficiency. Additionally, Azure’s multi-cloud strategy offers flexibility and risk mitigation by not depending solely on a single cloud provider. 

Monitoring and Strategic Decision-Making

Effective cloud management requires monitoring cost anomalies and informed decisions about region selection and service deployment. Azure’s ample monitoring tools help identify unexpected charges, and its analytics capabilities support strategic decision-making.

What You Should Focus On Now

Azure environments typically change often. Keep your eye on the costs.

  1. Start with Cost Avoidance—downsize first. If you can turn it off while maintaining patching and backups, do so for stretches of time.
  2. Develop a cost optimization process using Azure Advisor.
  3. Keep track of your decisions on Azure Advisor recommendations
  4. Review your optimizations to make sure they are doing what you thought they would
  5. Keep your cost optimizations in mind when making changes.

Enhancing Your Cloud Investment with the Right-Sized Partner

Azure offers the potential to maximize the value of cloud investments. However, without adhering to the principles and discipline required by the FinOps framework, organizations can find themselves spending unnecessarily and without purpose.

 

OneNeck is an experienced Microsoft Solutions Partner with the technical expertise to maximize your Azure investment. We offer a wide range of Azure Support Services that can help you navigate the complexities of your cloud environment and manage and optimize costs.

 

Ready to optimize your Azure investment? Contact us today to learn how we can help transform your cloud strategy.

grey line for FinOps and Azure blog.

]]>
Cloud Security in Microsoft Azure https://www.oneneck.com/blog/cloud-security-in-azure/ Tue, 21 May 2024 10:00:32 +0000 https://www.oneneck.com/?p=6897 Monthly Security Workshop: Cloud Security in Microsoft Azure This workshop delves into the shared responsibilities of Customers, Partners, and Service Providers in cloud security, emphasizing the critical three-way relationship and its impact on security posture. We explore essential security requirements and regulatory challenges, alongside demonstrating the ‘what, why, and how’ of key security tools and […]]]>

Monthly Security Workshop: Cloud Security in Microsoft Azure

This workshop delves into the shared responsibilities of Customers, Partners, and Service Providers in cloud security, emphasizing the critical three-way relationship and its impact on security posture. We explore essential security requirements and regulatory challenges, alongside demonstrating the ‘what, why, and how’ of key security tools and best practices through engaging case studies. Designed for IT leaders, security professionals, and business executives, this workshop aims to equip viewers with a comprehensive understanding of their roles in securing cloud environments, ensuring they are well-prepared to mitigate risks and implement effective security measures.

 

]]>
May Patching Update: Spring Cleaning Your Security https://www.oneneck.com/blog/may-2024-patching/ Sat, 18 May 2024 20:49:38 +0000 https://www.oneneck.com/?p=6867 Welcome to May’s edition of the OneNeck patching blog. As we transition deeper into spring, it’s crucial to stay vigilant in our cybersecurity efforts to ensure that exposures don’t replace May flowers. While Microsoft addressed fewer vulnerabilities than last month, they still tackled a significant array of issues. Additionally, our team observed numerous important updates […]]]>

Welcome to May’s edition of the OneNeck patching blog. As we transition deeper into spring, it’s crucial to stay vigilant in our cybersecurity efforts to ensure that exposures don’t replace May flowers. While Microsoft addressed fewer vulnerabilities than last month, they still tackled a significant array of issues. Additionally, our team observed numerous important updates within the Linux environment. 

Microsoft’s May Patching Security Overview

This month, Microsoft has addressed a total of 61 vulnerabilities, broken down into the following categories:

  • 17 Elevation of Privilege Vulnerabilities
  • 2 Security Feature Bypass Vulnerabilities
  • 27 Remote Code Execution Vulnerabilities
  • 7 Information Disclosure Vulnerabilities
  • 3 Denial of Service Vulnerabilities
  • 4 Spoofing Vulnerabilities

This month’s patch release tackles multiple crucial vulnerabilities. Two zero-day vulnerabilities are notably patched, as well as a publicly disclosed vulnerability affecting .NET 7 & 8 alongside Visual Studio. The prompt resolution of these issues is critical in preserving the security integrity of systems, as they could allow attackers to exploit privileges or bypass security measures, leading to unauthorized access or data exposure.

Highlighted May Patching

This month’s critical updates include:

  • CVE-2024-30040: Windows MSHTML Platform Security Feature Bypass Vulnerability
  • CVE-2024-30051: Windows DWM Core Library Elevation of Privilege Vulnerability
  • CVE-2024-30046: Visual Studio Denial of Service Vulnerability

Resolution of Known Issues from April 2024 Updates

Microsoft has resolved issues from last month’s updates, which predominantly affected VPN functionalities and NTLM authentication on Windows Servers. For more detailed insights, you can review the updates on the following blogs:

Exchange Updates

Microsoft released a Hotfix for Exchange late last month to address the numerous known issues from the March Exchange Security Update. Fortunately, OneNeck’s customers were unaffected by these issues, so we will hold off on applying the Hotfix to customer Exchange Servers and wait for a future Security Update.

In the April Hotfix, Microsoft introduced support for ECC certificates and Hybrid Modern Authentication for OWA/ECP, available exclusively for Exchange Server 2019. The next Security or Cumulative Update for Exchange 2019 will also include these features.

Microsoft has recognized the need for DKIM and DMARC for Exchange Server On-Prem following the Q1 2024 announcement from Google and Yahoo. However, they do not have any updates to announce at this time. Customers routing their mail through MS365, rather than sending mail directly from their On-Prem Exchange Server, should be mostly unaffected by the changes from Google and Yahoo.

Additionally, Microsoft released an Exchange Server Roadmap Update this month, outlining their plans for Exchange Server SE (Subscription Edition). This edition will likely be released early in the third quarter of 2025, coinciding with the end-of-life date for Exchange Server 2016 and 2019. Exchange Server SE will be the code equivalent to Exchange Server 2019 CU15. OneNeck encourages all customers using Exchange to upgrade to Exchange Server 2019. If you have any questions about how OneNeck can assist you with your upgrade decisions, please contact the Service Desk.

Linux Patching Insights

This month’s Linux updates address various vulnerabilities crucial for maintaining the security and stability of your environments. Notable patches include:

  • CVE-2023-50269: Security updates for Squid to bolster network management security.
  • CVE-2023-50868: Updates for Bind and DHCP enhancing DNS and network configuration security across Red Hat and Oracle Linux.
  • CVE-2024-1488: Security updates for Unbound on Oracle Linux to ensure robust DNS security.
  • CVE-2024-31083: Tigervnc and X.org server security updates for Oracle Linux, essential for secure remote desktop and graphical server environments.
  • CVE-2023-40551: Shim security updates enhancing boot loader integrity.
  • CVE-2023-52425, CVE-2024-1394: Security and bug fix updates for Grafana and Grafana-PCP on Oracle Linux, crucial for maintaining performance monitoring tools.
  • CVE-2024-21094: Java-11-Openjdk security update to maintain Java application security.
  • CVE-2024-23213: Webkit2gtk3 security updates to enhance web content rendering security.
  • CVE-2024-3019: Pcp security, bug fixes, and enhancement updates.
  • CVE-2024-3864: Firefox security updates across multiple distributions, vital for secure web browsing.

The quick application of these patches is crucial in mitigating risks and maintaining a secure environment.

Microsoft Office & SharePoint Updates

While our scheduled patching activities are comprehensive, they are designed to complement your internal update processes for a wide range of products, including Microsoft Office and SharePoint. We encourage our clients to regularly review and apply updates across all software to ensure the highest level of security. For insights on integrating these updates seamlessly into your security strategy or how OneNeck can support your efforts, do not hesitate to contact our Service Desk.

Closing Thoughts

As we move deeper into spring, it’s an ideal time to refresh and reinforce your cybersecurity measures by staying current with essential patching practices. As nature renews, let’s ensure our systems are fortified and secure. Timely and informed patch management is crucial in defending against vulnerabilities. If you have questions or need assistance, OneNeck is here to support your cybersecurity efforts.

Stay secure and patched, and let’s spring into action together.

grey line for monthly patching blog

Each month, OneNeck engineers review newly released updates from vendors, like Microsoft, to understand any known issues, actions required and understand the priority of each. This is done immediately following Patch Tuesday releases, and we monitor for adjustments to patches throughout each month.

The information above is gathered monthly during this review and posted for awareness to our customers. This information is generally updated only once per month and is based on our engineers’ review of the information provided by the vendor at that time. As always, for the most up-to-date patching information, please see the vendor’s website or contact us.

Note: If OneNeck actively manages a device or software that is impacted by any of these vulnerabilities, when necessary, OneNeck will be in direct contact with you regarding remediation.

 

]]>
Azure Storage: Finding Your Data Management Fit https://www.oneneck.com/blog/azure-storage-finding-your-data-management-fit/ Mon, 13 May 2024 19:56:18 +0000 https://www.oneneck.com/?p=6852 Having a robust storage solution can make or break your data management strategy. A versatile cloud storage service like Azure Storage is designed to handle everything from vast amounts of unstructured data to high-demand enterprise applications. Whether you’re dealing with blobs, files or even Kubernetes containers, read on to understand how Azure can streamline and […]]]>

Having a robust storage solution can make or break your data management strategy. A versatile cloud storage service like Azure Storage is designed to handle everything from vast amounts of unstructured data to high-demand enterprise applications. Whether you’re dealing with blobs, files or even Kubernetes containers, read on to understand how Azure can streamline and secure your data management practices effortlessly.

What is Azure Storage?

Azure Storage, developed by Microsoft, is a comprehensive cloud storage solution tailored for modern data management. It supports a wide range of data types and is designed to provide high availability, massive scalability and robust security. 

Services Overview 

Azure Storage and its various components are designed to meet a varying range of data storage requirements for businesses, large and small. Here’s a quick overview of each data service. 

Azure Blobs: Think of Azure Blob storage as your go-to for handling massive amounts of unstructured data. This is perfect for serving images or documents directly to a browser, storing files for distributed access or streaming video and audio.

Azure Files: When you need managed file shares that cloud applications can access using standard SMB (Server Message Block) protocol, Azure Files is your answer. You can mount file shares concurrently from cloud or on-premises deployments of Windows, Linux and macOS.

Azure Elastic SAN: This service supports enterprise-grade, high-performance block storage. Azure Elastic SAN mimics the capabilities of on-premises Storage Area Networks (SANs), providing you with scalability, flexibility and high throughput for your critical workloads.

Azure Queues: Queues is useful for storing large numbers of messages that can be accessed from anywhere in the world via authenticated calls using HTTP or HTTPS. This is particularly helpful if you’re building robust applications that must scale to process messages asynchronously.

Azure Tables: This NoSQL store is perfect for storing structured non-relational data. Use it when you need to store TBs (terabytes) of structured data capable of serving web scale applications.

Azure Managed Disks: These are block-level storage volumes managed by Azure and used with Azure Virtual Machines. Managed Disks are available in a range of sizes and performance levels, including ultra-high performance.

Azure Container Storage: If you’re working with containers like Kubernetes or developing microservices, Azure offers integrated container storage solutions. These ensure high performance and seamless scalability for containerized applications.

About Azure Storage Explorer

If you are using several Azure Storage services, you might need some support managing them. Azure Storage Explorer was built just for this. It equips you with the tools to upload, download and manage blobs, files, queues, tables and Data Lake Storage entities efficiently.

It also supports connections across multiple subscriptions and is compatible with all Azure regions, Azure Stack and Azure Government. Additionally, Azure Storage Explorer provides a user-friendly graphical user interface (GUI) that makes it accessible, even for those new to cloud storage management, supporting a wide range of operating systems.

Key Features and Benefits of Azure Storage

Azure Storage is engineered to provide a robust set of features that cater to diverse data storage requirements. It can:

  • scale on demand
  • adjust based on your storage capacity needs
  • protect your data against loss with data redundancy
  • secure your data with advanced encryption

These features and more make Azure Storage a preferred choice for enterprises looking for a reliable and scalable cloud storage solution.

Best Practices for Implementation

Implementing Azure Storage effectively involves adhering to several best practices that ensure both security and efficiency. Here are some important guidelines:

  • Maintain distinct storage accounts for development and production to safeguard data integrity and optimize performance. This separation prevents accidental data manipulation and helps you manage resources more effectively.
  • Enable Microsoft Defender for comprehensive threat detection.
  • Use Azure Resource Manager to deploy and manage your storage resources securely.
  • Implement soft delete for blobs and containers to protect against accidental deletions.
  • Ensure all data transfers are conducted over HTTPS and restrict shared access signature tokens to HTTPS connections only.
  • Take advantage of Microsoft Entra ID for robust access management.
  • Apply the principle of least privilege through Azure Role-Based Access Control (RBAC) to minimize unnecessary access rights.
  • Secure your account access keys using Azure Key Vault and regularly regenerate these keys to mitigate the risks of unauthorized access.

Manage Azure Storage with OneNeck

OneNeck can help manage your Azure storage environment, no matter what tier or configuration you have in place today. Our team will provide management and oversight of your environment, 24/7, from initial design and deployment to operations support, along with recommendations for potential optimization within your environment. Contact us to have a chat with our team.

grey line for Azure Storage blog.

]]>
Endpoint Protection: Why It’s Essential for Modern Cybersecurity https://www.oneneck.com/blog/endpoint-protection-why-its-essential-for-modern-cybersecurity/ Tue, 30 Apr 2024 14:36:56 +0000 https://www.oneneck.com/?p=6792 It’s no secret that cyber threats are evolving and increasing in frequency and sophistication, making securing the endpoints of your infrastructure an imperative. The rise in volume and diversification of connected devices has considerably increased the vulnerability of IT environments and critical data, such as customer and financial information. Due to these heightened risks, adopting […]]]>

It’s no secret that cyber threats are evolving and increasing in frequency and sophistication, making securing the endpoints of your infrastructure an imperative. The rise in volume and diversification of connected devices has considerably increased the vulnerability of IT environments and critical data, such as customer and financial information. Due to these heightened risks, adopting robust endpoint protection is no longer nice to have but rather an essential part of one’s security posture.

Why Endpoint Protection Matters

Endpoint protection is much more than traditional antivirus software; it’s the frontline defense of your network against cyber threats. As threats grow in complexity and craftiness, conventional security measures have proven outdated and oftentimes ineffective.

Endpoints, including computers, laptops, mobile devices, and other network-connected hardware, are frequently a network’s most vulnerable entry points. As such, they are prime targets for attackers seeking the easiest route into a digital environment.

Modern endpoint protection strategies involve significantly more than simply reacting to attacks, such as malware. They include security measures that comprise advanced algorithms and threat intelligence. This more sophisticated level of defense allows for detecting, preventing, and responding to threats in real time.

Endpoint Protection as Part of a Comprehensive Security Strategy

As remote and hybrid workforces gradually become the norm, the increasing array of connected devices is quickly expanding businesses’ attack surface. Even a single endpoint breach can have devastating effects, leading to financial losses and damage to organizational reputation. Reinforcing endpoints is essential to business continuity and resilience, ensuring operations proceed without disruption, even in the event of an attack.

Sufficient protection encompasses prevention, detection, swift response, and robust recovery. This comprehensive strategy ensures security incidents are managed effectively and that the impact of breaches is minimized, thus sustaining business operations and preserving the trust of stakeholders.

Furthermore, regulatory compliance mandates strict data protection standards in many sectors. Endpoint protection helps organizations meet these requirements, safeguarding sensitive data as it travels across devices. Businesses can avoid legal and financial repercussions associated with non-compliance by ensuring secure access and robust data protection measures.

Key Aspects of Endpoint Security

Effective endpoint protection involves a multifaceted approach—which extends beyond mere defense to encompass proactive management and compliance adherence— to guard against incoming threats and mitigate potential vulnerabilities. Organizations should prioritize the following vital aspects of endpoint protection:

Comprehensive Security Posture

  • Holistic Integration: Endpoint protection should seamlessly integrate into your overall security strategy. This integration enhances defenses against various threats, including malware, ransomware, and other malicious activities. A well-rounded security posture detects threats and actively prevents them.
  • Continuous Security Updates: Keeping protection systems up-to-date is vital. Regular updates ensure security measures are equipped to handle the latest threats, thus maintaining the integrity and security of organizational data.

Advanced Threat Detection

  • Leveraging AI and ML: Modern solutions utilize artificial intelligence (AI) and machine learning (ML) to anticipate, identify, and neutralize threats in real time. This technology adapts to emerging threats, ensuring robust defense capabilities.
  • Behavioral Analysis: Behavioral analysis features monitor device behavior for unusual activity, which could indicate a breach. This capability allows for quicker isolation and mitigation of potential threats, reducing potential impacts.

Policy Management and Compliance

  • Robust Policy Development: Developing and rigorously enforcing comprehensive security policies are fundamental for the integrity of your infrastructure. These policies set the standard for security behavior and incident response.
  • Regulatory Compliance: Utilizing tools such as Security Information and Event Management (SIEM) systems not only aids in achieving compliance with various regulatory standards but also in protecting sensitive information. This accountability is essential for maintaining organizational credibility and trust.

Enhancing Endpoint Protection is Just the Start with the Right Security Partner

Endpoint security is a cornerstone of robust cybersecurity. It plays a crucial role in a resilient and proactive security posture, helping organizations defend against current threats and prepare for future challenges. Working with a knowledgeable partner enables organizations to stay ahead of vulnerabilities and effectively protect their data.

Ready to enhance your security strategy? OneNeck’s experienced security team will deliver the tools and expertise to safeguard your data.

Contact us today to find out how we can help you fortify your endpoints.

grey line for endpoint protection blog.

 

]]>
Teams or No Teams: The New Microsoft 365 Licensing Question https://www.oneneck.com/blog/teams-or-no-teams-the-new-microsoft-365-licensing-question/ Mon, 22 Apr 2024 18:27:21 +0000 https://www.oneneck.com/?p=6763 To align its subscriptions worldwide, Microsoft announced it is set to revise its licensing structure for Microsoft 365 and Office 365, including changes to how Microsoft Teams licensing is bundled into these services. Initially implemented in the European Economic Area (EEA) and Switzerland, these changes are now being extended globally. What’s Changing with Microsoft Licensing […]]]>

To align its subscriptions worldwide, Microsoft announced it is set to revise its licensing structure for Microsoft 365 and Office 365, including changes to how Microsoft Teams licensing is bundled into these services. Initially implemented in the European Economic Area (EEA) and Switzerland, these changes are now being extended globally.

What’s Changing with Microsoft Licensing and Teams?

As of April 1, 2024, Microsoft has significantly adjusted the offering of Teams with Microsoft 365 (M365) and Office 365 (O365) subscriptions. Microsoft Teams will now be separated from the standard M365 and O365 licensing packages. For Enterprise-level offerings, Microsoft Teams will only be available as a separate purchase for new customers. This change was the company’s response to the regulatory ruling in European courts, which aimed to enhance competition and reduce package bundling that limited customer choice.

Changes to Microsoft Teams Licensing and What They Mean

Here’s what these changes entail:

  1. New Licensing Structure:
    • Microsoft will offer new versions of M365 and O365 that do not include Microsoft Teams. These offerings will be identified by a “(No Teams)” label appended to the suite names. This change aims to allow businesses to tailor their software packages more precisely, choosing only the necessary components.
  2. Standalone Microsoft Teams SKU:
    • Alongside the updated suites, Microsoft is rolling out a standalone Microsoft Teams option for enterprise customers. This move allows businesses to incorporate Teams into their operations as a separate purchase.
  3. Phasing Out Current Teams-Inclusive Enterprise SKUs:
    • Microsoft will discontinue the sale of new subscriptions to existing enterprise SKUs that include Teams, such as Microsoft 365 E3/E5 and Office 365 E1/E3/E5. New customers will need to navigate the new suite options that exclude Teams.

Microsoft No Teams Licensing Options

Source: Microsoft 

What This Means for Microsoft Customers Who Use Enterprise Subscriptions

The upcoming licensing changes by Microsoft will have specific implications for enterprise customers, affecting both existing and new customers differently. Here’s how these changes impact users:

  • Existing Customers: If you currently use an M365 or O365 plan that includes Teams, you can continue with your existing subscription, including any renewals and upgrades. This provision ensures that licensing changes do not interrupt your organization’s day-to-day operations. Additionally, this continuity allows your team to maintain access to all current features and future updates without reassessing your software licensing needs.
  • New Customers: From April 2024 onward, new customers must abide by the updated licensing structure. This change will require selecting from the new suites that do not include Microsoft Teams as a default component. Depending on business requirements, new customers must add Teams as a separate purchase to ensure their organization can access Microsoft’s comprehensive communication and collaboration tools.

Understanding “No Teams” Implications for SMB Customers

For small and medium business (SMB) customers, the upcoming changes to Microsoft 365 licensing present new choices that align with different business necessities regarding Microsoft Teams.

 Options Available to SMB Users

Unlike their Enterprise counterparts, SMBs will have the flexibility to select from the existing M365 suites that include Teams or opt for new versions of these suites that do not include Teams. This change allows SMBs to tailor their software solutions more closely to their specific operational requirements.

  1. Existing SMB Suites with Teams:
    • Microsoft 365 Business Basic/Standard/Premium: These current offerings include Microsoft Teams, among other features. They are designed to meet the diverse needs of SMBs, from basic office applications and cloud storage to advanced security and device management.
  2. New SMB Suites Without Teams:
    • In response to the broader licensing changes, Microsoft will also offer new versions of the Business Basic, Business Standard, and Business Premium suites without Microsoft Teams. These “No Teams” versions will cater to businesses that may prefer alternative communication tools or do not require the integrated collaboration features that Teams provides.

As Microsoft introduces these changes, staying informed and prepared will enable SMBs to make decisions that align with their goals and ensure continuity in their business practices.

Frontline Worker Subscriptions

Frontline Worker subscriptions Microsoft 365 F1 and Microsoft 365 F3 with teams will continue to be offered side by side with “No Teams” versions to give customers the flexibility to choose.

Moving Forward with a Trusted Partner

Microsoft’s changes to the licensing of M365 and O365, particularly the separation of Teams from many of its suite offerings, mark a significant shift in how businesses will access and deploy these tools.

As these adjustments unfold, organizations must understand how they will impact current and future software usage and deployments. The evolving landscape will influence decisions and strategies, regardless of whether one is an existing Microsoft/Office 365 user or considering new subscriptions.

As an experienced Microsoft Solutions Partner, OneNeck is ideally placed to guide and support your company through these changes. Our experts are ready to help you understand what these licensing updates mean for your business and to find the best options to meet organizational needs.

If you have any questions or need advice on navigating the new Microsoft licensing environment, Contact OneNeck today to set up a consultation.

grey line for Microsoft 365 and Teams licensing changes blog.

]]>
April Patching Update: Busy Season for Vulnerabilities https://www.oneneck.com/blog/april-2024-patching/ Tue, 16 Apr 2024 20:24:44 +0000 https://www.oneneck.com/?p=6755 Welcome to April’s edition of the OneNeck IT Solutions patching blog. With spring well underway, unfortunately, the trees and flowers are not the only things blossoming. Our team found itself navigating a busy month in cybersecurity, focusing on an extensive number of patches from Microsoft, including critical updates for two zero-day vulnerabilities and significant updates […]]]>

Welcome to April’s edition of the OneNeck IT Solutions patching blog. With spring well underway, unfortunately, the trees and flowers are not the only things blossoming. Our team found itself navigating a busy month in cybersecurity, focusing on an extensive number of patches from Microsoft, including critical updates for two zero-day vulnerabilities and significant updates across various Linux distributions.

Microsoft’s April Patching Overview

Microsoft has addressed a staggering 150 vulnerabilities this month, categorized as follows:

  • 31 Elevation of Privilege Vulnerabilities
  • 29 Security Feature Bypass Vulnerabilities
  • 67 Remote Code Execution Vulnerabilities
  • 13 Information Disclosure Vulnerabilities
  • 7 Denial of Service Vulnerabilities
  • 3 Spoofing Vulnerabilities

This broad range underscores the vital importance of comprehensive patch management. Notably, two zero-day vulnerabilities were addressed:

The Proxy Driver Spoofing Vulnerability could lead to significant data breaches by capturing sensitive information or injecting malicious data into sessions. At the same time, the SmartScreen Bypass could reduce the efficacy of one of Windows’ primary defenses against downloaded internet malware. Promptly addressing these vulnerabilities helps maintain the effectiveness of security barriers and prevents attackers from exploiting these sophisticated techniques.

Highlighted Patches

Critical vulnerabilities that require immediate attention include:

  • CVE-2024-20678: Remote Procedure Call Runtime Remote Code Execution Vulnerability
  • CVE-2024-20670: Outlook for Windows Spoofing Vulnerability
  • CVE-2024-26221: Windows DNS Server Remote Code Execution Vulnerability

These vulnerabilities present a diverse range of threats—from remote code execution to spoofing—that could compromise the integrity and confidentiality of affected systems. The potential impact of these issues includes unauthorized data access, system control, and bypassing security mechanisms. Organizations must prioritize these updates to mitigate these risks effectively. Timely patch application protects individual systems and fortifies the overall network security, preventing potential cascading effects of breaches stemming from these vulnerabilities.

Linux Patching Insights 

This month’s Linux updates are crucial for maintaining the security and stability of your environment. Notable patches include:

  • CVE-2024-2616: Critical security updates for Firefox, enhancing web security across multiple Oracle and Red Hat distributions.
  • CVE-2024-26602: Important Kernel security and bug fix updates for Oracle and Red Hat Linux.
  • CVE-2023-50868: Important updates for Dnsmasq, bolstering network management security.
  • CVE-2024-21626: Docker security update crucial for container management.
  • CVE-2023-45234: Security update for Edk2, enhancing system firmware security.
  • CVE-2024-0646 and CVE-2023-46589: Kernel and Tomcat security updates are vital for system and web application security.
  • CVE-2024-0775 and CVE-2023-45871: Updates for Oracle Linux’s Unbreakable Enterprise kernel, addressing critical vulnerabilities.

The range of patches this month underscores the importance of comprehensive security measures across various components of Linux systems. From web browsing and container management to core kernel operations and network services, each update plays a pivotal role in closing security gaps and enhancing the resilience of IT infrastructures. By proactively applying these updates, organizations can significantly reduce their exposure to cyber threats and ensure the continuity of their operational capabilities. These efforts are crucial to upholding stringent security standards and safeguarding sensitive data and system processes against emerging vulnerabilities.

Exchange Server

As a reminder, Microsoft will no longer be releasing Cumulative Updates for Exchange Server 2016. As a result, our team strongly recommends that all customers upgrade to Exchange Server 2019. If you have questions about how OneNeck can assist you with your upgrade decisions, do not hesitate to contact the Service Desk (800-272-3077).

Microsoft Office & SharePoint Updates

While our scheduled patching activities are comprehensive, they are designed to complement your internal update processes for a wide range of products, including Microsoft Office and SharePoint. We encourage our clients to regularly review and apply updates across all software to ensure the highest level of security. For insights on integrating these updates seamlessly into your security strategy or how OneNeck can support your efforts, do not hesitate to contact our Service Desk.

Closing Thoughts

April’s extensive patch release reminds us of the dynamic nature of cybersecurity threats and the ongoing need for vigilance. Renew your commitment to cybersecurity this spring by staying updated and proactive. For any support or questions, OneNeck is here to assist you.

Stay secure and patched, and let’s spring into action to keep our networks as vibrant and resilient as the season.

grey line for April 2024 Patching blog.

Each month, OneNeck engineers review newly released updates from vendors, like Microsoft, to understand any known issues, actions required and understand the priority of each. This is done immediately following Patch Tuesday releases, and we monitor for adjustments to patches throughout each month.

The information above is gathered monthly during this review and posted for awareness to our customers. This information is generally updated only once per month and is based on our engineers’ review of the information provided by the vendor at that time. As always, for the most up-to-date patching information, please see the vendor’s website or contact us.

Note: If OneNeck actively manages a device or software that is impacted by any of these vulnerabilities, when necessary, OneNeck will be in direct contact with you regarding remediation.

]]>
Azure Data Modernization: Building the Business of the Future https://www.oneneck.com/blog/azure-data-modernization-building-the-business-of-the-future/ Tue, 09 Apr 2024 17:54:49 +0000 https://www.oneneck.com/?p=6743 Data modernization has become a buzzword for moving to the cloud and adopting digital tools. But modernization is not just about staying current; it’s about uncovering data-driven insights that improve decision-making and elevate your business. Microsoft Azure facilitates these goals with platforms for machine learning, advanced analytics, containerization, data lakes, automation and more. These tools […]]]>

Data modernization has become a buzzword for moving to the cloud and adopting digital tools. But modernization is not just about staying current; it’s about uncovering data-driven insights that improve decision-making and elevate your business.

Microsoft Azure facilitates these goals with platforms for machine learning, advanced analytics, containerization, data lakes, automation and more. These tools are essential for the kind of business growth and efficiency that can redefine the potential of your business.

The Impact of Data Modernization on Business Growth

We all know what we want our business to do in the next decade: grow, grow, and grow some more. To do this, you must start taking small steps toward large-scale modernization that will impact:

  • Decision-Making: Building a single source of truth ensures your data is accurate and reliable so you can make informed decisions faster.
  • Customer Experience: Advanced analytics provide deeper insights into customer behavior, market trends and operational efficiencies.
  • Innovation: A modern data infrastructure sets a strong foundation for developing new products or services or improving existing ones.
  • Risk Management: Enhanced data security and governance ensures your business complies with the latest regulations and mitigates risks associated with data breaches or loss.

Building the Business of the Future with Azure

Your future business will be defined by today’s use of cutting-edge technologies. By adopting Azure Cloud, your organization positions itself to be reliable, secure and at the forefront of innovation.

Successful Data Modernization with Azure Data Factory

Azure Data Factory (ADF) is a cloud-based data integration service that facilitates the creation of ETL, ELT and data integration pipelines.

With ADF, you can:

  • Store your data in centralized cloud storage, such as Azure Data Lake.
  • Employ analytics and machine learning to refine your data.
  • Streamline the transition of your ETL/Big Data workloads to Microsoft Azure.
  • Support real-time data with over 90 built-in connectors.
  • Efficiently and securely manage data movement and orchestration tasks.

Successful Data Modernization with Azure Synapse Analytics

Azure Synapse Analytics is more than an analytics service; it’s a comprehensive solution that melds multiple technologies to offer unparalleled insights and performance. It ensures:

  • Robust security and governance
  • Seamless integration with other Azure services
  • Scalability according to your needs
  • Better decision-making through advanced analytics
  • Robust security

Successful Data Modernization with Azure Databricks

Azure Databricks is a unified data analytics platform that accelerates innovation across various domains, from data science and engineering to business analytics. Here are its key advantages:

  • Built on the highly performant Databricks runtime engine, which ensures that your data workloads are processed at lightning speed.
  • Scales automatically and elastically so you can manage fluctuating data workloads seamlessly and cost-effectively.
  • A comprehensive platform that supports a diverse range of analytical workloads, languages, and tools.

Successful Data Modernization with Azure Data Lake Storage

Azure Data Lake Storage is engineered for high-performance analytics workloads, ensuring that your data is not only accessible but primed for valuable insights.

Azure Data Lake Storage:

  • Removes data silos, allowing for a seamless data ecosystem
  • Provides a single platform that caters to all your storage needs
  • Automatically transitions your data to the most cost-efficient tier
  • Offers encryption at rest and advanced threat protection

Successful Data Modernization with Azure Cosmos DB

Azure Cosmos DB is a globally distributed, multi-model database service that excels in managing diverse data formats, from key-value pairs to graph-based databases. It ensures that your data is handled with precision by:

  • Allowing you to replicate your data across any number of Azure regions worldwide.
  • Providing the flexibility to choose the best model for your application’s needs.
  • Offering five distinct levels of consistency—Strong, Bounded-staleness, Session, Consistent Prefix and Eventual—to cater to various use-case scenarios.
  • Designing containers to scale horizontally, making them capable of handling millions of read and write requests per second.

Choosing the Azure Modernization Solutions That are Right for You

These strategic moves toward data modernization with Azure are not just about adopting new technologies; you are setting the foundation for a business that can adapt and grow in a digital economy where technology is a strategic asset.

Need help determining which Azure modernization solutions are right for you? Reach out, and let’s talk. With OneNeck, you benefit from a trusted partner with extensive experience in modern data architecture, Gold level partnership with Microsoft and deep expertise in all things IT to help you navigate complexities, reduce technical debt and achieve maximum value from your data.

grey line for Azure Data Modernization blog.

]]>
How ETL Facilitates Data Analysis and Visualization in Azure Environments https://www.oneneck.com/blog/how-etl-facilitates-data-analysis-and-visualization-in-azure-environments/ Sat, 30 Mar 2024 21:00:54 +0000 https://www.oneneck.com/?p=6732 Gathering data from multiple sources and formats and bringing it together in a useful format can present a challenge, but data analysis and visualization in an Azure environment can be streamlined with data transformation tools. One such method is through  ETL (Extract, Transform, Load) which is the process of extracting data from various sources, transforming […]]]>

Gathering data from multiple sources and formats and bringing it together in a useful format can present a challenge, but data analysis and visualization in an Azure environment can be streamlined with data transformation tools. One such method is through  ETL (Extract, Transform, Load) which is the process of extracting data from various sources, transforming it into a consistent format and loading it into a target system for analysis and visualization. This process is needed when data resides in different formats and structures across multiple sources.

The importance of ETL (Extract, Transform, Load) in data analysis and visualization

Most organizations have various sources of raw data. ETL allows them to consolidate all sources into a single repository. This simplifies the data analysis process by ensuring that data is accurate and complete. 

ETL process and its components

The ETL process consists of three main components: extraction, transformation and loading.

  1. Extraction involves gathering data in disparate formats and structures from various sources, such as databases, spreadsheets, files and APIs. 
  2. The transformation phase entails using ETL tools to clean, validate and structure data, ensuring quality and consistency. Transformations may also include calculations, aggregations and derivations to create new data elements.
  3. Loading is the process of mapping the transformed data to a target system, such as a data warehouse or data mart and placing it into the appropriate tables or data structures for analysis and visualization.

Popular Azure ETL tools for data processing and integration

Azure offers a variety of ETL tools with powerful capabilities for data processing and integration. 

Azure Data Factory

Azure Data Factory is a fully managed data integration service that allows you to create, schedule and orchestrate data pipelines for ETL workflows while providing a visual interface for designing and monitoring those pipelines.

Azure Databricks

Azure Databricks is an Apache Spark-based analytics platform that enables big data processing and ETL at scale, providing a collaborative environment for data engineers and scientists to build and deploy ETL workflows. 

Azure Synaps Analytics

Formerly known as Azure SQL Data Warehouse, Azure Synapse Analytics is a cloud-based service combining enterprise data warehousing, big data integration and analytics for a unified experience. 

ETL automation and scalability in Azure

Within the Azure environment, ETL processes can be automated for greater efficiency, reliability and scalability. 

  • Azure Logic Apps enables you to create automated workflows that integrate with various systems and services, reducing manual effort and increasing productivity.
  • Azure Functions is a serverless computing service that allows you to specify triggers to run code and automatically execute data processing and integration tasks. 
  • Azure also offers scalable storage services such as Azure Blob Storage and Azure Data Lake Storage. These services handle large volumes of data generated by cloud data ETL processes, providing high throughput and low latency.

Data quality management in ETL

Your insights and decisions rely on the accuracy of the data used, making data quality critical. Within the Azure environment, these data quality management features help ensure accuracy: 

  • Azure Data Factory has built-in functions including standardization, deduplication and validation processes to ensure data quality before loading it into the target system.
  • Azure Databricks uses Apache Spark for data profiling and data cleansing tasks that identify and fix data quality issues. It also integrates with Azure Machine Learning to automate data quality checks and validations.
  • Azure Synapse Analytics uses data validation rules and data quality indicators to define and enforce data quality standards and monitors for any data quality issues during the process.

Data visualization and reporting using ETL outputs

After the ETL process, data is ready for analysis and visualization. Microsoft Power BI is a tool you can use to create interactive reports and dashboards, connect to your outputs such as Azure SQL Database or Azure Analysis Services and visualize using charts, maps and tables. 

Power BI integrates with Azure Synapse Analytics to create interactive reports and dashboards directly from your Synapse Analytics data. You can also use other data visualization tools like Azure Data Studio and Azure Machine Learning Studio which have a rich set of features for data visualization, including drag-and-drop interfaces, data exploration and advanced analytics capabilities.

Your partner in data modernization

Data modernization is a complex process. Gain expertise in Azure ETL tools by working with the team of experts at OneNeck IT Solutions. We’ll guide you to design and implement efficient workflows in Azure environments for tailored solutions that meet your business requirements. OneNeck has the knowledge and experience you need in your data modernization journey.

grey line for ETL blog.

]]>
Cyber Attack Prevention: Defending Against Volt Typhoon https://www.oneneck.com/cyber-attack-prevention-defending-against-volt-typhoon/ Wed, 27 Mar 2024 16:38:06 +0000 https://www.oneneck.com/?p=6688 Cybersecurity remains at the forefront of national security concerns, especially with state-sponsored cyber activities targeting critical infrastructure. Recent advisories from the Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the National Security Agency (NSA) and the FBI have brought to light the activities of People’s Republic of China state-sponsored actors, notably referred to as […]]]>

Cybersecurity remains at the forefront of national security concerns, especially with state-sponsored cyber activities targeting critical infrastructure. Recent advisories from the Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the National Security Agency (NSA) and the FBI have brought to light the activities of People’s Republic of China state-sponsored actors, notably referred to as Volt Typhoon (also known as Vanguard Panda, BRONZE SILHOUETTE, Dev-0391, UNC3236, Voltzite, and Insidious Taurus). These cyber criminals, whose latest attack was identified in May 2023, are strategically positioning themselves within IT networks of U.S. critical infrastructure sectors, including—Communications, Energy, Transportation Systems, Water and Wastewater Systems—to potentially launch a disruptive or destructive cyber attack.

The Dangers Presented by Volt Typhoon’s Cyber Attack

Volt Typhoon’s most recent strategy highlights the sophisticated use of “living off the land” (LOTL) techniques. This method involves leveraging legitimate features of a system to remain undetected while conducting malicious activities. Specifically, the actors engage in detailed reconnaissance, exploiting vulnerabilities in public-facing network appliances for initial access, and then they leverage administrator credentials for lateral movement and domain control. The result is a combined strategic and stealth approach. These tactics signify a departure from traditional cyber-based espionage, hinting at a more ominous intent of pre-positioning for future activities.

Tactics and Techniques Utilized by Volt Typhoon:

  • Establish initial access through vulnerabilities in network appliances, followed by VPN use.
  • Obtain administrator credentials, often via privilege escalation or insecure storage.
  • Use lateral movement to domain controllers using valid credentials and Remote Desktop Protocol.
  • Discover and utilize PowerShell for targeted queries on Windows event logs via stealth networks.
  • Use the Volume Shadow Copy Service to achieve full domain compromise by accessing the Active Directory database (NTDS.dit).
  • Employ offline password-cracking techniques to gain elevated network access.
  • Strategic infiltration focuses on OT assets and tests access with default vendor or compromised OT system credentials.
  • Creates the potential for significant disruption, including manipulating HVAC systems or critical energy and water controls.

For a more detailed overview, visit the CISA Cybersecurity Advisory website.

Strategic Implications and Recommendations

The revelation of Volt Typhoon’s activities should serve as a wake-up call for bolstering security measures across critical infrastructure sectors. Additionally, these attacks underscore the importance of adopting a proactive and strategic approach to security, emphasizing resilience and the capacity to deter sophisticated threats.

Key recommendations for mitigating the risk posed by Volt Typhoon include:

  • Patching of Internet-facing Systems: Regularly update and patch Internet-facing systems, prioritizing critical vulnerabilities known to be exploited by Volt Typhoon. This patch management reduces the attack surface and protects against known exploits.
  • Phishing-resistant Multifactor Authentication (MFA): Deploy phishing-resistant MFA to safeguard access to networks and sensitive information. This process adds a crucial layer of security that attackers using stolen credentials cannot easily bypass.
  • Conditional Access Policies: Implement conditional access policies that evaluate the context of access requests (user identity, location, device security status, etc.) and apply appropriate security controls. This access restriction helps minimize risks by ensuring only legitimate, authenticated, and authorized access to critical resources.
  • Comprehensive Logging and Monitoring: Implement an extensive logging and monitoring regime. Ensure all application, access, and security logs are collected and analyzed in detail, focusing on detecting subtle, sophisticated tactics like those employed by Volt Typhoon, including LOTL techniques.
  • Technology Lifecycle Management: Develop a strategy for managing the end-of-life of technology the manufacturer no longer supports. Update or replace outdated systems to close vulnerabilities that attackers could exploit.

Weathering the Typhoon of a Cyber Attack with a Trusted Partner

The activities of Volt Typhoon highlight the evolving threat landscape and the need for constant vigilance and adaptation in cybersecurity practices. By understanding and monitoring the tactics and strategies employed by these bad actors, cybersecurity professionals can better protect both their organization’s valuable data and critical infrastructure from potential threats. This requires technological solutions and a strategic mindset that anticipates and mitigates against the sophisticated methods utilized.

However, the complexity, sophistication, and sheer volume of these threats often surpass the capabilities of in-house IT staff. This gap is where teaming with a reliable security partner becomes paramount. A seasoned security partner brings expertise, advanced technology solutions, and a proactive approach to identifying and mitigating threats, offering a comprehensive strategy that extends beyond traditional measures. This expertise ensures organizations can defend against complex attacks and stay ahead of potential vulnerabilities.

OneNeck IT Solutions offers a strategic advantage in response to such threats. Our experienced team provides a broad range of security services designed to protect against sophisticated cyber threats. Our security solutions, including cloud, managed, and professional services, help ensure a robust defense against a cyber attack from actors like Volt Typhoon.

Partnering with OneNeck is the perfect next step for organizations looking to enhance their security posture. Contact us today to learn more about how our services can protect your organization from sophisticated cyber threats.

grey line for Volt Typhoon cyber attack blog.

]]>
Biting Back: How Dental Practices Can Defend Against Rising Cyber Threats https://www.oneneck.com/blog/biting-back-how-dental-practices-can-defend-against-cyber-threats/ Tue, 19 Mar 2024 15:05:16 +0000 https://www.oneneck.com/?p=6652 For much of my adult life, I’ve been surrounded by family and friends who are dentists and orthodontists. I’ve seen first-hand the demanding time commitment required to care for patients while still trying to maintain staffing, run a dental practice, and manage an oral care business. It’s all-consuming, and while the focus is on keeping […]]]>

For much of my adult life, I’ve been surrounded by family and friends who are dentists and orthodontists. I’ve seen first-hand the demanding time commitment required to care for patients while still trying to maintain staffing, run a dental practice, and manage an oral care business. It’s all-consuming, and while the focus is on keeping smiles bright and healthy, there’s an unseen menace that’s not so easily brushed away: cyber threats.

It’s a tricky situation; dentists, orthodontists, and their office managers are experts at filling cavities, not firewall vulnerabilities. And who can blame them? When juggling appointments, patient care, and the daily operations of a dental office, there’s barely enough time to floss, let alone fend off cybercriminals.

However, as the digital age continues to evolve rapidly, so does the sophistication of cyber threats, making it crucial for dental practices to prioritize cybersecurity. Unfortunately, as with the broader healthcare industry, the dental industry is far from immune to these attacks. Recently, we’ve seen the unprecedented impacts of ransomware attacks on Change Healthcare (the technical arm of United Healthcare), and there have been several instances targeting dental offices as well, resulting in significant financial losses and the compromise of sensitive patient information. Such breaches damage the trust patients place in their healthcare providers and can come with hefty fines and legal ramifications.

Rooting Out Risk: Cybersecurity Hygiene for Dental Professionals

So, how can dental and orthodontic practices brace themselves against these threats? Here are 3 must-dos to keep your practice’s digital hygiene in tip-top shape:

Regular Check-Ups to Discover Cyber Threats

Just as regular dental check-ups prevent minor issues from becoming major problems, regular cybersecurity assessments can help identify vulnerabilities before exploitation. This prevention includes keeping all software up to date with regular patching, conducting periodic security training for all staff to know what to be on alert for, and implementing strong password policies to protect access to critical applications, data and systems.

Seal the Gaps in Your Defenses

Ensure that all patient data is encrypted and securely backed up. Consider it the digital equivalent of enamel to prevent decay. Encryption acts as a barrier, making it difficult for unauthorized individuals to access sensitive information.

As fluoride treatment provides additional protection on top of enamel, so does multi-factor authentication (MFA). So, even if a staff member’s password is compromised, MFA protects unauthorized data and account access.

Don’t Go It Alone Against Cyber Threats

Dental practices should consider partnering with cybersecurity experts to safeguard their operations, just as patients turn to dental professionals for their expertise. OneNeck IT Solutions offers a robust portfolio of security consulting services, managed services, and resale solutions tailored to dental practices’ unique needs. Our team understands the challenges you face and is equipped to handle the technicalities of cybersecurity, allowing you to focus on what you do best: caring for your patients.

Recommended by 9 out of 10 Security Professionals

In an industry where trust is paramount, ensuring the security of patient data is not just about regulatory compliance; it’s about maintaining the confidence and loyalty of those you serve. In today’s battle against cyber threats, it’s imperative to have a strong defense to lessen the likelihood of a painful recovery. Think of OneNeck IT Solutions as your practice’s cybersecurity orthodontist, here to straighten out your digital defense and keep your practice’s data as healthy as the smiles you create.

Remember, while the world of cybersecurity may seem daunting, you’re not alone. By taking proactive steps and partnering with the experienced professionals, your practice can bite back against cyber threats. Just like preventive dentistry, early detection and treatment can save you from more painful procedures down the line.

Contact us today to craft a custom security plan that keeps your data safe, secure, and shining brightly.

grey line for dental cyber threats protection blog.

]]>
Phishing Awareness https://www.oneneck.com/blog/phishing-awareness/ Tue, 19 Mar 2024 10:00:52 +0000 https://www.oneneck.com/?p=6895 Monthly Security Workshop: Phishing Awareness Phishing attacks continue to be one of the most pervasive and damaging threats to organizations worldwide. Watch this engaging workshop on Phishing Awareness, where we will unravel the sophisticated tactics used by cybercriminals and provide you with essential strategies to safeguard your organization. Learn how to identify phishing attempts, implement […]]]>

Monthly Security Workshop: Phishing Awareness

Phishing attacks continue to be one of the most pervasive and damaging threats to organizations worldwide. Watch this engaging workshop on Phishing Awareness, where we will unravel the sophisticated tactics used by cybercriminals and provide you with essential strategies to safeguard your organization. Learn how to identify phishing attempts, implement effective training programs, and utilize cutting-edge tools to protect your sensitive information. Our cybersecurity expert will share real-world examples and actionable insights to enhance your defense against these relentless attacks. Don’t miss this crucial opportunity to fortify your knowledge and strengthen your organization’s resilience against phishing threats.

]]>
March Patching Update: Ensuring a Secure Spring https://www.oneneck.com/blog/march-2024-patching/ Mon, 18 Mar 2024 19:30:09 +0000 https://www.oneneck.com/?p=6671 Welcome to March’s edition of the OneNeck IT Solutions patching blog. As spring approaches, we’re here to help ensure your IT environment is prepared and protected against the latest identified vulnerabilities. This month’s update highlights a variety of patches across Microsoft products and Linux environments, aiming to keep your systems secure and efficient. Microsoft’s March […]]]>

Welcome to March’s edition of the OneNeck IT Solutions patching blog. As spring approaches, we’re here to help ensure your IT environment is prepared and protected against the latest identified vulnerabilities. This month’s update highlights a variety of patches across Microsoft products and Linux environments, aiming to keep your systems secure and efficient.

Microsoft’s March Patching Overview

In March, Microsoft tackled a total of 59 vulnerabilities, detailed as follows:

  • 24 Elevation of Privilege Vulnerabilities
  • 3 Security Feature Bypass Vulnerabilities
  • 18 Remote Code Execution Vulnerabilities
  • 6 Information Disclosure Vulnerabilities
  • 6 Denial of Service Vulnerabilities
  • 2 Spoofing Vulnerabilities

Fortunately, there are no zero-day vulnerabilities to address this month, allowing IT teams to focus on routine updates and fortifications against potential future exploits.

March’s Patching Highlights

This month’s updates require particular attention to the following vulnerabilities:

  • CVE-2024-21407: A Critical Remote Code Execution Vulnerability in Windows Hyper-V.
  • CVE-2024-21400: An Elevation of Privilege Vulnerability in Microsoft Azure Kubernetes Service Confidential Container.
  • CVE-2024-26199: An Elevation of Privilege Vulnerability in Microsoft Office.
  • CVE-2024-20671: A Security Feature Bypass Vulnerability in Microsoft Defender.

These patches address a range of issues, from remote code execution, which could allow unauthorized access to systems, to enact an elevation of privilege. Including a Security Feature Bypass Vulnerability in Microsoft Defender highlights the necessity of this month’s updates, as it affects a core component of Microsoft’s security infrastructure, potentially leaving systems vulnerable to various threats. Administrators are urged to prioritize these patches to mitigate the risks associated with these vulnerabilities, ensuring the protection of systems against exploitation.

Featured Linux Patching Updates

Our Linux Team has closely examined the landscape and identified several critical updates for this month. Each patch plays a significant role in maintaining the security and stability of Linux environments:

  • CVE-2023-45863: Important updates for Oracle Linux Unbreakable Enterprise Kernel version 4.14.35 and 5.4.17, enhancing kernel security.
  • CVE-2023-4623: Critical security update for the Oracle Linux kernel, bolstering system defenses.
  • CVE-2023-42753: Important update for Oracle Linux, addressing security and bug fixes for enhanced system stability.
  • CVE-2023-4921: Security update for Oracle Linux Unbreakable Enterprise Kernel version 4.1.12, targeting vulnerabilities for improved security.
  • CVE-2023-50868: Significant security update for Oracle Linux’s Unbound, enhancing the security framework of network resolution.
  • CVE-2023-6622: Updates for Oracle Linux Unbreakable Enterprise Kernel, patching critical security gaps.
  • CVE-2024-0646: Kernel Security Update, crucial for maintaining the integrity and security of the Linux kernel.
  • CVE-2024-1551, CVE-2024-1552, CVE-2024-1553: This is a series of important Firefox security updates vital for secure web browsing and system security.
  • CVE-2024-21885: An important security update for Oracle Linux’s TigerVNC, ensuring secure remote desktop connections.

These updates safeguard your Linux servers against potential breaches and system vulnerabilities. Given the critical nature of these vulnerabilities, we recommend a thorough review and timely application of these patches to maintain optimal security and functionality within your Linux environment.

Exchange Server

OneNeck strongly cautions customers not to apply the Security Updates for Exchange this month carelessly. Doing so may cause issues with OWA, Exchange Monitoring, and attachment inspection/scanning conditions. We encourage you to review all documentation available from Microsoft regarding this month’s update before proceeding. Customers who are contracted with us for Exchange Management will have the update installed under separate change requests.

Additionally, it is crucial to note that Microsoft will no longer be releasing Cumulative Updates for Exchange Server 2016. As a result, our team strongly recommends that all customers upgrade to Exchange Server 2019. If you have questions about how OneNeck can assist you with your upgrade decisions, do not hesitate to contact the Service Desk (800-272-3077).

SQL Server 2019 Cumulative Update

There is a known issue with KB5033688 (Cumulative Update 25 for SQL Server 2019), released on February 15th, 2024. This fix might create access violation dump files when the SESSION is reset for reuse. Microsoft is continuing to work on a resolution for this issue. We anticipate this fix will likely be included in the next Cumulative Update release. 

Microsoft Office & SharePoint Updates

While our scheduled patching activities are comprehensive, they are designed to complement your internal update processes for a wide range of products, including Microsoft Office and SharePoint. We encourage our clients to regularly review and apply updates across all software to ensure the highest level of security. For insights on integrating these updates seamlessly into your security strategy or how OneNeck can support your efforts, do not hesitate to reach out to our Service Desk.

Closing Thoughts

As we march into spring, the proactive application of these updates is key to maintaining a strong cybersecurity posture. Stay ahead of potential threats by ensuring your environment is up-to-date. If you need assistance or have questions, OneNeck is here to support you.

Stay secure and patched, and let’s welcome a safe start to spring together.

grey line- for March Patching Blog.

Each month, OneNeck engineers review newly released updates from vendors, like Microsoft, to understand any known issues, actions required and understand the priority of each. This is done immediately following Patch Tuesday releases, and we monitor for adjustments to patches throughout each month.

The information above is gathered monthly during this review and posted for awareness to our customers. This information is generally updated only once per month and is based on our engineers’ review of the information provided by the vendor at that time. As always, for the most up-to-date patching information, please see the vendor’s website or contact us.

Note: If OneNeck actively manages a device or software that is impacted by any of these vulnerabilities, when necessary, OneNeck will be in direct contact with you regarding remediation.

 

]]>
Navigating the Patch Management Labyrinth: A Strategic Path for IT Security https://www.oneneck.com/blog/navigating-the-patch-management-labyrinth-a-strategic-path-for-it-security/ Tue, 27 Feb 2024 19:32:17 +0000 https://www.oneneck.com/?p=6552 When it comes to IT security, it’s nearly impossible to overstate patch management’s significance. It’s a pivotal process that, if disregarded, often leads to dire consequences. The intricate nature of today’s IT ecosystems, with their vast networks and complex software interdependencies, presents a challenging landscape. This complexity necessitates a strategic, well-informed approach to navigating the […]]]>

When it comes to IT security, it’s nearly impossible to overstate patch management’s significance. It’s a pivotal process that, if disregarded, often leads to dire consequences. The intricate nature of today’s IT ecosystems, with their vast networks and complex software interdependencies, presents a challenging landscape. This complexity necessitates a strategic, well-informed approach to navigating the patch management labyrinth, ensuring the integrity and security of critical technical infrastructures.

Consequences of a Breach

The 2017 Equifax breach should stand as a stark reminder of the vulnerabilities inherent in neglecting patch management. This breach, one of the largest in history, exposed the sensitive personal information of approximately 147 million U.S. consumers, including names, Social Security numbers, and dates of birth. The attack’s success was attributed to exploiting a known vulnerability that simply wasn’t patched in a timely manner.

The fallout from this incident was immense, leading to widespread criticism of Equifax’s data security practices and the eventual settlement with the Consumer Financial Protection Bureau (CFPB), the Federal Trade Commission (FTC), and 48 states, amounting to nearly $700 million in monetary relief and penalties. This breach underscores the ever-evolving cybersecurity threats confronting private and government entities and highlights the critical need for stringent patching practices​​​​.

Embracing Patch Management Services

Patching is a never-ending journey where IT teams can easily fall behind; however, embracing managed services offers a more tenable long-term option. These services, adhering to stringent security frameworks such as NIST 800-171 or CIS Controls, provide dedicated resources necessary for the efficient and timely application of patches. This approach aids organizations in maintaining compliance with changing regulations and strengthens defenses against cyber threats.

Managed services providers offer a dual advantage:

  • Free Up Internal Resources: Allows organizations to reallocate their internal resources towards core business operations, enhancing productivity and focus.
  • Access to Cybersecurity Expertise: Provides organizations with the latest cybersecurity expertise, keeping pace with evolving threats and technologies and ensuring a proactive defense mechanism.

By leveraging the knowledge and capabilities of managed service providers, organizations can navigate the patch management labyrinth with greater confidence and efficiency, ensuring a more robust security posture.

Risk and Response

Vulnerability scanning and security assessments play complementary yet distinct roles in the patch management process. Continuous vulnerability scanning is critical for identifying software that requires updates or may be associated with known bugs or vulnerabilities. On the other hand, risk assessments are conducted periodically to inform the policies and procedures that influence an organization’s vulnerability management efforts. While these assessments provide strategic direction and help ensure that patching practices are standardized and effective, it’s important to note that patching activities can proceed independently of risk assessments. When properly combined, these activities lay a solid foundation for developing and maintaining robust mitigation strategies.

Ultimately, the value of these assessments lies in identifying holes in vulnerability management policy and procedure, thus creating a catalyst for the necessary remediation to close those gaps. Interpreting the results requires a deep understanding of the organization’s risk profile and the potential impact of each vulnerability. This interpretation is where frameworks like CIS Controls prove invaluable, guiding organizations systematically to manage technical vulnerabilities effectively. Adhering to such standards ensures that the insights gained from assessments lead to actionable, prioritized steps that enhance the organization’s overall security posture.

Organizations can create a proactive defense mechanism by regularly assessing their security policies and procedures, thus directing the vulnerability scanning and patch management processes. This strategic approach addresses current vulnerabilities and sets the stage for a more resilient and secure IT infrastructure.

Lessons from the Field

The hacking of SolarWinds serves as a stark reminder of the critical importance of integrity and thoroughness in the patch management process. In this breach, attackers compromised the software development or update mechanism used by SolarWinds, a company that produces network management software widely used across government and private sectors. The attackers inserted malicious code into the company’s Orion software updates, which, once deployed, created a backdoor for the attackers into the victim’s IT environment.

The significance of this incident lies not only in its scale but also in the method of attack. It illustrates that the security process is as vital as the application of the patches. In this instance, attackers exploited organizations’ trust in their software vendors and the updates they provide. This breach underscores organizations’ need to apply patches promptly and verify the integrity and security of the patches themselves, along with the mechanisms used to deliver and install them.

Consultative Approach to Patch Management

The effectiveness of patch management critically hinges on a consultative approach. With the complex landscape of cybersecurity threats evolving rapidly, consulting services offer the expertise needed to navigate these challenges efficiently. Adopting a consultative approach to patch management not only streamlines the process of addressing vulnerabilities but also fortifies an organization’s defenses against future cybersecurity threats.

  • Expert Guidance: Provide specialized knowledge to help organizations sift through complex vulnerability reports, ensuring a clear understanding of the threat landscape.
  • Prioritization of Patches: Identify and prioritize patches crucial for maintaining operational security and compliance, focusing efforts where they are most needed.
  • Proactive Vulnerability Management: Advocate for continuous monitoring and early threat detection per cybersecurity frameworks like CIS.
  • Constant Vigilance: Encourage a culture of vigilance and ongoing assessment within organizations, promoting a thorough and integrity-focused patching process.

A Patch Management Partnership: Crafting a Secure Future

The journey through the patch management landscape is more than just a technical endeavor; it demands a strategic mindset that embraces continuous improvement and an understanding of the broader cybersecurity environment. Patch management requires a holistic strategy encompassing multiple facets of cybersecurity. This comprehensive approach integrates managed services to offload and streamline patch applications, employs detailed security assessments to uncover vulnerabilities, and follows the principles laid out by established security frameworks.

This path, though demanding, paves the way to a secure and robust digital future, safeguarding the organization’s assets and data against potential breaches. OneNeck is here to help with an experienced team that provides tailored solutions for patching and any other aspect of systems management your organization may need. Our extensive expertise across multiple platforms and industries allows us to deliver a right-fit solution for you.

Contact us today to speak with a member of our team.

grey line to end patch management security blog.

***Check out our Monthly Patching Blog series to keep up-to-date on the latest critical updates from our vendors. ***

 

]]>
Critical ScreenConnect Vulnerability: Authentication Bypass Risk https://www.oneneck.com/blog/critical-screenconnect-vulnerability-authentication-bypass-risk/ Thu, 22 Feb 2024 21:55:50 +0000 https://www.oneneck.com/?p=6541 A critical vulnerability has been uncovered in ConnectWise’s ScreenConnect. Identified under CVE-2024-1709, this susceptibility poses a significant threat, prompting immediate and decisive action to safeguard sensitive information and maintain operational integrity. Importantly, for our clients and partners, OneNeck has not been impacted by this vulnerability. However, we recognize the importance of staying informed on all […]]]>

A critical vulnerability has been uncovered in ConnectWise’s ScreenConnect. Identified under CVE-2024-1709, this susceptibility poses a significant threat, prompting immediate and decisive action to safeguard sensitive information and maintain operational integrity.

Importantly, for our clients and partners, OneNeck has not been impacted by this vulnerability. However, we recognize the importance of staying informed on all potential security threats and providing guidance on mitigation strategies to our partners and customers.

A Closer Look at the ScreenConnect Vulnerability

Initially reported on February 13, 2024, through ConnectWise’s vulnerability disclosure channel, the exposures demand immediate action from on-premise customers. These security risks involve:

  • CWE-288: Authentication bypass using an alternate path or channel
  • CWE-22: Improper limitation of a pathname to a restricted directory (“path traversal”)

Both vulnerabilities highlight the need for stringent security measures. The CVSS score stands at a critical 10 for CWE-288, underlining the severity of the threat. This score is calculated based on several metrics, indicating that the vulnerability is easily exploitable and the potentially high impact on confidentiality, integrity, and availability that could result. 

Indicators of Compromise

The following IP addresses have been identified by ConnectWise as being used by threat actors and are provided below for your protection and defense.

IOCs:

155.133.5.15

155.133.5.14

118.69.65.60

ConnectWise’s Response and Remediation Steps

ConnectWise promptly issued a security bulletin outlining remediation steps after discovering the vulnerability. Cloud customers, including those using “screenconnect.com” and “hostedrmm.com,” were automatically secured against these vulnerabilities as of February 19, requiring no additional actions on their part.

On-prem users, on the other hand, are urged to update to the latest ScreenConnect version, 23.9.10.8817, immediately to protect against these threats, with version 23.9.8 being the minimum requirement to mitigate the reported vulnerabilities. Notably, ConnectWise has lifted license restrictions to ensure all customers, even those not currently under maintenance, can upgrade to the latest version.

  • For instructions on updating to the newest release, please reference this document.
  • Link to patch: Download

Immediate Steps for ScreenConnect Users

The identification of CVE-2024-1709 necessitates immediate action from ConnectWise partners. As mentioned above for cloud users, remediation has been automatically applied, ensuring security without further steps needed, though continued monitoring of your environment is highly recommended. For on-premises users, updating your systems is critical. Upgrading to the latest ScreenConnect version is not just recommended; it’s essential for safeguarding against potential exploitation.

Best Practices and a Partner That Has Your Back

The discovery of this issue serves as a valuable lesson for all organizations in the importance of timely updates and the implementation of a robust cybersecurity framework.

Key recommendations include:

  • Regularly updating and patching software to mitigate vulnerabilities.
  • Monitoring systems for indicators of compromise to detect and respond to threats promptly.
  • Educating stakeholders about the importance of cybersecurity hygiene.

At OneNeck, the security of our customers is our top priority. We are dedicated to informing our customers about potential security threats, regardless of whether we directly manage those services. Our commitment extends beyond mere awareness; we actively provide support and guidance to ensure our customers can navigate the cybersecurity landscape confidently. Should you need assistance or have concerns about your security posture, our Customer Support Center is ready to help.

grey line for ScreenConnect vulnerability blog

]]>
February Patching: Leaping Ahead of Vulnerabilities https://www.oneneck.com/blog/february-2024-patching/ Wed, 21 Feb 2024 19:28:52 +0000 https://www.oneneck.com/?p=6527 As we embrace the extra day this leap year brings, OneNeck is here to ensure that February’s additional time is met with heightened cybersecurity vigilance. This month, we navigate through a blend of routine maintenance and critical zero-day patches that demand immediate attention. Let’s leap into this month’s updates, highlighting not only the routine patching […]]]>

As we embrace the extra day this leap year brings, OneNeck is here to ensure that February’s additional time is met with heightened cybersecurity vigilance. This month, we navigate through a blend of routine maintenance and critical zero-day patches that demand immediate attention. Let’s leap into this month’s updates, highlighting not only the routine patching tasks but also addressing essential vulnerabilities that could significantly impact the security posture of your IT environment.

Microsoft’s Patching Synopsis

Microsoft has addressed 73 vulnerabilities, categorized as follows:

  • 16 Elevation of Privilege Vulnerabilities
  • 3 Security Feature Bypass Vulnerabilities
  • 30 Remote Code Execution Vulnerabilities
  • 5 Information Disclosure Vulnerabilities
  • 9 Denial of Service Vulnerabilities
  • 10 Spoofing Vulnerabilities

This release includes patching two zero-day vulnerabilities, highlighted in the following, underscoring the importance of timely updates.

February’s Patching Highlights

Key vulnerabilities spotlighted for this month include:

Given their critical nature, these vulnerabilities demand immediate attention from IT professionals. The risk they pose, if left unpatched, could lead to significant breaches, data loss, and system compromise. We urge organizations to prioritize these updates to safeguard their networks against attacks.

Exchange Updates

OneNeck has proactively addressed the Exchange Server vulnerability identified in this month’s update cycle for those under our Exchange Management service. Furthermore, for clients utilizing Exchange 2019 and covered under our management services, deploying this month’s Cumulative Update will proceed through distinct change requests. Note: Microsoft has discontinued Cumulative Updates for Exchange Server 2016. In light of this, we strongly advocate for all our clients to consider migrating to Exchange Server 2019 to ensure continued security and support. If you have questions about how OneNeck can assist you, please reach out to our Service Desk (800-272-3077).

Linux Patching Overview

This month, our Linux Team has meticulously identified a series of necessary patches for bolstering your Linux environments’ security and functionality. Here’s a detailed breakdown of these vital updates:

  • CVE-2023-42753: Security update for the RHEL 7 Kernel, enhancing system defenses.
  • CVE-2023-5633, CVE-2023-20569, CVE-2023-42753: Addresses multiple vulnerabilities for the RHEL 8 Kernel,
  • CVE-2023-40283, CVE-2023-42753, CVE-2023-46813: Security enhancements for the RHEL 9 Kernel, closing multiple critical gaps.
  • CVE-2024-20926, CVE-2024-20945, CVE-2024-20952: Java-1.8.0-Openjdk and Java-11-Openjdk security updates are crucial for maintaining Java applications’ security integrity.
  • CVE-2023-44446: Update for Gstreamer-Plugins-Bad-Free, safeguarding multimedia processing.
  • CVE-2024-0409, CVE-2024-21885, CVE-2024-21886: Xorg-X11-Server security updates, crucial for graphical system stability and security.
  • CVE-2024-0751, CVE-2024-0753, CVE-2024-0755: Firefox security updates for secure web browsing.
  • CVE-2024-0229, CVE-2024-21885, CVE-2024-21886: Tigervnc security updates, enhancing remote desktop security.

While categorized as moderate, the following updates are still important for maintaining the integrity and security of various system components and services:

  • CVE-2023-43804, CVE-2023-45803: These patches for Python-Urllib3 address vulnerabilities in HTTP client software, mitigating risks that could compromise web communication security.
  • CVE-2023-39615: The Libxml2 security update for XML processing ensures the security and integrity of XML applications.
  • CVE-2022-44638: A Pixman update strengthening the core image rendering libraries, protecting systems from vulnerabilities affecting graphic content processing.
  • CVE-2023-7104: Fortifies Sqlite database stability and security, preventing data integrity issues.
  • CVE-2023-27043: Enhances the overall security framework of Python3 applications, addressing vulnerabilities in scripting and automation.
  • CVE-2023-5981, CVE-2024-0553, CVE-2024-0567: Updates to Openssh ensuring secure system access and communication.
  • CVE-2024-0553: Gnutls security update marks improvements in SSL/TLS communication security, addressing vulnerabilities in encrypted data transmission.

While these patches are classified as moderate in severity, their implementation is vital for proactively safeguarding Linux environments against a range of security threats. We recommend system administrators apply these updates promptly to ensure ongoing security and stability.

Microsoft Office and SharePoint Updates

While our scheduled patching activities are comprehensive, they are designed to complement your internal update processes for a wide range of products, including Microsoft Office and SharePoint. We encourage our clients to regularly review and apply updates across all software to ensure the highest level of security. For insights on integrating these updates seamlessly into your security strategy or to find out how OneNeck can support your efforts, do not hesitate to reach out to our Service Desk.

TLS 1.0 and TLS 1.1 Update Advisory

As previously announced, Microsoft will disable TLS 1.0 and TLS 1.1. While no specific date has been set, we urge all customers to prepare their environment for these changes. For more information, visit the Tech Community Blog.

Closing Thoughts

This month, taking a “leap” into cybersecurity vigilance reminds us of the extra steps we can take to fortify our digital defenses. With each monthly patching cycle, we reaffirm our commitment to your cybersecurity. Remember, staying up-to-date with patches is a key defense strategy. Please contact us for any assistance or questions; our team is ready to help.

Stay secure and patched; let’s use this extra day– and every day– as an opportunity to continue safeguarding your IT infrastructure together.

grey line for February Patching Blog

Each month, OneNeck engineers review newly released updates from vendors, like Microsoft, to understand any known issues, actions required and understand the priority of each. This is done immediately following Patch Tuesday releases, and we monitor for adjustments to patches throughout each month.

The information above is gathered monthly during this review and posted for awareness to our customers. This information is generally updated only once per month and is based on our engineers’ review of the information provided by the vendor at that time. As always, for the most up-to-date patching information, please see the vendor’s website or contact us.

Note: If OneNeck actively manages a device or software that is impacted by any of these vulnerabilities, when necessary, OneNeck will be in direct contact with you regarding remediation.

 

]]>
Trends in Cybersecurity https://www.oneneck.com/blog/trends-in-cybersecurity/ Tue, 20 Feb 2024 11:00:37 +0000 https://www.oneneck.com/?p=6890 Monthly Security Workshop: Trends in Cybersecurity In a rapidly evolving digital landscape, staying ahead of cybersecurity threats is more critical than ever. This insightful workshop on Trends in Cybersecurity explores the latest developments and emerging trends that are shaping the future of digital defense. From the rise of artificial intelligence in threat detection to the […]]]>

Monthly Security Workshop: Trends in Cybersecurity

In a rapidly evolving digital landscape, staying ahead of cybersecurity threats is more critical than ever. This insightful workshop on Trends in Cybersecurity explores the latest developments and emerging trends that are shaping the future of digital defense. From the rise of artificial intelligence in threat detection to the increasing importance of zero-trust architectures, our security expert will delve into the strategies and technologies that are revolutionizing how organizations protect their sensitive data. Whether you’re a cybersecurity professional or an IT decision-maker, this webinar will provide you with the knowledge and tools to enhance your security posture and stay ahead of cyber adversaries. Watch now to learn from industry leaders and gain actionable insights into the future of cybersecurity.

]]>
Simplify Your Move to the Cloud with Azure Database Migration Service https://www.oneneck.com/blog/simplify-move-to-the-cloud-with-azure-database-migration-service/ Fri, 16 Feb 2024 17:45:50 +0000 https://www.oneneck.com/?p=6511 As businesses continue to modernize and migrate workloads to the cloud, one daunting task persists — migrating databases. Database migration can require complex data transformations and usually takes many steps. This task can be overwhelming on your own, but with the assistance of Azure Database Migration Service, migrating data, schema and objects to Azure becomes […]]]>

As businesses continue to modernize and migrate workloads to the cloud, one daunting task persists — migrating databases. Database migration can require complex data transformations and usually takes many steps. This task can be overwhelming on your own, but with the assistance of Azure Database Migration Service, migrating data, schema and objects to Azure becomes significantly more streamlined and efficient.

Why Migrate to Azure Data Platforms?

Migrating to Azure data platforms offers your organization numerous advantages over on-premises infrastructure.

Scalability

Azure platforms provide scalability and flexibility, allowing you to easily scale your resources up or down based on your needs. This allows you to handle increasing workloads and sudden spikes in traffic without hassle.

Protection

Azure data platforms offer high availability and disaster recovery options, ensuring that your data is protected and accessible at all times. Additionally, Azure provides advanced security features, such as encryption and threat detection, to safeguard your data from unauthorized access.

Cost

With Azure data platforms, you only pay for the resources you use, eliminating the need for expensive infrastructure investments.

What is Azure Database Migration Service?

Azure Database Migration Service is a fully managed service offered by Microsoft Azure that allows you to migrate your databases to Azure data platforms with ease. It supports various source databases, including SQL Server, MySQL, Oracle and PostgreSQL, and provides a seamless migration experience.

The Azure Database Migration Service lets you perform both online and offline migrations and offers a range of migration methods, such as database backup and restore, online data migration and offline data migration using Azure Data Box. It also offers a comprehensive monitoring dashboard, so you can monitor your migration and troubleshoot any issues that may arise.

How to Use Azure Database Migration Service

The user-friendly interface of Azure Database Migration Service guides you through the migration process. Here’s how to get started:

  1. Create an instance of the service in your Azure portal.
  2. Select the source and target databases you want to migrate.
  3. Choose the migration method that best suits your needs and configure the required settings.
  4. Start the Azure data migration process and monitor its progress using the built-in monitoring dashboard.

Azure Database Migration Service also allows you to schedule migrations to ensure minimal business disruption.

Proven Techniques for a Successful Database Migration with Azure

Follow these proven techniques to ensure a smooth and seamless database migration using Azure Database Migration Service.

Source Database Assessment

The first step is conducting a comprehensive assessment of your source database, analyzing the database schema, dependencies and performance metrics. This helps you understand your source database so you can effectively plan and strategize the migration process.

Trial Migration

Conduct a trial migration to identify any potential issues or challenges that may arise before proceeding with full-scale Azure data migration. Addressing any concerns early on helps minimize disruptions and ensure a successful transition.

Industry Standards

Follow industry best practices and standards, like ensuring data integrity and security throughout the migration process. Implementing robust security measures and encryption protocols safeguards your data from unauthorized access or potential breaches.

Backups

Make backups of your data, establish recovery procedures and regularly test and validate your backup systems, in case any unforeseen issues occur during the migration.

Ongoing Monitoring

After the migration, ongoing monitoring and optimization are vital for maintaining optimal performance, security and compliance. Regularly review performance metrics, fine-tune configurations and address any performance bottlenecks to ensure that your migrated database operates at peak efficiency.

Stay Secure in the Cloud

Know that you have access to a reliable and secure solution with Azure Database Migration Service. When migrating your databases, it simplifies the process and lets you confidently move your data to the cloud. Azure infrastructure gives you scalability, flexibility and security while lowering costs.

Once you’ve transitioned to a cloud or hybrid environment, secure your data with the help of OneNeck IT Solutions. We’ll help protect your cloud infrastructure resources with our virtualized network security services, ensuring compliance while reducing the load on your IT team. Learn more about OneNeck’s Cloud Security Solutions.

grey line for Azure Database Migration Service blog

]]>
Protecting Data in the Cloud: Why Azure Backup is a Must-Have for Businesses https://www.oneneck.com/blog/protecting-data-in-the-cloud-why-azure-backup-is-a-must-have-for-businesses/ Fri, 09 Feb 2024 15:22:32 +0000 https://www.oneneck.com/?p=6482 Cloud computing offers scalability and easy access to data for all your locations. But just like in on-premises data centers, your data in the cloud is vulnerable to breaches, accidental deletions, and system failures. Your organization needs a comprehensive backup strategy to protect against data loss and attacks and to ensure you meet compliance requirements. […]]]>

Cloud computing offers scalability and easy access to data for all your locations. But just like in on-premises data centers, your data in the cloud is vulnerable to breaches, accidental deletions, and system failures. Your organization needs a comprehensive backup strategy to protect against data loss and attacks and to ensure you meet compliance requirements. Microsoft Azure Backup is an easy-to-use solution for backing up business information as well as meeting your IT compliance obligations.

What are Azure Backups?

Microsoft Azure Backup is a cloud-based service that allows businesses to protect and restore their data by backing it up in the cloud. It can back up your entire infrastructure, including virtual machines, databases and files. Using Azure Backup service eliminates the need for traditional, on-premises backup methods such as tape or disk-based systems and provides a more reliable and scalable solution for data protection.

Features of the Azure Backup Service

Azure Backup offers seamless integration with other Azure services, like Azure Site Recovery and Azure Monitor. You can use these services as part of your business continuity and disaster recovery (BCDR) strategy for outages and to monitor the health and performance of your backups.

Azure Backup service can perform incremental backups — only backing up changes made since the last backup — and automated backups — scheduled backups based on your specific requirements. Both options reduce storage costs and the time it takes to back up your data. You have the option to store backups in multiple geographic locations, which ensures that in the event of a disaster, your data is safe and can be restored from a different region.

Azure Backup has features to help you meet regulatory compliance or legal requirements, including long-term backup retention and granular recovery so that you can restore individual files or entire virtual machines.

The service also offers hybrid backup, allowing you to back up your data to the Azure cloud or an on-premises location, providing flexibility and an added layer of protection, ensuring that data is always available, even after a network failure or any other disaster.

Benefits of Microsoft Azure Backup for Data Security

Because the service was designed for ease of use and security, Azure Backup offers several benefits for your organization.

Reliability: Azure Backup uses redundant storage and data replication to ensure backups are always available to your organization, even during hardware failures or natural disasters.

Advanced security features: With industry-standard encryption algorithms to protect your data in transit and at rest, Azure Backup helps prevent unauthorized access and provides built-in monitoring and alert capabilities to notify you about potential security threats.

Cost-effective protection: Traditional backup methods often require expensive software licenses and hardware, but cloud-based Azure Backup eliminates the need for hardware investments and software licenses. You only pay for the storage you use, allowing you to scale your backup requirements as needed and keep costs low.

Compliance certifications: Microsoft Azure and Azure Backup have many global, industry, and government certifications to help your organization meet regional, national, and industry-specific regulatory requirements. In addition, the service lets you retain data as long as required by your business and to meet regulatory compliance.

Strategies for Cloud Security and Compliance

While Azure Backup service provides robust data protection in the cloud, businesses should also implement additional cloud security and compliance strategies. Extra layers of security such as multi-factor authentication (MFA), regular monitoring and auditing, and regularly educating employees on data security best practices will help keep attackers at bay.

Protecting sensitive data in the cloud while meeting compliance requirements is a challenge for IT departments everywhere. However, with the help of industry security experts, you can ease your IT burden and get back to business. Secure, scalable cloud backup from Microsoft Azure Backup coupled with cloud security and data center compliance from OneNeck IT Solutions can give you the peace of mind you’re looking for. Count on OneNeck’s ReliaCloud security services and audit documentation to secure your applications and data.

Ready to learn more? Read about OneNeck’s cloud security and compliance solutions.

grey line for Azure backup blog.

]]>
Securing Data Privacy: Strategies for Surviving Digital Transformation https://www.oneneck.com/blog/securing-data-privacy-strategies-for-surviving-digital-transformation/ Mon, 22 Jan 2024 15:26:44 +0000 https://www.oneneck.com/?p=6430 As we step into Data Privacy Week, we should reflect on the importance of protecting data throughout an organization and at an individual level. In a time when digital transformation is rapidly advancing, data privacy challenges have become more complex and demanding. This week is a timely reminder of the continuous efforts needed to safeguard […]]]>

As we step into Data Privacy Week, we should reflect on the importance of protecting data throughout an organization and at an individual level. In a time when digital transformation is rapidly advancing, data privacy challenges have become more complex and demanding. This week is a timely reminder of the continuous efforts needed to safeguard sensitive information in our hyper-connected world.

The acceleration of digital integration into our daily lives and businesses brings countless potential vulnerabilities. Addressing data privacy vulnerabilities requires a shift in mindset and advanced technical solutions approach.

Emphasizing Security Awareness Training: Empower Your Workforce

A knowledgeable and vigilant workforce is a critical defense mechanism against cyber threats, and building this first line of defense is a multifaceted endeavor. Cyber threats constantly shift, necessitating regular training to keep the workforce aware of the latest risks, threats and defense mechanisms. Continuous education is crucial in building a proactive culture of security. It ensures employees are not just aware but are also actively participating in safeguarding organizational data.

Engagement is the key to retention, and this is where interactive training platforms come into play. By employing simulated attacks, interactive learning modules, and incorporating real-world scenarios, the training process becomes more than just a routine exercise. It becomes an immersive experience, significantly enhancing the understanding and retention of cybersecurity best practices. This approach ensures the principles of cybersecurity are not just learned in theory but are ingrained in the everyday behavior and mindset of the workforce.

Robust Data Access Controls: A Strategic Necessity for Data Privacy

One of the most critical yet often overlooked cybersecurity areas is managing internal access to data. Robust data access controls are not just an add-on but a strategic necessity. How data is accessed and handled internally can have significant impact on an organization’s vulnerability to security breaches.

These controls serve as the foundation of a comprehensive cybersecurity strategy, ensuring sensitive information is accessed responsibly and securely. The goal of course, is preventing unauthorized external access and accurately manage how internal users interact with, share, and utilize data.

  • Customized Access Rights – Tailoring access controls to employees’ specific needs and roles is essential in minimizing unnecessary data exposure. This customization ensures that employees have access to the data they need for their roles and no more, thereby reducing the risk of internal data breaches.
  • Automated Solutions – With the complexity of modern network environments, manually managing access rights is no longer viable. Automated tools are crucial for the efficient management and monitoring of access rights, ensuring that the right people have the proper access at the correct times and that access is revoked when no longer needed. These systems play a role in identifying and responding to unauthorized access attempts, enhancing overall data security.

If it’s been a while (or not yet happened) since your Microsoft Active Directory or Entra ID environment was reviewed and optimized, OneNeck’s expert Microsoft security consultants can quickly and easily engage to ensure your automated tools are helping (rather than hindering) your security efforts.

The Power of Segmentation: Isolating Risks

Network segmentation involves creating distinct barriers within a network, effectively separating different areas to isolate risks and prevent breakouts. Organizations can significantly mitigate the impact of potential breaches by dividing the network into distinct zones, each with its own unique types of data and access levels.

When networks are segmented, a breach in one area is contained, preventing it from spreading across the entire network. This isolation is particularly beneficial in large organizations, where the diversity and volume of data can vary significantly across different departments. By segmenting these areas, organizations can apply tailored security measures appropriate for the sensitivity of the data contained within each segment.

This approach also aids organizations in meeting various compliance requirements. With data privacy regulations (such as General Data Protection Regulation, GDPR) becoming increasingly stringent, demonstrating effective data management is crucial. Network segmentation simplifies this process by clearly defining data boundaries. When data is segmented and categorized, applying specific regulatory standards to each data type becomes easier, streamlining the compliance process. This clear delineation of data not only aids in compliance but also enhances overall security management, making it easier for organizations to identify and rectify any potential vulnerabilities within specific segments.

Reinforcing Data Privacy Defenses

As cyber threats become more sophisticated, multi-layered security systems are imperative. Advanced firewalls, Intrusion Prevention Systems (IPS), Intrusion Detection Systems (IDS), and comprehensive antivirus solutions are among these critical defenses. These components work together to create a formidable barrier against a wide range of threats.

  • Next Generation Firewalls – The role of firewalls in cybersecurity cannot be overstated. Next-generation firewalls go beyond traditional packet filtering, offering deeper inspection and control of network traffic. These firewalls analyze traffic for malicious activities and apply rules that go far beyond IP addresses and ports, offering a more nuanced defense against sophisticated attacks.
  • Real-time Threat Detection – Intrusion Prevention Systems (IPS) and Intrusion Detection Systems (IDS) provide real-time monitoring and immediate response to unusual activities traversing a firewall with such capabilities. These systems are essential for identifying potential threats as they occur, allowing for quick countermeasures to prevent or minimize damage.
  • Comprehensive Antivirus Solutions – Antivirus software remains a fundamental element of cybersecurity defense. However, these programs must be comprehensive, regularly updated, and capable of dealing with the latest malware and virus threats. Modern antivirus solutions should protect against known viruses and offer heuristic analysis to detect new, unknown threats.

A Data Privacy Partner You Can Rely On

While Data Privacy Week serves as a crucial reminder of the ongoing importance of protecting data, it’s vital to recognize that the principles and strategies discussed are not just for a single week but are part of a continuous effort. Let it catalyze ongoing education, strategy enhancement, and technological advancement in data security. As we step beyond this observance week, let’s all embrace the responsibility of ensuring data privacy as a fundamental aspect of our digital existence, demonstrating organizational and individual commitments to safeguarding our most valuable digital assets daily.

 At OneNeck, we take a holistic approach to data privacy. We provide a broad selection of services and solution packages tailored to the specific needs of our customers. Are you in need of a partner to help administer your security demands? We’ve got your back with our comprehensive managed services suites.

Contact us today to see how we can be your data protection partner.

grey line to end data privacy and data protection blog

]]>
January Patching Update: Secure Start to the Year https://www.oneneck.com/blog/january-2024-patching/ Wed, 17 Jan 2024 22:27:07 +0000 https://www.oneneck.com/?p=6424 Happy New Year from all of us at OneNeck! As we enter 2024, we’re back with our monthly patching blog, committed to guiding you through the latest updates and patches. A fresh year brings new opportunities to enhance cybersecurity measures, ensuring that your IT infrastructure remains robust against emerging threats. Starting the year on a […]]]>

Happy New Year from all of us at OneNeck! As we enter 2024, we’re back with our monthly patching blog, committed to guiding you through the latest updates and patches. A fresh year brings new opportunities to enhance cybersecurity measures, ensuring that your IT infrastructure remains robust against emerging threats. Starting the year on a secure footing is vital, and our first patching update of the year is designed to help you maintain a resilient and robust defense against cyber threats.

Microsoft’s January Security Overview

In the first month of 2024, Microsoft has addressed a range of vulnerabilities:

  • 10 Elevation of Privilege Vulnerabilities
  • 7 Security Feature Bypass Vulnerabilities
  • 12 Remote Code Execution Vulnerabilities
  • 11 Information Disclosure Vulnerabilities
  • 6 Denial of Service Vulnerabilities
  • 3 Spoofing Vulnerabilities

Notably, this month has no zero-day vulnerabilities in need of patching, which is a decidedly positive start to the year!

Patching Highlights for this Month

The following are among the most critical patches and should be prioritized:

Additionally, global issues with the BitLocker Security Feature Bypass Vulnerability (CVE-2024-20666) updates have been reported, affecting various Windows OS versions. Microsoft has released a guide on automating the update to WinRE images for Windows 10 and Windows 11 to address this security issue, which can be found here.

January’s Linux Patching Updates

Our Linux Team has carefully examined the patches for this month, ensuring crucial vulnerabilities are brought to your attention. Here’s the breakdown:

  • CVE-2023-39193: Addresses a critical security concern within Oracle Linux 7’s Unbreakable Enterprise Kernel (UEK) version 4.1.12, enhancing system defenses against malicious attacks.
  • CVE-2023-4623: Fortifies Oracle Linux 7’s UEK version 4.14, patching vulnerabilities that potentially compromise system integrity.
  • CVE-2023-5178: Updates Oracle Linux 7’s UEK version 5.4.17, targeting security gaps to bolster the kernel’s protective measures.
  • CVE-2023-44446: Enhances GStreamer 1’s security, patching vulnerabilities to maintain the integrity and stability of multimedia content processing.
  • CVE-2023-5869: Focuses on securing PostgreSQL, a powerful open-source database system, against exploits that could affect data confidentiality and integrity.
  • CVE-2023-5557: Updates Tracker Miners, essential tools for indexing and searching data, to close security potentially exploitable loopholes.
  • CVE-2023-42917: Provides vital security improvements to WebKit2GTK, the engine behind numerous GNOME applications, ensuring safer web content rendering.
  • CVE-2023-45871: Bolsters the security framework of the RHEL 9 Kernel, critical for the operational safety and reliability of Red Hat Enterprise Linux systems.

While classified as moderate, the following updates are essential for maintaining the integrity and security of various system components and services.

  • CVE-2022-44638: Fortifies the Pixman library, by patching vulnerabilities that compromise graphic content security.
  • CVE-2023-39615: Provides crucial updates to LibXML and closes gaps that can execute arbitrary code or access sensitive information.
  • CVE-2022-24963: Focusing on the Apache Portable Runtime (APR) library, and closes security holes affecting a broad range of software, from web servers to database systems.
  • CVE-2023-38473: Enhances the security of Avahi, by addressing vulnerabilities that disrupt service discovery or compromise network communications.

Furthermore, updates are rolling out for widely used utilities like Curl and OpenSSL, targeting vulnerabilities to prevent unauthorized access and data breaches.

Microsoft Office & SharePoint Updates

While our scheduled patching activities are comprehensive, they are designed to complement your internal update processes for a wide range of products, including Microsoft Office and SharePoint. We encourage our clients to regularly review and apply updates across all software to ensure the highest level of security. For assistance on integrating these updates seamlessly into your security strategy or to find out how OneNeck can support your efforts, please reach out to our Service Desk.

TLS 1.0 and TLS 1.1 Disabling Updates

Updates to disable TLS 1.0 and TLS 1.1 are forthcoming. There have yet to be announcements of a specific date, but customers are encouraged to ensure their environment is ready for these changes. For more information, please refer to the Tech Community Blog.

New Year, Same Focus on Security

As always, OneNeck is here to assist with your cybersecurity needs. Stay tuned for the next patching blog, and remember to keep your systems secure and up to date.

Stay secure and stay patched!

grey line for January Patching blog.

Each month, OneNeck engineers review newly released updates from vendors, like Microsoft, to understand any known issues, actions required and understand the priority of each. This is done immediately following Patch Tuesday releases, and we monitor for adjustments to patches throughout each month.

The information above is gathered monthly during this review and posted for awareness to our customers. This information is generally updated only once per month and is based on our engineers’ review of the information provided by the vendor at that time. As always, for the most up-to-date patching information, please see the vendor’s website or contact us.

Note: If OneNeck actively manages a device or software that is impacted by any of these vulnerabilities, when necessary, OneNeck will be in direct contact with you regarding remediation.

]]>
Building Trust with Cloud Compliance Solutions https://www.oneneck.com/blog/building-trust-with-cloud-compliance-solutions/ Fri, 12 Jan 2024 20:35:41 +0000 https://www.oneneck.com/?p=6414 Cloud computing is generally considered to be a safe bet when it comes to system security. Cloud platforms often come with sophisticated security features like access control, user authentication, encryption, and more. However, they can be challenging when it comes to regulatory compliance. Not every solution is built with the specific cloud restrictions and requirements […]]]>

Cloud computing is generally considered to be a safe bet when it comes to system security. Cloud platforms often come with sophisticated security features like access control, user authentication, encryption, and more.

However, they can be challenging when it comes to regulatory compliance. Not every solution is built with the specific cloud restrictions and requirements of various regulatory bodies in mind. Fortunately, cloud compliance solutions are designed to enhance data security and help organizations adhere to regulatory requirements.

What is Cloud Compliance?

Cloud compliance is adherence to the local, national and international regulations and industry standards that cover storing, processing and transmitting data in the cloud. These regulations and standards protect sensitive information and ensure the privacy, integrity and availability of data. Complying with these regulations helps organizations reduce the risk of data breaches and any fines or reputational damage that may come along with a breach.

The Importance of Cloud Regulatory Compliance and Data Security

Cloud security standards and regulations are complex and ever-changing, and meeting them can take significant time and resources. However, non-compliance carries the risk of fines, legal action, reputation damage and loss of customer trust. Companies must prioritize cloud compliance and data security to ensure sensitive information stays safe while preserving their reputation and upholding customer trust.

Compliance Standards

Depending on the industry and the type of data being stored and processed, cloud compliance standards can vary. Some key standards affecting many organizations include:

PCI DSS

If your company stores, processes, transmits or handles credit card data using cloud services, your provider must be Payment Card Industry Data Security Standard (PCI DSS) compliant. Compliant cloud providers must protect credit card data from unauthorized access or breaches with robust security measures such as regular security audits and strict access controls.

HIPAA

Most people have heard of the Health Insurance Portability and Accountability Act (HIPAA), the national law creating regulations to define and protect sensitive healthcare information. HIPPA regulations apply to organizations that handle electronic protected health information (ePHI). 

Organizations that use cloud services to store or process ePHI must ensure their cloud provider meets HIPAA compliance requirements, which include implementing safeguards, conducting risk assessments and controlling data access to protect sensitive healthcare information from unauthorized access or disclosure.

Other Cloud Compliance Standards

In addition to the standards above, your company may be required to comply with other regulations, depending on the industry and the geographic regions you operate in. 

The EU-U.S. Privacy Shield Framework protects the personal data of individuals in the European Union (EU) by requiring transparency from companies that use it.

The American Institute of Certified Public Accountants’ (AICPA) Statement on Standards for Attestation Engagements No. 18 (SSAE 18) is a cloud compliance standard for third-party data centers. Data centers get certified by completing examinations and providing supporting documentation of organizational and IT controls to protect mission-critical IT infrastructure.

Additional cloud compliance standards include the General Data Protection Regulation (GDPR) for organizations that handle the personal data of European Union citizens, the Federal Risk and Authorization Management Program (FedRAMP) for government agencies and the International Organization for Standardization (ISO) standards for various industries. 

Cloud Compliance Solutions for Your Organization

With changing regulations and so many moving parts, maintaining cloud compliance can be challenging for any IT department. Fortunately, there are cloud compliance solutions that can help you navigate the complexities of regulatory compliance to ensure you meet all requirements. 

OneNeck IT Solutions offers comprehensive cloud compliance solutions to help organizations comply with regulations. OneNeck’s ReliaCloud meets HIPAA/HITECH, U.S.-EU Privacy Shield and Type 2 SSAE 18 (SOC 1) compliance requirements and others, freeing up your IT resources. 

Don’t face overwhelming compliance requirements on your own. By partnering with OneNeck, you have experts on your side so you can focus on what you do best—managing your business. Learn more about OneNeck cloud compliance solutions here.

grey line for cloud compliance blog.

]]>
Microsoft Exchange Server Compliance: Preventing Email Disruptions: https://www.oneneck.com/blog/microsoft-exchange-server-compliance-preventing-email-disruptions/ Mon, 08 Jan 2024 16:23:51 +0000 https://www.oneneck.com/?p=6379 Did you get my email? If you are deploying outdated Exchange servers, this straightforward question may no longer be quite so innocuous. To bolster email security, Microsoft has announced a policy of throttling and blocking emails from an out-of-date on-premises Exchange server. This initiative responds to the increasing cybersecurity threats targeting vulnerabilities in older, unsupported […]]]>

Did you get my email? If you are deploying outdated Exchange servers, this straightforward question may no longer be quite so innocuous. To bolster email security, Microsoft has announced a policy of throttling and blocking emails from an out-of-date on-premises Exchange server. This initiative responds to the increasing cybersecurity threats targeting vulnerabilities in older, unsupported versions. Microsoft aims to compel administrators to promptly update and patch their Exchange servers by implementing a transport-based enforcement system. This decision underscores the importance of maintaining up-to-date systems to ensure secure and reliable email communication.

Microsoft’s Enforcement System

Microsoft’s transport-based enforcement system represents a pivotal advance in securing email communication against the vulnerabilities of outdated Exchange servers. This system is methodically designed, initially identifying and reporting servers running outdated software, then progressing to throttling email traffic from these servers. The ultimate step, reserved for persistently non-compliant servers, involves blocking email traffic entirely. The rationale is straightforward: to motivate administrators to prioritize updates and patch their servers, thereby maintaining a robust, secure email environment.

The initial focus of this enforcement is on Exchange 2007 servers, identified as particularly vulnerable due to their age and lack of support. However, Microsoft has indicated that this is just the beginning. The enforcement scope is set to widen. Microsoft has confirmed that Exchange 2010 and 2013 will fall under enforcement beginning this month. There is an expectation for Exchange 2016 and 2019 servers to follow suit shortly. This expansion highlights the escalating priority of cybersecurity and the need for proactive measures against potential vulnerabilities due to outdated servers.

Microsoft Exchange Server email enforcement chart

Source: Microsoft

Enforcement Stages

Microsoft is adopting a progressive enforcement approach, gradually increasing throttling and then introducing stages of blocking, which can lead to up to 100% blockage of non-compliant traffic.

  • The escalation of enforcement actions includes increased throttling, the introduction of blocking, and complete blocking until the server is updated or decommissioned.
  • Stage 1 begins with a report-only mode upon the first detection of a non-compliant server, allowing 30 days for remediation.
  • Failure to update within 30 days increases throttling over the next 30 days (Stages 2-4).
  • After 60 days, throttling and blocking escalate, with increased blocking every 10 days for another 30 days (Stages 5-7).
  • At 90 days without remediation, Stage 8 is reached, where Exchange Online will block all messages from the server until compliance is restored.

Managing the Exchange Server New System

Understanding the challenges of transitioning to updated server systems, Microsoft has provided a temporary reprieve for organizations. This measure, accessible via the Exchange Admin Center (EAC) or Exchange Online PowerShell, allows administrators to halt the enforcement of the new security protocols temporarily. Designed for organizations that need more time to update their on-premises Exchange servers, this pause is crucial to ensure ongoing email services without disruption.

Enforcement Pause

  • Tenants can pause enforcement actions for up to 90 days per year, similar to a pre-paid debit card system. You may require 5 days in Q1 to remediate a server, or perhaps 15 days in Q2. Then, another 7 days in Q3, and so forth, up to 90 days per calendar year.
  • The enforcement pause is manageable through the new mail flow report in the EAC and puts the server back into a report-only mode for the duration specified by the admin, up to the annual limit.

However, this reprieve is a temporary solution. Administrators must use this time wisely, focusing on updating and securing their servers. During these periods, developing and implementing proactive server maintenance and security steps are imperative to avoid long-term risks and potential breaches.

Security Implication Beyond Exchange Server

The enforcement of updated security protocols on Exchange servers by Microsoft reflects a larger, more critical conversation in cybersecurity. While addressing specific vulnerabilities in Exchange servers, this initiative is a poignant reminder of the need for robust cybersecurity practices across all digital platforms. Organizations must regularly update and monitor their systems, not just in response to immediate threats but as a part of a continuous commitment to digital security.

The implications of this initiative extend beyond Exchange servers. It underscores the importance of a comprehensive security strategy that includes layers of defense against emerging threats. This strategy should encompass proactive updates, regular system monitoring, and the implementation of advanced security measures. In doing so, organizations can better protect themselves against a wide range of cyber threats, ensuring the security and reliability of their digital operations.

Ensuring Continuous Protection with Patch Management Services

As we have explored the critical need for up-to-date security measures, it’s clear that regular patch management is an essential component of any robust security strategy. Navigating the complexities of patch management can be daunting for any organization, but it’s a vital step in safeguarding against vulnerabilities.

This protection is where OneNeck’s Patch Management services step in. By offering comprehensive systems management solutions, our team helps provide peace of mind that your IT infrastructure is secure and current. With services tailored to monitor and continuously apply necessary updates, we’ll ensure your systems comply with the latest security standards and are resilient against emerging threats.

For a deeper understanding of how patch management forms the core of a robust defensive IT strategy, consider reading further here and exploring the benefits of proactive patching on our Monthly Patching blog site.

Beyond the Throttle: A Partner to Ensure Exchange Server Security

The recent actions by Microsoft underscore the necessity of keeping On-Premises Hybrid Exchange Servers up to date. These developments highlight an urgent need for server maintenance for organizations without Exchange Management services. As an experienced Microsoft CSP and Solutions partner, OneNeck is ready to ensure your servers remain current, secure, and performing at their best.

Keep your business safe from outdated technology. Partner with our experienced team and proactively step towards seamless and secure server operations. Contact us today to keep your systems in top condition.

grey line for Exchange Server blog.

]]>
5 Underutilized Microsoft 365 Features to Boost Your Organization’s Productivity in 2024 https://www.oneneck.com/blog/5-underutilized-microsoft-365-features-to-boost-organizations-productivity-in-2024/ Thu, 04 Jan 2024 16:58:59 +0000 https://www.oneneck.com/?p=6364 Microsoft has a jam-packed feature set in most licensing packages. However, it’s difficult for organizational IT groups to roll out the entirety of these features and options. They are afraid (and rightfully so) that chaos will reign if they immediately implement everything Microsoft offers. However, there are several features designed to maximize productivity that every […]]]>

Microsoft has a jam-packed feature set in most licensing packages. However, it’s difficult for organizational IT groups to roll out the entirety of these features and options. They are afraid (and rightfully so) that chaos will reign if they immediately implement everything Microsoft offers. However, there are several features designed to maximize productivity that every organization should consider implementing. The best part is that they are probably included in the licensing your business is already paying for!

#1: Free Audio-Conferencing

Microsoft offers free audio conferencing for users with many Office packages, including Microsoft 365 Basic, Standard, Premium, E3, E5, F1, F3, and Office 365 E1, E3, and F3. This service features unlimited dial-in and 60 minutes per assigned license of dial-out. However, a significant number of users with access to this feature aren’t utilizing it to its full potential.

A key advantage for organizations using a paid third-party audio-conferencing service is the potential cost-saving benefit. With free audio conferencing included in qualifying Microsoft licenses, reducing or even eliminating the expenses associated with these third-party services might be possible.

For more details on how to set up audio conferencing for Teams, which is complimentary with certain Office licensing, you can refer to the following resource:

#2: Microsoft Bookings

Microsoft Bookings simplifies the process of scheduling meetings, especially with external parties. Ideal for one-on-one or small group meetings, Bookings is incorporated in most Microsoft packages, such as Office 365: A3, A5, E1, E3, E5, F1, F3, and Microsoft 365: A3, A5, E3, E5, F1, F3, Business Basic, Business Standard, Business Premium. Notably, Bookings is not a standalone app and requires the Outlook Web App or Outlook on the web, as it integrates with and stores data in Outlook.

Bookings offers a user-friendly solution for organizations looking to streamline their scheduling processes and to top it off; it’s a tool you likely already have access to. Implementing Bookings significantly eases the coordination of meetings, offering an accessible way for clients and team members to schedule time together. I use Bookings to allow clients an easy way to get us together.

Setting up Bookings is a straightforward process:

MS Bookings (turn on) (Make scheduling meetings easier on everybody)

#3: Assigning Licensing by Groups

The best practice for businesses managing many users is assigning licenses using Active Directory groups. This approach facilitates automation, streamlining the onboarding process and minimizing errors. This method of license assignment requires Entra ID licensing, which is available in various M365 packages or as an add-on.

The use of Active Directory for license assignment not only simplifies management but also integrates with other Microsoft security features, including Multi-Factor Authentication (MFA) and Conditional Access policies.

Here’s how you can get started:

#4: Microsoft Power Automate

Power Automate is akin to bringing the concept of macros into enterprise workflows. This tool offers the capability to implement automated responses, streamline workflows, and integrate various Microsoft applications seamlessly. Power Automate is included in several Microsoft 365 licensing options, such as E3, E5, F1, Business Basic, Standard, and Premium, and Office 365 E1, E3, E5, and F3. Note that Intune and EntraID might be required for certain functionalities if not included in your package.

Imagine being able to automatically forward emails from an unattended mailbox, reformat them, and then send them to a ticketing system, or enabling a user to run a .Net application and automatically post the results to a SharePoint site. The possibilities with Power Automate are vast, offering solutions that range from simple task automation to complex enterprise-level workflows.

Interested in exploring the capabilities of Power Automate? Get your start here:

Using Microsoft Power Automate (included in most packages)

#5: Microsoft To Do

Among Microsoft 365’s suite of productivity tools, Microsoft To Do stands out for its simplicity and effectiveness. This application enables users to create straightforward task lists, but its true power lies in integrating with other Microsoft applications like Teams and Outlook.

With To Do, you can compile tasks, share with a team, and assign responsibilities, fostering collaboration as everyone can view and contribute to the same list. Integration with Outlook allows you to flag emails for follow-up directly in To Do, where tasks can be further detailed with due dates and assigned to specific team members. Organizations can significantly reduce clutter across their Inbox and Teams, streamlining communication and project management.

Microsoft To Do is a valuable resource for those ready to enhance their organizational habits.

Using Microsoft To Do | Microsoft 365

Your Microsoft Productivity Partner for 2024 and Beyond

Are you ready to unlock the full potential of Microsoft 365 and take your team’s productivity to new heights? At OneNeck, as a seasoned Microsoft CSP and Solutions Partner, we’re committed to helping you excel in the Modern Workplace. From optimizing your licensing strategy to maximizing your use of Microsoft’s productivity tools, we provide the support you need to succeed.

Ready to transform your workflows and enhance collaboration? Contact us today and transform the way you work in 2024 and beyond!

grey line to end Microsoft productivity blog.

]]>
Dark Web Realities: Understanding Its Impact on Privacy and Security https://www.oneneck.com/blog/dark-web-realities-understanding-impact-on-privacy-and-security/ Fri, 22 Dec 2023 21:14:48 +0000 https://www.oneneck.com/?p=6352 In the vastness of the internet exists a somewhat mysterious shadowy corner known as the dark web. Though often misunderstood, this concealed segment of the web poses significant risks to personal and corporate data security. As per a recent report, in 2023, roughly 2.7 million users accessed the dark web daily, many with nefarious intent, […]]]>

In the vastness of the internet exists a somewhat mysterious shadowy corner known as the dark web. Though often misunderstood, this concealed segment of the web poses significant risks to personal and corporate data security. As per a recent report, in 2023, roughly 2.7 million users accessed the dark web daily, many with nefarious intent, while others are simply searching for anonymity but often encountering much more than they bargained for.

Distinct from the ‘surface web’ – the part of the internet we frequently use – and the ‘deep web,’ which contains protected information like medical records and financial data, the dark web is intentionally hidden and inaccessible through standard search engines and browsers. Access requires specific software and configurations, thus creating an environment where users can remain anonymous and untraceable.

The Allure and Perils of the Dark Web

The dark web presents tantalizing but dangerous options for those accessing it. Its allure lies not just in the obscurity it offers but in the promise of freedom from oversight. This shadowy network attracts diverse users: privacy advocates seeking refuge from surveillance, journalists sharing sensitive information under the cloak of anonymity, and, unfortunately, individuals engaging in illegal activities.

However, the characteristics that make the dark web appealing also render it dangerous. This hidden corner of the internet has become a hotspot for a range of cybercriminal activities. The anonymity and lack of regulation facilitate and embolden these illicit transactions. It has been estimated that 75% of Dark Web sites are marketplaces. Another study suggests that anywhere from 2% to 5% of the global GDP is laundered on the dark web.

The dark web serves as a breeding ground for security threats, providing a hub for black-market transactions and a haven for hackers and cybercriminals. In 2021 alone, ransomware attacks were recorded every 11 seconds, causing damages upwards of $20 billion. This stark reality highlights the critical need for robust cybersecurity measures. The sale of personal and corporate data, hacking tools, and ransomware kits is rampant. As technology advances, so do the tactics and tools employed in the dark web’s shadowy corridors, making it a moving target for law enforcement and cybersecurity experts.

Corporate Data in the Crosshairs

Emerging as a distinct threat to corporate data, the dark web poses a substantial risk to the integrity and security of global businesses. Kaspersky’s research highlights this issue’s gravity, revealing an average of over 1,700 posts monthly related to the sale, purchase, or distribution of corporate databases and documents. This alarming trend includes a range of sensitive information, from confidential business strategies to private customer details, which, in the wrong hands, can lead to disastrous consequences, including identity theft, compliance failures, financial fraud, and severe reputational damage to the companies involved.

The trafficking of corporate data on the dark web has far-reaching implications that extend well beyond a breached organization. When sensitive personal data falls into the wrong hands, it can lead to a cascade of privacy violations affecting countless individuals. Customers and employees find their personal information, financial details, and identities at risk of being exploited.

Businesses bear a crucial responsibility, not just to their bottom line, but to their customers, clients, and partners, and must enact robust cybersecurity measures. This obligation includes deploying advanced security technologies, conducting thorough employee training and awareness programs, executing regular security audits, and constant preparedness via effective incident response plans. By doing so, they preserve their interests and protect the personal and financial well-being of their clients and partners from the ripple effects of data breaches.

Safeguarding Against Dark Web Dangers

While challenging, there are effective strategies and policies that organizations can deploy to help defend against the multifaceted threats of the dark web. Comprehensive protection requires a solid security foundation and an agile and dynamic approach. Some basic principles to safeguard against dark web dangers include:

  • Establish robust password protocols – Craft intricate and unique passwords for each account to minimize unauthorized breaches.
  • Enable Multi-Factor Authentication (MFA) – Implement additional verification steps to access accounts, significantly enhancing security against unauthorized access and breaches.
  • Stay current with software updates – Regular updates can prevent the exploitation of system vulnerabilities.
  • Prioritize cybersecurity education – Equip employees with the knowledge and practices to act as the first line of defense against cyber intrusions.

Cybercriminals continuously develop new tactics, and companies must respond by adopting a holistic approach. This approach includes strengthening security by employing advanced security measures such as encryption, firewalls, and intrusion detection systems and regularly conducting security audits to identify and address vulnerabilities.

Furthermore, developing a robust incident response plan is essential for minimizing damage during a data breach. This plan should include protocols for immediate action, communication strategies, and recovery processes.

A Partner to Help Light the Way

The challenges posed by the dark web are daunting but not insurmountable. OneNeck is here to guide you with robust cybersecurity solutions tailored to protect your personal and corporate data. Don’t wait until threats become breaches; act now.

Contact our security experts today for a Security Awareness Call and start fortifying your defenses against the ever-evolving digital threats of the dark web.

grey line for dark web blog.

]]>
Embracing the Future: Upgrade from Nutanix Xi Leap to OneNeck’s Premier DRaaS https://www.oneneck.com/blog/upgrade-from-nutanix-xi-leap-to-onenecks-premier-draas/ Wed, 20 Dec 2023 15:18:35 +0000 https://www.oneneck.com/?p=6314 As Nutanix transitions from their Xi Leap service, businesses must find a reliable alternative for disaster recovery needs. OneNeck stands out as a natural choice, recognized for its service excellence by Nutanix, allowing you to make the switch with confidence. ReliaCloud® Disaster Recovery as a Service (DRaaS) OneNeck designs its ReliaCloud DRaaS with your needs in […]]]>

As Nutanix transitions from their Xi Leap service, businesses must find a reliable alternative for disaster recovery needs. OneNeck stands out as a natural choice, recognized for its service excellence by Nutanix, allowing you to make the switch with confidence.

ReliaCloud® Disaster Recovery as a Service (DRaaS)

OneNeck designs its ReliaCloud DRaaS with your needs in mind. It balances flexibility and reliability, aligning with Nutanix’s standards to minimize disruptions in your operations while safeguarding your data effectively.

Tailored for Nutanix Xi Leap Users

Understanding the nuances of Xi Leap, OneNeck’s DRaaS solution is designed to offer a familiar experience. It’s not just a service switch; it’s also an upgrade with advanced features and functionality. When comparing Nutanix Xi Leap and OneNeck DRaaS, here are some critical aspects to consider:

Integration and Onboarding

Both our solutions focus on simplifying the disaster recovery process, although through different integrations. Nutanix leverages its AOS platform, while OneNeck customizes our solution based on client infrastructure.

Automation and Replication

Each service provides automated disaster recovery processes emphasizing reducing complexity and streamlining operations.

Testing and Security

We offer non-disruptive testing to ensure DR readiness and maintain security, highlighting our commitments to consistent reliability and regulatory compliance.

Customization and Flexibility

While our approaches differ, both our services aim to offer flexible solutions tailored to businesses’ specific needs and requirements. Additionally, OneNeck’s DRaaS includes multiple options like full production DRaaS, storage optimization, limited protection, and production protection.

Committed to Quality

OneNeck’s recognition as a Champion in the Nutanix Elevate Service Provider Program, combined with over 150 Nutanix certifications, reflects our commitment to quality in Nutanix-based managed services. We’re continually learning and growing to serve our customers’ needs better.

A Strategic Step Forward

Choosing OneNeck is more than just opting for a new service provider; it’s a strategic decision for your business’s future. With comprehensive managed services and the robust ReliaCloud platform, OneNeck is well-positioned to elevate your disaster recovery capabilities.

Take the Next Step after Nutanix Xi Leap

Ready to upgrade your disaster recovery strategy? Explore OneNeck’s DRaaS solutions and contact us for a smooth and efficient transition from Nutanix Xi Leap.

grey line for Xi Leap end-of-life and OneNeck DRaaS blog

 

]]>
December 2023 Patching Insights: Closing the Year on a Secure Note https://www.oneneck.com/blog/december-2023-patching/ Mon, 18 Dec 2023 18:22:41 +0000 https://www.oneneck.com/?p=6304 Welcome to the December 2023 edition of OneNeck’s monthly patching blog. Our cybersecurity team remains vigilant, continuously analyzing the latest patches essential for maintaining your IT infrastructure’s security. With the year coming to a close, it’s crucial to ensure that your systems are updated to mitigate potential vulnerabilities that could compromise your network. Microsoft’s December […]]]>

Welcome to the December 2023 edition of OneNeck’s monthly patching blog. Our cybersecurity team remains vigilant, continuously analyzing the latest patches essential for maintaining your IT infrastructure’s security. With the year coming to a close, it’s crucial to ensure that your systems are updated to mitigate potential vulnerabilities that could compromise your network.

Microsoft’s December Security Brief

For December, Microsoft has addressed a total of 34 vulnerabilities, which are categorized as follows:

  • 10 Elevation of Privilege Vulnerabilities
  • 8 Remote Code Execution Vulnerabilities
  • 6 Information Disclosure Vulnerabilities
  • 5 Denial of Service Vulnerabilities
  • 5 Spoofing Vulnerabilities

This month’s update cycle is particularly noteworthy for addressing an AMD zero-day vulnerability disclosed in August, but that has remained unpatched until now. The vulnerability, tracked as CVE-2023-20588, was a division-by-zero flaw affecting some AMD processors that could potentially lead to information disclosure.

Patching Highlights for the Month

Among the vulnerabilities addressed, the following patches are particularly critical and should be prioritized.

  • CVE-2023-35628: This patch addresses a Remote Code Execution Vulnerability in the Windows MSHTML Platform.
  • CVE-2023-36019: Fixes a Spoofing Vulnerability in the Microsoft Power Platform Connector.
  • CVE-2023-35636: Remedies an Information Disclosure Vulnerability in Microsoft Outlook.

Linux Patching for December

Our Unix Team has identified several vulnerabilities with essential patches that should be conducted without delay:

  • CVE-2023-46847: Critical security and bug fix update for Squid.
  • CVE-2022-45884; CVE-2022-3523: Focuses on security enhancements and bug resolutions for the Kernel.
  • CVE-2023-6204; CVE-2023-6209: Bolsters Firefox browser security.
  • CVE-2023-34058: Enhancement for open-vm-tools.
  • CVE-2022-32885: Update targeting both security and functionality improvements in Webkit2gtk3.
  • CVE-2023-3972: Security enhancement for insights-client.
  • CVE-2023-38545: Bolsters security for Curl.
  • CVE-2023-44487: Network protocol enhancements for Nghttp2.
  • CVE-2023-23583: Update for Microcode_ctl, focusing on system firmware security.
  • CVE-2023-40217: Security update for Python.
  • CVE-2023-5367: Security improving Tigervnc’s secure functionality.
  • CVE-2023-1989: Update for the Unbreakable Enterprise Kernel’s (UEK) security.

These patches safeguard your Linux servers against potential breaches and system vulnerabilities. We recommend reviewing the detailed advisories for each CVE to understand the implications and take appropriate action.

In addition, December also brought several moderate-level updates enhancing the security and functionality of various Linux components. Notable among these are a security update for Samba (CVE-2023-3961), enhancing file and print service security; updates for DNS server software BIND (CVE-2022-3094) and DNS request handling in c-ares (CVE-2020-22217); a firmware update enhancement in fwupd (CVE-2022-3287); and security improvements for the printing system CUPS (CVE-2023-32324) and the text editor Emacs (CVE-2022-48337). While less critical, these updates are still necessary for maintaining a well-protected and efficient Linux environment.

Microsoft Office and Exchange Patching

Per our standard practice, OneNeck does not conduct patching for Microsoft Office products during our scheduled updates. We urge all customers to apply the latest Microsoft Office updates promptly. Should you need assistance or have any inquiries regarding this process, please don’t hesitate to contact our Service Desk.

Exchange

We continue to recommend that all customers upgrade to Exchange Server 2019. For those with OneNeck Exchange Management contracts, we will handle the Exchange Security Updates separately.

TLS 1.0 and TLS 1.1 Updates

As a reminder, Microsoft will soon implement updates to disable TLS 1.0 and TLS 1.1. We strongly advise preparing your systems for these updates to ensure seamless application functionality. For detailed information and guidance, please refer to Microsoft’s official communication.

Looking Forward to the New Year

As we conclude our December patching cycle, we encourage you to stay proactive by implementing these updates. Our team at OneNeck is always ready to support you in strengthening your cybersecurity posture.

Stay secure and stay patched; we look forward to bringing you more updates in the new year!

grey line for December Patching blog.

 

Each month, OneNeck engineers review newly released updates from vendors, like Microsoft, to understand any known issues, actions required and understand the priority of each. This is done immediately following Patch Tuesday releases, and we monitor for adjustments to patches throughout each month.

The information above is gathered monthly during this review and posted for awareness to our customers. This information is generally updated only once per month and is based on our engineers’ review of the information provided by the vendor at that time. As always, for the most up-to-date patching information, please see the vendor’s website or contact us.

Note: If OneNeck actively manages a device or software that is impacted by any of these vulnerabilities, when necessary, OneNeck will be in direct contact with you regarding remediation.

 

]]>
Cloud Migration Essentials: The Power of the 6 Rs https://www.oneneck.com/blog/cloud-migration-essentials-the-power-of-the-6-rs/ Fri, 15 Dec 2023 20:06:11 +0000 https://www.oneneck.com/?p=6288 Successful organizations constantly seek ways to stay ahead of the curve in the ever-evolving business landscape. One such opportunity is the shift from traditional on-premises systems to cloud-based architectures. This transition is not merely a fleeting trend; it’s a strategic move for businesses aiming for scalability, flexibility, and efficiency. As the cloud becomes an integral […]]]>

Successful organizations constantly seek ways to stay ahead of the curve in the ever-evolving business landscape. One such opportunity is the shift from traditional on-premises systems to cloud-based architectures. This transition is not merely a fleeting trend; it’s a strategic move for businesses aiming for scalability, flexibility, and efficiency. As the cloud becomes an integral part of the modern business landscape, understanding the intricacies of cloud migration becomes vital.

The Significance of Cloud Migration

The modern workplace has ushered in a surge in both the volume and diversity of data and applications. Managing these increasing complexities in traditional systems can be cumbersome, expensive and inefficient. Cloud systems offer a solution, providing scalable storage, enhanced security and cost-effective operations. Moreover, with the rise of remote work and global collaborations, cloud systems facilitate easy access to data and applications worldwide, ensuring business continuity and agility.

The impact of cloud migration extends beyond mere technological advancements; it signifies a profound shift in business operations and strategy. Embracing the cloud equips businesses with extensive agility, allowing them to scale operations in response to demand, optimize resource utilization, and realize significant cost savings. This migration also revolutionizes collaboration. With the cloud, data and applications become universally accessible, enabling teams to work seamlessly in real-time, boosting productivity and spurring innovation. Furthermore, the cloud allows for data-driven decision-making. Businesses can make strategic choices rooted in real-time data by harnessing advanced analytics and AI-driven insights.

Strategic Framework for Cloud Migration

Embarking on the cloud migration journey is not a one-size-fits-all approach. It requires a tailored strategy, considering each organization’s unique needs and objectives. Here’s a deeper look into the foundational steps for a successful cloud migration:

  • Strategize the Move: Before any migration begins, it’s crucial to have a deep understanding of the current infrastructure. This knowledge involves auditing existing applications, data storage needs, and network configurations. By defining clear objectives for the migration, businesses can set measurable goals, whether they are cost savings, improved performance, or enhanced scalability.
  • Select the Appropriate Cloud: The cloud ecosystem offers a plethora of options. From public clouds that offer vast scalability to private clouds that provide enhanced security, the choice depends on the business’s specific needs. Hybrid and multi-cloud strategies are also gaining traction, allowing companies to leverage the best of both worlds.
  • Execute the Transition: This is where the rubber meets the road. A well-defined strategy ensures that the migration process is smooth, with minimal disruptions. It involves selecting the right tools, setting up the necessary configurations and ensuring data integrity during the transfer.
  • Assess the Migration: A successful migration is not just about moving data and applications. Once the migration is complete, testing is essential to ensure all components function optimally in the new environment, including performance testing, security audits and functionality checks.

During this process, it’s essential to ensure that the existing systems remain operational. Businesses cannot afford downtimes, and a phased migration approach limits disruptions to daily operations.

Decoding the 6 Rs of Cloud Migration

Experts have outlined the ‘6 Rs’ of cloud migration to streamline this process and ensure a successful migration. These represent six strategies or pathways that businesses can adopt. The journey to the cloud is multifaceted, and the 6 Rs provide a structured approach to navigating this endeavor:

  • Re-host: This is the most straightforward approach. It involves moving applications and data to the cloud without significant changes, ensuring a quick and cost-effective migration.
  • Re-platform: While similar to re-hosting, this strategy goes a step further by optimizing applications to harness the full potential of the cloud, leading to improved performance and reduced costs.
  • Repurchase: This strategy involves a shift in the IT consumption model. Instead of traditional software deployments, businesses might opt for SaaS solutions, leveraging cloud-native applications that are regularly updated and maintained by providers.
  • Retain: Not all applications or data might be suitable for immediate migration. Some components may remain on-premise due to compliance needs, legacy system dependencies, or other reasons, leading to a hybrid cloud approach.
  • Retire: Over time, certain applications become redundant or obsolete. Instead of migrating them, businesses can decommission them, leading to cost savings and reduced complexity.
  • Re-factor: This is the most intensive approach, involving a complete redesign of applications to be cloud-native. While it requires significant effort, the long-term benefits of scalability, performance, and future readiness can be tremendous.

The 6 Rs: A Strategic Blueprint for Cloud Success

While the benefits of cloud migration are evident, the journey itself can be fraught with challenges, and the 6 Rs provide a structured basis to address them. By understanding and implementing one or more of these strategies, businesses can:

Minimize Downtime: Ensuring that operations continue smoothly during the migration process.

Optimize Costs: By choosing the right strategy, organizations can avoid unnecessary expenses and ensure a return on their cloud investment.

Future-Proof Operations: Companies can be prepared for technological advancements by adopting cloud-native solutions and architectures.

A Partner That Has Your Back

With an extensive track record of designing and implementing successful cloud migrations, OneNeck brings a wealth of experience and expertise to the table. We understand that each migration is as unique as the organization undertaking it. We emphasize a tailored approach rooted in industry best practices and hands-on experience. Our team of experts works closely with you to understand your specific needs, goals and industry requirements, crafting a migration plan that is both strategic and seamless.

To ensure a successful migration to the cloud, we conduct a Hybrid Cloud Assessment that covers all the bases, including workload analysis, bandwidth analysis, and end-user experience analysis. This assessment allows us to create a plan that aligns perfectly with your objectives.

But our role doesn’t end with the migration. We remain by your side, offering support and consolation. Whether you are on the cusp of a cloud transition or just contemplating the possibilities, we are here to guide you every step of the way.

Contact us today to explore strategies and solutions for your cloud migration journey.

grey line for cloud migration 6 Rs blog.

]]>
Vulnerability Assessment and Testing to Identify Cybersecurity Risk https://www.oneneck.com/blog/vulnerability-assessment-and-testing-to-identify-cybersecurity-risk/ Wed, 06 Dec 2023 21:42:40 +0000 https://www.oneneck.com/?p=6184 It’s strange to live in a world where a cyber attack can take place deep in a data center or right in your back pocket. The breadth of the threat landscape causes increased concern for your , company’s reputation and bottom line — a breach can be lurking in the most innocent of places, like […]]]>

It’s strange to live in a world where a cyber attack can take place deep in a data center or right in your back pocket. The breadth of the threat landscape causes increased concern for your , company’s reputation and bottom line — a breach can be lurking in the most innocent of places, like an employee email about receiving a company gift.

In 2022, the global average cost of a data breach was $4.35 million. You can no longer just set your threat protection and walk away. You must be proactive in securing your networks against potential vulnerabilities. A critical component of this approach is the implementation of a thorough vulnerability assessment and vulnerability testing.

What Is a Vulnerability Assessment?

A vulnerability assessment is the systematic testing of your computer systems to identify and prioritize as many vulnerabilities as possible. It’s a proactive way for your organization to understand weaknesses and react to cyber threats before damage is done.

Too often, you find out about security shortfalls after a breach happens. The advantage of vulnerability testing is that it enables you to find security gaps in your network and fix them before they become a problem. This proactive approach can save your company time and resources while keeping operations running smoothly.

Why You Need Vulnerability Assessment and Testing

Performing vulnerability testing is crucial to understanding your organization’s cybersecurity landscape and serves multiple critical functions in maintaining the integrity of your defense against cyber threats.

  • Proactive Defense: Identifying vulnerabilities before a breach occurs lets you fix them before attackers find them.
  • Compliance: Certain industries have regulations requiring regular assessments to ensure that systems safeguard sensitive data effectively.
  • Reputation Protection: A commitment to Identifying and addressing vulnerabilities early instills trust with your clients and stakeholders.

4 Steps of a Vulnerability Assessment

Vulnerability assessments typically follow these four steps: plan, scan, analyze, and remediate.

1. Plan

In the planning phase, you’ll identify which assets will be assessed, including those on-premises and in the cloud, and determine the most critical systems where the most sensitive data resides. This is also when companies should review the specific requirements of their industry and regulatory standards.

2. Scan

Scanning involves using automated network tools to scan for and identify potential vulnerabilities within the defined scope. This phase can include:

  • Network-based scans to identify vulnerable systems on wired or wireless networks.
  • Host-based scans to identify vulnerabilities in workstations, servers, or other network hosts.
  • Application scans to test to identify known software vulnerabilities and check network and web application configurations.
  • Database scans to detect vulnerable points in databases.

3. Analyze

In the analysis phase, cybersecurity professionals gather the generated reports and review the results of the scans. In this step, security experts prioritize vulnerabilities based on their severity and assess the potential impact on the organization. The analysis phase is crucial for understanding which vulnerabilities pose the greatest risk and require immediate attention.

4. Remediate

Once the security gaps have been identified and prioritized, remediation involves addressing and mitigating those identified vulnerabilities. This may include patching, updating applications, reconfiguring settings, or implementing additional security tools or procedures.

Identify Your Security Gaps Now

While companies of all sizes will benefit from vulnerability testing, the fact is that many companies don’t have the resources to perform the steps needed to thoroughly examine and protect their IT systems. OneNeck IT Solutions can help in your security journey. Our vulnerability assessment, scan, and remediation services can help you identify the security gaps in your system and fix them before opportunistic attackers get in. If you need additional security services, we also offer a cost-effective virtual CISO (vCISO) service with a team of security experts to help you address all your security and compliance needs.

Don’t take chances with your IT systems. Learn more by reading about OneNeck’s cybersecurity assessments here.

grey line for Vulnerability Assessment and vulnerability Testing blog.

]]>
Ransomware Attacker Turns Tables: Reports Victim for Compliance Violation https://www.oneneck.com/blog/ransomware-attacker-turns-tables-reports-victim-for-compliance-violation/ Mon, 27 Nov 2023 16:36:01 +0000 https://www.oneneck.com/?p=6076 In a unique twist of events in the cybersecurity world, a ransomware attacker has crossed into uncharted territory. Exploiting a new legal loophole, they reported their victim, digital lending technology vendor MeridianLink, to the U.S. Securities and Exchange Commission (SEC) for failing to promptly disclose a breach. This case marks a significant evolution in ransomware […]]]>

In a unique twist of events in the cybersecurity world, a ransomware attacker has crossed into uncharted territory. Exploiting a new legal loophole, they reported their victim, digital lending technology vendor MeridianLink, to the U.S. Securities and Exchange Commission (SEC) for failing to promptly disclose a breach. This case marks a significant evolution in ransomware tactics. It highlights the crucial intersection of cybersecurity, legal compliance, and corporate responsibility.

The Ransomware Attack on MeridianLink

The ransomware attacker, a group known as Alphv/BlackCat, claims to have infiltrated MeridianLink’s network on November 7th, 2023, resulting in the theft of significant amounts of customer data and operational information. While MeridianLink confirmed the cybersecurity incident, the exact timeline of the breach’s discovery and reporting remains unclear. The company claims that the attack occurred on November 10th and that the threat was quickly nullified.

MeridianLink’s official statement on the incident: “Upon discovery on the same day, we acted immediately to contain the threat and engaged a team of third-party experts to investigate the incident. Based on our investigation to date, we have identified no evidence of unauthorized access to our production platforms, and the incident has caused minimal business interruption.” The company also added that it cannot share further details due to its ongoing investigation.

Why the SEC Complaint

Since July 26th, 2023, the SEC has mandated that public companies disclose significant cyber incidents within four days. These rules went into effect in September. However, it is worth noting that the disclosure requirement takes effect on December 18th for large organizations, while smaller companies have a deadline of June 2024.

Regardless of specific dates, the intent here is clear; –add another layer of pressure on cyberattack victims to give in to the demands of their attackers and pay the requested ransoms. By filing such complaints, companies now face the possibility of bad publicity, erosion of client trust, and financial losses, as well as potential compliance and legal ramifications.

Implications for Cybersecurity and Compliance

While a cyber assailant filing a complaint to a governmental organization for an attack they are responsible for may seem a bit like an arsonist reporting a fire, this incident underscores how cybercrime is constantly evolving. Now, attackers are even leveraging legal and regulatory frameworks to their advantage. This development is a stark reminder for businesses to fortify their security defenses and remain transparent and prompt in their breach disclosure practices.

Cybersecurity and Resilience

Ultimately this incident underscores a critical lesson for all organizations: the importance of having effective cybersecurity measures and being resilient in the face of a successful attack. Further highlighted is the evolving nature of cyber threats and the need for a comprehensive cybersecurity approach that encompasses prevention and response strategies.

So, what are businesses supposed to do to meet evolving threats? Here are some key points to consider for organizations aiming to bolster cybersecurity defenses:

Proactive Cybersecurity Measures

  • Regular Risk Assessments – Organizations can stay ahead of emerging threats and vulnerabilities by continuously evaluating cybersecurity risks.
  • Advanced Threat Detection – Leveraging cutting-edge technologies to detect threats early is crucial in a landscape where attack methods constantly evolve.
  • Employee Training and Awareness – Human error can be a significant vulnerability, empowering employees with knowledge and best practices is vital.
  • Robust Data Encryption – Encrypting sensitive data is a fundamental security practice that ensures data integrity, even in the event of unauthorized access.
  • Multi-Factor Authentication (MFA) – MFA is a critical layer in defense strategies, adding depth to access controls and reducing the risk of unauthorized entry.

Bridging Defense and Recovery

While proactive measures serve as the first line of defense, laying the groundwork for prevention, an organization’s resilience strategies are the contingency plans that take over when defenses are breached. This dynamic transition is crucial for maintaining operational continuity and upholding stakeholder trust through adversity.

A comprehensive cybersecurity approach embodies this transition, ensuring that threat prevention vigilance is complemented by incident response robustness. It guarantees that organizations not only deter potential breaches but bounce back with speed and efficiency, safeguarding their operational integrity when breached.

 Resilience in the Face of an Ransomware Attacks

  • Incident Response Plan – A clear and actionable incident response plan is vital for quick and effective action in a breach.
  • Rapid Response Team – A dedicated team ready to tackle cybersecurity incidents, with defined roles and responsibilities, is essential for minimizing damage and restoring operations swiftly.
  • Communication Strategy – Effective communication during and after an incident is crucial for maintaining stakeholder trust and managing reputational risks.
  • Legal and Regulatory Compliance – Understanding and adhering to legal and regulatory requirements ensures an organization’s response is effective and compliant.
  • Backup and Recovery Procedures – Regular backups and robust recovery processes are the safety nets that ensure business continuity in the face of cyber adversity.

From Compliance to Confidence with OneNeck

The MeridianLink ransomware attack, coupled with the regulatory maneuverings of the attackers, exemplifies the dual threats of modern cybersecurity: technical and compliance. OneNeck is well-versed in the dynamics of both cyber threats and compliance landscapes. Our suite of cybersecurity solutions is designed to address these challenging fronts head-on.

Contact us today to fortify defenses and align your cybersecurity strategies with today’s demands. Together, we can ensure that your organization is secure, compliant, and, above all, resilient in the face of any threat.

grey line for Ransomware and Compliance blog.

]]>
November Patching Update: Important Advisory and Vulnerabilities https://www.oneneck.com/blog/november-2023-patching/ Mon, 20 Nov 2023 16:11:04 +0000 https://www.oneneck.com/?p=6060 Welcome to OneNeck’s monthly patching blog for November 2023. As your proactive partner in cybersecurity, our team is dedicated to identifying and addressing the most critical updates that can impact your IT infrastructure. Our engineers are committed to dissecting and understanding the latest vendor-released patches, ensuring that our Managed Patch Services keep your systems secure […]]]>

Welcome to OneNeck’s monthly patching blog for November 2023. As your proactive partner in cybersecurity, our team is dedicated to identifying and addressing the most critical updates that can impact your IT infrastructure. Our engineers are committed to dissecting and understanding the latest vendor-released patches, ensuring that our Managed Patch Services keep your systems secure and operational.

Microsoft Security Brief

In November, Microsoft has patched 58 vulnerabilities, sorted into the following categories:

  • 16 Elevation of Privilege Vulnerabilities
  • 6 Security Feature Bypass Vulnerabilities
  • 15 Remote Code Execution Vulnerabilities
  • 6 Information Disclosure Vulnerabilities
  • 5 Denial of Service Vulnerabilities
  • 11 Spoofing Vulnerabilities

Notably this month, 3 zero-day vulnerabilities are currently being actively exploited.

Patching Highlights for November

These patches require your immediate attention due to their high-risk potential:

  • CVE-2023-36025: Addresses a Security Feature Bypass Vulnerability in Windows SmartScreen.
  • CVE-2023-36033: Fixes an Elevation of Privilege Vulnerability in the Windows DWM Core Library.
  • CVE-2023-36036: Remedies an Elevation of Privilege Vulnerability in the Windows Cloud Files Mini Filter Driver.
  • CVE-2023-36397: Patches a Remote Code Execution Vulnerability in Windows Pragmatic General Multicast (PGM).
  • CVE-2023-36413: Corrects a Security Feature Bypass Vulnerability in Microsoft Office.

ASP.NET Core Applications Advisory

Developers utilizing ASP.NET Core 8.0 applications should be aware of the following advisory from Microsoft and take particular note of CVE-2023-36038 – an ASP.NET Core Denial of Service Vulnerability, where a remote unauthenticated user can issue specially crafted requests to a .NET application which may result in denial of service.

Linux Patching Updates

Our Unix Team has compiled an extensive list of Linux patches and vulnerabilities that demand attention this month:

  • CVE-2023-3609; CVE-2023-32233; CVE-2023-35001: Patches for Red Hat Enterprise Linux 7 (Kernel), addressing critical security issues and enhancing system stability.
  • CVE-2023-3341: Linux security update for BIND, crucial for maintaining domain name system integrity.
  • CVE-2023-5721; CVE-2023-5724; CVE-2023-5725; CVE-2023-5728; CVE-2023-5730; CVE-2023-5732; CVE-2023-44488: A series of vital Firefox updates, reinforcing browser security and addressing various vulnerabilities.
  • CVE-2023-40217: An important update for Python 3.x, enhancing security features and fixing vulnerabilities.
  • CVE-2023-5217; CVE-2023-44488: For libvpx, focusing on addressing security concerns in this multimedia library.
  • CVE-2023-44487: An update for nghttp, ensuring robustness against potential network protocol vulnerabilities.
  • CVE-2023-38545; CVE-2023-38546: Bolsters security features for curl.
  • CVE-2023-0567; CVE-2023-0568; CVE-2023-0662; CVE-2023-3247; CVE-2023-3823; CVE-2023-3824: Updates for PHP, addressing various security issues to ensure script integrity and system safety.
  • CVE-2023-44487: Addresses security vulnerabilities and enhances web server protection within Tomcat.
  • CVE-2022-0934: Ensures DNS forwarding and DHCP server stability within dnsmasq.
  • CVE-2021-40211: A security update for ImageMagick, crucial for maintaining security in image processing tasks.
  • CVE-2023-3609; CVE-2023-35001; CVE-2023-32233: Key patches for Oracle Linux 7 (Kernel 3.10), focusing on kernel vulnerabilities and system enhancements.
  • CVE-2022-34918; CVE-2023-2513; CVE-2023-4387; CVE-2023-22024; CVE-2023-3772; CVE-2023-35001; CVE-2023-4206; CVE-2023-3611; CVE-2023-4459; CVE-2023-3776: For Oracle Linux 7 (Kernel 4.1.12), targeting various kernel security issues.
  • CVE-2023-42753; CVE-2023-22024: Oracle Linux 7 (Kernel 4.14) patches, enhancing kernel protection and stability.
  • CVE-2023-20588; CVE-2023-5090; CVE-2023-20569; CVE-2023-42753; CVE-2023-22024: Regarding Oracle Linux 7 (Kernel 5.4), focusing on kernel security and functionality improvements.

Microsoft Office and Exchange Updates

Please note that OneNeck does not patch Microsoft Office products during scheduled patching. We recommend customers apply Microsoft Office updates immediately. If you have questions about how our team can assist you within in your Microsoft environment, contact our Service Desk.

Exchange

For Exchange, we continue to recommend upgrading to Exchange Server 2019 and remind you that we’re here to apply necessary Exchange Security Updates for managed clients.

TLS 1.0 and TLS 1.1 Disabling Updates

Updates disabling TLS 1.0 and TLS 1.1 are on the horizon. Ensure you prepare your environment for these changes to maintain application functionality. For more information, visit Microsoft’s post on the timeline and process of these updates.

November Patching Cycle

As November’s patching cycle concludes, we invite you to remain engaged for next month’s updates. Keeping your systems up-to-date is more than a best practice—it’s necessary. Our team is ready to assist if you have any questions or need support.

Stay secure and stay patched!

grey line for monthly patching blog series- November.

Each month, OneNeck engineers review newly released updates from vendors, like Microsoft, to understand any known issues, actions required and understand the priority of each. This is done immediately following Patch Tuesday releases, and we monitor for adjustments to patches throughout each month.

The information above is gathered monthly during this review and posted for awareness to our customers. This information is generally updated only once per month and is based on our engineers’ review of the information provided by the vendor at that time. As always, for the most up-to-date patching information, please see the vendor’s website or contact us.

Note: If OneNeck actively manages a device or software that is impacted by any of these vulnerabilities, when necessary, OneNeck will be in direct contact with you regarding remediation.

 

]]>
CMMC: Quickstart Guide to Cybersecurity Maturity Model Certification https://www.oneneck.com/blog/cmmc-quickstart-guide-to-certification/ Fri, 17 Nov 2023 15:59:47 +0000 https://www.oneneck.com/?p=6036 Cybersecurity Maturity Model Certification (CMMC) is a security framework created by the U.S. Department of Defense (DoD) to ensure companies prove their information security protocols are robust and mature enough to protect sensitive DoD data known as Controlled Unclassified Information (CUI). Understanding this framework and achieving organizational certification is an important step to winning deals […]]]>

Cybersecurity Maturity Model Certification (CMMC) is a security framework created by the U.S. Department of Defense (DoD) to ensure companies prove their information security protocols are robust and mature enough to protect sensitive DoD data known as Controlled Unclassified Information (CUI). Understanding this framework and achieving organizational certification is an important step to winning deals and contracts.

Introduction to CMMC

What does CMMC mean?

The acronym CMMC stands for Cybersecurity Maturity Model Certification. By tying together several leading cybersecurity standards into five maturity levels ranging from basic to advanced, the CMMC program provides a verifiable roadmap for improving your organization’s security posture. To get certified, your organization must meet the criteria of at least the first level of certification.

Purpose and Goals of CMMC Certification

The goal of the CMMC certification is to deter uncontrolled access and possible misuse of crucial defense industry information residing outside the controlled federal systems. It intends to offer greater assurance to DoD that a contractor can adequately protect sensitive unclassified information at a level commensurate with your risk. Obtaining your certification establishes your firm as a reliable, diligent entity committed to cybersecurity.

CMMC Maturity Levels

CMMC 2.0—the most recent iteration of the model—has three levels of maturity that are applicable depending on the kind of information your company stores and the type of work it does. Each has its own list of requirements that build upon the level before it.

Level 1

At this initial stage, the focus is on implementing basic security measures. It includes 17 different practices that ensure companies are protecting Federal Contract Information (FCI).

Level 2

To achieve the second level, organizations must meet another 48 safeguards by embracing universally accepted best practices while incorporating relevant protective measures on Controlled Unclassified Information (CUI).

Level 3

Level 3 maturity means a company has good cyber hygiene or the satisfactory application of all NIST SP 800-171 Rev.1 guidelines along with an additional seven other controls totaling up to a sum of 130 required practices.

Preparation Steps for Cybersecurity Maturity Model Certification

So, what does it take to get you prepared to be CMMC certified? Working towards your Cybersecurity Maturity Model Certification (CMMC) will be much easier if you follow these pivotal steps to ensure you have all your ducks in a row.

1.   Determine Your CMMC Level and Scope

Determining the appropriate CMMC level for certification involves a careful assessment of your organization’s specific circumstances, cybersecurity risks and the requirements of your contracts or projects with the DoD. Review your DoD contracts and project specifications to understand what level you need and what its requirements are. From there, determine the types of data and assets your organization will handle or have access to during DoD projects.

2.   Run a Cybersecurity Practices Gap Analysis

Test current cybersecurity measures against the standard CMMC framework using a gap analysis template or similar digital tool. Pinpoint unmet practices or processes across domains like access control, asset management and incident response. Document the gaps and discuss the actions that must be taken to address them.

3.   Build a System Security Plan

A system security plan (SSP) is effectively a high-level blueprint of your program where you clearly outline how cyber safeguards are implemented universe-wide in compliance with defined CMMC 2.0 requirements. You likely already have one in place — the next step is to update it with the information you uncovered in step two. If you don’t already have an SSP, you’ll need to build one.

4.   Engage a Trusted Partner

Engaging a trusted partner can spell the difference between a smooth certification and one with lots of avoidable pitfalls. Selecting a trusted CMMC third-party assessment organization (C3PAO) familiar with both best practices and potential loopholes within your specific industry sector makes sense. This partner-ally can run cybersecurity assessments, gap analyses and ensure you and your team fully understand the expectations and requirements of certification.

The Support You Need to Get Certified

OneNeck’s security assessments are executed by a team of experts who stay on top of evolving threats, changing regulations and best practices. We help you cover all the bases so you can understand your current state, see how it measures up against the CMMC framework and take the necessary steps to get certified.

 

Contact us for a security assessment consultation.

grey line for CMMC (Cybersecurity Maturity Model Certification) blog.

]]>
You’ve Suffered a Breach, Now What? https://www.oneneck.com/blog/you-suffered-a-breach-now-what/ Wed, 08 Nov 2023 19:40:06 +0000 https://www.oneneck.com/?p=5987 The threat of cyber breaches looms larger than ever before. These incidents are not just occasional blips; they have become a persistent part of online existence. Last year, there were over 1800 reported breaches affected over 400 million people, with no signs of slowing down. This reality underscores the critical need for robust preparedness and comprehensive […]]]>

The threat of cyber breaches looms larger than ever before. These incidents are not just occasional blips; they have become a persistent part of online existence. Last year, there were over 1800 reported breaches affected over 400 million people, with no signs of slowing down. This reality underscores the critical need for robust preparedness and comprehensive knowledge of cybersecurity practices. Every day presents new challenges and potential threats, making it imperative for organizations to stay vigilant and proactive in their defense strategies. It’s not about if a breach will happen, but when—and how well you can respond and recover.

The Power of Preparation: Incident Response Plans

Imagine the moment you detect a breach. Your immediate instinct might be panic, but with a robust Incident Response Plan, you can ensure a swift and organized response.

Isolating affected systems is one of the first and most crucial steps. This action helps to prevent the further spread of malware or potential data leaks. It’s akin to stopping a water leak before flooding your house. You can minimize the damage and start the recovery process by acting swiftly.

But an IRP isn’t just about immediate actions. It also covers assessing the breach’s impact, communication strategies, and post-incident reviews. It’s a comprehensive approach that looks at the incident from all angles, ensuring nothing is overlooked.

Preparation truly is the key. In the face of a cyber incident, having a plan ready to activate can be the difference between a minor hiccup and a major catastrophe. It’s the difference between feeling lost and having a clear direction. In cybersecurity, where every second counts, an Incident Response Plan is your best ally.

Maintaining Trust: The Role of Communication in Cyber Incidents

In the aftermath of a cyber breach, communication becomes a pivotal front in maintaining trust. The way an organization handles information sharing can significantly influence its reputation and the trust it has built.

Internally, it’s crucial to keep staff informed. This transparency ensures that employees, from the C-suite to the frontline, understand the breach’s implications and the remedial actions underway. This clarity prevents the spread of confusion and aligns the team’s response efforts.

Externally, the need for openness is even more critical. Customers and partners who have entrusted their data to the organization deserve to know the breach’s impact. Transparency with these stakeholders and, when necessary, the media is fundamental to maintaining the organization’s integrity. Timely and forthright communication helps manage public perception, ensuring the breach does not permanently damage the organization’s image.

Damage Control: Assessing and Recovering from a Breach

After addressing the immediate threats of a cyber breach, organizations must turn to a meticulous investigation of the incident. Like detectives reconstructing the events at a crime scene, they must identify the breach’s nature, scope and origin. Key steps include:

  • Conducting a Forensic Analysis – Tracing the attack’s pathways to assess the extent of the infiltration. This helps determine if the breach was a targeted attack or a random malware strike, which is crucial for crafting an effective defense strategy.
  • Identifying the Breach’s Source – Determining whether it was an external attack, an internal oversight, or a combination of factors. Pinpointing the cause is essential to prevent similar incidents in the future.
  • Assessing the Compromised Data – Understanding the type of data compromised to dictate the recovery strategy. The response might range from notifying affected parties to enhancing security protocols, depending on whether sensitive customer information or operational data was involved.

Navigating the Aftermath of a Breach: Technical Recovery and Legal Obligations

One of the most effective preventive measures against cyber threats is ensuring that systems are continuously updated. Every software update often comes with patches that address known vulnerabilities. By neglecting these updates, organizations leave their doors open to cybercriminals always looking for such weaknesses.

But what happens when cybersecurity preventions fail? That’s where backups and disaster recovery come into play. Think of backups as safety nets, ready to catch you when you fall. In the unfortunate event of data loss due to a breach, having a recent backup and an effective disaster recovery plan means you can restore your systems to their pre-breach state with minimal downtime. This swift restoration minimizes operational disruptions and helps maintain trust with stakeholders who expect uninterrupted service.

However, the aftermath of a breach isn’t just about technical recovery. There’s a legal landscape to navigate. Different regions have varying data protection laws, many of which mandate timely notifications to affected parties in the event of a data breach. Non-compliance can result in hefty fines and further reputational damage. Thus, being aware of and compliant with these regulations is not a mere formality; it’s an integral part of post-breach management.

Learning from a Breach: Training and Review

When the dust settles, stepping back and analyzing the incident is essential. What vulnerabilities were exploited? Were there any lapses in protocol or human errors? Answering these questions provides a roadmap for strengthening cybersecurity measures.

However, technical safeguards are just one piece of the puzzle. Human error remains one of the most significant vulnerabilities in any security system. Continuous employee training is crucial. Regular training sessions ensure that staff are aware of the latest threats and equipped with the knowledge to counteract them. From phishing scams to sophisticated malware attacks, employees should be the first line of defense, not the weakest link.

Moreover, cybersecurity training should not be a one-off event. Regular updates, refresher courses and drills can help ingrain security best practices in the organizational culture.

While technology provides the means to combat cyber threats, your employees wield these tools. Investing in their training and fostering a culture of security awareness ensures that they’re always ready, vigilant, and proactive in the face of potential breaches.

Fortify Your Organization Against a Breach

OneNeck is more than just a vendor; we’re your cybersecurity partner. Whether you are looking to strengthen your overall security posture, utilize cost-effective vCISO services, conduct comprehensive security assessments, ensure timely patching or empowering your team with top-notch training, we’re here to help. Our expertise and commitment ensure that you’re prepared for today’s threats and the challenges of tomorrow.

Don’t wait for a breach to reveal the gaps in your cyber-defenses. Contact us today, and let’s work together to build a resilient and robust security framework for your organization.

grey line for cybersecurity breach blog.

]]>
Managed Network Services: Enhancing Business Operations https://www.oneneck.com/blog/managed-network-services-enhancing-business-operations/ Fri, 03 Nov 2023 16:11:28 +0000 https://www.oneneck.com/?p=5930 Whether you’re a small startup or a multinational corporation, the way you manage and maintain your network can significantly impact your operations, security and overall efficiency—especially when you’ve got bandwidth-hungry applications to handle and a growing number of devices connecting to your network. Managed network services enable businesses to alleviate routine tasks and focus on […]]]>

Whether you’re a small startup or a multinational corporation, the way you manage and maintain your network can significantly impact your operations, security and overall efficiency—especially when you’ve got bandwidth-hungry applications to handle and a growing number of devices connecting to your network. Managed network services enable businesses to alleviate routine tasks and focus on strategic initiatives. With a managed network services provider, you can delegate these mundane responsibilities and concentrate on building an IT infrastructure that fuels business growth.

What are Managed Network Services?

A managed network is a communication network overseen and maintained by a specialized third party known as a Managed Service Provider (MSP). With an MSP partnership, businesses engage a third party to handle basic IT operations, including managing complex networking environments, troubleshooting, improving performance levels and operating system maintenance—tasks that were traditionally handled by in-house IT staff.

How do Managed Network Services Differ from Traditional In-house Services?

Managed and traditional in-house services have notable distinctions that make them suitable for different types of businesses.

  • Ownership and Responsibility—In a managed network, the organization outsources the responsibility for network management to a third-party provider. In a traditional network, the organization is responsible for all aspects of its design, implementation, management and maintenance.
  • Proactive vs Reactive—Managed network providers actively monitor network performance to anticipate issues before they arise. In contrast, traditional network management is often reactive due to time and resource constraints.
  • Scalability—Managed service providers (MSPs) can quickly adjust resources to accommodate changing business needs. Scaling a traditional network often involves procuring and configuring additional hardware at a significant cost in time and money.
  • Cost Structure—In a managed network, the organization pays a recurring fee to the managed service provider, simplifying budgeting. Costs for a traditional infrastructure include hardware and software, as well as staff salaries, training and maintenance.
Managed Networks Traditional In-house
Ownership Responsibility is outsourced to a 3rd party Organization has full control
Proactivity Proactively monitor network performance Reactive due to resource constraints
Scalability Easily scale resources up or down Flexibility is limited and expensive
Cost Structure Recurring fee payable to the MSP Responsible for all CAPEX and OPEX expenses

Choosing a Managed Network Service Provider

Choosing a managed network service provider is an important decision. You want to find a trusted partner capable of managing the entire network infrastructure that your internal teams rely upon daily.

Here are some factors to pay attention to when selecting the right managed network solution provider for your business.

Company Reputation and Track Record

A provider’s track record of handling diverse challenges is a strong indicator of their expertise. Select an MSP that has had its mettle tested. One who is adept at overcoming various obstacles is likely better equipped to handle unforeseen issues with your network. A thorough evaluation of customer reviews, case studies and LinkedIn profiles can provide valuable insights into the experience of each potential partner.

Technical Expertise

This might be obvious, but it still needs to be said: Choose an MSP that does more than monitoring and device management. Your provider’s services should align with your long-term initiatives and deliver integrated security intelligence that aligns with IT infrastructure and back-end technology. To avoid the future cost of technology changes, make sure your MSP can protect your existing investments by requesting a list of platforms the provider is certified to manage.

Customizability of services

Every organization has unique network requirements based on its industry, size, operations and objectives. Look for providers that offer a wide range of services, provide multiple service levels, give you the ability to mix and match and have prepackaged offerings. This kind of customizability allows you to pay for the services and features you actually need, rather than being locked into a fixed package that may not be applicable to your needs.

OneNeck Delivers Customized, Comprehensive Managed Network Services

Choosing managed network services enables businesses of all sizes to secure their digital assets by leveraging new technology and experienced IT professionals.

With industry-leading technology, OneNeck delivers operational excellence and compliance through rigorous, flexible and accessible network management services. Contact us to learn more about our managed security services.

grey line for managed network services blog.

]]>
Cybercrime as a Service (CaaS): The Dark Side of “as a Service” https://www.oneneck.com/blog/caas-the-dark-side-of-as-a-service/ Tue, 31 Oct 2023 18:18:09 +0000 https://www.oneneck.com/?p=5867 The “as a Service” model has undoubtedly transformed the way businesses operate. From Software as a Service (SaaS) to Infrastructure as a Service (IaaS) and Platform as a Service (PaaS), these models have been instrumental in streamlining operations and promoting innovation. Yet, lurking in the digital shadows is a more sinister iteration of this model— […]]]>

The “as a Service” model has undoubtedly transformed the way businesses operate. From Software as a Service (SaaS) to Infrastructure as a Service (IaaS) and Platform as a Service (PaaS), these models have been instrumental in streamlining operations and promoting innovation. Yet, lurking in the digital shadows is a more sinister iteration of this model— Cybercrime as a Service (CaaS).

Advent of CaaS: Democratizing Cybercrime

The introduction of CaaS marked a pivotal moment in the evolution of cyber threats. This model transformed cybercrime from isolated acts of digital mischief into a structured and scalable service. With CaaS, cybercrime is no longer confined to the tech-savvy elite. Instead, it became a marketplace where malicious tools, infrastructure, and services are readily available for purchase or rent.

CaaS platforms offer a range of services, from ransomware toolkits to botnets for rent, making it alarmingly simple for individuals with limited technical knowledge to launch sophisticated cyberattacks. This shift not only increased the volume of cyberattacks (an attack every 39 seconds) but also their complexity and impact.

The primary driver behind CaaS is profit. By commodifying cybercriminal tools and services, CaaS providers have tapped into a lucrative market, catering to a growing clientele of aspiring cybercriminals. This commercial approach has led to a surge in cybercrime activities as attacks become more accessible to a broader audience.

In essence, CaaS has streamlined and professionalized the world of cybercrime. What was once a domain of individual hackers has now morphed into an organized, service-driven industry with revenue streams, customer bases and even customer support.

The Dark Web’s Marketplace

At its core, CaaS provides a platform where individuals or groups with malicious intent can offer cybercriminal tools, infrastructure, and services to other criminals for a fee. This model has dramatically democratized the world of cybercrime. Previously, launching a sophisticated cyberattack required considerable technical expertise. Now, thanks to CaaS, even those with limited technical knowledge can orchestrate advanced cyberattacks.

Cybercrime as a Service offers an array of malicious tools and services. Here’s a closer look at some of the primary offerings:

  • Ransomware as a Service – This service provides clients with ready-made ransomware toolkits. These toolkits encrypt a victim’s data and demand a ransom for its release, turning digital assets into hostages for extortion activities.
  • Exploit as a Service – These are specialized tools for targeted malware campaigns. They exploit known vulnerabilities in software and systems, allowing cybercriminals to infiltrate and compromise targeted devices or networks.
  • Phishing as a Service – This service delivers comprehensive phishing campaigns, often mimicking legitimate entities, to deceive individuals into revealing sensitive information. These campaigns steal data such as login credentials, credit card numbers, and other personal information.
  • DDoS-for-Hire – Distributed denial-of-service (DDoS) attacks are a common form of cyber-attack that overwhelms targeted websites or networks by flooding them with an excessive amount of traffic.
  • Botnets for Rent – This service offers networks of infected computers, known as ‘zombies,’ available for lease. Hackers can utilize these extensive networks to distribute spam emails, mine cryptocurrencies, or launch DDoS attacks to overwhelm targeted websites.

Economic Impact of CaaS

The rise of Cybercrime as a Service has brought about profound financial implications. The commodification of cybercriminal tools and services has not only democratized the world of cybercrime but has also turned it into a highly profitable venture. According to a report from AtlasVPN, the annual revenue generated from CaaS activities is estimated to exceed $1.6 billion.

This booming segment of the cybercrime ecosystem is not without its consequences. The ease of access to malicious tools and services has led to a sharp increase in cybercrime incidents. For businesses, this means not only direct financial losses from attacks (predicted to reach $10.5 trillion by 2025) but also potential reputational damage, which can have long-lasting effects on customer trust and brand value. Individuals also find themselves at heightened risk, facing threats to personal data and financial assets. The economic shadow cast by CaaS is vast, affecting entities ranging from large corporations to everyday internet users.

Defending Against the CaaS Threat

The commercialization and accessibility of cybercrime tools mean that threats can come from any direction and at any time. To effectively counter these threats and safeguard their digital assets, businesses need to adopt a holistic approach to cybersecurity. Combatting the menace of Cybercrime as a Service requires a comprehensive and multi-faceted approach:

  • Proactive Defense – Organizations must cultivate a culture of proactive cybersecurity measures and accountability.
  • Collaborative Engagement – It’s essential to coordinate with industry associations, law enforcement, and the broader cybersecurity community to form a united front against cyber threats.
  • Continuous Learning – By analyzing past security incidents, organizations can learn, adapt, and bolster their defense mechanisms. Additionally, training employees to be aware of threats and how to respond appropriately is critical.
  • Advanced Security Measures – Employing cutting-edge security solutions ensures real-time monitoring, swift threat detection, and rapid response.

One particularly effective way for organizations to combat the onslaught of attacks generated through CaaS is by deploying Managed Detection and Response (MDR). MDR combines sophisticated technology alongside artificial and human intelligence to continuously monitor your systems for threats and mitigate incidents. This security solution helps discover and intercept attacks before significant damage occurs. 

Strengthening Defenses Against Security Threats

The escalating threat of Cybercrime as a Service underscores the importance of organizations to be proactive and well-prepared. Seeking expert guidance and forming strategic partnerships can make all the difference. OneNeck offers a comprehensive suite of security solutions tailored to address the challenges of today’s cyberattacks, including those generated by CaaS. By aligning with trusted partners like OneNeck, organizations can bolster their defenses, ensuring a secure and resilient digital environment in the face of these evolving threats.

Don’t wait for a breach to happen. Contact our security experts today.

grey line for Cybercrime as a Service (CaaS) blog.

]]>
Containers vs Virtual Machines: Choosing the Right Solution for You https://www.oneneck.com/blog/containers-vs-virtual-machines-choosing-the-right-solution-for-you/ Fri, 27 Oct 2023 16:33:36 +0000 https://www.oneneck.com/?p=5821 Choosing the appropriate virtualization deployment model can make a world of difference for your environment. However, deciding between containers vs virtual machines isn’t always clear-cut. They each have strengths and weaknesses, depending on your operating environment. What is a Virtual Machine (VM)? Choosing the appropriate virtualization deployment model can significantly impact your environment. VMs can […]]]>

Choosing the appropriate virtualization deployment model can make a world of difference for your environment. However, deciding between containers vs virtual machines isn’t always clear-cut. They each have strengths and weaknesses, depending on your operating environment.

What is a Virtual Machine (VM)?

Choosing the appropriate virtualization deployment model can significantly impact your environment. VMs can run multiple instances of operating systems on a single physical machine. They can also store data, connect to networks, and perform other computing functions.

VMs exist independently of one another yet share the same hardware resources such as CPU power or storage space. You can run multiple “virtual computers” on a single physical computer. Each VM behaves like a separate, isolated computer, so you can run different operating systems or software on each VM without them interfering with each other.

Pros and Cons of VMs

VMs have advantages and disadvantages that can vary depending on the specific use case and needs. Here are some of the pros of VMs:

  1. Isolation: VMs provide isolation between different virtual machines, so if one VM crashes or has security issues, it doesn’t affect other VMs running on the same physical host.
  2. Resource Allocation: VMs allow efficient distribution of computing resources, such as specific amounts of CPU, memory, and storage so each VM can operate effectively.
  3. Versatility: VMs enable you to run multiple operating systems and applications on a single physical host. This is useful for testing, development, or running applications that require different environments.

Some cons of VMs include:

  1. Increased Resource Usage: Because they run complete operating systems—which load up entirely separate instances of binaries, libraries and system resources—VM resource usage is naturally higher.
  2. Slow Performance: VMs install an entire OS for each instance, making them resource-heavy and slow to spin up.
  3. Limited Scalability: A single server can only support a limited number of VMs, limiting the scalability of VMs in response to dynamic traffic conditions.

What are Containers?

A container is a package of software that contains the necessary elements to run applications in any environment. By sharing the host system’s OS kernel instead of requiring its own OS, containers are compact and can run in a private data center, the public cloud, on a developer’s personal laptop or anywhere you need it.

Pros and Cons of Containers

Here are some of the pros of containers:

  1. Resource Efficiency: Containers use fewer compute resources than traditional virtual machines by leveraging shared operating systems.
  2. Scalability: Servers can run more containers with the same amount of resources, and applications are easier to scale based on demand.
  3. Rapid Deployment: Containers can be created and launched quickly to meet demand.
  4. Cloud Compatible: The flexibility of containers makes them ideal for deploying in the cloud.

Cons of containers include:

  1. Limited OS Support: Containers typically rely on a Linux kernel, so they may not be as suitable for applications that require specific operating systems, like Windows.
  2. Security Risks: Misconfigured containers or vulnerabilities in the container runtime can pose security risks and endanger your organization.
  3. Learning Curve: Deploying containers to automatically provision, scale and manage containerized applications can be challenging for organizations and individuals who are new to these technologies.

Which Option is Better for You?

When it comes to the debate about container vs VM, both have unique characteristics and advantages, depending on your unique situation.

Virtual machiness are easy to create and support various OS options, making them suitable for developers. They also provide a layer of security by keeping instances isolated. However, VMs use more resources — companies with budget to allocate to additional computing power will be well-suited to VMs.

Containers operate well in a cloud environment, are flexible and portable and can easily scale horizontally. They consume fewer resources and are faster to deploy. However, due to their shared resources, they are more vulnerable to cyber-attacks and require robust protection. Companies that are confident in their cybersecurity posture, defense strategy and disaster recovery plan can benefit most from the flexibility and scalability of containers.

Your organization’s virtualization strategy will depend largely on your business needs and infrastructure. Whether you land on the VM, container or combination side of the container vs VM debate, it’s essential to protect your network from attacks.

OneNeck has partnered with Fortra’s Alert Logic to offer Managed Detection and Response (MDR). By combining our teams of round-the-clock security experts with Fortra’s Alert Logic’s award-winning SaaS security platform and continuous threat research and analytics. Learn more about Always-on Support with MDR from OneNeck and Alert Logic by reading the brochure here.

Are your containers secure? OneNeck has partnered with Alert Logic to offer top-notch intrusion detection for containers. Explore our specialized offering and fortify your container security.

grey line for containers vs virtual machines blog.

]]>
Azure AD is Now Microsoft Entra ID https://www.oneneck.com/blog/azure-ad-is-now-microsoft-entra-id/ Tue, 24 Oct 2023 15:06:14 +0000 https://www.oneneck.com/?p=5780 Names, often the first point of interaction, play a crucial role in setting expectations and understanding the crux of a product. Recognizing this, Microsoft announced a significant shift for one of its cornerstone services. As of October, Azure Active Directory (Azure AD), known and utilized by organizations worldwide, has officially transitioned to its new identity […]]]>

Names, often the first point of interaction, play a crucial role in setting expectations and understanding the crux of a product. Recognizing this, Microsoft announced a significant shift for one of its cornerstone services. As of October, Azure Active Directory (Azure AD), known and utilized by organizations worldwide, has officially transitioned to its new identity as Microsoft Entra ID.

Why the Change from Azure AD to Microsoft Entra ID?

Microsoft’s shift from Azure Active Directory® to Microsoft Entra ID® highlights its commitment to adaptability in a world where businesses use multiple cloud services and platforms. The new name, Microsoft Entra ID, clarifies that this tool is designed for easy identity management across different systems and platforms.

Additionally, the term “Active Directory” has often been linked with Windows Server Active Directory. By introducing “Entra ID,” Microsoft draws a clear line between its cloud-based identity service and the traditional on-premises system. This change also aligns with Microsoft’s goal to unify its product range under the Microsoft Entra banner, ensuring users’ consistent and straightforward experience.

Azure AD to Entra ID graphic

Source: Microsoft

What Does This Mean for Current Users?

For those already using Azure AD or in the process of deploying it, there’s good news:

  • No Interruptions: Your Azure AD will continue to function as usual. All configurations, deployments, and integrations remain unaffected.
  • Familiar Features: You can access all the Azure AD features through the Azure portal, Microsoft 365 admin center, and now, the Microsoft Entra admin center.
  • Consistent Licensing & Pricing: There are no changes to licensing, terms, service-level agreements, product certifications, support, or pricing.

Transitioning Smoothly from Azure AD to Microsoft Entra ID

Understanding the potential challenges and concerns that come with such a significant change, Microsoft has attempted to minimize disruption for its users, aiming to provide continuity and consistency, even as it introduced a new identity for a familiar product. A couple of things to note for this transition:

  • Consistency in Tools: Login URLs, APIs, PowerShell cmdlets, and Microsoft Authentication Libraries (MSAL) that businesses and developers rely on remained unchanged, ensuring no disruptions to existing workflows.
  • Updated Service Plans: As of October 1, 2023, users will have noticed changes in the display names for service plans. For instance, what was once known as Azure AD Free is now called Microsoft Entra ID Free.

What’s in a Name?

Names in the tech world are often more than just labels. As Microsoft transitioned from Azure Active Directory to Microsoft Entra ID, it was crucial to ensure that while the branding evolved, the underlying essence and the value it offers to users remained constant. This consistency means that even with the new nomenclature, users can expect the same robust features and functionalities they’ve grown accustomed to. For instance:

  • Consistent Access Control: What was previously known as “Azure AD Conditional Access” has transitioned to “Microsoft Entra Conditional Access,” continuing to offer users granular control over who has access to what.
  • Seamless Sign-On Experience: The “Azure AD single sign-on” feature, which provides users with a frictionless login experience across applications, is now branded as “Microsoft Entra single sign-on.”

It’s important to note that although many names have been changed, specific terminologies have been retained for clarity and continuity. Terms like Active Directory, developer tools, and Azure AD B2C continue to hold their original names, ensuring familiarity for long-time users.

The Bigger Picture for Microsoft Entra ID

Microsoft’s decision to rename Azure Active Directory to Microsoft Entra ID is more than just a rebranding; it reflects a broader attempt to make technology more accessible and secure for all users in the Modern Workplace

  • Embracing Multicloud and Multiplatform: As businesses diversify their tech stacks, using services from various providers and platforms, there’s a growing need for solutions that can effortlessly bridge these different environments. Microsoft Entra ID is designed with this in mind, offering robust multicloud and multiplatform functionalities that ensure seamless identity management, no matter where your services are hosted.
  • Clear Distinction from Traditional Systems: For many, the term “Active Directory” is synonymous with the on-premises identity solutions of yesteryears. With the introduction of “Entra ID,” Microsoft is signaling a clear departure from these traditional systems, emphasizing its cloud-first approach and the advantages that come with it.
  • Simplified Secure Access: With threats to digital security becoming increasingly sophisticated, there’s a pressing need for tools that offer robust protection without adding complexity. Microsoft Entra ID is a step in this direction, streamlining protective identity and network access processes making them more intuitive and user-friendly.

Partner with OneNeck

As you navigate these changes, remember you’re not alone. OneNeck, as an experienced Microsoft CSP and Solutions Partner, is here to guide and support you every step of the way. Whether you’re seeking insights on the new functionalities or an in-depth Entra ID Assessment, our team is ready to assist. Let us help you harness the full potential of Microsoft Entra ID and ensure a seamless transition for your organization.

Contact us today and take the next step in your digital transformation journey.

grey line for Azure AD is Now Microsoft Entra ID blog

]]>
Anatomy of Wartime Cyberattacks https://www.oneneck.com/blog/anatomy-of-wartime-cyberattacks/ Wed, 18 Oct 2023 15:46:42 +0000 https://www.oneneck.com/?p=5762 Cyberattacks during wartime have become a potent weapon, affecting the warring nations and regular citizens worldwide. Such shifts in cyber threats highlight the interconnected nature of our digital world, where geopolitical events in one region can have digital repercussions across the globe. A recent example underscores this global reach: the Israel-Hamas conflict has increased cyber […]]]>

Cyberattacks during wartime have become a potent weapon, affecting the warring nations and regular citizens worldwide. Such shifts in cyber threats highlight the interconnected nature of our digital world, where geopolitical events in one region can have digital repercussions across the globe. A recent example underscores this global reach: the Israel-Hamas conflict has increased cyber threats even in seemingly unrelated countries like Australia. With this evolving landscape of digital warfare, it’s crucial to understand the various cyberattacks that emerge during conflicts and their potential impacts.

DoS Attacks: More Than Just Wartime Cyberattacks

Denial of Service (DoS) attacks aim to incapacitate systems vital for offensive and defensive measures. By targeting infrastructure and applications that fortify and defend, attackers can effectively blind these systems, potentially masking a physical assault. Critical systems, whether for gathering intelligence, executing attacks, or facilitating communication, can be interrupted, severely limiting or preventing retaliation. Within hours of Hamas rockets entering Israel, DoS attacks started to spring up on Palestinian and Israeli sites, including nearly 3 dozen directed at Israeli government pages.

While the average individual might not directly encounter these cyberattacks, the implications for businesses are profound. Software and hardware companies supplying defense contracts should be proactive, anticipating the need for patching vulnerabilities and assisting in recovery and restoration efforts. Alarmingly, attackers might even compromise these defense-related companies well before conflicts arise, scouting for weaknesses to exploit.

Propaganda and False Information: Manipulating the Masses

In the age of information, controlling the narrative is a powerful tool. The compromise of news websites, especially during conflict, can significantly sway public perception. With awareness of this power, attackers employ various tactics to manipulate the masses. By attempting to swing the narrative in their favor, they can elicit support for a different side or even exaggerate the gravity of situations to create panic or confusion. This deception is not just about spreading false information but crafting a storyline that serves their agenda.

Unless you’re directly involved in the security of these news organizations, you’re likely a consumer of the information they provide. In such a scenario, how do you discern fact from fiction? The key lies in diversification. It’s crucial to cross-reference information, seeking out multiple sources before placing trust in a single outlet. Doing so gives you a more holistic view of events and safeguards yourself against falling prey to one-sided narratives.

Moreover, in this era of digital news, consider revisiting traditional forms of journalism, such as newspapers and magazines, which often undergo rigorous editorial processes.

Deep Fakes & AI: The New Face of Deception

With advancements in deep fake technology and AI, it’s become alarmingly easy to fabricate convincing audio and video. Deep fake technology uses advanced machine learning algorithms to craft realistic yet entirely fabricated content. The possibilities are endless and frightening, from altering speeches to manipulating facial expressions. Imagine a scenario where a video surfaces online showing a nation’s leader declaring war, admitting to crimes or even expressing sympathy for the opposition.

But it’s not just about political figures. Ordinary citizens can also become targets. From creating defamatory content to blackmail, the personal repercussions of deep fakes can be devastating.

In a world where seeing once meant believing, we now find ourselves questioning the authenticity of everything we view.

So, how can one navigate this treacherous digital landscape?

  • Consider the source. Is the content coming from a reputable outlet?
  • Look for corroborating evidence. Are other trusted sources reporting the same news?
  • Stay informed. Tools and platforms that detect deep fakes are also emerging and can offer additional protection.

Phishing & Financial Scams: Exploiting the Heartstrings During Wartime

War, with its devastating images and heart-wrenching stories, naturally evokes a strong emotional response. Always looking for vulnerabilities, scammers recognize this emotional state as an opportunity. Malicious actors deceive people by pretending to be charitable organizations or creating stories of suffering and need.

You might receive an email detailing the plight of war victims, complete with poignant images and a call to action. Or a message on social media from a seemingly reputable organization urging immediate donations to help those in need. While the instinct to help is commendable, pausing and evaluating is crucial. With awareness and caution, one can avoid falling into these traps.

Before making any donations, always verify the legitimacy of the organization. It is important to take simple steps such as checking official websites, reading reviews, and examining an organization’s records. Be especially wary of unsolicited requests for funds, no matter how genuine they seem. Remember, legitimate organizations rarely, if ever, resort to aggressive or emotionally manipulative tactics.

Supply Chain Interruption: The Global Domino Effect

Disrupting the supply chain can deliver a significant advantage in wartime. Whether it’s the agricultural sector ensuring food supplies, the energy sector providing fuel, or the industries engaged in arms manufacturing and defense technology, no area is immune. The objective is clear: weaken the opposition by cutting off resources.

However, the ramifications of such attacks extend far beyond the immediate conflict. In our interconnected global economy, disruptions in one region can ripple across industries, economies and livelihoods worldwide. For instance, a cyberattack on an oil refinery could lead to fuel shortages, escalating prices and transportation disruptions across continents.

For global citizens and businesses, this presents a dual threat. On the one hand, there’s the direct risk of being targeted in cyberattacks aimed at weakening specific supply chain elements. On the other, there’s the indirect impact. As supply chains falter, essential commodities can become scarce, leading to increased living costs, shortages of items and even socio-economic unrest.

Navigating this complex scenario requires a multi-faceted approach. Governments and industries must collaborate to fortify their digital and physical infrastructures. Regular audits, cybersecurity training, and international cooperation can help mitigate risks. It’s a wake-up call for individuals to understand the vulnerabilities inherent in our globalized system. Being informed, prepared and adaptable can help reduce supply chain challenges.

Wartime Cyberattacks: Safeguarding Yourself with a Trusted Partner

The digital warfare landscape is vast and ever-evolving, impacting not just nations in conflict but resonating globally. Economies, societies, businesses and individual lives are intertwined, making the consequences of digital threats far-reaching. As we move forward, we must recognize the magnitude of these challenges and the importance of staying informed.

Awareness, vigilance, and proactive measures are not just buzzwords; they are necessities in this digital age. By understanding the threats and taking timely actions, we can safeguard our digital assets and ensure a more secure future for all.

OneNeck offers cutting-edge cybersecurity solutions tailored to your needs. Having a trusted partner can make all the difference in challenging times.

Contact us today for a comprehensive cybersecurity assessment and fortify your digital defenses.

grey line for wartime cyberattacks blog.

]]>
October Patching Update: Key Vulnerabilities & Fixes https://www.oneneck.com/blog/october-2023-patching/ Tue, 17 Oct 2023 14:59:33 +0000 https://www.oneneck.com/?p=5757  Welcome to OneNeck’s monthly patching blog for October 2023. As your steadfast partner in IT security, our mission is to spotlight pivotal updates crucial to maintaining the integrity of your systems. Our dedicated engineers delve deep every month to dissect vendor-released patches, determining their ramifications and guiding necessary actions for our clientele. With OneNeck’s Managed […]]]>

 Welcome to OneNeck’s monthly patching blog for October 2023. As your steadfast partner in IT security, our mission is to spotlight pivotal updates crucial to maintaining the integrity of your systems. Our dedicated engineers delve deep every month to dissect vendor-released patches, determining their ramifications and guiding necessary actions for our clientele. With OneNeck’s Managed Patch Services, you can rest easy, confident that your systems remain secure, safeguarded, and current.

Key Patching Takeaways for October:

This month, Microsoft addressed a total of 104 flaws. These vulnerabilities are categorized as follows:

  • 26 Elevation of Privilege Vulnerabilities
  • 3 Security Feature Bypass Vulnerabilities
  • 45 Remote Code Execution Vulnerabilities
  • 12 Information Disclosure Vulnerabilities
  • 17 Denial of Service Vulnerabilities
  • 1 Spoofing Vulnerabilities

It’s worth noting that three of these vulnerabilities are zero-day—vulnerabilities known to malicious entities and potentially already being exploited.

Highlighted Patches for the Month:

Given their significant security implications, the following patches necessitate immediate attention:

  • CVE-2023-41763: Skype for Business – Elevation of Privilege Vulnerability. Here, An attacker could make a specially crafted network call to the target Skype for Business server, which causes the parsing of an HTTP request to an arbitrary address and potentially disclose IP addresses, port numbers or both to the attacker.
  • CVE-2023-36563: Microsoft WordPad – Information Disclosure Vulnerability. Exploiting this vulnerability could allow the disclosure of NTLM hashes.
  • CVE-2023-35349: Microsoft Message Queuing – Remote Code Execution Vulnerability. Successful exploitation of this vulnerability could allow an unauthenticated attacker to execute code on the target server remotely.

Important Patching Update from Our Unix Team

For October, a series of significant Unix patches have been released. This month, our team breaks down the following patches:

  • CVE-2020-22219: Important – Security Update for FLAC. This vulnerability addresses potential code execution flaws related to FLAC audio file parsing.
  • CVE-2022-40982, CVE-2023-22024, CVE-2023-3106, CVE-2023-3567, CVE-2023-42753: Important – Oracle Unbreakable Enterprise kernel security updates. These patches target vulnerabilities that could lead to unauthorized system access, data leaks, or disruptions in Oracle’s enterprise kernel services.
  • CVE-2023-20593 & CVE-2023-4004: Important – Oracle Linux kernel security and enhancement updates. These patches mitigate vulnerabilities in the Oracle Linux kernel, focusing on improving system stability and preventing potential privilege escalations.
  • CVE-2023-20900: Important – open-vm-tools security update. A patch to address potential risks associated with VMware tools, granting a malicious actor Guest Operation Privileges
  • CVE-2023-35001 & CVE-2023-35788: Important – Kernel security bug fixes and enhancement updates. These patches correct vulnerabilities in the Unix kernel that allow an out-of-bounds write in the flower classifier code that could result in denial of service or privilege escalation.
  • CVE-2023-4580 & CVE-2023-4585: Important – Firefox security updates where Push notifications stored on disk in private browsing mode were not encrypted, potentially allowing the leak of sensitive information.
  • CVE-2023-4863: Important – A security update for libwebp that allows a remote attacker to perform an out-of-bounds memory write via a crafted HTML page.

Microsoft Office Updates:

OneNeck does not patch Microsoft Office products during scheduled patching. We recommend all customers take the necessary action to apply Microsoft Office updates to their environment as soon as possible. If you have questions about how OneNeck can assist you with this in your environment, please contact the Service Desk.

Exchange Updates:

OneNeck encourages all customers to upgrade to Exchange Server 2019. OneNeck will apply Exchange Security Updates (along with the additional actions) under separate Change Requests for customers contracted with OneNeck for Exchange Management.

Microsoft will soon push out updates to disable TLS 1.0 and TLS 1.1. OneNeck encourages all customers to ensure their environment is adequately updated to ensure applications function with this updated security posture. For further details on TLS updates, please check the information provided by Microsoft’s blog post.

We look forward to sharing more insights next month, and as always, we’re here to assist and answer any queries you might have. Keeping your systems updated is crucial for security, and we’re committed to guiding you every step of the way.

Stay secure and stay patched!

grey line for October patching blog.

Each month, OneNeck engineers review newly released updates from vendors, like Microsoft, to understand any known issues, actions required and understand the priority of each. This is done immediately following Patch Tuesday releases, and we monitor for adjustments to patches throughout each month.

The information above is gathered monthly during this review and posted for awareness to our customers. This information is generally updated only once per month and is based on our engineers’ review of the information provided by the vendor at that time. As always, for the most up-to-date patching information, please see the vendor’s website or contact us.

Note: If OneNeck actively manages a device or software that is impacted by any of these vulnerabilities, when necessary, OneNeck will be in direct contact with you regarding remediation.

]]>
Transitioning from VLSC to Microsoft Admin Center for License Management https://www.oneneck.com/blog/transitioning-from-vlsc-to-microsoft-admin-center-for-license-management/ Mon, 16 Oct 2023 18:47:54 +0000 https://www.oneneck.com/?p=5658 Roughly two years ago, Microsoft announced changes to its licensing management system and began transitioning functionality away from its Volume Licensing Service Center (VLSC) and into the Microsoft Admin Center. Since this announcement, functionality mostly remained paralleled at both locations. However, as of Spring 2023, Microsoft has begun to remove these functionalities from the VLSC, […]]]>

Roughly two years ago, Microsoft announced changes to its licensing management system and began transitioning functionality away from its Volume Licensing Service Center (VLSC) and into the Microsoft Admin Center. Since this announcement, functionality mostly remained paralleled at both locations.

However, as of Spring 2023, Microsoft has begun to remove these functionalities from the VLSC, with customers needing to access them exclusively on the Microsoft 365 Administration site. With the enforcement of this change and the retirement of particular features in VLSC, many customers are now finding they are having difficulties accessing these elements and are unsure exactly how to proceed. Read on to learn more about the VLSC changes and features being retired and ways to access your licensing.

Understanding Microsoft Volume Licensing in Microsoft 365

The Microsoft VLSC has traditionally been the go-to platform for managing licenses, retrieving keys and downloading software. However, in line with its stated intent of creating a more integrated and universal experience, Microsoft has been gradually shifting certain functionalities from the VLSC to the Microsoft 365 Admin site, also known as the Microsoft Admin Center.

Microsoft presents a variety of licensing solutions tailored to meet the unique requirements of its users. As a reputable reseller, OneNeck offers volume licensing through the Open Value plan, among other options. Such plans are especially suited for clients looking for on-premises solutions or those interested in leveraging the advantages of Software Assurance.

What’s Changing with VLSC and Microsoft Admin Center?

In April 2023, Microsoft decided to retire specific features from the VLSC. These retirements mean these features will be exclusively available on the Microsoft Admin Center. The move is part of Microsoft’s broader strategy to streamline its services and offer a more cohesive user experience.

To view volume licensing in the Microsoft 365 admin center, you must have registered a license ID (volume licensing agreement or enrollment) in the VLSC. After registering in the VLSC and signing into the Microsoft 365 admin center at least once, it won’t be necessary to return to VLSC for those volume licensing features that have been relocated.

As a result of these changes, many clients are now transitioning to the Microsoft Admin Center from the VLSC. If you’re one of them, here are some resources to guide you through the process:

Assistance with Transitioning to Microsoft Admin Center

Transitioning to a new platform can sometimes be challenging. If you encounter issues accessing your licensing details on the Microsoft Admin Center, don’t hesitate to seek help. Microsoft has a dedicated Volume Licensing Service team ready to assist you. For those users that purchased licenses from 3rd-party sources, you will most likely need to contact Microsoft Support in order to register a license ID in the VLSC and then gain access to the Microsoft Admin sites.

Typical response time for web inquiries can range upwards to 24 hours. So, if your concern is urgent, it’s advisable to contact them via phone.

Transitions, like the shift from VLSC to the Microsoft Admin Center, can present challenges. While these changes usually aim to offer a more streamlined experience, they can also require adjustments and a period of adaptation. OneNeck understands these challenges and is here to assist. We aim to help you navigate these changes smoothly, ensuring you can efficiently manage your licensing and continue your operations with minimal disruption.

If you have questions or need support, don’t hesitate to contact our team today.

grey line to end Transitioning from VLSC to Microsoft Admin Center for License Management blog.

]]>
Maintaining Cyber Vigilance in a World of Digital Threats https://www.oneneck.com/blog/maintaining-cyber-vigilance-in-a-world-of-digital-threats/ Fri, 13 Oct 2023 15:15:43 +0000 https://www.oneneck.com/?p=5727 The world’s attention is spread thin from the recent unrest in the Middle East to the prolonged conflict between Ukraine and Russia and a US presidential election on the horizon. These events, while primarily political and military in nature, also significantly impact our digital world. The interconnectedness of our global society means that disruptions in […]]]>

The world’s attention is spread thin from the recent unrest in the Middle East to the prolonged conflict between Ukraine and Russia and a US presidential election on the horizon. These events, while primarily political and military in nature, also significantly impact our digital world. The interconnectedness of our global society means that disruptions in one area can lead to challenges in another. As geopolitical tensions rise, the online environment becomes a new battleground for conflicts, espionage, and cyberattacks. Individuals, businesses, and nations must exercise cyber vigilance, understanding that physical borders aren’t the only boundaries at risk.

Bad actors, state-sponsored and opportunistic hackers, are always looking for moments of vulnerability. They exploit the heightened emotions and distractions of global events to launch cyberattacks. As tensions escalated around Israel, documented cyberattacks paralleled the physical military confrontations. But it’s crucial to understand that these digital threats aren’t confined to the primary participants of these global events. Allies, supply chains, businesses and even individuals can find themselves caught in the crossfire.

Given the current state of affairs, it’s more important than ever for everyone to exhibit cyber vigilance. Here’s what you can do to safeguard your digital assets:

Cyber Vigilance Education

While it may be a cliché, knowledge truly is power when it comes to cybersecurity. It’s about having the right tools and cultivating an informed mindset to discern threats and act proactively. Understanding the attackers’ tactics and adopting a vigilant approach can significantly reduce our vulnerability to cyber threats. Here’s how you can bolster your cybersecurity knowledge:

  • Understanding Attacker Tactics

    • Stay Informed – Regularly read up on the latest cyberattack methods. Knowledge is your first line of defense.
    • Real-world Examples – Familiarize yourself with case studies of recent cyberattacks to understand their modus operandi.
  • Distrust and Verify

    • Be Skeptical – Always question unsolicited communications, especially if they ask for personal or financial information.
    • Double-check – If you receive an unexpected request, contact the person or organization directly using a verified method, like their official phone number, before taking action.
  • Formal Training with KnowBe4

    • What is it? – KnowBe4 is a platform that offers security awareness training to help organizations and individuals recognize and combat cybersecurity threats.
    • Why is it important? – With the proper training, you can identify phishing emails, malicious attachments and other threats before they become a problem.

Patch Regularly

Staying updated is not just about accessing the latest features; it’s a critical defense mechanism. Regularly updating your software protects you against known vulnerabilities that cybercriminals could exploit. Think of patches as digital armor, reinforcing your systems against potential threats. Here’s why regular updates are essential and how you can maintain them:

  • Update Computer Operating Systems

    • Stay Current – Manufacturers regularly release updates that patch vulnerabilities. Ensure you’re always using the latest version.
    • Automate – Set your system to update automatically whenever a new version is available.
    • Patch Management – Investing in patch management ensures critical updates are prioritized and applied in a timely manner.
  • Mobile Device Updates

    • Consistent Checks – Mobile devices are frequent targets. Regularly check for software updates to stay protected.
    • Beware of Third-party Stores – Only download apps from official app stores to reduce the risk of malware.
  • Application Updates

    • Why it Matters – Outdated software can have vulnerabilities that hackers exploit. Keeping them updated closes these security gaps.
    • Set Reminders – If your software doesn’t update automatically, you can use tools or set up calendar reminders to check for updates regularly. This way, you can ensure that your software is always up-to-date with the latest features and security patches.

Bolster Defenses

A proactive stance is always better than a reactive one. While staying informed and keeping systems updated is essential, having robust defenses in place is equally crucial. Think of these defenses as the walls of a digital fortress designed to keep intruders at bay. From multi-layered authentication methods to strong passwords and robust antivirus measures, here’s how you can fortify your digital defenses:

  • Embrace Multi-Factor Authentication (MFA)

    • Extra Layer – MFA requires two or more verification methods. These methods often consist of something you know (password), something you have (a phone) or something you are (fingerprint).
    • Deterrence – MFA can prevent unauthorized access even if a hacker gets your password.
  • Strengthen Passwords

    • Complexity is Key – Use a mix of uppercase, lowercase, numbers, and symbols. Creating passphrases is a helpful way to ensure length and complexity are accounted for while remaining memorable for the user.
    • Avoid Common Mistakes – Never use easily guessable passwords like “password123” or “admin.”
    • Use a Password Manager – These tools generate and store complex passwords for you, reducing the risk of breaches.
  • Invest in Antivirus Software

    • Real-time Protection – Good antivirus software monitors your system in real-time, catching threats before they can do substantial harm.
    • Regular Scans – Schedule weekly or daily scans to ensure no malware has slipped through.

Your Trusted Cyber Vigilance Ally

Cyber vigilance is always necessary, but its importance during turbulent times cannot be overstated. While global events capture our attention, it’s essential to remember that our digital spaces require consistent protection. We boost digital safety by staying informed, maintaining vigilance and applying best practices. Especially during challenging periods, a dedicated approach to online security is crucial to prevent potential threats and maintain the integrity of digital interactions.

Choosing the right security partner is pivotal. Whether you’re looking to strengthen cybersecurity measures, enhance IT infrastructure or explore new digital solutions, OneNeck is here to support and guide you.

Don’t compromise on digital security. Contact us today; together, we’ll help ensure a robust and secure digital experience.

grey line for cyber vigilance blog.

]]>
Critical Security Vulnerability for NetScaler ADC and NetScaler Gateway https://www.oneneck.com/blog/critical-security-vulnerability-for-netscaler-adc-and-netscaler-gateway/ Thu, 12 Oct 2023 15:00:51 +0000 https://www.oneneck.com/?p=5737 On October 10, 2023, Citrix released a security bulletin concerning the discovery of two critical vulnerabilities. This announcement highlighted vulnerabilities in their flagship products: NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly known as Citrix Gateway). These vulnerabilities are particularly concerning as, if successfully exploited, they could compromise the integrity and security of systems […]]]>

On October 10, 2023, Citrix released a security bulletin concerning the discovery of two critical vulnerabilities. This announcement highlighted vulnerabilities in their flagship products: NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly known as Citrix Gateway). These vulnerabilities are particularly concerning as, if successfully exploited, they could compromise the integrity and security of systems and data. Specifically, the vulnerabilities could lead to:

  • CVE-2023-4966: Sensitive information disclosure
  • CVE-2023-4967: Denial of service

NetScaler CVE ID chart

Source: Citrix

Affected NetScaler Versions

The following versions of NetScaler ADC and NetScaler Gateway are affected:

  • NetScaler ADC and NetScaler Gateway 14.1 before 14.1-8.50
  • NetScaler ADC and NetScaler Gateway 13.1 before 13.1-49.15
  • NetScaler ADC and NetScaler Gateway 13.0 before 13.0-92.19
  • NetScaler ADC 13.1-FIPS before 13.1-37.164
  • NetScaler ADC 12.1-FIPS before 12.1-55.300
  • NetScaler ADC 12.1-NDcPP before 12.1-55.300

These vulnerabilities do not directly impact customers utilizing Citrix-managed cloud services or Citrix-managed Adaptive Authentication, and, as such, no immediate action is required.

Another important item to note is that NetScaler ADC and NetScaler Gateway version 12.1 is now End-of-Life (EOL) and remains vulnerable.

For more detailed information, please refer to the official Citrix security bulletin on the Citrix Knowledge Center.

Recommended Action

In light of these recent discoveries, OneNeck cannot emphasize enough the importance of timely action. We strongly urge all affected customers to prioritize the installation of the updated versions of NetScaler ADC and NetScaler Gateway. By doing so, you can ensure your systems’ continued security and integrity, safeguarding them against potential exploits.

We have some reassuring news for our valued customers utilizing OneNeck’s managed services. We’ve already initiated contact and are actively supporting you in addressing these vulnerabilities. Rest assured, we’re on top of this situation to ensure your systems remain secure.

OneNeck’s Commitment to Customer Security

At OneNeck, we prioritize the security of our customers. We understand the complexities and challenges of managing and updating IT infrastructure. Beyond these immediate concerns, we also offer Citrix Assurance Services as well as comprehensive patch management to ensure long-term system security and stability. As a trusted partner, we stand ready to help any customer needing support, whether for installing the necessary patches or for broader IT management solutions.

Additionally, we invite you to check out our Monthly Patching Blog series. It’s a valuable resource to keep you informed on the latest critical updates from our vendors, ensuring you’re always ahead of potential threats.

If you require assistance or have any concerns, please contact our Customer Care Center. Our team is ready and available to guide you through the update process and beyond, ensuring your systems remain secure and resilient.

grey line for Citrix NetScaler vulnerability blog.

]]>
Microsoft Teams for VDI – What You Need to Know https://www.oneneck.com/blog/microsoft-teams-for-vdi-what-you-need-to-know/ Tue, 10 Oct 2023 16:10:27 +0000 https://www.oneneck.com/?p=5665 Many organizations have adopted Microsoft Teams as a cornerstone in the ever-evolving world of remote work and collaboration. To better support these organizations, Microsoft released an update for Teams optimized for Virtualized Desktop Infrastructure (VDI). This update is crucial for those utilizing VDI deployments like Citrix Workspace, Azure Virtual Desktops, VMware Horizon and Microsoft Remote […]]]>

Many organizations have adopted Microsoft Teams as a cornerstone in the ever-evolving world of remote work and collaboration. To better support these organizations, Microsoft released an update for Teams optimized for Virtualized Desktop Infrastructure (VDI). This update is crucial for those utilizing VDI deployments like Citrix Workspace, Azure Virtual Desktops, VMware Horizon and Microsoft Remote Desktop Services. In this blog, we’ll outline the new requirements and walk you through the installation process.

Key Benefits of Microsoft Teams for VDI Deployments:

Azure Virtual Desktops

Microsoft’s Azure Virtual Desktop now offers audio/video (AV) optimization for Teams on VDI.

Citrix DaaS/Virtual Apps and Desktops

Teams is now compatible with various versions of the Citrix Workspace app and Citrix Virtual Delivery Agent (VDA). However, it’s worth noting that Citrix Virtual Apps (also known as published apps) is currently not supported.

VMware Horizon

Teams is now supported on Horizon Agent 7.13.1 or 2103, ensuring optimized Teams experiences for VMware Horizon users.

Microsoft Remote Desktop Services

Users can benefit from AV advancements with the new Teams client.

Minimum Requirement:

To install the new Teams, virtual machines need to satisfy the minimum requirements outlined here.

Microsoft Teams for VDI minimum requirements graphic.

Source: Microsoft

How to Install Microsoft Teams for VDI:

To ensure a successful installation of Microsoft Teams for VDI, follow the guidelines provided by Microsoft in their official documentation. Here’s a summarized step-by-step guide:

  1. Check Virtualization Provider Requirements: Ensure your virtualization provider is certified. Currently, Microsoft Teams for VDI with AV optimization is certified with Azure Virtual Desktops, Windows 365, Citrix, and VMware.
  2. Review Minimum Version Requirements: The minimum version requirements for software components vary depending on your virtualization provider. For instance, Azure Virtual Desktop requires:
    • Remote Desktop Client for Windows 1.2.1755
    • Remote Desktop Client for Mac 10.7.7
    • WebRTC Redirector Service 1.1.2110.16001
  3. Deploy Necessary Registry Keys: To optimize the new Teams client when being deployed via Azure Virtual Desktops, a registry key must be deployed.
  4. Installation Options:
    • Option 1: Uninstall the classic Teams client and install the new one. This is the recommended method; you can use the direct or “bulk deployment” method.
    • Option 2: Install both apps ‘side by side’. Users can switch between them using the toggle on the top left of the Teams UI.
  5. Ensure Profile and Cache Location: The new Teams client stores all settings and configurations in a designated folder. To ensure the proper functioning of MS Teams, ensure the persistence of this folder.

Enhancements in New Teams:

The new Teams client introduces a range of improvements to enhance the user experience in VDI environments:

  • Channels 2.0: This is a significant upgrade to how channels function in Teams. Channels 2.0 offers a more organized and streamlined approach to team collaboration. Users can navigate and collaborate more efficiently within their teams with enhanced features like pinned channels, better notification management, and improved search capabilities.
  • Multi-window Support: Previously, users often found it cumbersome to juggle between different chats, meetings, and documents within a single Teams window. With the new update, Teams now supports multiple windows by default, allowing users to open chats, meetings, or documents in separate windows for a more flexible and multitasking-friendly environment.

 Key Takeaways for OneNeck Customers:

The Teams update for VDI addresses the specific needs of organizations using virtualized environments. With this update, Microsoft introduced changes to ensure seamless integration of Teams across various VDI deployments, including Citrix DaaS and Desktops, Azure Virtual Desktops, VMware Horizon and Microsoft Remote Desktop Services. Organizations should stay updated on these changes, understand the new requirements and follow the recommended installation procedures.

If you need help upgrading or deploying Teams in a VDI environment, OneNeck, an experienced Microsoft Solutions Partner, can simplify M365 management.

Contact us today to ensure a smooth transition and get the most out of your Teams experience.

grey line for Microsoft Teams for VDI - What You Need to Know blog.

]]>
Cybersecurity Awareness Month: Simple Steps for Staying Safer Online https://www.oneneck.com/blog/cybersecurity-awareness-month-simple-steps-for-staying-safer-online/ Fri, 06 Oct 2023 14:20:09 +0000 https://www.oneneck.com/?p=5636 October is more than just the month of fall foliage and Halloween; it’s a period that has, for the past two decades, been dedicated to cybersecurity. As we mark the 20th Cybersecurity Awareness Month, it’s clear that with the increasing volume and sophistication of cyberattacks, cybersecurity and its subsequent awareness are just as, if not […]]]>

October is more than just the month of fall foliage and Halloween; it’s a period that has, for the past two decades, been dedicated to cybersecurity. As we mark the 20th Cybersecurity Awareness Month, it’s clear that with the increasing volume and sophistication of cyberattacks, cybersecurity and its subsequent awareness are just as, if not more, important today. The collaborative efforts of governmental agencies and those in the tech industry underscore the imperative of ensuring individuals and businesses remain secure.

Cybersecurity Awareness Month: A Two Decades Journey

Cybersecurity Awareness Month was established when our digital landscape looked quite different. Following the tragic events of 9/11, government agencies and tech industry leaders collectively recognized the critical need for digital safety. Organizations including the Department of Homeland Security (DHS), the White House, and tech leaders such as Microsoft, Amazon, Cisco and others joined together to educate the public on the necessity of safe technology usage. This effort gave birth to Cybersecurity Awareness Month. This campaign has evolved over the years to be co-managed by the National Cybersecurity Alliance (NCA) and the U.S. Cybersecurity and Infrastructure Security Agency (CISA).

During its first instance, the primary advice of Cybersecurity Awareness Month was straightforward: change passwords in tandem with smoke detector battery replacements. While this was a practical starting point, the digital landscape has evolved dramatically. With the rise in volume and sophistication of cyberattacks, such simplistic advice is no longer sufficient. The nature of threats has shifted from mere password breaches to advanced persistent threats, ransomware attacks, and sophisticated phishing schemes. The goals and recommendations have matured over the years, reflecting the complexities of today’s cyber threats.

With that said, one of the primary objectives of Cybersecurity Awareness Month is to let users know that being safer does not need to be overly complicated or arduous. Rather, by adding a handful of simple actions to our daily routines, we can all become significantly safer whenever we are online.

2023 Cybersecurity Awareness Month Banner Image source: cisa.gov

Everyday Actions for Cybersecurity Awareness Month

Awareness is undeniably the foundation of digital safety. However, it’s the actions we take, based on that awareness, that truly determine our security in the digital realm. This year’s theme from CISA, “Secure Our World,” is a firm reminder, emphasizing our collective role in fortifying the digital space. Let’s delve deeper into the four actions highlighted by the campaign:

Use Strong Passwords

In today’s digital age, where data breaches have unfortunately become commonplace, the significance of using robust passwords cannot be overstated. A strong password is the first line of defense against potential cyber threats. But what constitutes a strong password? In a post from earlier this year, OneNeck’s Security Specialist, Nick Santilli, states that ideally, it should be a combination of letters (uppercase and lowercase), numbers and special symbols, making it difficult for cybercriminals to guess or crack. He further recommends that instead of passWORDS, think more in terms of passPHRASES. Passphrases are typically longer than passwords and, therefore, harder to crack.

Moreover, with the plethora of online accounts most of us manage, remembering unique passwords for each can be daunting. This need for password organization is where password managers come into play. These tools store your passwords securely and generate strong, random passwords for your accounts.

Enable Multi-Factor Authentication (MFA)

While a strong password is crucial, it’s not infallible. Cybercriminals have developed methods to compromise even the most complex passwords. This need to supplement the protection offered by login credentials is where Multi-Factor Authentication (MFA) steps in.

As mentioned in our March blog, To MFA or Not to MFA – It’s Not Really a Question Anymore, MFA requires users to provide two or more verification factors to access an account, making unauthorized access incredibly challenging. This validation could be something you know (password), something you have (a phone or hardware token), or something you are (fingerprint or facial recognition). By adding this additional layer of security, even if an attacker manages to steal your password, they won’t be able to access your account without the second verification factor.

Recognize and Report Phishing

Phishing attacks are the most common form of cybercrime. Cybercriminals craft seemingly legitimate emails, messages or websites to deceive individuals into providing sensitive data, such as personally identifiable information, banking details or login credentials. It’s imperative to be discerning and vigilant. For organizations, educating and training employees is essential. One particularly effective method to train and test is using simulated phishing attacks.

While organizations can employ training methods, individuals must also be vigilant in recognizing and responding to potential threats. Always verify the source before clicking on any links or downloading attachments. Look for telltale signs of phishing, such as generic greetings, spelling errors or suspicious email addresses. Trust your instincts and avoid interacting with the message if something seems amiss. Moreover, reporting suspicious activity is fundamental in curbing such threats and ensuring that others are warned quickly.

Regularly Update Software

The digital landscape is dynamic, with cyber threats constantly evolving. To counter these threats, software developers regularly release updates that patch known vulnerabilities. Keeping your software updated, be it your operating system, applications or antivirus, protects against the latest known threats.

Auto-updates are one option for keeping software current. Still, they might not always be feasible for organizations due to compatibility issues, work schedules or other business requirements. In such cases, investing in patch management becomes crucial. Patch management ensures that updates and patches are prioritized and applied promptly, offering a structured approach to maintaining software security.

OneNeck: Your Partner for Cybersecurity Awareness Month and Beyond

At OneNeck, our core values resonate deeply with the goals of Cybersecurity Awareness Month. While security might be intricate for professionals, we understand that it should be accessible and straightforward for everyone else. Simple measures such as MFA, password managers and cybersecurity education (like recognizing phishing scams) can significantly enhance digital security for your business.

Take action this Cybersecurity Awareness Month. Partner with OneNeck, and let’s work together to fortify your digital defenses, ensuring a safer and more secure online environment for your business.

grey line for Cybersecurity Awareness Month blog

]]>
Cyber Insurance: Simple Steps for Preparation https://www.oneneck.com/blog/cyber-insurance-simple-steps-for-preparation/ Tue, 03 Oct 2023 14:48:04 +0000 https://www.oneneck.com/?p=5596 Cybersecurity is a critical concern for organizations worldwide. As businesses increasingly rely on networked technologies, potential risks and vulnerabilities have escalated. Consequently, cyber insurance has become a vital tool in the risk management strategy of many organizations. In this blog, we delve into cyber insurance, highlighting its necessity, the challenges in acquiring it and strategies […]]]>

Cybersecurity is a critical concern for organizations worldwide. As businesses increasingly rely on networked technologies, potential risks and vulnerabilities have escalated. Consequently, cyber insurance has become a vital tool in the risk management strategy of many organizations. In this blog, we delve into cyber insurance, highlighting its necessity, the challenges in acquiring it and strategies to secure better rates and coverage.

The Growing Need for Cyber Insurance

Cyber insurance serves as a safety net, helping organizations mitigate the financial and operational repercussions of cyber threats like ransomware. However, many businesses are at a crossroads, unsure of what policies to obtain or if insurers will even underwrite their risk.

Recent research underscores the growing perception among organizations that ransomware poses a significant threat to their viability. Despite increased awareness and dedicated efforts to counter these threats, a mere 15% of companies have adopted active cyber insurance policies, as the Enterprise Strategy Group (ESG) reported.

Challenges in Acquiring Cyber Insurance

While it stands to reason that obtaining cyber insurance should be a straightforward process, given its importance for most organizations, the actual experience tells a different story. Organizations frequently encounter a series of obstacles in pursuing cyber insurance. These hurdles, including soaring premium rates and rigid underwriter requirements, add layers of complexity to the acquisition process.

A notable 56% of IT and security leaders find it challenging to navigate these hurdles, highlighting the need for expert guidance to facilitate a smooth policy acquisition process. Let’s examine the primary challenges organizations face:

Escalating Rates

  • Surge in Premium Rates: The cyber insurance market is experiencing a significant premium rate increase. This surge is primarily attributed to the growing frequency and severity of cyber-attacks, which have heightened the risk factors associated with providing coverage.
  • Market Dynamics: The dynamics of the insurance market, influenced by global economic factors and regulatory changes, also play a crucial role in the escalation of rates. Organizations need to stay abreast of these dynamics to negotiate better terms.

Coverage Limitations

  • Restricted Scope of Protection: Organizations often find that the coverage offered by cyber insurance policies is limited, restricting the scope of protection and leaving them vulnerable to uncovered threats under standard policy terms.
  • Customization Challenges: Tailoring a policy to suit an organization’s unique needs and risk profile can be complicated. It requires a deep understanding of the potential risks and the ability to negotiate terms that offer comprehensive protection.

Meeting Underwriter Requirements

  • Comprehensive Cybersecurity Assessment: Meeting the stringent requirements set by underwriters is a significant hurdle. This process often entails a detailed assessment of the organization’s cybersecurity posture, including evaluating the attack surface and the effectiveness of the existing security measures.
  • Demonstrating a Robust Security Program: Organizations must show a robust security program encompassing vulnerability management and a well-functioning security operations function. This presentation assures underwriters of their preparedness to mitigate potential cyber threats.

What Companies Need to Know

Navigating cyber insurance requires a solid understanding of your company and the insurance landscape. The first step is a comprehensive self-assessment to gauge your company’s cybersecurity posture. This process helps identify the strengths and weaknesses of your existing cybersecurity measures, allowing you to opt for coverage that aligns precisely with your company’s needs. It is vital to avoid succumbing to the pressure of accepting terms or add-ons that do not mesh with your business operations.

Understanding the terminology and nomenclature used in the cyber insurance sector is equally important. This knowledge enables communication of your needs and empowers you to negotiate terms that serve your company’s best interests. Keeping abreast of trends and dynamics in the cyber insurance market is crucial and includes understanding insurance companies’ evaluation of potential clients.

It’s worth noting that the cyber insurance industry operates with considerable flexibility due to a lack of stringent regulations, allowing insurers significant leeway in setting terms and conditions. This freedom grants insurers substantial discretion in determining policy coverage and associated costs.

Strategies to Secure Better Cyber Insurance Rates and Coverage

It’s no secret that companies seek ways to snag better deals and broader coverage from their cyber insurance policies. Let’s walk through some key strategies that can serve as an outline for securing an approach that is both economically viable and comprehensive:

  • Collaborative Assessment and Action Planning: Organizations must engage in a collaborative security assessment process to secure better rates and coverage. This involves working closely with managed service providers like OneNeck, who guide IT and security leaders through meticulously evaluating the current environment and identifying gaps. This assessment culminates in a proposed action plan that bolsters security measures and streamlines the process.
  • Leveraging Managed Detection and Response (MDR) Services: Increasing numbers of organizations recognize the importance of utilizing Managed Detection and Response (MDR) services as a vital step in meeting the prerequisites for cyber insurance. Engaging with MDR providers not only helps fulfill the requirements but also strengthens the security program, enhancing the organization’s credibility and standing in the eyes of insurers.
  • Building a Tailored Security Program: Every organization has a unique infrastructure and risk profile. Hence, adopting a one-size-fits-all approach to cybersecurity isn’t viable. Organizations must strive to build a security program that aligns with their environment, operating model and risk profile. This process involves understanding the attack surface, assessing external assets that add risk and implementing preventative security controls.
  • Incident Response (IR) Planning: IR planning is a core activity that prepares organizations to respond effectively to cyber incidents. It encompasses a range of strategies and processes designed to mitigate the impact of cyber-attacks and ensure swift recovery. Moreover, if your company has encountered security breaches, it might influence policy eligibility and the cost. Being prepared to showcase the measures implemented to mitigate future risks can be a strong bargaining point.

Partnering with Experts for a Secure Future

Navigating the complex world of cyber insurance requires a proactive and achievable cyber defense plan. Organizations must focus on building continuous processes supported by automated tools to meet the dynamic demands of the cyber landscape. Moreover, partnering with experts like OneNeck can facilitate a seamless journey towards securing a robust cyber insurance policy, ensuring you are well-prepared to face the evolving cyber threats head-on.

To further empower your organization, we invite you to watch our insightful webinar, “Take the Driver’s Seat from Your Cyber-Insurance Underwriter.” This session, led by OneNeck industry experts, will provide you with the knowledge and tools to confidently navigate the complex landscape of cyber insurance. The webinar is available on demand, allowing you to access this valuable information at your own pace and convenience.

Contact us today to strengthen your cybersecurity posture and find the best cyber insurance solutions tailored to your needs. Our expert team is here to guide you every step of the way, ensuring a safer and more secure digital journey ahead.

Take the first step towards a proactive and fortified cyber defense strategy today.

grey line for cyber insurance blog.

]]>
Getting Started with Microsoft Power Platform https://www.oneneck.com/blog/getting-started-with-microsoft-power-platform/ Fri, 29 Sep 2023 14:33:08 +0000 https://www.oneneck.com/?p=5611 Learn How Microsoft Power Platform Brings Automation and Efficiency to Your Team In today’s business environment, the need for innovative and efficient solutions to manage data has never been more crucial. As organizations grapple with an ever-increasing influx of information, Microsoft Power Platform® provides an answer. This modern technology suite empowers businesses and individuals alike, […]]]>

Learn How Microsoft Power Platform Brings Automation and Efficiency to Your Team

In today’s business environment, the need for innovative and efficient solutions to manage data has never been more crucial. As organizations grapple with an ever-increasing influx of information, Microsoft Power Platform® provides an answer. This modern technology suite empowers businesses and individuals alike, offering tools to analyze, automate and act decisively. The result? Enhanced productivity and growth that positions companies at the forefront of their industries.

Here’s a closer look at the platform — what it is, what it does and how it will benefit your organization.

What is Microsoft Power Platform?

Microsoft Power Platform is a robust and scalable suite of capabilities to help you transform data analytics, accelerate application development, automate processes and create intelligent virtual assistants with ease. It seamlessly integrates various functionalities, ensuring that organizations have the tools they need to navigate the complexities of today’s digital landscape. Whether it’s harnessing data insights, developing custom applications or streamlining operations, the Power Platform is designed to be a versatile ally in driving business growth and innovation.

Power Platform includes the following components:

  • Power Apps
  • Power Automate
  • Power BI
  • Power Pages
  • Power Virtual Agents

Let’s look at each of these in more detail.

Power Apps

Power Apps is a low-code app development tool that allows virtually anyone to design applications tailored to their specific needs without requiring in-depth coding skills. It democratizes app creation by offering users intuitive drag-and-drop interfaces and pre-built templates which make it simple to build complex features with ease—all without IT or app dev team interventions.

Power Automate

Power Automate replaces time-consuming and laborious manual tasks. The tool streamlines departmental work or cross-functional collaborations using conditional logic (read: similar to programming ‘if-then’ statements) that triggers necessary tasks automatically based on your chosen criteria.

Whether you are dealing with HR onboarding tasks or seeking to optimize a marketing campaign’s outreach, Power Automate dramatically increases simplicity and productivity.

Power BI

Microsoft’s Power BI intelligence tool simplifies data analysis via interactive visualizations and consolidates information from different sources onto user-friendly dashboards.

From graphs depicting sales performance metrics to charts showing vital customer behavior trends, Power BI provides extensive transparency for smarter, data-informed decision-making processes.

Power Pages

Power Pages is a no-code tool that allows general business users to create dynamic, informative websites and pages quickly and easily. With an extensive library of web page templates and drag-and-drop design operations, virtually anyone can build intuitive interfaces for market-tailored creations and personalized user experiences.

Recently OneNeck’s parent company, TDS, used Power Pages to transition from an inefficient email-based system to a centralized portal, enhancing communication and request management for their extensive network. Read the case study here.

Power Virtual Agents

Chatbots and digital assistants are all the rage. Microsoft’s Power Virtual Agents features Microsoft’s AI capabilities and pre-built templates to deploy responsive virtual agents without requiring coding skills. These bot assistants can answer routine questions, resolve common issues and intelligently route more complex problems to human operators.

Benefits of Using the Microsoft Power Platform

Embracing Power Platform can be a game-changer for your business. Throughout your digital transformation journey, Microsoft’s all-encompassing technology prioritizes efficiency and innovation to deliver three key benefits:

Streamlined Business Operations

The Microsoft platform automates previously manual processes. Unburden your team from routine tasks to save time, resources and frustration while streamlining operations and improving data quality and accuracy.

New Data Insights

Enterprise data can provide a wealth of helpful insights—so long as you have the right tools to analyze it comprehensively. Microsoft solutions like Power BI turn abstract numbers into actionable insights through powerful data visualization capabilities. Now, you can make truly data-informed decisions quicker and more confidently with real-time analytics instead of relying on gut instinct and guesswork.

Low-Code for Non-Technical End Users

Low-code and no-code tools are ushering in a new era of DIY app, website, and workflow design. Microsoft Power Platform is a scalable solution that provides intuitive design and development features that allow any non-technical business user to easily create custom tools to solve business challenges big and small, for today and tomorrow.

How to get started with Microsoft Power Platform

Ready to take Microsoft Power Platform for a spin? As a Microsoft Solutions Partner, OneNeck is the go-to resource for helping your team get the tools and platform components it needs to meet and address your most pressing business challenges.

Schedule a free, 4-hour Power Platform consultation with OneNeck to explore how it can help you be more efficient and make a greater impact on the work you do every day.

grey line for Microsoft Power Platform blog.

]]>
Cisco’s HyperFlex End-of-Life and the New Nutanix Partnership https://www.oneneck.com/blog/ciscos-hyperflex-end-of-life-and-the-new-nutanix-partnership/ Tue, 26 Sep 2023 18:05:54 +0000 https://www.oneneck.com/?p=5602 Recently, Cisco made a pivotal announcement that marks a new direction in strategy. They announced the end-of-life of the HyperFlex Data Platform, a key product in the hyperconverged infrastructure (HCI) market. Cisco has set September 11, 2024, as the final order date, though renewals will be accepted for existing subscriptions until February 28, 2029. Cisco […]]]>

Recently, Cisco made a pivotal announcement that marks a new direction in strategy. They announced the end-of-life of the HyperFlex Data Platform, a key product in the hyperconverged infrastructure (HCI) market.

Cisco has set September 11, 2024, as the final order date, though renewals will be accepted for existing subscriptions until February 28, 2029. Cisco has stated that this move reflects their commitment to staying aligned with current market trends and ensuring that they continue to meet the evolving requirements of their customers. In a statement from Cisco, they further explained the decision. “Cisco made the decision to discontinue its Cisco HyperFlex HCI product family based on evolving customer needs and market dynamics. This decision has been timed to best support our customers, partners, and employees.”

Partnership with Nutanix

Following the decision to discontinue HyperFlex, Cisco has moved to partner with Nutanix. Nutanix, known for their cloud software and HCI solutions, complements Cisco’s offerings in the hyperconverged domain.

The collaboration aims to simplify hybrid multicloud operations. With this alliance, Nutanix’s software will be compatible with Cisco’s Unified Computing System (UCS) hardware, including the M5 and M6 generation servers. As a result, the “Cisco Compute Hyperconverged with Nutanix” solution has been introduced. This solution integrates Cisco’s compute and networking capabilities with Nutanix’s Cloud Platform, providing businesses with an option for multicloud environments.

By combining their respective strengths, Cisco and Nutanix aim to offer a solution that addresses the challenges of modern hyperconverged infrastructure. This partnership emphasizes both companies’ practical approach to address industry needs. As the industry adapts to these significant shifts, the role of experienced partners becomes even more crucial.

OneNeck – Your Partner for Both Cisco and Nutanix Solutions

OneNeck has built robust and longstanding partnerships with both Cisco and Nutanix. As a Gold Certified Cisco partner, our deep-rooted expertise in Cisco solutions is a testament to our dedication and commitment to excellence. Additionally, our commitment to Nutanix has not gone unnoticed. In early 2023, Nutanix spotlighted our partnership as we were honored with the Global and Americas Service Provider of the Year title. Beyond this, OneNeck holds the distinction of being both a Nutanix Champion Service Provider and a Champion Reseller.

This dual alliance places OneNeck in a unique position, especially during industry shifts like the one presented by this transition. We understand the intricacies of both the Cisco and Nutanix offerings, and this knowledge equips us to offer tailored guidance to businesses.

As companies grapple with multi-cloud decisions, OneNeck is poised to provide clarity, direction and solutions that harness the combined strengths of both Cisco and Nutanix. More than just understanding the technology, we grasp the broader business implications. This holistic context ensures that our clients navigate the change seamlessly and harness it for growth and innovation.

As the HCI landscape undergoes significant changes, OneNeck stands as a steadfast partner for businesses. Our goal is to ensure that companies navigate these transitions seamlessly, making the most of their infrastructure investments and positioning themselves effectively for future industry developments.

Navigating Hyperflex Changes with Expertise and Insight

The decision by Cisco to transition from HyperFlex and collaborate with Nutanix marks a notable change in the HCI market. With this collaboration, businesses can expect solutions that address the challenges of today’s multi-cloud environments.

OneNeck, with our deep-rooted partnerships and expertise, stands ready to guide businesses through this transition. Our tight alignment with Cisco and Nutanix equips us with the insights and knowledge to provide timely and effective solutions.

If your organization is navigating these changes or exploring a new HCI strategy, we’re here to help. Contact us today.

grey line for hyperflex end-of-life blog

]]>
Cloud Security 101: Strengthening Security in the Digital Sky https://www.oneneck.com/blog/cloud-security-101-strengthening-security-in-the-digital-sky/ Fri, 22 Sep 2023 15:58:48 +0000 https://www.oneneck.com/?p=5585 The cloud’s vast potential is undeniable, but it also introduces a unique set of challenges that require specialized expertise. Understanding and implementing robust security measures becomes crucial as organizations transition from traditional on-premises infrastructures to cloud-based and hybrid systems. Harnessing the Cloud: Opportunities and Obstacles Cloud computing has significantly impacted the way companies function, offering […]]]>

The cloud’s vast potential is undeniable, but it also introduces a unique set of challenges that require specialized expertise. Understanding and implementing robust security measures becomes crucial as organizations transition from traditional on-premises infrastructures to cloud-based and hybrid systems.

Harnessing the Cloud: Opportunities and Obstacles

Cloud computing has significantly impacted the way companies function, offering a range of benefits that cater to modern needs. One of its primary advantages is scalability and flexibility. The cloud can adjust to varying demands for a small startup or a large enterprise. This adaptability means utilizing resources on an as-needed basis, often reducing the necessity for significant upfront investments in infrastructure. The cloud can scale to meet those demands as businesses grow or change.

Traditional IT setups involve high initial costs, from procuring hardware to establishing and maintaining data centers. In contrast, cloud computing introduces a more flexible financial model, shifting expenses to operational ones. Organizations can better manage their budgets, paying only for the resources they use. This provides financial flexibility and reduces reliance on physical hardware, allowing businesses to adapt quickly to changing needs without being bogged down by legacy systems.

Cloud computing facilitates global collaboration, allowing teams worldwide to work together in real-time and access shared resources and tools. Additionally, businesses can effectively reach global markets, serving clients from any location. However, this accessibility also presents challenges; every access point in the cloud can be a potential vulnerability, underscoring the importance of robust security measures.

Shared Responsibility in Cloud Security

In cloud computing, the concept of “shared responsibility” is paramount. It delineates security obligations between the cloud service provider and the user. While the provider is typically responsible for the underlying infrastructure and ensuring the cloud platform’s security, the user is tasked with safeguarding their data and applications.

Encryption, for instance, becomes a collaborative effort where the service might offer the tools, but users must implement and manage them. Understanding and embracing this shared model is crucial for adequate cloud security, as it underscores the idea that security is a joint effort, requiring vigilance from both the provider and the user.

However, shared responsibility doesn’t end with technical measures. It extends to regulatory compliance and best practices. Standards such as NIST, HIPAA and CIS Controls serve as security and data protection benchmarks. These standards represent legal obligations and set the foundation for trust and ethical data handling. By aligning with these recognized standards, consumers and providers can ensure they meet the highest security benchmarks, further strengthening their collaborative defense against potential threats.

Network Security: A Multi-Layered Approach

Let’s visualize a secure cloud environment as a fortress designed with multiple layers of defense to deter potential threats. Firewalls are the primary gatekeepers, monitoring and controlling incoming and outgoing network traffic based on predetermined security policies. Intrusion Detection Systems (IDS) continuously scan for suspicious activities or policy violations, serving as vigilant sentinels that alert administrators to potential threats.

Inside the network, internal security measures are vital. Techniques like micro-segmentation create isolated environments, ensuring a breach in one segment doesn’t jeopardize the entire system. Intrusion Prevention Systems (IPS) don’t just detect threats; they actively block malicious activities, maintaining the network’s resilience against cyberattacks. Additionally, regular vulnerability assessments highlight weaknesses, allowing for timely remediation.

IAM: Beyond Simple Permissions

Identity and Access Management (IAM) extends beyond the basic premise of granting or denying access. At its core, IAM is a holistic approach to managing digital identities, ensuring that the right individuals access the right resources at the right times and for the right reasons.

Understanding user behavior is pivotal in this process. IAM systems can continuously monitor and analyze user activities and detect patterns and anomalies that might indicate potential security threats. It’s not only about the timing of access; accessing high-value data or making bulk data transfers when it’s not part of their usual tasks can also be flagged.

Furthermore, IAM systems can take proactive measures such as implementing multi-factor authentication (MFA). MFA requires the user to provide two or more verification factors to gain access, adding an extra layer of security and ensuring that even if a malicious actor has login credentials, they will still need another verification form, making unauthorized access significantly more challenging.

Proactive Defense: More than Just Monitoring

Managing vulnerabilities is an obvious cornerstone of cloud security. However, the reactionary nature of traditional anti-virus software can no longer address the sophisticated and agile nature of modern attacks.

Regular assessments and penetration tests help identify and address potential weak spots before attackers can exploit them. It’s crucial to have an efficient patch management system in place, ensuring that vulnerabilities are dealt with swiftly.

As businesses increasingly adopt container and microservices architectures, the need for security intensifies. It is essential to integrate protective measures from the development stage and maintain them throughout the software’s lifecycle. By proactively managing vulnerabilities, organizations can reduce the window of opportunity for potential exploits. This proactive stance protects applications and data and fosters a culture of ongoing vigilance, a necessity in an environment where threats can emerge unpredictably.

The Human Element of Cloud Security

While advanced tools and protocols are indispensable, the human element is pivotal. It’s a common misconception that most security breaches are solely due to technological vulnerabilities. Human error or oversight often serves as the gateway for cyberattacks. Without the proper knowledge, employees can inadvertently become the weakest link, falling prey to sophisticated phishing attacks or unintentionally mishandling sensitive data.

Recognizing this, organizations must invest in continuous cybersecurity education. Regular training sessions, enriched with the latest threat intelligence, equip employees with the skills to discern potential threats. Security Awareness Training on identifying phishing emails, safe browsing practices, and secure password management can transform employees from potential security risks to vigilant watchdogs.

Choosing a Cloud Service Partnership

Selecting the right Cloud Service Provider (CSP) is a critical decision. Your CSP needs to be much more than a vendor; they are integral to your organization’s security posture. It’s not just about the tools and features they offer but also about their approach to security as a whole.

When considering a CSP, it’s essential to delve into its security philosophy. Questions to ponder include: How frequently do they undergo security audits? How swiftly do they respond to identified threats? A reputable CSP will be forthright about its security protocols, past incidents and remediation measures. This transparency ensures that you’re not just choosing a service but entering into a partnership built on trust and mutual security goals.

Navigating Cloud Security with OneNeck

In the evolving landscape of modern cloud computing, businesses are presented with unparalleled opportunities and inherent challenges. As organizations leverage the cloud’s capabilities, the significance of robust security becomes increasingly evident. A comprehensive approach to cloud security, which integrates technology, processes, and the human element, is essential for a confident and risk-mitigated digital transition.

At OneNeck, we pride ourselves on being more than just a provider of technical services. With extensive expertise in cloud solutions, we offer a partnership built on trust, experience and dedication. As a leading Cloud Service Provider, we prioritize proactive security measures and have a deep understanding of the evolving threat landscape.

As you consider your next steps in the cloud domain, let our experience and expertise guide you. Contact us today to ensure your cloud endeavors are both innovative and secure.

grey line for cloud security blog

]]>
September Patching: Updates for Exchange Server Vulnerabilities and More https://www.oneneck.com/blog/september-2023-patching/ Mon, 18 Sep 2023 17:17:16 +0000 https://www.oneneck.com/?p=5561 Welcome to OneNeck’s monthly patching blog for September 2023. Our team remains committed to informing you about the latest patches and updates that might affect your systems. Every month, our engineers scrutinize newly released updates from vendors to identify any known issues requiring action and assign priority to each patch. As part of our dedication […]]]>

Welcome to OneNeck’s monthly patching blog for September 2023. Our team remains committed to informing you about the latest patches and updates that might affect your systems. Every month, our engineers scrutinize newly released updates from vendors to identify any known issues requiring action and assign priority to each patch. As part of our dedication to safeguarding your systems, we offer comprehensive Managed Patch Services to assist clients in keeping their environments secure and up-to-date.

Alert: Microsoft Exchange Server Vulnerabilities

This month, we place a particular highlight on the critical updates concerning the Microsoft Exchange Server. We strongly urge all customers to ensure that their Exchange Servers are updated with the September Security Update for Exchange as soon as possible to protect against numerous critical vulnerabilities.

Last month, we addressed the following vulnerabilities :

CVE-2023-21709, CVE-2023-38181, CVE-2023-38185, CVE-2023-35368, CVE-2023-38182 and CVE-2023-35388

September brings about additions to this list. Microsoft has flagged these CVEs as being critical. These are all concerning Remote Code Execution Vulnerabilities:

Once the updates have been installed, you should also complete the further actions discussed in this article from Microsoft.

Microsoft Patching Updates

This month, Microsoft rectified 59 flaws divided into various categories, including two zero-day or actively exploited bugs:

  • 3 Security Feature Bypass Vulnerabilities
  • 24 Remote Code Execution Vulnerabilities
  • 9 Information Disclosure Vulnerabilities
  • 3 Denial of Service Vulnerabilities
  • 5 Spoofing Vulnerabilities
  • 5 Edge – Chromium Vulnerabilities

This month, we are placing a significant focus on a select group of patches that address both critical and high-severity vulnerabilities. We strongly urge you to integrate the following patches into your system to bolster your security posture against potential exploitation:

  • CVE-2023-36802 – This patch mitigates a vulnerability in the Microsoft Streaming Service Proxy that could allow attackers to elevate privileges within your system.
  • CVE-2023-36761 – This update addresses a flaw within Microsoft Word that can lead to unintended information disclosure, exposing confidential data to malicious actors.
  • CVE-2023-38143, CVE-2023-38144 – These updates rectify Windows Common Log File System Driver vulnerabilities. They prevent attackers from exploiting the system to elevate their privileges.
  • CVE-2023-36744*, CVE-2023-36745* & CVE-2023-36756* – As noted in the Alert section above, these patches are critical in securing the Microsoft Exchange Server against remote code execution vulnerabilities, preventing unauthorized access and potential data compromise.

Important Patching Update from Our Unix Team

This month, our team highlights a selection of updates, including two critical patches, that are essential to securing your system. Here, we breakdown these patches to provide you with the knowledge to fortify your network and data effectively against imminent security threats:

  • CVE-2023-4057: Addresses a critical security vulnerability within Firefox. It is highly recommended that this update be implemented swiftly to prevent potential breaches.
  • CVE-2023-38408: This is a critical update enhancing the security structure of OpenSSH, designed to bolster its defenses against potential cyber threats. Prioritize this patch to protect against unauthorized access and potential data breaches.
  • CVE-2023-35788: This significant update addresses security and bug issues concerning the kernel, readily available for Red Hat Enterprise Linux 7 users.
  • CVE-2023-32360: Authentication issue addressed with improved state management. An unauthenticated user may be able to access recently printed documents.
  • CVE-2023-2235: A substantial update bringing security and bug fixes for the kernel, specifically geared towards users utilizing Red Hat Enterprise Linux 8.
  • CVE-2023-3899: An essential update for the subscription manager, focusing on tightening security protocols and enhancing overall performance.

By updating your systems with these patches, you are taking a proactive step in securing your network and data. Our team stands ready to assist our customers at any time to provide any guidance or support needed throughout this process.

Microsoft Office Patching

OneNeck does not cover Microsoft Office products during scheduled patching. However, we advocate that all customers promptly apply Microsoft Office updates in their environment. For assistance or inquiries, don’t hesitate to contact our Service Desk.

Exchange Updates

We recommend all customers to upgrade to Exchange Server 2019. OneNeck will facilitate the August Exchange Security Update under separate Change Requests for clients enlisted with OneNeck for Exchange Management. For support or further information, please get in touch with our Service Desk at 800-272-3077. Additionally, note that Microsoft will soon deactivate TLS 1.0 and TLS 1.1. Ensure your environment is up to date to prevent any application malfunctions. For details, visit Microsoft’s Blog Post.

As we wrap up, we remind you to stay tuned for next month’s blog and feel free to contact us with any queries or concerns. Remember, staying informed is your first line of defense.

Stay secure and stay patched!

grey line to end September patching blog

Each month, OneNeck engineers review newly released updates from vendors, like Microsoft, to understand any known issues, actions required and understand the priority of each. This is done immediately following Patch Tuesday releases, and we monitor for adjustments to patches throughout each month.

The information above is gathered monthly during this review and posted for awareness to our customers. This information is generally updated only once per month and is based on our engineers’ review of the information provided by the vendor at that time. As always, for the most up-to-date patching information, please see the vendor’s website or contact us.

Note: If OneNeck actively manages a device or software that is impacted by any of these vulnerabilities, when necessary, OneNeck will be in direct contact with you regarding remediation.

 

]]>
Importance of Penetration Testing in Cybersecurity https://www.oneneck.com/blog/importance-of-penetration-testing-in-cybersecurity/ Thu, 14 Sep 2023 21:03:29 +0000 https://www.oneneck.com/?p=5540 Uncover Security Gaps with Proactive Pen Tests The battle of cybersecurity is more of a game of chess than a warzone. As our reliance on digital platforms intensifies, so does the sophistication of attacks. And as cyber-attacks become more intelligent, our cybersecurity technology evolves in hopes that we can stay ahead of malicious actors before […]]]>

Uncover Security Gaps with Proactive Pen Tests

The battle of cybersecurity is more of a game of chess than a warzone. As our reliance on digital platforms intensifies, so does the sophistication of attacks. And as cyber-attacks become more intelligent, our cybersecurity technology evolves in hopes that we can stay ahead of malicious actors before they access digital assets and personally identifiable information (PII).

But is it enough? Even with incredibly thorough security measures, there are still likely to be holes in any company’s attack surface. The only way to plug them is to find them—and the only way to find them is to use penetration testing.

What is penetration testing?

Penetration testing is a deliberate and approved cyber-attack on a computer system, carried out to assess and improve the security of the system.

Unlike actual cyber attacks, which aim to exploit systems for malicious intent, pen tests are conducted to identify vulnerabilities and weaknesses before bad actors do. These tests provide invaluable insights into potential attack vectors, enabling organizations to bolster their defenses and ensure data remains safe.

What are the types of pen testing?

Each type of penetration test offers important approaches to proactively find and address potential vulnerabilities. No test is fully comprehensive, so a mix of different types of tests is the best way to ensure a comprehensive review of your cybersecurity posture. Let’s explore these distinct methodologies.

  • Black Box Testing: Here, the tester has no prior knowledge of the target system, mimicking the approach of real-world attackers who have no internal knowledge of the system.
  • White Box Testing: Testers have full knowledge of the system’s architecture and source code. This approach is exhaustive and helps identify vulnerabilities deep within the system.
  • Gray Box Testing: A middle ground between black and white box testing, testers have partial knowledge of the system. This testing is efficient in highlighting vulnerabilities from both internal and external perspectives.
  • Red Team Testing: A dynamic approach where a group of ethical hackers simulate real-world cyber-attacks to test an organization’s detection and response capabilities.
  • Blue Team Testing: Opposite to red teaming, blue team testing focuses on defense. Blue teams defend against simulated attacks and hone their incident response strategies.

Benefits of penetration testing

On average, 57% of attackers can complete an end-to-end attack in less than a day. While the basic benefit of pen testing is clear—uncovering vulnerabilities before they are exploited by malicious actors—there are many reasons why pen testing is valuable.

  • Simulates real-world attack scenarios, giving an authentic picture of potential security breaches.
  • Maintains compliance with regulations to avoid potential legal consequences.
  • Demonstrates a commitment to security, which increases customer trust.
  • Saves significant costs that might come from ransom payments, data loss, legal implications, penalties and lost business.
  • Ensures that an organization’s defenses adapt and grow in tandem, always a step ahead of potential attackers.

The 5 phases of pen testing

The process of penetration testing is typically divided into five sequential phases. Each phase ensures your approach to testing is methodical, enabling you to identify security gaps so you can improve your security posture. Here are the five phases of penetration testing:

Pen Test Phase 1: Planning and Reconnaissance

Before the actual test, the objectives, scope and methods of the test are defined. This phase includes determining the systems to be tested and establishing the boundaries of the test.

From there, the tester begins reconnaissance by gathering as much information as possible about the target system. This could involve identifying IP addresses, domain details and network services. The idea is to find potential entry points and understand the system’s architecture.

Pen Test Phase 2: Scanning

This phase aims to identify how the target system will respond to various intrusion attempts. Testers can use tools and methods to detect vulnerabilities both statically (by analyzing application code) and dynamically (by evaluating the system while it’s running).

Pen Test Phase 3: Gaining Access

Now, testers try to exploit the identified vulnerabilities. This means they’ll attempt to hack into the system, mimicking potential real-world attacks. This phase demonstrates what type of data could be accessed or stolen from a successful breach.

Pen Test Phase 4: Maintaining Access

This phase simulates what cyber attackers do after they’ve breached a system. The goal is to understand if the system can detect and resist prolonged unauthorized presence. Testers attempt to create a “backdoor” for themselves, emulating how malware might operate to stay undetected within a compromised system.

Pen Test Phase 5: Analysis

Post-testing, this phase is all about documentation and feedback. A detailed report is generated, outlining vulnerabilities discovered, data accessed, methods used and the duration of the testers’ unnoticed presence in the system. The report also typically includes recommendations for securing the identified vulnerabilities, providing organizations with actionable insights to bolster their defenses.

Penetration Testing with OneNeck

Penetration testing is an important part of OneNeck’s suite of cybersecurity solutions. Our real-world risk assessment includes the execution of full-scope Red Team exercises, mimicking tactics and techniques employed by even the most recent threats. These tests go well beyond a standard checklist, revealing business-specific risks present in your network and infrastructure.

With OneNeck, you can keep moving forward because we’ve got your back. Learn more about our penetration testing solution or reach out for a free quote.

grey line to end Penetration Testing blog.

]]>
4 Reasons Companies Need Managed Threat Detection https://www.oneneck.com/blog/four-reasons-companies-need-managed-threat-detection/ Thu, 07 Sep 2023 18:50:14 +0000 https://www.oneneck.com/?p=5493 The cyber threats that organizations face today have evolved beyond the computer viruses of decades past. Attacks are more sophisticated, well-planned and stealthy than ever. Organizations must stay alert and be ready to deal with cyber threats anytime and anywhere, with a strong response plan for what is, these days, inevitable. What is Managed Threat […]]]>

The cyber threats that organizations face today have evolved beyond the computer viruses of decades past. Attacks are more sophisticated, well-planned and stealthy than ever. Organizations must stay alert and be ready to deal with cyber threats anytime and anywhere, with a strong response plan for what is, these days, inevitable.

What is Managed Threat Detection?

Managed threat detection and response (MDR) is an outsourced security solution that monitors for threats to ensure fast response and remediation of security incidents. Managed detection can address today’s common threats, such as ransomware, denial of service (DoS) attacks, phishing and attacks that blend two or more threats.

The Challenges of Managing Threat Detection

One of the reasons cyberattacks are so hard to defend against is that as organizations evolve, so do attackers. For every advance in security, attackers come up with a new way to get around it. IT teams can face these additional challenges in managing threat detection:

  • Too many alerts. As security technology grows more sophisticated, it also has more false alarms, making it a constant struggle to determine which threats are real, and which are just noise.
  • Not enough skilled staff. Many organizations are short-staffed already and don’t have the cybersecurity expertise needed to implement and run managed detection in their environment.
  • Too many endpoints. Between office and remote workers, networks today have more geographically dispersed endpoints, resulting in a larger attack surface — and more stuff to protect.
  • A growing number of threats. Worldwide cyberattacks were up 38% in 2022 compared to the previous year. Many of them targeted collaboration tools used by remote workers.
  • Disconnected tools. When an organization’s security tools are pieced together from different vendors, they may not work well together to enable a cohesive response.

As organizations grow, keeping up with these challenges will only get more complex, taking time and resources away from other business priorities.

4 Reasons Businesses Partner with Managed Detection Providers.

One of the best ways to stay on top of cyber threats is to partner with a managed detection provider. Managed detection providers are specialists with the expertise and resources to focus on advanced threat protection to keep your organization’s devices and data safe from breaches. Here are four reasons why you should partner with a managed detection provider:

1.   Save time and resources

To stay on top of the latest emerging threats, you need a comprehensive suite of the latest security tools and the time to configure and monitor them. However, the cost of investing in those tools, as well as setting them up and monitoring them, is beyond many organizations’ reach. It’s far more cost effective to work with a managed detection provider who already has the technology and monitoring capabilities and the skilled staff to keep your environment safe.

2.   Leverage industry experience and expertise

Even with the latest security tools, you and your team need to keep your finger on the pulse of new threat actors, attack vectors and attack techniques. When you engage a provider that works with a diverse range of problems in your industry, you get access to their real-world experience. Their trained staff also keeps a close eye on new and unexpected developments in cyber threats so you know what might be coming before it hits you.

3.   Gut-check your cybersecurity strategy

The threat landscape evolves so rapidly that yesterday’s strategy might not work against today’s attacks. In addition, it is difficult to address every potential threat vector with a third party to check your work. Working with a managed detection provider who is experienced in security strategies ensures that you’ve cemented every crack in your security posture to keep your network and devices safe.

4.   Gain support amid cybersecurity talent shortages

With a reported 700,000 cybersecurity positions unfilled in 2022, you may not be able to hire the staff you need to manage cyber detection and response at your organization. Outsourcing to a managed detection provider that already has a full staff greatly eases the burden and cost of recruiting, hiring and training in a very competitive market.

Modern Businesses Need Managed Threat Detection

No organization is too small to be immune to a security attack. Cybersecurity should be at the top of everyone’s priority list. But for many organizations, lack of staff or budget pushes security farther down the list, leaving their environment vulnerable to attack.

Fortunately, there’s a solution: Experts who continually monitor your environment, with access to the latest research and analytics, who are ready to respond when threats arise.

OneNeck IT Solutions has partnered with Fortra’s Alert Logic to bring you round-the-clock managed detection and response services. Our security experts, along with the award-winning security platform from Fortra’s Alert Logic, collect and analyze real-time data to assess and mitigate every threat, any time of the day and night.

Are you ready to learn more about how OneNeck and Fortra’s Alert Logic can provide you with next-level managed detection and response services? Read more about managed detection here.

grey line for Managed Threat Detection blog

]]>
Microsoft CSP Licensing: Transitioning from Legacy to the New Commerce Experience https://www.oneneck.com/blog/microsoft-csp-licensing-transitioning-to-the-new-commerce-experience/ Thu, 31 Aug 2023 18:11:27 +0000 https://www.oneneck.com/?p=5443 The New Commerce Experience (NCE) is Microsoft’s latest platform for licensing. With NCE, customers can choose from various subscription terms, including annual and monthly options. Microsoft has revealed plans requiring a transition, impacting customers currently using Legacy licensing. While NCE aims to offer a simplified approach to licensing and provide customers with significant control over […]]]>

The New Commerce Experience (NCE) is Microsoft’s latest platform for licensing. With NCE, customers can choose from various subscription terms, including annual and monthly options. Microsoft has revealed plans requiring a transition, impacting customers currently using Legacy licensing. While NCE aims to offer a simplified approach to licensing and provide customers with significant control over their subscriptions, the transition may present challenges for some organizations. The shift to a new licensing platform can be complex, and businesses may need assistance understanding new terms, managing subscriptions and optimizing cloud investments.

For organizations currently on Legacy licensing, partnering with a trusted advisor can be invaluable during this transition. A knowledgeable partner can provide guidance, answer questions, and help navigate the complexities of the new licensing model. With proper support, businesses can confidently transition to NCE and continue to make the most of their Microsoft cloud services.

Transition Timeline for Microsoft New Commerce Experience Licensing Platform

Microsoft has announced that legacy SKUs for Microsoft 365/Office 365 and related online services will automatically be moved to the New Commerce Experience starting with any renewal occurring on or after January 1, 2024. This transition will impact commercial clients still using Legacy licensing, mainly affecting academic, nonprofit and government subscription clients. This change is part of Microsoft’s ongoing efforts to modernize its licensing model and provide customers with a more flexible and transparent approach to managing cloud services.

Microsoft New Commerce Experience Pricing and Commitment

Microsoft has not announced any pricing changes associated with the transition to NCE. However, there will be adjustments to the commitment terms for customers. Customers must commit to a 1-year duration, with no cancellations or reductions allowed after 168 hours (7 days) from the time of order until renewal. Alternatively, customers can choose a 1-month term at a 20% premium, with the same restrictions on cancellations and reductions. These new commitment terms are designed to provide customers with more predictable billing and greater flexibility in managing their subscriptions. While the transition to NCE may require some adjustments, it allows businesses to benefit from a more streamlined and transparent licensing model.

Microsoft New Commerce Experience

Source: Microsoft

Support from an Experienced Microsoft CSP

OneNeck will assist customers with the transition to NCE starting in November 2023 as soon as the new SKUs become available. We will reach out to affected clients and work with them to ensure a smooth migration process. Our team of experts will be available to answer any questions and provide guidance throughout the transition.

Since the introduction of NCE two years ago, OneNeck has consistently collaborated with our clients each year, helping them manage their subscriptions and integrate new Microsoft features as they become available. If you’re transitioning to NCE for the first time, rest assured you’ll receive the same dedicated experience.

A Partner You Can Trust

The transition to the New Commerce Experience represents a significant shift in Microsoft’s licensing model. While change can often seem daunting, OneNeck is here to help customers navigate the process and ensure a smooth transition. We will work closely with affected clients to provide support and guidance throughout the migration process.

If you’re not currently a OneNeck client but would like more information or assistance with the NCE transition, we’re happy to help. Our team of experts is available to answer any questions and provide guidance on the migration process. Whether you’re a small business or a large enterprise, we’re committed to helping you make the most of your Microsoft investments.

For more information on the changeover to NCE and its impacts, please contact us at OneNeck. Whether you’re looking for assistance with the NCE transition, need help with Microsoft services, are looking for a partner to help you navigate the Modern Workplace or have any other Microsoft-related needs, our team of experts is here to provide the support and guidance you need.

grey line for Microsoft New Commerce Experience blog

]]>
Why Managed Cloud Security Should Be Part of Your Security Strategy https://www.oneneck.com/blog/why-managed-cloud-security-should-be-part-of-your-strategy/ Mon, 28 Aug 2023 18:21:44 +0000 https://www.oneneck.com/?p=5427 Instead of investing in costly infrastructure upgrades that are difficult to secure, more and more organizations are transitioning to cloud services Fifty-eight percent of IT leaders cite security as one of the top reasons for their transition to the cloud. However, that doesn’t mean IT leaders can walk away and trust that their data is […]]]>

Instead of investing in costly infrastructure upgrades that are difficult to secure, more and more organizations are transitioning to cloud services Fifty-eight percent of IT leaders cite security as one of the top reasons for their transition to the cloud.

However, that doesn’t mean IT leaders can walk away and trust that their data is safe. Cloud security is a shared responsibility, especially in a multi-cloud environment or hybrid cloud deployment where security must be managed across multiple platforms.

If security is a high priority for your organization, leaning on your internal team and cloud provider to manage all endpoints, attack vectors, and cloud deployments may not be enough. An extra layer of protection with cloud managed security services ensures your data stays safe in this ever-broadening threat environment.

What is Managed Cloud Security?

Managed cloud security is a third-party security service that helps you lock down your company’s cloud-based infrastructure and applications. Cloud security managed services include anti-virus, firewall management, intrusion detection and monitoring and testing for vulnerabilities.

What are the Different Types of Cloud Security?

For businesses with a variety of cloud platforms and configurations, a few basic security services are essential for a minimum level of protection.

  • Identity and Access Management (IAM)— Ensures each user has the correct access (and lack of access) to your organization’s assets. User identity is validated using passwords, single sign-on and multi-factor authentication.
  • Network and Device Security— Puts barriers such as encryption and VPNs between the user and the data in contained environments.
  • Security Monitoring/Alerting— Notifies you of unusual activity and potential breaches. These systems can be automated but should be monitored by security personnel.
  • Disaster Recovery and Business Continuity Planning— A documented plan with steps to take before and after a breach. The plan should spell out data redundancy tactics and recovery steps.

5 Reasons to Invest in Managed Cloud Security

Though your cloud provider may have a standard cloud security package, here are five reasons why you should be prepared to fill in any security gaps with your own cloud security managed service.

1.   Strengthen your security posture.

A managed cloud security provider has specialized expertise, advanced security technologies and the staff to continuously monitor your cloud environment without interruption. Accidental misconfigurations are one of the most common cybersecurity risks and happen most often in cloud environments. A vulnerability assessment conducted by a skilled cloud security provider can uncover misconfigurations and other vulnerabilities which will strengthen your organization’s overall security posture.

2.   Address cybersecurity skill and talent shortages.

Hundreds of thousands of IT security positions go unfilled each year due to a shortage of skilled professionals. Hiring your own staff can be a nearly impossible—and undoubtedly expensive—task. Working with a third-party provider ensures you have experienced security experts monitoring your environment at all times, without the hassle of employee turnover, recruiting, rehiring and training.

3.   Respond quickly to threats.

A dedicated security team can provide real-time monitoring and incident response, identify and contain threats and remediate the damage to reduce downtime and minimize data loss.

4.   Focus on your core competencies.

Cybersecurity diverts time and resources away from your core business activities. When you outsource to experts, you get top-of-the-line security monitoring and technology while gaining the time you need to handle the highest, most strategic security priorities.

5.   Improving compliance.

Many organizations face regulatory requirements that are non-negotiable. These expectations are much easier to meet with a cloud managed security service provider that can continuously monitor and report on your organization’s compliance with local, federal, and international law. This ensures your organization meets its obligations according to industry standards and regulatory guidelines and helps you avoid penalties due to noncompliance.

Engage a Strong Cloud Security Partner

Investing in managed cloud security gives you a full team of security experts on your side to monitor and mitigate attacks. With this proactive approach, you’ll have fewer security incidents, experience less downtime and can always rest assured that you’re in compliance.

Leveraging the expertise of managed cloud security providers like the team at OneNeck IT Services leaves you free to focus on your core business activities while the experts ensure a robust defense against ever-evolving threats. With OneNeck’s help, you can reap the benefits of cloud flexibility and scalability without compromising security.

Ready to learn more? Read about OneNeck’s cloud security solutions.

grey line for managed cloud security blog

]]>
EDR, XDR and MDR: Which Endpoint Security Strategy is Right for You? https://www.oneneck.com/blog/edr-xdr-mdr-which-endpoint-security-strategy-for-you/ Wed, 23 Aug 2023 18:13:55 +0000 https://www.oneneck.com/?p=5399 Endpoint security is a crucial component of the delivery and management of cloud services. Traditionally antivirus software has served as the primary front line for endpoint defense. However, with the dynamic nature of increasingly sophisticated attacks, more agile security solutions are becoming necessary. A study by Gartner states that by the end of 2023, more […]]]>

Endpoint security is a crucial component of the delivery and management of cloud services. Traditionally antivirus software has served as the primary front line for endpoint defense. However, with the dynamic nature of increasingly sophisticated attacks, more agile security solutions are becoming necessary. A study by Gartner states that by the end of 2023, more than 50% of enterprises will move away from solely relying on antivirus offerings and transition to one or more forms of detection and response capabilities. Three endpoint security solutions have emerged as the primary methods for defending against these threats: Endpoint Detection and Response (EDR), Extended Detection and Response (XDR) and Managed Detection and Response (MDR).

While EDR, XDR and MDR solutions are related and share some common features, they each provide distinct security aspects. In this blog, we’ll break down the differences and similarities between these three solutions, helping you decide what solution best suits your organization’s needs.

Endpoint Detection and Response (EDR)

EDR is a security solution that protects endpoints, including desktops, laptops or mobile devices from cyber threats. EDR uses advanced technologies to detect, analyze and respond to threats, and this protection is essential as endpoints are often the primary targets of cyberattacks. With the proliferation of the hybrid workforce, employees are using multiple devices to access company data, leading to a corresponding increase in attack surfaces, making it crucial to have a robust endpoint security solution to protect against threats that target these devices. EDR services provide real-time protection by preventing malware, ransomware and other threats from compromising devices.

Endpoint Security Features of EDR:

  • Endpoint Protection – Real-time defenses are at the core of EDR, safeguarding endpoints from malware, ransomware and other malicious threats.
  • Threat Detection – Leveraging advanced analytics and machine learning, EDR pinpoints and analyzes threats specifically targeting endpoints.
  • Threat Response – With EDR’s automated capabilities, organizations can swiftly contain and counteract threats.
  • Forensics and Investigation – Delving deep, EDR furnishes comprehensive forensic data, aiding organizations in dissecting and comprehending cyber threat intricacies.

Microsoft Defender for Endpoint is one example of an industry-recognized EDR solution. Defender for Endpoints delivers advanced threat detection, investigation, and response capabilities. Machine learning, behavioral analysis and threat intelligence detect and respond to endpoint dangers. Cisco Secure Endpoint is another widely used option that provides a unified solution for endpoint protections alongside threat intelligence to block threats or contain breaches by remediating malware attacks.

Extended Detection and Response (XDR)

XDR is an advanced security solution focusing beyond just devices, offering comprehensive protection for endpoints, networks and cloud environments. This holistic approach to threat detection and protection allows organizations to identify and mitigate threats more effectively, reducing the risk of a successful cyberattack. XDR is ideal for organizations desiring a rounded approach to security, providing a unified security solution across an organization’s IT environment. By weaving together protections for endpoints, networks, and the cloud, XDR presents a unified front against security threats, ensuring faster detection and a more coordinated response.

Endpoint Security Features of XDR:

  • Unified Protection – Bridging gaps across endpoints, networks and cloud spaces, this feature ensures a cohesive cybersecurity strategy.
  • Advanced Threat Detection – Harnessing the power of analytics, machine learning and extensive threat intelligence, XDR casts a wide net to spot and explore threats throughout the IT landscape.
  • Automated Response – In the face of threats, XDR acts with its rapid automated response tools, enabling organizations to swiftly counteract potential dangers.
  • Threat Hunting – Going beyond passive defense, XDR actively seeks out potential hazards, empowering organizations to take a proactive stance against cyber threats.

Industry leaders offering XDR services include the likes of Palo Alto, Microsoft and Cisco. These companies are well known for their comprehensive cybersecurity solutions and have developed their XDR offerings to provide holistic protection for organizations’ IT environments. By leveraging the expertise and resources of these industry leaders, companies can ensure the safety of systems and data from threats and quick and effective responses during a breach.

Managed Detection and Response (MDR)

MDR is a security service blending advanced threat detection, incident response, and continuous monitoring. Using a mix of cutting-edge technologies and human expertise, MDR providers swiftly detect and counter threats. This makes it a go-to solution for organizations without in-house cybersecurity resources. In this era of increasingly sophisticated and targeted security threats, it’s not just about detection but also about proactive defense. MDR’s approach aids businesses in identifying threats early, leveraging advanced threat intelligence to bolster their defenses and protect their systems and data.

Key Features of MDR:

  • 24/7 Monitoring – MDR providers offer round-the-clock monitoring of your network, systems, and data to detect and respond to threats in real time.
  • Threat Intelligence – Providers use threat intelligence to identify and analyze emerging threats, helping organizations stay ahead of cybercriminals.
  • Incident Response – During a security breach, MDR providers offer incident response services to contain and mitigate the breach’s impact.
  • Compliance Management – Beyond just threat management, MDR providers also ensure organizations align with regulatory standards, setting up and upholding essential security controls.

Several notable MDR services stand out in the industry. Fortra’s Alert Logic offers integrated protection tailored for cloud-based, hybrid, and on-premises workloads. Microsoft’s MDR incorporates managed hunting services, security posture assessments, and advanced threat protection. While, Cisco has integrated its MDR solution into the SecureX platform, providing a suite of security services that encompass threat detection, incident response, and proactive threat hunting.

Navigating Endpoint Security Landscape and Beyond

MDR, EDR and XDR are robust cybersecurity solutions that offer unique benefits to organizations. The choice between EDR, XDR and MDR depends on an organization’s needs, resources and threat landscape. MDR is an excellent solution for organizations that use extensive cloud solutions and need additional support to provide and manage robust threat protection. EDR is designed for organizations that may be less cloud-based but seek additional defense beyond the reactive nature of antivirus and malware. XDR is ideal for organizations that wish to extend threat detection and prevention beyond endpoints to include cloud services, networks, identities or even email. Ultimately many organizations will likely seek a combination of these solutions to ensure comprehensive protection for their systems and data.

OneNeck is an experienced partner that can help you discover and implement MDR, EDR or XDR solutions tailored to your company’s needs. Combining our expertise, resources and extensive partnerships, we’ll help protect your systems and data from cyber threats and ensure the safety and security of your environments.

Contact us today to learn more about our managed security solutions or assessment services and see how we can help you implement robust security measures for your organization.

grey line for endpoint security blog.

]]>
August Patching: Navigating Microsoft and Linux Vulnerabilities https://www.oneneck.com/blog/august-2023-patching/ Wed, 16 Aug 2023 15:17:05 +0000 https://www.oneneck.com/?p=5375 Our monthly patching blog continues our commitment to keep you abreast of the latest threats and updates that might affect your systems. This month, Microsoft and Linux have released several significant updates, some of which addressed critical vulnerabilities. Windows Patching Highlights This month, Microsoft addressed 87 flaws, broken down into the following categories: 18 Elevation […]]]>

Our monthly patching blog continues our commitment to keep you abreast of the latest threats and updates that might affect your systems. This month, Microsoft and Linux have released several significant updates, some of which addressed critical vulnerabilities.

Windows Patching Highlights

This month, Microsoft addressed 87 flaws, broken down into the following categories:

18 Elevation of Privilege Vulnerabilities: These could allow attackers to gain elevated privileges, compromising system integrity.

3 Security Feature Bypass Vulnerabilities: These flaws could permit attackers to bypass security features, leading to unauthorized access.

23 Remote Code Execution Vulnerabilities: These vulnerabilities could allow an attacker to remotely execute arbitrary code, leading to unauthorized access and data compromise.

10 Information Disclosure Vulnerabilities: Potentially exposing sensitive information to unauthorized parties.

8 Denial of Service Vulnerabilities: Allowing an attacker to crash or slow down the system.

12 Spoofing Vulnerabilities: Allowing an attacker to disguise themselves as another user.

This month’s updates tackle a variety of vulnerabilities that impact different Windows components. They include fixes for zero-day vulnerabilities that hackers have actively exploited, as well as vulnerabilities in Microsoft Office, Microsoft Exchange, and other areas of the Windows operating system.

August’s Highlighted Patches Include:

CVE-2023-38180 – .NET and Visual Studio Denial of Service Vulnerability: This flaw could allow an attacker to crash or slow down the system.

ADV230003 – Microsoft Office Defense in Depth Update: An improvement to Microsoft Office’s security features.

CVE-2023-36884 – Windows Search Remote Code Execution Vulnerability (update now available): Addressing a previously reported vulnerability that could allow an attacker to execute arbitrary code remotely.

CVE-2023-35385, CVE-2023-36910, & CVE-2023-36911 – Microsoft Message Queuing Remote Code Execution Vulnerability: Could allow unauthorized remote code execution.

CVE-2023-21709, CVE-2023-38181, CVE-2023-38185, CVE-2023-35368, CVE-2023-38182, & CVE-2023-35388 – Microsoft Exchange Security Updates: Patches for various vulnerabilities that may lead to unauthorized access and data leakage.

CVE-2023-32019 – This update was installed with June 2023 Security Updates, but the setting was disabled. The August updates will switch the setting to enabled.

Linux Patching

Moving on to Linux, we have a collection of vital security updates addressing vulnerabilities across various components. This roundup includes patches for critical vulnerabilities that demand immediate attention and essential updates to maintain overall system integrity.

  • CVE-2023-20593 – A critical security vulnerability affecting the Linux firmware package in Oracle Linux is resolved. Attackers could exploit this issue to potentially access sensitive information on vulnerable systems.
  • CVE-2023-1999 – The libwebp library contained a vulnerability addressed in this update. Exploiting this issue allowed attackers to use the ApplyFiltersAndEncode function and loop through to free best.bw and assign best = trial pointer.
  • CESA-2023:3145 – A vulnerability found in the Apache Portable Runtime Utility Library (apr-util) allowing attackers to execute arbitrary code with elevated privileges.
  • CVE-2023-25652 – A vulnerability in Git permitting attackers to feed specially crafted input to `git apply –reject`, a path outside the working tree, overwriting it with partially controlled contents.
  • CVE-2023-24329 – An issue in the urllib.parse component of Python before 3.11.4, where attackers could bypass blocklisting methods by supplying a URL that starts with blank characters, has been resolved.
  • CVE-2023-32067 – The c-ares DNS resolver library contained a vulnerability enabling attackers to launch denial-of-service attacks on affected systems is now resolved.
  • CVE-2023-37201 – Provides fixes for vulnerabilities found in Firefox, including where an attacker could trigger a use-after-free condition when creating a WebRTC connection over HTTPS.
  • CVE-2022-3564 – Patch for a vulnerability within the Linux kernel, preventing attackers from gaining unauthorized access to vulnerable systems.
  • CVE-2023-2828 – Addresses vulnerability in BIND DNS server exploited to conduct denial-of-service attacks on affected systems.
  • CVE-2023-32435 – Addresses a memory corruption issue with improved state management.
  • CVE-2023-2269 – A denial of service problem, resulting in a deadlock in table_clear in drivers/md/dm-ioctl.c in the Linux Kernel Device Mapper-Multipathing sub-component.

Non-Critical Updates

We’ve also identified multiple non-critical updates. Specifically, a security and bug fix update for Java (CVE-2023-22045) addresses a potential unauthorized access vulnerability. A similar update now exists for Samba (CVE-2023-3347). Lastly, a security update for Emacs (CVE-2022-48339) is available, addressing a similar vulnerability for unwanted access. While these vulnerabilities are not considered critical, we recommend applying these patches to maintain a secure environment.

Microsoft Office Updates

OneNeck does not patch Microsoft Office products during scheduled patching. We recommend all customers apply Microsoft Office updates to their environment immediately. If you have questions about how OneNeck can assist you in your environment, don’t hesitate to contact the Service Desk.

Exchange Updates

OneNeck encourages all customers to upgrade to Exchange Server 2019. OneNeck will apply the August Exchange Security Update (along with the additional actions) under separate Change Requests for customers contracted with OneNeck for Exchange Management. For customers not contracted with us for Exchange Management services, don’t hesitate to contact the Service Desk if you have any questions on how OneNeck can assist you in your environment.

Please note our engineers base the information provided here on reviews of the information provided by the vendors at the time of the release. Please see the vendor’s website or contact us for the latest patching details.

Keep an eye out for next month’s blog, and as always, feel free to contact us with any questions or concerns. Stay secure and stay patched!

grey line for August Patching blog

Each month, OneNeck engineers review newly released updates from vendors, like Microsoft, to understand any known issues, actions required and understand the priority of each. This is done immediately following Patch Tuesday releases, and we monitor for adjustments to patches throughout each month.

The information below is gathered monthly during this review and posted for awareness to our customers. This information is generally updated only once per month and is based on our engineers’ review of the information provided by the vendor at that time. As always, for the most up-to-date patching information, please see the vendor’s website or contact us.

Note: If OneNeck actively manages a device or software that is impacted by any of these vulnerabilities, when necessary, OneNeck will be in direct contact with you regarding remediation.

]]>
Anytime, Anywhere Collaboration Solutions for Remote Teams https://www.oneneck.com/blog/anytime-anywhere-collaboration-solutions/ Fri, 11 Aug 2023 14:44:34 +0000 https://www.oneneck.com/?p=5340 Collaboration Solutions Keep Your Remote Team Happy, Engaged and Productive A few years ago, remote work was something of a novelty. That changed in 2020 when the need for remote collaboration burst to the forefront of many organizations’ minds. Now, after a few years of implementing and improving processes, remote work seems here to stay. […]]]>

Collaboration Solutions Keep Your Remote Team Happy, Engaged and Productive

A few years ago, remote work was something of a novelty. That changed in 2020 when the need for remote collaboration burst to the forefront of many organizations’ minds. Now, after a few years of implementing and improving processes, remote work seems here to stay.

Both employees and businesses are on board with the idea of remote or hybrid work — working outside of the office at least part of the time. When given the chance to work remotely at least part of the time, 87% of workers say they’ll do it. An AT&T report predicts that by 2024, hybrid work models will grow to 81% of the workforce.

What is a Collaboration Solution?

A collaboration solution is a type of software that allows employees or teams to communicate with each other and share information in real time, no matter where they are. The right solution for your team can help employees stay productive and focused while working toward the company’s goals.

Collaboration: The Key to Success in Remote Work Environments

It’s common for employees to work 100% remotely or in a hybrid environment, splitting their work time between the office and other locations. Without collaboration solutions, employees can be frustrated by digital barriers that hinder communication and creativity and lead to duplicate work — two or more employees working on different parts of the same project without realizing it.

However, using the right collaboration solution provides many benefits for remote employees.

Collaboration solutions enable strong team communication.

When all your employees use a collaboration solution, it ensures that everyone can access the same information and is on the same page. This also cuts down on duplicate messages through multiple channels, such as an employee sending an email, instant messaging and calling to try to reach someone.

Collaboration solutions build team cohesion.

A cohesive team doesn’t result from having everyone together in one building. Rather, teamwork grows from strong communication and trust. Collaboration solutions foster teamwork with face-to-face communication through video, messaging and information sharing. In addition, a digital space for socializing — a virtual water cooler or digital break room — helps build camaraderie and trust.

Collaboration solutions speed the pace of work.

Real-time information sharing and feedback cut down on distractions by diminishing the need for meetings, emails and calls. Face-to-face and instant communication, even virtually, eliminates delays and bottlenecks and helps speed up work.

Cisco Collaboration Solutions

Cisco has bundled together voice, video, data, security and mobility into a single solution called Cisco Unified Communications (UC). Along with UC, Cisco offers these cloud-based Webex solutions:

  • Webex is a complete, cloud-based app-centric collaboration suite that allows teams to create, meet, message, call, whiteboard and share in one continuous workstream from anywhere.
  • Webex Calling is a cloud-based phone system for global calling from any location.
  • Webex Meetings offers online, face-to-face meetings with high-definition video from a web browser, mobile phone or tablet.

Microsoft’s Tools for Collaborative Success

Microsoft offers a suite of collaboration tools designed to enhance productivity and teamwork. Microsoft Teams, part of the Microsoft 365 suite, is a hub for collaboration that integrates with other Microsoft apps and services. Features include:

  • Chat and instant messaging
  • Video conferencing
  • File sharing and collaboration
  • Integration with Microsoft Office apps like Word, Excel, and PowerPoint
  • Customizable and extendable with third-party apps and integrations

Microsoft’s collaboration solutions are designed to meet the diverse needs of modern workplaces, providing seamless communication and collaboration across devices and platforms.

Technology brings teams together.

The reality of today’s workplace is that remote work is here to stay. Even employees who routinely work from the office will occasionally find themselves working from home or other locations. As a result, every organization needs to invest in collaboration solutions to help their teams stay productive, no matter where they are.

To help, OneNeck IT Solutions has partnered with both Cisco and Microsoft to provide leading-edge collaboration solutions for the remote and hybrid workplace. Both Cisco Unified Solutions and Microsoft Teams are smart, affordable ways to keep your employees happy while encouraging them to give their best work. Together with OneNeck’s continuous monitoring, management and support, your organization will be ready to face the challenges of a hybrid work environment.

grey line for collaboration solutions blog

]]>
What is Endpoint Security and How Does it Work? https://www.oneneck.com/blog/what-is-endpoint-security-how-does-it-work/ Thu, 03 Aug 2023 14:49:47 +0000 https://www.oneneck.com/?p=5222 Endpoint Security is Essential to Protecting Your Network and Your Remote Workforce You may not realize it, but one of the biggest threats to your network could be lurking in a coffee shop or someone’s pocket. Today, 70% of breaches originate on endpoints like desktops, laptops, mobile phones or tablets. Endpoint security is essential to […]]]>

Endpoint Security is Essential to Protecting Your Network and Your Remote Workforce

You may not realize it, but one of the biggest threats to your network could be lurking in a coffee shop or someone’s pocket. Today, 70% of breaches originate on endpoints like desktops, laptops, mobile phones or tablets. Endpoint security is essential to protecting your organization’s network and data from threats and malicious attacks.

The Evolution of Endpoint Security

It used to be that all of your network users sat in the same building and used the same computers to access on-premises data. All you needed to protect your network was a simple antivirus program that could detect known threats.

That’s not the case anymore.

In recent years, most organizations have not only changed how their employees work—with many different devices, cloud and SaaS applications—but also where they work. Employees are just as likely to work remotely as they are to be in the office. With the increase in remote and hybrid work, we’ve gone from the office to working from anywhere, including home, the local coffee shop or on an international flight. Users can be on devices and networks that you can’t control or secure.

Why Do I Need Endpoint Security?

Endpoint security helps organizations protect critical systems and sensitive data from cyberattacks like phishing, malware and ransomware. Sixty-eight percent of companies say they’ve had their data or IT infrastructure compromised through endpoint attacks. The endpoints on your network may reside outside of your office building, but they are vulnerable to attackers and frequently targeted.

Your employees may not know if the Wi-Fi they’re using right now is secure or not. Or if the network is running out-of-date antivirus software or unpatched operating systems, which can increase the risk of security vulnerabilities. That’s why it’s vital to have an endpoint security strategy that will prevent attacks before they happen, as well as detect and respond to attacks as they’re happening.

How to Protect Your Assets with Endpoint Security

When your users and devices are off-network, they are the most vulnerable. Endpoint security measures protect your assets while still allowing employees easy access to your organization’s network.

Three ways to keep endpoints secure without compromising employee productivity are:

  1. Verify—Establish that your users are who they say they are before you grant them access to the network. Do this by using multi-factor authentication (MFA), so your users are required to provide a second source of validation, like a phone or a token, to verify their identity.
  2. Access—Provide a secure access point for remote workers with a Virtual Private Network (VPN). No matter where your users are, a VPN provides a secure connection to your network.
  3. Defend—No matter what actions you take, attacks are still going to happen. Be ready for the inevitable by using DNS and endpoint security to block, detect and respond to attacks before they compromise your network.

Security Starts with OneNeck

Endpoint security isn’t something to leave to chance. As malicious attacks continue to rise, protecting your remote workers and securing endpoints is your first line of defense against a network breach.

At OneNeck IT Solutions, we’ve partnered with Cisco to provide a simple, effective security solution designed for your remote workers. Cisco’s Endpoint Security solution protects your remote workers by blocking endpoint attacks and helping you respond quickly to threats. OneNeck can help you protect your network with holistic security solutions that keep pace with the ever-changing cyber landscape.

Learn more by reading about endpoint security in this helpful guide from OneNeck and Cisco, Protecting Your Endpoints the Right Way.

grey line

]]>
Active Directory vs Azure Active Directory https://www.oneneck.com/blog/active-directory-vs-azure-active-directory/ Fri, 28 Jul 2023 14:52:08 +0000 https://www.oneneck.com/?p=5190 When it comes to identity management, Microsoft’s Active Directory has become nearly ubiquitous, allowing organizations to manage multiple on-premises environments using a single identity per user. However, with the shift towards cloud-based solutions, Azure Active Directory (Azure AD) has emerged as a powerful solution for hybrid and cloud-based environments. Evolution of Identity Management Introducing Active […]]]>

When it comes to identity management, Microsoft’s Active Directory has become nearly ubiquitous, allowing organizations to manage multiple on-premises environments using a single identity per user. However, with the shift towards cloud-based solutions, Azure Active Directory (Azure AD) has emerged as a powerful solution for hybrid and cloud-based environments.

Evolution of Identity Management

Introducing Active Directory Domain Services was a significant milestone in identity management. Before its invention, managing multiple on-premises infrastructure components and systems was daunting, often requiring separate identities for each system. Active Directory transformed this process, allowing organizations to address these diverse systems using a single user identity, thus not only streamlining the management process and enhancing security by providing a unified approach for controlling user access and permissions.

However, a more flexible and scalable solution became needed with the shift toward cloud-based environments. Enter Azure Active Directory. This solution elevates the concept of a unified IAM system by offering an Identity as a Service (IDaaS) solution. Azure AD can be utilized by cloud-based organizations or via a hybrid deployment on-premises workloads are present. Azure AD improves management of on-premises Active Directory-integrated applications through secure remote access and Conditional access. This capability benefits organizations utilizing hybrid environments, providing a unified system for managing access across all apps. Moreover, through additional features such as multi-factor authentication, advanced threat analytics and seamless integration with other Microsoft services Azure AD is a powerful solution for modern IAM needs.

Key Concepts: Active Directory vs Azure Active Directory

Active Directory and Azure Active Directory (Azure AD) both serve as identity and access management solutions, however they cater to different environments and have distinct features. Both allow user provisioning, group and entitlement management and administrative rights delegation. Though, Azure AD extends these capabilities with automatic user creation from cloud systems, dynamic group inclusion and built-in roles with Azure AD role-based access control.

Azure AD also includes features such as intelligent password protection, multi-factor authentication and native support for mobile devices through Microsoft Intune. It can access cloud-based and on-premises apps via Azure AD application proxy agents, including traditional and legacy apps. It is worth noting that while Active Directory support multiple domains on a single tenant and includes features like organizational units and group policy objects, these capabilities are not present with Azure AD.

Active Directory and Azure AD Feature Comparison:

  • User Provisioning – Both Active Directory and Azure AD allow user provisioning. In Active Directory, this is done manually or through an automated system like Microsoft Identity Manager. Azure AD, however, supports automatic user creation from cloud HR systems and can provision identities in SCIM-enabled SaaS apps.
  • External Identities – Active Directory requires manually creating external users in a dedicated external AD forest. Azure AD simplifies this process by providing a special class of identity to support external identities and managing the link to the external user identity to ensure they are valid.
  • Entitlement Management and Groups – Both solutions allow administrators to make users members of groups and grant groups access to apps or resources. Azure AD offers additional features like dynamic inclusion based on a query and Entitlement management to give users access to a collection of apps and resources using workflows and time-based criteria.
  • Admin Management – Active Directory uses a combination of domains, organizational units and groups to delegate administrative rights. Azure AD provides built-in roles with its Azure AD role-based access control system. It augments role management with Privileged Identity Management (PIM) to provide just-in-time, time-restricted or workflow-based access to privileged roles.
  • Credential Management – Active Directory credentials are based on passwords, certificate authentication or smartcard authentication. Azure AD uses intelligent password protection, including smart lockout, blocking common and custom password phrases and substitutions, and boosts security through multi-factor authentication and passwordless technologies such as FIDO2.
  • Application Management – Active Directory forms the basis for numerous on-premises infrastructure components. LDAP, Windows-Integrated Authentication or Header-based authentication are primarily utilized to control user access. Meanwhile, Azure AD can access both cloud-based and on-premises apps, including traditional and legacy apps, via Azure AD application proxy agents while simultaneously supporting SaaS apps. Conditional access policies establish rules for controlling access.
  • Device Management – Active Directory provides strong management capabilities for on-premises Windows servers and can domain join Windows devices to manage them. However, it does not support mobile devices without third-party solutions. Azure AD supports mobile device management natively through integration with Microsoft Intune. Furthermore, Windows devices can be joined to Azure AD, and their compliance checked as part of the Conditional access authentication process.

Extending Capabilities with Azure Active Directory

Azure AD introduces several additional features and utilities, extending its capabilities beyond traditional Active Directory. One such utility is Azure AD Connect, which allows organizations to synchronize data from their local Active Directory to Azure AD. This tool effectively extends an organization’s on-premises AD into the cloud, providing a seamless hybrid environment that leverages the benefits of both on-premises and cloud-based IAM.

Azure AD Domain Services provides a managed Active Directory domain on virtual domain controllers hosted in Azure. This offers many aspects of Active Directory that are not natively present in Azure AD, such as organizational units (OUs) and group policy objects (GPOs), meaning businesses get familiar functionality and structure of their local Active Directory combined with cloud-based scalability and flexibility.

The Next Steps

Active Directory and Azure AD play pivotal roles, each catering to unique organizational needs and environments. Active Directory has long been a trusted solution for on-premises management, while Azure Active Directory offers a flexible solution that meets the demands of modern, cloud-based and hybrid environments.

Choosing the right solution is about both meeting current needs and future-proofing your organization’s security and operational efficiency. As an experienced Microsoft CSP, OneNeck helps guide your organization through these critical decisions, ensuring selection and implementation of solutions that best aligns with your business needs.

Ready to get the most out of your identity and access management? Our team of experts is ready to assist. Contact us today to discover how we can help with your IAM solution or any of your Microsoft related needs.

grey line for Azure Active Directory vs Active Directory blog

]]>
What Are Colocation Services? Benefits and Use Cases https://www.oneneck.com/blog/what-are-colocation-services/ Wed, 19 Jul 2023 14:00:41 +0000 https://www.oneneck.com/?p=5056 Instead of maintaining costly on-premises data centers, many organizations leverage colocation to house their servers and networking equipment. Colocation services have numerous benefits, including greater control over infrastructure costs and equipment, better security and increased bandwidth. What Is the Difference Between a Data Center and Colocation? A data center is a facility where organizations store […]]]>

Instead of maintaining costly on-premises data centers, many organizations leverage colocation to house their servers and networking equipment. Colocation services have numerous benefits, including greater control over infrastructure costs and equipment, better security and increased bandwidth.

What Is the Difference Between a Data Center and Colocation?

A data center is a facility where organizations store and manage their computing resources, including servers and networking equipment. On the other hand, colocation is a rental service offered by third-party data center providers that allows organizations to house their servers and equipment in leased space.

Organizations that operate their own data centers are responsible for all aspects—infrastructure design, maintenance, security and power supply. However, organizations using colocation services outsource facility management to the colocation provider, while retaining ownership and control over their servers and data.

Some colocation providers deploy both cloud and colocation solutions.

Why Do Companies Invest in Colocation?

Colocation services provide organizations access to state-of-the-art infrastructure without any upfront costs. This results in significant cost savings—the primary reason 10% of organizations migrate to a colocation environment.

Here are some of the other key reasons why organizations invest in colocation:

  • Scalability and flexibility – Organizations can easily expand or shrink their IT infrastructure based on their evolving needs. This allows organizations to adapt to growth, seasonal fluctuations or sudden spikes in demand more efficiently.
  • Enhanced connectivity – Colocation facilities typically offer high-speed, redundant network connections that enable low-latency, high-bandwidth connectivity. This is crucial for industries that require uninterrupted data access.
  • Expert support and management – Colocation services often include support from experienced technicians. Companies can free their IT teams from mundane tasks like monitoring, maintenance, security and backup management.
  • Robust disaster recovery – Organizations gain access to redundant power supplies, backup generators and disaster mitigation measures. This ensures continuity of operations, even in the event of man-made or natural disasters.

Top 4 Use Cases for Colocation Services

Owning Infrastructure Without Any Upfront Costs

In regulated industries where compliance and data security are critical, owning your own infrastructure is a necessity. However, building and maintaining a data center can be complex, expensive and resource-intensive.

Colocation allows organizations to navigate regulatory challenges efficiently while ensuring the security, availability and integrity of their sensitive data. Colocation facilities offer stringent security measures, like physical security controls and video surveillance. They often also work with regulatory bodies to ensure that organizations meet the necessary compliance requirements effectively.

Scaling Infrastructure for M&A and Business Growth

Scaling IT infrastructure for mergers and acquisitions (M&A) or rapid business growth can be challenging. However, colocation services enable organizations to accommodate evolving demands.

During M&A, organizations can use a shared facility where equipment from different entities can be colocated to streamline the consolidation process and expedite system integration. Similarly, when experiencing rapid growth, organizations can quickly expand their infrastructure.

Renting space within a colocation facility gives organizations the flexibility to add servers, storage and networking equipment as needed.

Supporting High Bandwidth and Extremely Low Latency

Colocation services allow organizations to provide high-quality, uninterrupted experiences in bandwidth-intensive applications—crucial in industries like media, distribution and retail.

Colocation facilities are designed with robust network connectivity that supports high-speed data transfer and extremely low latency. Organizations using these facilities gain access to dedicated, high-bandwidth connections that result in optimal network performance and minimal latency-related issues.

Colocation providers often also have strategic partnerships with major network providers and close proximity to key network exchange points, which further reduce latency.

Operating in Hybrid Environments with Sensitive Data

With colocation services, organizations can operate in hybrid environments while maintaining stringent security and compliance standards for their sensitive data.

Colocation allows organizations to securely store and process sensitive data on-premises, ensuring compliance with privacy regulations and internal security policies. In addition, colocation providers offer robust physical and digital security measures that help organizations maintain control over their sensitive data.

Colocation facilities also enable seamless integration of hybrid environments, ensuring efficient data transfer, reduced latency and enhanced security for sensitive workloads.

Is Colocation Right for You?

Data center colocation is a viable option for organizations thinking of expanding their cloud or on-premise infrastructure or de-risking their operations. To determine whether your organization should follow suit, you may want to consider the following questions:

  • Does your organization want to own and manage its computing infrastructure while cutting down the costs of a data center?
  • Is your organization increasingly experiencing periods of growth, mergers or acquisitions?
  • Are your organization’s revenue and reputation affected by regular data center outages?
  • Are efficiency and sustainability critical to your organization’s competitive differentiation?

If you answered in the affirmative to most or all of these questions, then it’s time to consider colocation. OneNeck’s top-tier data centers provide organizations with cost savings, round-the-clock support and protection from unforeseen events. Learn more by reading about our Data Center Colocation Services.

]]>
July Patching: Windows, Office, Python and More https://www.oneneck.com/blog/july-2023-patching/ Fri, 14 Jul 2023 17:46:09 +0000 https://www.oneneck.com/?p=5107 Welcome to OneNeck’s monthly patching blog for July 2023. We aim to keep you informed about the latest patches and updates that may be affecting your systems. This month, we have identified several zero-day vulnerabilities or actively exploited bugs that require attention. Windows Patching Highlights Here are the most significant patches for July: CVE-2023-32046 – […]]]>

Welcome to OneNeck’s monthly patching blog for July 2023. We aim to keep you informed about the latest patches and updates that may be affecting your systems. This month, we have identified several zero-day vulnerabilities or actively exploited bugs that require attention.

Windows Patching Highlights

Here are the most significant patches for July:

  • CVE-2023-32046 – Windows MSHTML Platform Elevation of Privilege Vulnerability Potentially allows attackers to gain elevated privileges, thus compromising system integrity.
  • CVE-2023-32049 – Windows Smart Screen Security Feature Bypass Vulnerability. This exposure could allow attackers to bypass security features, potentially leading to unauthorized access.
  • CVE-2023-36874 – Windows Error Reporting Service Elevation of Privilege Vulnerability. Could allow an attacker to elevate their privileges, potentially leading to unauthorized system changes.
  • CVE-2023-36884 – Office and Windows HTML Remote Code Execution Vulnerability. Attacker could remotely execute arbitrary code, potentially leading to unauthorized access and data compromise.
  • CVE-2023-35311 – Microsoft Outlook Security Feature Bypass Vulnerability. Allow for bypass of security features in Outlook, potentially leading to unauthorized access to sensitive information.
  • ADV230001 – Guidance on Malicious Use of Microsoft Signed Drivers. This advisory guides the handling of situations where Microsoft-signed drivers are being used for malicious purposes.

While Microsoft has not yet released any updates related to CVE-2023-36884, they have provided mitigation advice, which, if applied, might cause certain issues with regular functionality. We will be watching for an out-of-band update this month and may add to our deployments if determined necessary. We will also consider circling back to update devices patched before the out-of-band update release.

Microsoft Office Updates

Be aware that there have been reports of ‘External Email’ banners, which many companies use to identify messages sent from an external sender, stopping functioning after office updates are applied this month. A reported quick fix for the issue is to change the color used in the banner.

Please note that OneNeck does not patch Microsoft Office products during scheduled patching. We recommend that all customers apply Microsoft Office updates to their environment immediately. If you need assistance with this in your environment, don’t hesitate to contact our Service Desk.

Additional Patching Highlights

In addition to the previously mentioned patches, we have identified several other important security updates:

  • CVE-2023-24329 – A security update for python3 is available. It addresses an issue in the urllib.parse component of Python before 3.11.4 that allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
  • CVE-2023-32067 –This addresses a vulnerability that could potentially allow an attacker to cause a denial of service.
  • CVE-2023-34416 –A security update for Firefox. This update addresses a vulnerability allowing an attacker to execute arbitrary code.

Non-Critical Updates

While updates are available for Emacs (CVE-2022-48339) and open-vm-tools (CVE-2023-20867), it’s worth noting that these are categorized as non-critical. Our primary focus remains on addressing vulnerabilities of higher severity to ensure the utmost security of your systems.

Active Directory Federation Service Security Feature Bypass Vulnerability

Upon application of July updates to all Active Directory Federation Service servers, Microsoft recommends enabling a setting on the primary AD FS server. OneNeck will investigate this for any customers contracted with us for Active Directory Management. For customers not contracted with OneNeck for Active Directory Management: please contact the Service Desk if you have questions about how OneNeck can assist you in your environment.

Other Important Notes

Deployment of the Initial Enforcement phase for CVE-2022-37967 regarding Kerberos protocol changes is occurring in July. Additionally, this month, the enforcement phase for CVE-2022-38023 regarding Netlogon protocol changes is being deployed. The Initial Enforcement for this was deployed via last month’s patches.

Keep an eye out for next month’s blog, and as always, feel free to contact us with any questions or concerns. Stay secure, and stay patched!

grey line for July Patching blog

Each month, OneNeck engineers review newly released updates from vendors, like Microsoft, to understand any known issues, actions required and understand the priority of each. This is done immediately following Patch Tuesday releases, and we monitor for adjustments to patches throughout each month.

The information below is gathered monthly during this review and posted for awareness to our customers. This information is generally updated only once per month and is based on our engineers’ review of the information provided by the vendor at that time. As always, for the most up-to-date patching information, please see the vendor’s website or contact us.

Note: If OneNeck actively manages a device or software that is impacted by any of these vulnerabilities, when necessary, OneNeck will be in direct contact with you regarding remediation.

]]>
Demystifying Shadow IT How to Manage Unsanctioned Technology https://www.oneneck.com/blog/demystifying-shadow-it-and-how-to-manage/ Mon, 10 Jul 2023 13:34:45 +0000 https://www.oneneck.com/?p=4742 Shadow IT, you’ve probably heard the term thrown around in tech circles and IT departments. It likely conjures images of something from a spy novel. However, it is real, affecting businesses across all industries. Shadow IT refers to IT applications, solutions, services or other technology used within a company without explicit organizational approval. This unauthorized […]]]>

Shadow IT, you’ve probably heard the term thrown around in tech circles and IT departments. It likely conjures images of something from a spy novel. However, it is real, affecting businesses across all industries. Shadow IT refers to IT applications, solutions, services or other technology used within a company without explicit organizational approval. This unauthorized use could include a team opting for a file-sharing app or an individual downloading software not supported by the IT department.

Today, the upswing of Shadow IT stems both from the pursuit of convenience as well as the rise of generative AI. As this innovative technology becomes more accessible and widespread, employees may be tempted to utilize AI tools and applications without official approval, adding another level to the Shadow IT landscape. Ultimately, Shadow IT is a concern that most companies must address, with a recent report showing that 77% of IT Professionals believe that shadow IT is a major issue.  Managing it effectively is key to organizational success.

Understanding the Appeal of Shadow IT

To effectively manage Shadow IT, it is vital to grasp why it appeals to employees in the first place. Shadow IT often emerges when employees perceive the officially approved tools and processes as cumbersome, slow or inefficient. A recent study from Beezy shows that 58% of employees aren’t satisfied with their company’s technologies. The allure of a more user-friendly tool or a platform offering greater functionality, such as generative AI tools, can be a strong incentive to bypass official channels. As these AI tools become more sophisticated and intuitive, they can seem attractive alternatives to traditional systems, further fueling their appeal.

Understanding the allure of Shadow IT also means acknowledging the resourcefulness of your employees. Faced with challenges or roadblocks, they seek solutions that enable them to do their job effectively. In the era of artificial intelligence, this might mean turning to advanced AI models like Chat GPT to streamline workflows or improve productivity. While this can pose risks when it leads to the use of unauthorized tools, it also indicates a proactive workforce. Recognizing this mindset can help channel innovative thinking toward safer, more compliant solutions.

In some cases, Shadow IT can highlight gaps or inefficiencies in current IT offerings. If a significant number of employees are turning to the same Shadow IT solution, this may indicate that existing tools aren’t fully meeting their needs. Rather than seeing this as a problem, consider it a source of important user feedback. It provides an opportunity to understand how IT offerings could be improved or expanded, thus fostering an environment of continuous improvement. By seeing Shadow IT as not just a risk but also a signal, you can better align IT strategy with employees’ actual needs, turning a potential threat into a tool for improvement.

The Risks

In many cases, Shadow IT may seem benign or, as mentioned above, a potential productivity booster, but it is critical to acknowledge its substantial risks. The most glaring risk is the potential for security breaches. Unsanctioned apps and services frequently do not adhere to the same stringent security protocols as officially approved tools. This discrepancy creates weak points in the security framework, leaving businesses vulnerable to data breaches.

Shadow IT solutions’ lack of stringent security protocols has real-world implications, the most notable being the loss of critical data. Unauthorized platforms may not be backed up properly or incorporated into an organization’s data recovery plan. Companies may suffer damages if these platforms experience a system failure or a cyber-attack, leading to significant setbacks, as lost data could include client information, sensitive employee details or even proprietary business data.

Furthermore, using Shadow IT raises serious compliance issues, especially in heavily regulated industries. Industries like healthcare, finance and education have strict security, privacy and data handling protocols. If employees are using non-approved software or services, it can inadvertently lead to compliance violations. Non-compliance can result in substantial fines, litigation costs or severe reputation damage. Shadow IT, thus, poses risks that extend far beyond immediate IT concerns, potentially impacting a business’ entire operation.

Managing Shadow IT: A Balancing Act

Managing Shadow IT isn’t about allowing a free-for-all or enforcing a strict ban; instead, it’s striking an appropriate balance:

  • Discover Existing Shadow IT– Recognize existing Shadow IT within your organization. Utilize tools designed for this purpose, which can help you detect and catalog unauthorized software and services used by your employees.
  • Assess Risks and Benefits– After identifying Shadow IT, thoroughly assess the associated risks and benefits. Consider conducting a security review for some tools categorized as Shadow IT, as they may benefit your organization’s workflow and could potentially be officially adopted.
  • Formulate Clear IT Policies– Develop and implement a comprehensive policy that governs the use of IT resources within your organization. This policy should outline what is allowed and what isn’t. Once created, ensure these policies are effectively communicated across the organization to maintain clarity and transparency.
  • Educate and Train Your Employees– It’s crucial to ensure all employees know the risks associated with Shadow IT and the importance of adhering to the set IT policies. This is not a one-off effort. Continuously incorporate this process into your regular training schedule to keep pace with changes in policy or technology.
  • Block Questionable Applications– For any apps or services deemed a possible threat, block their usage and require employees to justify potential approval before granting the ability to download or install.
  • Monitor Regularly– Implement a regular monitoring process to check for occurrences of Shadow IT within your organization. This continuous vigilance will help enforce your IT policies and help you stay aware of the use of new tools or applications outside approved channels.

How OneNeck Can Help

When appropriately managed, Shadow IT can spark growth and innovation while simultaneously mitigating risks and potential compliance issues. It’s about striking an equilibrium between security, flexibility and adapting to your employees’ needs.

Navigating the Shadow IT landscape can be challenging, but you don’t have to face this task alone. OneNeck offers services to secure, manage and transform your organization’s apps effectively. By viewing Shadow IT as an opportunity for continuous improvement and strategic advantage, we can help make sure your IT infrastructure is safe, efficient and tailored to your organization’s needs.

Contact us today to bring Shadow IT into the light and turn it from a cause for concern into a pathway toward innovation and growth.

grey line at end of Shadow IT blog.

]]>
Cybersecurity Insurance: Protecting Your Digital Assets https://www.oneneck.com/blog/cybersecurity-insurance-protecting-your-digital-assets/ Thu, 06 Jul 2023 18:23:21 +0000 https://www.oneneck.com/?p=4990 Today’s modern workplace has ushered in a new reality where safeguarding digital assets is as crucial as protecting our physical ones. Safeguarding digital assets is particularly critical for organizations of all sizes, from small businesses to enterprises. Enter cybersecurity insurance, a specialized form of insurance designed to mitigate financial risks associated with cyber threats. What […]]]>

Today’s modern workplace has ushered in a new reality where safeguarding digital assets is as crucial as protecting our physical ones. Safeguarding digital assets is particularly critical for organizations of all sizes, from small businesses to enterprises. Enter cybersecurity insurance, a specialized form of insurance designed to mitigate financial risks associated with cyber threats. What exactly is cybersecurity insurance? Why does your business need it? And how difficult is it to obtain?

What is Cybersecurity Insurance?

The Department of Homeland Security states that cybersecurity insurance, sometimes known as cyber liability insurance, is a measure designed to mitigate losses from cyber-incidents such as data breaches, business interruption, network damage and cyber extortion. Ultimately, it’s a risk transfer mechanism, allowing businesses to reposition some financial risks associated with data breaches and other cyber threats to an insurance company.

This insurance typically covers a range of expenses such as notification costs, credit monitoring, costs to defend claims leveled by regulators, fines and penalties, and loss resulting from identity theft. It’s a safety net to help organizations weather the storm of cyber threats.

Why Do You Need Cybersecurity Insurance?

Let’s look at the current cyber-threat landscape to answer this question. It is estimated that organizations currently suffer a ransomware attack every 11 seconds, and it is expected that there will be attacks on consumers and businesses every two seconds by 2031. As companies become increasingly reliant on digital technology, the risk of cyber threats escalates exponentially.

A cyberattack can result in significant financial losses due to business interruption, data recovery and reputational damage. Without a cybersecurity insurance policy, the cost of a data breach can be devastating. According to a recent IBM study, the global average price of a data breach in 2022 was $4.35 million.

Having cybersecurity insurance provides a financial buffer, allowing businesses to recover and bounce back faster. It’s not just about managing risk – it’s about resilience.

The Cost of Coverage

Cybersecurity insurance costs differ appreciably from one company to another based on numerous factors. Still, increasing numbers of businesses of all sizes are investing in this coverage to circumvent the burden of hefty immediate expenses in a cyber crisis.

The pricing of cybersecurity insurance takes into account several critical aspects of your business, including:

  • Organizational scale and industry sector
  • Quantity of sensitive information
  • Annual earnings
  • Efficacy security protocols and compliance measures
  • Geographical location
  • Nature of handled data
  • Cyber incident history
  • Current risk management practices
  • Coverage limit and selected deductible
  • Use of third-party services

It is important to note that costs are on the rise. To date, cybersecurity insurance has been relatively inexpensive. However, that low price point has begun to disappear. Insurers are raising rates dramatically and adding additional requirements for coverage, making it harder, if not impossible, for some to get. Higher premiums for public and private organizations result from the rising demand for coverage due to the frequency and higher costs of cybercrime incidents.

Cybersecurity Insurance: A Worthwhile Endeavor

Obtaining cybersecurity insurance isn’t inherently problematic, but it does require a thorough understanding of your business’s cyber risk profile. Insurance companies will often assess an organization’s cybersecurity posture before offering coverage. They consider factors such as the type of data you store, your industry sector, your company’s size, your existing cybersecurity measures, and your history of cyber incidents.

This assessment can pose a challenge for businesses without a robust cybersecurity framework. However, working with an experienced IT partner can help make this process smoother. They can assist in identifying and mitigating cyber risks, thereby improving your chances of securing suitable coverage.

In the end, while getting cybersecurity insurance might require some effort and investment, it’s a small price compared to the potential financial impact of a cyber-attack.

Securing Your Digital Future

In the digital age, cybersecurity insurance is not just an option anymore; it is a necessary part of any business risk management strategy. Just as businesses insure physical assets, it’s equally important to consider protecting digital assets. After all, in the modern workplace, a cyber-attack is not a matter of if but when.

For those who may find the process challenging, remember you do not have to navigate it alone. OneNeck is here to help guide you through the complexities of security and obtaining cybersecurity insurance. Our team has your back and will do whatever it takes to ensure your business has the protection it needs.

Contact us today and embark on your journey toward enhanced cybersecurity. Let us help you ensure a resilient business that is built for the digital challenges of today and future.

grey line to end cybersecurity insurance blog

 

]]>
Breaking Down Database Managed Services https://www.oneneck.com/blog/breaking-down-database-managed-services/ Thu, 29 Jun 2023 22:39:18 +0000 https://www.oneneck.com/?p=4767 Database management is becoming increasingly complex. However, more organizations are going one step further to employ database managed services.]]>

Database management is becoming increasingly complex due to growing data volumes and security concerns, which require significant infrastructure investments and specialized skills. Many organizations rely on the guidelines provided by ITIL (Information Technology Infrastructure Library) as a framework to manage their database environment effectively, deliver services efficiently, and optimize overall performance.

However, more organizations are going one step further to employ database managed services—the adoption of managed services is growing steadily with a compound annual growth rate of 12.44%.

What are database managed services?

Database managed services are cloud-based offerings that handle the administration, monitoring, and optimization of databases, allowing organizations to focus on their core operations. These services often include patching, security management, and incident diagnosis.

The unique value of database managed services

Organizations primarily invest in database managed services to offload the operational complexities of database management, and there are numerous benefits. Overall, these services enhance efficiency, reliability, and scalability while freeing up valuable time and resources.

Managed services providers (MSPs) offer deep expertise and dedicated resources to ensure optimal performance, high availability, and data security. With automated backups and disaster recovery mechanisms, organizations can safeguard their data without manual intervention.

Additionally, organizations gain the ability to seamlessly scale their database resources based on demand, allowing them to handle varying workloads effectively. Managed services also reduce the need for upfront investments in hardware and software, resulting in cost savings.

Companies with an SQL, PostgreSQL, or Oracle environment further benefit from advanced querying capabilities, robust security features, and comprehensive ecosystem support.

Key aspects of database managed services

Database MSPs provide organizations with access to a team of experts that handle database tasks, ensure optimal performance, safeguard data, and minimize downtime. Some of the key aspects of database managed services include:

Upgrades and patches

Database MSPs handle the responsibility of installing updates, upgrades, and security patches for the supported database systems. They stay current with the latest releases and ensure that databases are running on the most secure and efficient versions. This minimizes the risk of vulnerabilities and security breaches.

These upgrades and patches also save organizations time and effort by eliminating the need to track and implement updates themselves. Regular upgrades and patches also help optimize database performance, introduce new features, and ensure compatibility with evolving technologies, enhancing the overall stability and reliability of the database environment.

Security management

Protecting sensitive data from breaches is another critical aspect of database managed services. Database MSPs leverage encryption to safeguard data at rest and in transit, and implement authentication mechanisms to prevent unauthorized access. They also monitor databases for vulnerabilities, perform regular audits and apply necessary patches.

Moreover, database MSPs employ intrusion detection and prevention systems to detect and mitigate potential threats. With proactive measures in place, database managed services enhance data security, ensuring compliance with industry regulations.

Incident diagnosis and resolution

A database administration team monitors for any performance issues or anomalies and when incidents occur, they promptly identify the root cause of the problem. Once the issue is identified, the team works diligently to resolve it and ensure minimal downtime, lowering the impact on business operations.

This often involves troubleshooting, performance tuning, and implementing necessary fixes or optimizations. With their specialized expertise, managed service providers can efficiently handle complex database issues, ensuring prompt incident resolution.

Performance tuning

Database MSPs optimize performance and ensure fast query execution time by analyzing database performance metrics, identifying bottlenecks, and fine-tuning configurations, indexes, and query plans. Additionally, they monitor resource utilization—such as CPU and memory—and scale them as needed.

Performance tuning also involves database schema optimization, query optimization, and implementing caching mechanisms. By continually optimizing and fine-tuning the database environment, database MSPs help organizations improve user experience and support critical operations efficiently.

24/7 support

With round-the-clock support, database MSPs ensure prompt assistance in the event of database-related issues or emergencies. Their support teams are available at all times to address queries, provide troubleshooting guidance and resolve critical incidents.

The support includes monitoring systems for potential issues, responding to alerts, and offering timely resolutions. Businesses can rely on the expertise of database MSPs, and 24/7 support means that assistance is readily available regardless of the time zone or the nature of the problem. This ensures minimal downtime and uninterrupted access to critical databases.

Get started with OneNeck’s Certified DBAs

Database managed services allow organizations to offload the operational complexities of database management. Due to growing data volume and security concerns, and the rising workload of IT departments, the reliance of organizations on database managed services will continue to grow.

You can trust OneNeck’s certified database administrators with performance tuning, database optimization, security implementation, and proactive monitoring—regardless of whether your environment is SQL, PostgreSQL or Oracle. Companies of all sizes rely on OneNeck to ensure reliable, efficient, and secure database operations.

Read more about our Managed Database Services and learn how OneNeck’s experts can help you maintain and protect your databases.

]]>
Microsoft Defender for Endpoint: A Powerful Solution https://www.oneneck.com/blog/defender-for-endpoint-solution-for-threat-defense/ Tue, 20 Jun 2023 14:25:23 +0000 https://www.oneneck.com/?p=4710 In today’s interconnected digital ecosystem, fortifying endpoint devices is no longer a luxury—it’s an absolute necessity. Every work-enabled laptop, mobile device or home desktop represents a potential gateway for bad actors. This situation amplifies the need for businesses to bolster their defenses and secure every endpoint. The expansion of the work environment has dramatically increased […]]]>

In today’s interconnected digital ecosystem, fortifying endpoint devices is no longer a luxury—it’s an absolute necessity. Every work-enabled laptop, mobile device or home desktop represents a potential gateway for bad actors. This situation amplifies the need for businesses to bolster their defenses and secure every endpoint.

The expansion of the work environment has dramatically increased the number of possible entry points for potential attackers. This change in the threat landscape has highlighted the vulnerabilities in many traditional security models. Protecting the new “borderless” network requires a more comprehensive approach. Endpoint security solutions have emerged as key players in providing robust protection, among which Microsoft Defender for Endpoint® has become a potent deterrent against advanced threats. Microsoft’s offering has earned respect throughout the industry, where Gartner has rated Defender for Endpoint as a “Leader” in its Magic Quadrant for Endpoint Protection Platforms (EPP) report, demonstrating its high ability to execute and a compelling vision for the future of endpoint security.

Unraveling Defender for Endpoint

Defender for Endpoint is an enterprise-grade platform designed to help businesses prevent, detect, investigate and respond to advanced threats. It showcases Microsoft’s commitment to providing wide-ranging protection for diverse digital environments. Initially exclusive to Windows, the solution now extends its security capabilities across macOS, Android and iOS mobile devices (managed by Intune) and servers powered by Windows or Linux. This breadth of coverage allows businesses to achieve comprehensive protection across their entire device ecosystem.

The value Defender for Endpoint extends beyond multi-platform compatibility and includes a proactive approach to threat management. It’s not about addressing vulnerabilities after an attack; it’s about fortifying defenses, anticipating threats and developing robust responses. This strategy is implemented through various aspects, each addressing a specific part of endpoint security. These components include asset discovery, threat and vulnerability management, attack surface reduction, next-generation protection and endpoint detection and response.

How does Defender for Endpoint accomplish this task? Its advanced security features and how it harnesses cloud security analytics turns endpoint behavioral signals into actionable insights, detections and responses. Built into Windows 10, Windows 11 and Server 2019+, these behavioral sensors collect and process signals from the operating system, while cloud security analytics add an extra layer of protection.

Defender for Endpoint Purchase Options

The platform offers two distinct purchase options, catering to the unique security needs of businesses of all sizes and scopes: P1 and P2. The P1 package is fundamentally centered on prevention, forming the backbone of your security infrastructure. It provides a robust and reliable foundation for your security needs, helping businesses fortify their digital assets and reduce their susceptibility to cyber threats. By investing in a solid preventive framework, companies can reduce the potential attack surface, making it harder for malicious entities to breach their defenses.

Alternatively, the P2 package delivers advanced capabilities beyond simple prevention. It incorporates critical features such as endpoint detection and response (EDR) and automated investigation and remediation (AIR). Additionally, P2 includes incident response and Threat and Vulnerability Management (TVM), enabling effective and timely responses to security incidents and providing vulnerability insights. The comprehensive nature of P2 makes it an optimal choice for businesses seeking robust, layered protection. The P1 and P2 options empower businesses to tailor security solutions to their specific needs, guaranteeing powerful protection.

Integrated Security: A Unified Experience

Defender for Endpoint isn’t a standalone product—it’s an integral part of a comprehensive security ecosystem. This ecosystem approach to security is a strategic move that underlines Microsoft’s commitment to providing businesses with a holistic security solution. Instead of viewing each aspect of cybersecurity as a separate entity, Microsoft has created an interconnected suite of tools where each component plays a critical role in maintaining the overall security posture of an organization.

One of the key strengths is the seamless integration of Microsoft Defender for Endpoint with various other Microsoft solutions. These solutions include Microsoft Defender for Cloud, Microsoft Sentinel, Intune/ Microsoft Endpoint Manager, Microsoft Defender for Cloud Apps, Microsoft Defender for Identity and Microsoft Defender for Office. This deep integration ensures a seamless security experience across all Microsoft solutions. It simplifies the management of security protocols and enhances the effectiveness of threat detection and response. By integrating these different tools, Microsoft provides businesses a unified platform to handle various security tasks, from endpoint protection to cloud security.

With a unified security experience, IT teams can easily navigate between different tools within the Microsoft suite, significantly reducing the time and effort spent on managing security protocols. Furthermore, the integration allows for more efficient threat intelligence and response strategies sharing across different tools. This means that a threat detected by one tool can be quickly communicated to the rest, facilitating a rapid and coordinated response. Defender for Endpoint plays a central role in fortifying businesses against a complex landscape of cyber threats through this comprehensive and interconnected approach.

The Components: A Closer Look

Defender for Endpoint isn’t just a single, one-size-fits-all solution. Instead, it’s a carefully assembled collection of components, each with its unique function, designed to bolster your overall endpoint security. Like puzzle pieces, these elements work together, creating a comprehensive, multi-angle approach to security. Some of the most important aspects include:

  • Next-Generation Protection (NGP)– Going beyond the traditional MS Defender Antivirus measures, NGP provides robust real-time protection against sophisticated malware and zero-day exploits. Additionally, cloud-delivered protection delivers near-instant detection and blocking of new and emerging threats.
  • Attack Surface Reduction (ASR)– Minimizes the potential entry points for threats, making it harder for attackers to infiltrate your systems. It’s a proactive measure to keep threats at bay via components such as ASR rules that target suspicious software behavior, hardware-based isolation, controlled folder access and device control removable storage protection.
  • Endpoint Detection & Response– EDR uses machine learning, behavioral analysis and threat intelligence to provide real-time visibility into endpoint activity, identification and detection of abnormal activities or potential dangers and rapid response to minimize the impact of an attack.
  • Automated Investigation and Remediation–AIR uses AI and machine learning to streamline the investigation of alerts, identify causes of potential threats and can then take remediation actions to contain an infected device or quarantine malicious files, thus automating tasks that typically require human intervention.
  • Comprehensive Reporting and Alerting– Provides comprehensive reporting and alerting capabilities that give crucial visibility into an organization’s security posture and enable rapid response to potential threats.
  • Microsoft Secure Score for Devices– This powerful tool helps organizations assess their security posture and identify areas where proactive improvements can be made to security defenses.

OneNeck and Microsoft: An Investment in Security

In an era defined by digital transformations, ensuring the security of endpoint devices is paramount. Defender for Endpoint stands as a powerful ally in this endeavor. Its wide-ranging compatibility across different operating systems and seamless integration with a host of Microsoft solutions make it a vital part of a comprehensive security strategy.

Ready to enhance your organization’s digital security posture? As an experienced Microsoft Cloud Solution Provider (CSP), OneNeck possesses extensive knowledge of Microsoft Defender for Endpoint and the Microsoft ecosystem. Our team can help you harness the power of these advanced tools, tailoring them to meet your specific needs. Don’t wait for a security breach to take action. Contact our team today!

grey line that ends Defender for Endpoint blog

 

]]>
June Patching: Vulnerabilities in VMware and Microsoft https://www.oneneck.com/blog/june-2023-patching/ Fri, 16 Jun 2023 18:42:12 +0000 https://www.oneneck.com/?p=4697 Welcome to OneNeck’s monthly patching blog for June 2023. Our aim is to keep you informed about the latest patches and updates that may affect your systems. This month saw the release of several important patches but, thankfully, no zero-day vulnerabilities or actively exploited bugs. Patching Highlights Here are the most significant patches for June: […]]]>

Welcome to OneNeck’s monthly patching blog for June 2023. Our aim is to keep you informed about the latest patches and updates that may affect your systems. This month saw the release of several important patches but, thankfully, no zero-day vulnerabilities or actively exploited bugs.

Patching Highlights

Here are the most significant patches for June:

  • CVE-2023-20867 – An authentication bypass vulnerability in VMware Tools has been identified. This vulnerability could potentially allow unauthorized users to gain access to sensitive information.
  • CVE-2023-29357 – Pertains to an elevation of privilege vulnerability in the Microsoft SharePoint Server. If exploited, this vulnerability could grant an attacker higher-level privilege, thereby compromising the integrity and confidentiality of your data.
  • CVE-2023-32031 – A remote code execution vulnerability in Microsoft Exchange Server that is particularly concerning as it could potentially allow an attacker to remotely execute arbitrary code and gain unauthorized access to data or services.
  • CVE-2023-33131 – This vulnerability is being addressed within a broader set of updates for Microsoft Office. If exploited, it could lead to the execution of malicious code when a user opens a specially crafted file or program.

VMware Tools Updates

At OneNeck, we regularly update virtual machines (VMs) in managed environments. VMware Tools contains an Authentication Bypass vulnerability (CVE-2023-20867) in the vgauth module. A fully compromised ESXi host can force VMware Tools to fail to authenticate host-to-guest operations, impacting the confidentiality and integrity of the guest virtual machine. This month, we will work to apply the latest version of VM Tools to remediate CVE-2023-20867 for customers contracted with OneNeck for support of their VMware environment.

Microsoft Office Updates

Please note that OneNeck does not patch Microsoft Office products during scheduled patching. We recommend that all customers apply Microsoft Office updates to their environment as soon as possible. If you need assistance with this in your environment, don’t hesitate to contact our team of Microsoft experts.

Exchange Patching Updates

Important news for Exchange users: Exchange Server 2013 has reached End of Life, and Microsoft will provide no further patches for this version. Exchange Server 2016 has reached the end of Mainstream Support and is now under Extended Support. We will continue applying Security Updates Microsoft released for customers contracted with OneNeck for Exchange Management.

Moreover, we strongly encourage all customers to upgrade to Exchange Server 2019. A new Security Update has been released for Exchange Server 2019, which we will apply for customers contracted with OneNeck for Exchange Management and running a supported version of Exchange.

Windows 10 & 11 22H2

OneNeck recommends updating Windows 10 & 11 devices to Feature Update version 22H2 to ensure future security updates will install on your systems. This upgrade is not automatic via standard patching. Additionally, Windows 10 & 11 devices using BitLocker will require a manual update to the Windows Recovery Environment. Please contact our Service Desk if you need assistance with these processes.

Secure Boot Security Bypass Vulnerability

We do not enable Secure Boot on OneNeck- build servers. As a result, we will not be taking any manual action for this update. However, if you have enabled Secure Boot on your servers, we encourage you to review the documentation and take all necessary actions. Our Service Desk is available to assist you with this should you have questions or concerns surrounding your organization’s environment.

OneNeck Has Your Back!

Stay tuned for next month’s patching blog, and as always, feel free to reach out with any questions or concerns. Stay secure, stay patched!

grey line for June patching blog

Each month, OneNeck engineers review newly released updates from vendors, like Microsoft, to understand any known issues, actions required and understand the priority of each. This is done immediately following Patch Tuesday releases, and we monitor for adjustments to patches throughout each month.

The information below is gathered monthly during this review and posted for awareness to our customers. This information is generally updated only once per month and is based on our engineers’ review of the information provided by the vendor at that time. As always, for the most up-to-date patching information, please see the vendor’s website or contact us.

Note: If OneNeck actively manages a device or software that is impacted by any of these vulnerabilities, when necessary, OneNeck will be in direct contact with you regarding remediation.

 

]]>
Boost Endpoint Protection with Microsoft Defender for Endpoint and Intune https://www.oneneck.com/blog/boost-endpoint-protection-with-microsoft-defender-for-endpoint-and-intune/ Thu, 08 Jun 2023 17:16:28 +0000 https://www.oneneck.com/?p=4518 The need for robust endpoint protection cannot be overstated. As network boundaries continue to blur with increases in remote work and the proliferation of mobile and IoT devices, endpoint protection has emerged as a critical aspect of network security. In this blog, we explore this process and examine two of Microsoft’s primary solutions: Microsoft Defender […]]]>

The need for robust endpoint protection cannot be overstated. As network boundaries continue to blur with increases in remote work and the proliferation of mobile and IoT devices, endpoint protection has emerged as a critical aspect of network security. In this blog, we explore this process and examine two of Microsoft’s primary solutions: Microsoft Defender for Endpoint and Microsoft Intune.

Understanding Microsoft Defender for Endpoint

Microsoft Defender for Endpoint® is a platform designed to safeguard your organization’s endpoints, essentially any devices connecting to your network. These can range from traditional computing devices like desktops and laptops to modern smart devices and IoT gadgets.

Defender for Endpoint serves as a protective shield for your network by offering real-time threat detection, prevention, and response capabilities. But that’s not all it does. It also provides automated investigation capabilities, helping IT teams promptly detect and respond to threats, reducing time and resources spent on investigations.

Moreover, it facilitates threat intelligence sharing across platforms, enhancing an organization’s ability to proactively defend against potential threats. By harnessing artificial intelligence (AI) and integrating it with other security solutions, Defender for Endpoint ensures that your network remains resilient.

The Microsoft Defender Family: A Holistic Approach

The term “Microsoft Defender” often sparks confusion due to its broad scope. Contrary to what one might intuitively think, Microsoft Defender is not a single application but a family of interconnected security solutions designed to take a holistic approach to address digital protection. Given this complex arrangement, businesses often find it challenging to determine which specific product from the Defender suite best suits their needs.

While our focus here is on Defender for Endpoint, understanding what the entire MS Defender family brings to the table is important.  Some of the more prominent applications and add-ons include:

  • Microsoft Defender for Office 365– Prevents volume-based and targeted attacks, phishing, ransomware and advanced malware with its robust filtering system. It uses AI to detect malicious and suspicious content and provides capabilities for identifying, prioritizing and investigating threats across Office 365.​
  • Microsoft Defender for Identity– Helps Security Operations identify configuration vulnerabilities and prioritize the riskiest users in an organization. It also provides real-time analytics & data intelligence to threats​.
  • Microsoft 365 Defender– Part of Microsoft’s XDR solution, it automatically analyzes threat data across domains, building a comprehensive picture of each attack in a single dashboard​​.
  • Microsoft Defender for Cloud Apps– Acts as a cloud access security broker (CASB), providing multifunction visibility, control over data travel and sophisticated analytics. It helps organizations elevate security posture by combating cyber threats across all their cloud services​​.
  • Microsoft Defender Vulnerability Management– Bolsters security and IT personnel by filling workflow gaps, enabling prioritization and remediation of critical vulnerabilities and misconfigurations throughout an organization.

These applications work in concert, providing an integrated, multi-layered defense strategy. This interconnectivity creates a centrally managed environment where endpoint protection is integral to your network security strategy rather than an isolated, independent function.

The Role of Microsoft Intune

Microsoft Intune®, a vital component of the Defender ecosystem, deserves special mention. Intune is a cloud-based service that provides comprehensive device and application management capabilities. It’s a tool that simplifies device management and establishes a secure foundation for your endpoint protection strategy.

Intune provides granular control over how devices access corporate data, allowing you to enforce compliance policies and regulate device access based on predefined rules. This ability to control device access is critical to any endpoint protection plan, as it ensures that only authorized devices are allowed to interact with your network.

In addition, Intune facilitates mobile application management, allowing you to control how corporate data is accessed and shared on mobile apps. This ability means protecting your data even when accessed from personal devices, ensuring that your business information remains secure, no matter where it’s accessed.

Interplay Between Intune and Defender for Endpoint

Intune and Defender for Endpoint are not standalone solutions; they work together to provide a comprehensive endpoint protection strategy. Intune sets the stage by establishing basic security controls and compliance policies, while Defender for Endpoint builds upon this foundation to provide advanced threat protection.

This interplay between Intune and Defender for Endpoint allows for an integrated and dynamic defense strategy. Defender for Endpoint and Intune ensure protection for both devices and data from threats by managing your endpoints and controlling their access to your network.

Why Organizations Need to Use Defender for Endpoint

The benefits of using Defender for Endpoint are numerous. It leverages advanced technologies, such as behavioral sensors and cloud-delivered security, to guard against known and unknown threats providing robust protection for your endpoints. This protection includes Zero Day attacks, ensuring your network remains protected even when new threats emerge.

In addition to securing devices, Defender for Endpoint provides application-level protection. It ensures that critical business software is protected from potential vulnerabilities, minimizing the exploitation risk to your applications. This level of security is essential as applications often serve as entry points for attackers.

Furthermore, Defender for Endpoint offers advanced threat-hunting capabilities. Using a rich data set collected from your endpoints it can uncover hidden breaches that traditional defenses might miss. This proactive approach to threat detection and response can significantly reduce the impact of security incidents.

Key Considerations for Implementation

First, it’s essential to understand Intune’s role in optimizing Defender’s effectiveness for endpoints. By leveraging Intune’s capabilities, you can manage antivirus, endpoint detection and response, and firewall policies from a single view, enhancing your organization’s security posture.

Integrating Intune and Defender for Endpoint also provides opportunities for automation, reducing manual tasks and freeing your IT team to focus on strategic initiatives. Furthermore, the rich reporting capabilities of both solutions provide valuable insights into your security posture, helping you make informed decisions and continuously improve your endpoint protection strategy.

Strengthening Your Endpoint Protection Strategy with OneNeck and Microsoft

As digital threats evolve, so must your endpoint protection strategy. Consider how Microsoft Defender for Endpoint and Intune can enhance your approach. By proactively managing and securing your endpoints, you can protect your network, data and, ultimately, your organization. Start your journey with Microsoft Defender for Endpoint and Microsoft Intune today and step up your endpoint protection game.

As an experienced Microsoft CSP and IT security provider, OneNeck is positioned perfectly to be your trusted partner. We specialize in deploying layered security strategies that provide comprehensive protection, from the DNS layer, through the network to the endpoint. We leverage the power of Microsoft Defender for Endpoint, Microsoft Intune and other essential security tools to ensure your digital assets are well-protected.

Ready to boost your organization’s defenses? Contact us today for a personalized consultation on how Microsoft Defender for Endpoint and Microsoft Intune can protect your digital assets.

grey line at end of Defender for Endpoints and Intune blog

]]>
Why Organizations Are Embracing ITIL Managed Services https://www.oneneck.com/blog/why-organizations-are-embracing-itil-managed-services/ Tue, 06 Jun 2023 17:59:03 +0000 https://www.oneneck.com/?p=4509 ITIL (Information Technology Infrastructure Library) is nothing new to IT departments. For decades, organizations have followed the best practices outlined in the ITIL framework to deliver high-quality and cost-effective IT services. In the search for a managed services provider (MSP), you might find it difficult to discern the value of one provider over another. To […]]]>

ITIL (Information Technology Infrastructure Library) is nothing new to IT departments. For decades, organizations have followed the best practices outlined in the ITIL framework to deliver high-quality and cost-effective IT services.

In the search for a managed services provider (MSP), you might find it difficult to discern the value of one provider over another. To receive the best services, today’s organizations should engage an MSP that follows the ITIL framework.

The Value of ITIL to Today’s Organizations

The importance of ITIL has only grown as IT environments have become more complex and distributed. Today’s organizations use ITIL to align their IT services with their ever-evolving business needs and customer expectations.

The primary focus of ITIL is to automate processes, improve service management, and integrate IT departments. The ITIL service lifecycle comprises five main stages:

  • Service Strategy focuses on understanding the business objectives and customer needs by defining a strategic approach to IT service management.
  • Service Design means designing new services or modifying existing services based on the defined requirements and strategies.
  • Service Transition involves implementing new or modified services in the operational environment of the organization.
  • Service Operation refers to the actual delivery of services to customers, including incident and problem management.
  • Continual Service Improvement aims to optimize service delivery through performance assessment and change implementation.

These five stages provide today’s organizations with a structured framework for managing IT services and improving service quality on an ongoing basis.

ITIL has gone through several revisions and consolidations since it was introduced in the late 1980s to accommodate new technology developments. ITIL 4, the latest version of the framework, was released with updates that help IT departments like yours foster greater agility and flexibility.

What is a Managed Service in ITIL?

A managed service for ITIL is the outsourced delivery and management of an organization’s IT services by a third party known as a managed service provider. They support the IT infrastructure and systems of their clients based on the optimized processes outlined in ITIL.

Top Reasons Companies Invest in ITIL-based Managed Services

You might engage an ITIL managed services provider for a number of reasons. You might want your employees to focus more on your organization’s core functions and strategic initiatives. You may be looking for opportunities to achieve greater scalability, flexibility, and cost advantages through economies of scale.

Here’s a closer look at some of the primary reasons companies use ITIL managed services providers.

Streamlines customer onboarding.

When a managed services provider uses the ITIL framework, they build standardized procedures for customer onboarding, ensuring that the process remains consistent and efficient. From there, they work with you to define roles and responsibilities within the onboarding process, which eliminates confusion and enables coordination between all teams involved—ultimately leading to a better experience for your team.

MSPs may also use ITIL to build a knowledge base for customer onboarding based on best practices and lessons learned. This knowledge can be shared throughout your organization to further improve consistency.

Helps MSPs deliver excellent customer service.

MSPs can use ITIL to align their service offerings with your business requirements, which ensures that the services they provide are valuable and relevant. With Service Level Agreements that establish clear expectations, metrics, and targets for service delivery, you and your MSP will have a basis for measuring and reporting service performance. Moreover, ITIL provides MSPs guidelines for effective incident management so your issues are resolved promptly with minimal impact on business operations.

Increases the value your MSP can deliver.

ITIL allows MSPs to implement well-defined processes, which minimizes errors in service delivery. It also provides guidelines that enable MSPs to manage incidents systematically, allowing errors to be detected and resolved faster—which means fewer fires for you to worry about. In addition, ITIL lowers the risk of disruptions during change implementation so MSPs can deliver more stable and reliable IT services.

Includes process review cycles for continuous improvement.

ITIL provides MSPs with a structured approach to constantly update their IT service delivery. The process review cycles involve periodic assessments of service management processes, which help MSPs to pinpoint areas that require improvement—within their organization and within yours—including bottlenecks and inefficiencies.

With this information at their fingertips, MSPs can work with you to define key performance indicators (KPIs) based on ITIL’s standards to track performance and gain insights into the gaps in service delivery.

Engage with a Leading ITIL Managed Services Provider

Organizations are embracing ITIL managed services because MSPs establish a robust framework that guarantees service quality and reliability when managing and delivering IT services. This significantly lowers the risk of disruptions and improves customer satisfaction for your organization.

OneNeck is a leading ITIL managed services provider with an extensive portfolio of managed services, including managed database services. OneNeck’s experienced database administration team proactively monitors systems to ensure peak performance at all times, while standardizing and optimizing routine tasks to reduce costs.

Learn more by reading about our Managed Services.

grey line

]]>
Unpacking Microsoft Fabric: Next-Gen Data Analytics https://www.oneneck.com/blog/unpacking-microsoft-fabric/ Fri, 02 Jun 2023 17:59:14 +0000 https://www.oneneck.com/?p=4487 Microsoft recently unveiled its latest innovation, Microsoft Fabric®, an integrated data and analytics platform constructed on the robust foundation of the company’s OneLake data lake. Users should experience several interesting benefits, including easier data integration and platform-independent data analysis. So, what exactly is Fabric? According to the overview provided by Microsoft, “Fabric is an all-in-one […]]]>

Microsoft recently unveiled its latest innovation, Microsoft Fabric®, an integrated data and analytics platform constructed on the robust foundation of the company’s OneLake data lake. Users should experience several interesting benefits, including easier data integration and platform-independent data analysis.

So, what exactly is Fabric? According to the overview provided by Microsoft, “Fabric is an all-in-one analytics solution for enterprises that covers everything from data movement to data science, Real-Time Analytics, and business intelligence. It offers a comprehensive suite of services, including data lake, data engineering, and data integration, all in one place.”

The beauty of Fabric is that it eliminates the need to piece together different services from multiple vendors. Instead, businesses can employ a highly integrated, end-to-end, easy-to-use product to simplify analytics. This capability is further supported by the platform being built upon an established Software as a Service (SaaS) foundation.

Microsoft Fabric components and SaaS Foundation.

– Source: Microsoft

Microsoft Fabric and Power BI: Cut from the Same Cloth

Current Power BI® users will likely notice an inherent familiarity with Fabric. The SaaS foundation used to build Fabric is what Power BI utilizes today. While Fabric offers a plethora of new features, the fundamentals of Fabric and Power BI are in most cases indistinguishable.

Shared features and experiences include, but are not limited to:

  • Workspaces– Fabric workspaces behave like Power BI workspaces only with increased availability of item types.
  • Navigation– If you understand how to operate the Power BI portal, you know how to move around Fabric. They work the same.
  • Collaboration and Content Management– You can collaborate and share with Fabric items and workspaces like you do with Power BI.
  • Capacities– New Fabric workloads utilize the capacity-based compute model used by Power BI Premium.
  • Administration– Fabric administration works like Power BI administration, and the Fabric admin portal is just an evolution of Power BI’s portal.

OneLake, the OneDrive for Data

OneLake® is a SaaS data lake that is a fundamental element of the Fabric SaaS foundation. Each Fabric tenant involves a single OneLake instance, and every Fabric experience works natively with data in the lake. Microsoft is christening OneLake, the OneDrive for data.

Like OneDrive, OneLake is included with every Microsoft Fabric tenant, designed to be the solitary destination for all analytics data. OneLake provides companies with a single data lake for the entire organization and a copy of data to use with various analytical engines.

Microsoft Fabric: Core Components

Fabric provides an exhaustive set of features, ranging from integration tools, a Spark-based analytics platform, to a real-time analytics tool, all boosted by an upgraded Power BI. This facilitates user-friendly visualization and AI-based analytics. Furthermore, Fabric presents a no-code developer interface, enabling users with various experience levels or programming to monitor real-time data.

Fabric offers comprehensive analytics experiences designed to work together seamlessly. Each experience is tailored to an individual user and a particular task. Microsoft Fabric’s core components include:

  • Power BI– A Business Intelligence platform that permits organizational users to access all data in Fabric quickly and intuitively, aiding in data-informed decision-making.
  • Data Engineering– Provides a Spark platform designed for data engineers to transform large-scale data and democratize data using the lakehouse. Integrating Microsoft Fabric Spark with Data Factory allows notebooks and Spark jobs to be scheduled and orchestrated.
  • Data Factory– Integrates the user-friendly Power Query with the scalable Azure Data Factory. This combination provides over 200 native connectors to data sources on-premises and in the cloud.
  • Data Science– Facilitates creation, deployment and operational management of machine learning models within the Fabric environment. Integration with Azure Machine Learning includes built-in experiment tracking and model registry. This integration allows enriched organizational data with predictions and business analysts to combine those predictions into their Power BI reports, allowing for the transition from descriptive to predictive insights.
  • Data Warehouse– This feature provides SQL performance and scalability, separating compute from storage for independent scaling of both components. It also includes native data storage in the open Delta Lake format.
  • Real-Time Analytics– Observational data collected from various sources like apps, IoT devices and human interactions is an expanding data category. Real-Time Analytics manages high volumes of semi-structured data with shifting schemas.

It is important to acknowledge that most of these new features are still currently in preview. In this phase, the features afford an exciting glimpse into the future of data integration, management and analysis, providing the potential to redefine the handling of large-scale data operations.

OneNeck, a Microsoft CSP for Today and Tomorrow

At OneNeck, we’re proud to be an experienced and trusted Microsoft CSP. Our partnership aims to bring the best technology and services to our clients, helping organizations navigate the world of data more efficiently and effectively.

Don’t wait to leverage the Microsoft suite of cloud services, including innovations such as Fabric, in your data operations. Connect with OneNeck to learn more about how we can help you excel in the Modern Workplace and stay ahead of the curve in this ever-evolving digital landscape.

Contact us today to speak to one of our experienced Microsoft experts.

]]>
Embrace Industry 4.0 with IT Solutions for Manufacturing https://www.oneneck.com/blog/how-to-get-to-industry-4-0-it-solutions-for-manufacturing/ Tue, 30 May 2023 22:15:03 +0000 https://www.oneneck.com/?p=4387 5 IT Solutions to Automate Your Production Facility The latest phase in manufacturing, known as Industry 4.0 or the Fourth Industrial Revolution, refers to the use of smart automation and connectivity in a production environment. By utilizing the Internet of Things (IoT) to connect computers to machines, facilities can automate production while leveraging data and […]]]>

5 IT Solutions to Automate Your Production Facility

The latest phase in manufacturing, known as Industry 4.0 or the Fourth Industrial Revolution, refers to the use of smart automation and connectivity in a production environment. By utilizing the Internet of Things (IoT) to connect computers to machines, facilities can automate production while leveraging data and analytics, enhancing human interaction with machines and improving efficiency and productivity.

What are Industry 4.0 Solutions for Manufacturing?

Industry 4.0 IT solutions for manufacturing are cutting-edge technologies that enable data sharing and automation by connecting machines and computers — leading to today’s “smart factories.”

Along with improved robotics and IoT connectivity, smart factories may employ additional digital solutions. These may include automated diagnostic tools, remote monitoring, predictive maintenance, augmented reality (AR) and virtual reality (VR), and mobile and web apps.

Automation and connectivity in smart factories lead to improved production reliability and precision, and a more agile, flexible, and efficient production environment.

5 Foundational IT Solutions for Manufacturing

Implementing Industry 4.0 smart manufacturing processes can help companies achieve continuous improvement goals such as reducing downtime, improving supply chain traceability, and increasing speed to market. However, Industry 4.0 doesn’t just happen. Management must identify opportunities, choose from various technological and digital solutions, and implement the ones that address the highest priority functions.

Here are five foundational IT solutions for manufacturing to consider as your organization prepares to implement Industry 4.0 in your factory.

  1. Cloud & Hybrid IT: Cloud computing enables manufacturers to store and access data and applications on remote servers. This internet-based solution eliminates the need for on-premises infrastructure, providing an affordable, flexible, and scalable solution. Combining cloud and on-premises systems results in a hybrid IT solution, allowing organizations to leverage the benefits of both.
  2. Colocation: Manufacturers can rent servers and other hardware space at a third-party provider’s facility, allowing them to outsource physical infrastructure while retaining control over their IT systems. Colocation can also assist manufacturers by providing redundancy for disaster recovery.
  3. Application Modernization: In manufacturing, application modernization is the process of updating or replacing legacy software and systems to ensure compatibility with modern technology. This can include migrating on-premises software to the cloud, implementing software-as-a-service (SaaS) solutions, and using technologies like artificial intelligence (AI) and machine learning (ML). Application modernization enhances the functionality and efficiency of equipment, frontline workers, and supply chain while optimizing processes.
  4. Virtualization: Virtualization technology enables manufacturers to use a single physical server to run multiple virtual machines or operating systems. This reduces costs while improving hardware utilization and scalability. Virtualization also helps support flexible work arrangements by enabling the creation of virtualized desktops, allowing employees a secure way to remotely access applications and data.
  5. Digital Transformation: Digital transformation is the integration of digital technologies across all aspects of a manufacturing organization, fundamentally changing how it operates. It can cover many different initiatives, such as adopting Industrial Internet of Things (IIoT) devices for real-time data collection and predictive maintenance, leveraging analytics for informed decision-making, and implementing automation and robotics to streamline processes and increase productivity.

The Future of Manufacturing Starts with OneNeck

These foundational IT solutions for manufacturing are a starting point when planning for the digital transformation necessary to thrive in today’s technology-driven landscape. Moving to Industry 4.0 offers enticing long-term benefits including continuous improvement and cost savings.

Don’t walk this path without a partner that can guide you through the journey. At OneNeck, we have helped manufacturing companies like yours jump into action with innovative solutions.

  • Migrations to cloud, multi-cloud, and hybrid environments
  • Colocation for managing the cost of expanding data centers
  • Cybersecurity products and services to reduce downtime and risk
  • Digital transformation and application modernization
  • Connected machines and devices

In today’s competitive, rapidly evolving manufacturing environment, organizations that embrace digital solutions are better able to weather any storm. Let OneNeck IT Solutions help you navigate your organization’s transition to Industry 4.0.

Read more about IT solutions for the manufacturing industry, and learn how OneNeck can help provide solutions right for your factory.

]]>
Tips for Data Security While Traveling https://www.oneneck.com/blog/tips-for-data-security-while-traveling/ Wed, 24 May 2023 18:46:43 +0000 https://www.oneneck.com/?p=4317 You’ve likely recently come across a warning from the FBI about the risks of using public USB ports. It is a healthy reminder of the ever-present threat of hackers and the need to practice good general security habits, especially when traveling. In this blog, we’ll discuss crucial tips for maintaining digital privacy and data security […]]]>

You’ve likely recently come across a warning from the FBI about the risks of using public USB ports. It is a healthy reminder of the ever-present threat of hackers and the need to practice good general security habits, especially when traveling. In this blog, we’ll discuss crucial tips for maintaining digital privacy and data security while traveling, whether at an airport, coffee shop hotel or any public setting. After all, protecting personal and business data is always a shared responsibility.

Public USB Port as a Risk to Data Security

The specific FBI caution against using public USB ports centered around “juice jacking.” While juice jacking is just one method for the corruption of USB ports, it is a particularly deceptive technique in which hackers use public charging stations to access a device’s data or install malware. Connecting a device to a compromised charging port or using a tampered charging cable allows attackers to potentially access the device’s data, passwords and other sensitive information. In some cases, they might even install malware that can remotely control the device, monitor activities, encrypt data and demand a ransom.

So, what can you do to protect yourself from these attacks? The most straightforward practice is always to carry a wall port to plug your USB cable into. This basic precaution can go a long way in helping you avoid potential breaches and compromised devices.

There are still options when traveling internationally or if you cannot access a plug-in power source. You can bring a USB battery pack or use a personal USB cable to charge directly from another of your devices. Another option is a charge-only USB cord, known as a “USB condom.” These protective items are an affordable and effective solution that significantly reduces the risk of compromising your data while charging devices.

One other essential note, it’s crucial to keep your device’s software up to date since outdated software is more vulnerable to attacks. Installing security patches and system updates as soon as they become available safeguards your device against known vulnerabilities.

Data Security While Traveling

It’s important to note that public USB port risks are not the only data security threats faced when traveling or in public settings. In addition to these threats, other potential risks exist, such as shoulder surfing and cyber-attacks through seemingly trustworthy Wi-Fi networks.

As a traveler or someone frequently in public settings, it is essential to be aware of these diverse risks and adopt a comprehensive approach to protecting data. These precautions include being careful about the networks you connect to, the information you share and how you handle devices in public spaces.

VPNs and Wi-Fi Security

Free Wi-Fi networks, often found in airports, hotels and coffee shops, pose significant problems. These networks frequently lack proper management, making them vulnerable to security threats from bad actors waiting for easy targets. Additionally, they likely don’t encrypt or protect browsing traffic, and might require the sharing of some personal information to gain access. If possible, consider using a personal hotspot from mobile device to ensure the greater security. Using a personal hotspot lets you control the network you’re connecting to, making it less likely for hackers to intercept data.

Using a virtual private network (VPN) to secure your internet connection is essential when away from home or office networks. A VPN establishes an encrypted tunnel between your device and the internet, protecting data from potential eavesdroppers and hackers. When selecting a VPN service, choose one with a strong reputation, end-to-end encryption and a no-logs policy. “No-logs” means the VPN provider doesn’t store information about online activities, ensuring your privacy remains protected even if the provider is compromised.

Privacy Screens

Physical security is also essential while traveling. You never know who might be looking over your shoulder in crowded places like airports or busy coffee shops. A skilled attacker can capture astonishing amounts of information by observing your screen.

To protect privacy, consider using a privacy screen on your devices. These screens make it difficult for others to see your screen from an angle, helping to prevent unwanted snooping. Privacy screens offer a relatively inexpensive and easily available solution that provides further security for your devices.

Protecting Sensitive Company Information

Your company’s security protocols, domain names, email addresses, applications and intellectual property are potential cyberattack targets. When traveling, it’s essential to stay vigilant in safeguarding this information, as it can be used to craft targeted attacks against your business or colleagues.

Exercise additional caution when using devices in public spaces, as cell phones with high-quality cameras can easily capture images of your screen or record conversations for later review. Always be mindful of your surroundings and take extra precautions to secure your company’s sensitive information.

Follow Company Protocols

Always follow your company’s guidelines for accessing and storing sensitive data while traveling. These procedures may include using encrypted devices or secure cloud storage services to protect your files. It’s also important to keep track of any physical documents containing sensitive information, as they can be easily lost or stolen during transit.

Ensure the use of strong, unique passwords for all accounts and enable multi-factor authentication (MFA) whenever possible. MFA adds an extra layer of security by requiring additional verification methods, such as a fingerprint or a one-time code sent to your mobile device.

If your devices are lost or stolen, enable remote wipe capabilities. This feature lets you erase all data from your devices remotely, preventing unauthorized access to sensitive information. Many organizations will require this as a standard component of device setup.

Protecting Personal Information on the Go

Ensuring data security while traveling is a shared responsibility that requires vigilance and good habits. You can better protect personal and business data from potential threats by following the tips outlined here. Always use your charging equipment, connect to secure networks through a VPN, use privacy screens and be cautious with sensitive information. By adopting these everyday security practices, you can enjoy peace of mind and focus on making the most of your travels. Stay safe and make digital security a top priority.

Data Security with a Trusted Partner

Protecting your personal or company data is always more effective when collaborating with a trusted partner. OneNeck offers a comprehensive approach to security services, ensuring the safety of your organization’s data in the cloud, on-premises, or within a hybrid environment. In addition, we provide practical security awareness training through extensive collaborations with trusted partners. This training educates users, effectively reducing risk and enhancing your organization’s security culture.

Ready to enhance your personal and organizational security? Contact us today to speak with a OneNeck security expert and take the first step toward a more secure future.

 

grey line

]]>
Secure Boot Vulnerability, Exchange Updates & LAPS https://www.oneneck.com/blog/may-2023-patching/ Wed, 17 May 2023 21:31:10 +0000 https://www.oneneck.com/?p=4585 Secure Boot Security Bypass Vulnerability: May greeted us with a significant security vulnerability concerning Secure Boot. As a critical security feature, Secure Boot ensures that machines boot using only software trusted by the Original Equipment Manufacturer (OEM). This month brought the identification and subsequent patching of a security bypass vulnerability (CVE-2023-24932) that could compromise the […]]]>

Secure Boot Security Bypass Vulnerability:

May greeted us with a significant security vulnerability concerning Secure Boot. As a critical security feature, Secure Boot ensures that machines boot using only software trusted by the Original Equipment Manufacturer (OEM). This month brought the identification and subsequent patching of a security bypass vulnerability (CVE-2023-24932) that could compromise the integrity of devices with Secure Boot enabled.

Our standard practice does not involve enabling Secure Boot on OneNeck-built servers. As such, our team is not planning on providing manual action for this update. However, customers who have enabled Secure Boot on their servers should take this vulnerability seriously. We strongly recommend reviewing the related documentation and taking any necessary actions to safeguard your systems. Our Service Desk is readily available to assist our customers with any questions or assistance in their environment.

Exchange Server Updates and EOL Announcements:

This month also brought important updates for Microsoft Exchange Server.

Firstly, Microsoft has released a new Cumulative Update for Exchange Server 2019. For customers contracted with OneNeck for Exchange Management and running this version of Exchange, we will apply this update on your behalf.

In other news, Exchange Server 2013 has now reached End of Life. This designation means that Microsoft will no longer provide patches for this version of Exchange. Thus we recommend customers move away from this version to avoid potential security risks.

Meanwhile, Exchange Server 2016 has transitioned from Mainstream Support to Extended Support. While it is still receiving security updates from Microsoft, starting to plan for the future is essential. We will continue to apply these security updates for customers contracted with us for Exchange Management.

At OneNeck, we encourage all customers to upgrade to Exchange Server 2019 to benefit from the latest features, improved security and continued support. For those unsure how to proceed with the upgrade, our Service Desk will guide you through the process.

Introducing the New Local Administrator Password Solution (LAPS)

Lastly, we’d like to highlight the release of a new version of LAPS last month. This latest iteration extends support for Windows 10 & 11 and Server 2019 & 2022 and introduces new features for Azure Active Directory.

LAPS provides a simple, automated solution for managing local administrator passwords, reducing the risk of security breaches resulting from compromised credentials. If you want to deploy LAPS in your environment or have any questions about its features, please contact us at any time for assistance.

OneNeck Has Your Back!

As always, our goal at OneNeck is to help you navigate the ever-changing landscape of IT. We remain committed to providing you with the latest updates and ensuring your systems are secure, reliable, and optimized. Thank you for your continued trust in OneNeck.

Stay tuned for more updates next month!

grey line

]]>
Boosting Efficiency with Microsoft Power Pages https://www.oneneck.com/blog/boost-efficiency-with-microsoft-power-pages/ Tue, 16 May 2023 18:24:18 +0000 https://www.oneneck.com/?p=4291 In a time where digital transformation often determines the course of business, efficiency and agility take center stage. Today, companies worldwide aim to streamline operations, heighten productivity and foster collaboration. In this fast-paced, ever-evolving landscape, businesses continually seek for innovative tools to keep them ahead of the competition and aligned with strategic objectives. Enter Microsoft […]]]>

In a time where digital transformation often determines the course of business, efficiency and agility take center stage. Today, companies worldwide aim to streamline operations, heighten productivity and foster collaboration. In this fast-paced, ever-evolving landscape, businesses continually seek for innovative tools to keep them ahead of the competition and aligned with strategic objectives. Enter Microsoft Power Pages.

Microsoft Power Pages®,  is a dynamic component of Microsoft’s Power Platform®. This formidable yet accessible tool enables businesses to generate custom web pages swiftly and intuitively. It facilitates a streamlined workflow and democratizes the web application development process. Read on to discover how you can leverage the transformative power of Microsoft Power Pages to drive your business forward.

Microsoft Power Pages: What’s in It for You?

Power Pages is a web-based, low-code platform that offers a user-friendly solution for individuals to create, share and collaborate on custom web pages within their organization. It bridges the gap between IT and non-IT staff, fostering innovation and agility throughout your business. This inclusive approach facilitates innovation and agility in your business, making adaptation to new challenges and opportunities easier.

A principal feature of Power Pages is its seamless integration with the broader Microsoft Power Platform, including Power Apps, Power Automate, Power BI and other Microsoft applications such as Microsoft 365, Dynamics 365 and Azure. This integration allows businesses to create comprehensive solutions that help improve efficiency and streamline workflows. Power Pages helps reduce bottlenecks and enhances productivity by enabling smooth data and process flows across platforms, supporting your organization’s digital transformation efforts.

Key Benefits of Power Pages

  • Accelerated Development– The low-code approach enables the rapid creation and deployment of web applications. Users can drag and drop elements into a web page, reducing the need for extensive coding knowledge, thus accelerating development.
  • Enhanced Collaboration– Multiple users can work on different aspects of a single site. While one member is creating a data source, another adds content and a third works on the site’s workflow. This collaborative approach breaks down silos and enables a more unified approach to problem-solving.
  • Streamlined Workflows– The seamless integration with other Microsoft applications enables end-to-end solutions that automate processes and reduce manual tasks. Whether using Microsoft 365, Dynamics 365 or Azure, Power Pages tap into these platforms to improve workflows.
  • Reduced IT Burden– Empowers non-technical employees to create custom web applications, reducing the reliance on IT departments. This democratization of development helps organizations save time and resources, freeing IT professionals to focus on more complex tasks.
  • Improved Data Management– Integration with tools like Power BI and Dynamics 365 centralize and streamline data handling processes, allowing for a more unified approach to data analysis. This integration makes it easier for organizations to glean insights and make data-driven decisions.

The Practicality of Microsoft Power Pages

Power Pages offers a platform tailored to diverse organizational needs, serving as a flexible tool for a variety of processes. For instance, it can assist in creating customized web pages that serve specific purposes, such as data collection or customer interaction. By integrating with Dynamics 365 or other CRM solutions, automation of routine tasks such as updating information can be accomplished, reducing manual input and the potential for errors.

Furthermore, Power Pages can assist in automating internal processes. This could involve creating web applications that handle specific tasks, like onboarding new team members or managing various organizational tasks. Power Pages helps ensure data accuracy and streamlines processes by integrating with existing software tools.

Through OneNeck, I was personally involved in a use case that illustrates the practical benefits Power Pages provides. My team at OneNeck successfully utilized it to create a request portal for our parent company, TDS, delivering customers a seamless and personalized support experience. The integration with Power Automate enabled the automation of support ticket routing, ensuring quick and efficient resolution of customer inquiries.

 

New request page designed via Microsoft Power Pages.

Users submit requests to TDS employees using a customized form on a Power Pages site.

Unleashing the Full Potential of Power Pages

To maximize the app’s potential, here are some additional tips:

  • Frequent Training and Development– Regular training sessions help your team stay current on the latest Power Pages features and capabilities. Encourage your employees to experiment and explore the tool to identify new strategies within your organization. Need a place to start? Microsoft provides extensive documentation.
  • Collaborate Across Departments– Foster cross-departmental collaboration using Power Pages. Teams within your organization may find different uses for the tool. Sharing these insights and applications can lead to innovative solutions.
  • Leverage Microsoft Integrations– Fully integrate Power Pages seamlessly with other Microsoft tools. This integration can streamline workflows and processes across your entire organization.
  • Stay Updated– Microsoft frequently updates Power Pages with new features and improvements. Ensure you are up-to-date with these developments to harness the tool’s full potential.

Driving Business Success 

Microsoft Power Pages provides a robust, low-code platform for businesses to create custom web applications that improve efficiency, streamline workflows and enhance collaboration. By leveraging the capabilities of Power Pages and its seamless integration with other Microsoft applications, organizations can drive growth in an increasingly competitive landscape.

Whether you are a small business looking to maximize its resources through streamlined processes or an enterprise seeking to enhance collaboration, Power Pages offers a flexible, robust solution tailored to your needs. If you’re ready to experience the benefits of Microsoft Power Pages, don’t wait. Our experienced team at OneNeck is ready to help you unlock its potential. Contact us today and learn how we can help you make the most of your Microsoft investment.

 

]]>
Is Managed Cloud Storage for You? https://www.oneneck.com/blog/is-managed-cloud-storage-for-you/ Wed, 10 May 2023 17:11:40 +0000 https://www.oneneck.com/?p=4286 Just a decade ago, IT professionals were abuzz about “the cloud.” Today, more than 60% of corporate data is stored in the cloud, and by 2025, research suggests that more than 200 zettabytes of data will be stored in the cloud — roughly half of all the world’s data. Managed cloud storage solutions can help […]]]>

Just a decade ago, IT professionals were abuzz about “the cloud.” Today, more than 60% of corporate data is stored in the cloud, and by 2025, research suggests that more than 200 zettabytes of data will be stored in the cloud — roughly half of all the world’s data.

Managed cloud storage solutions can help organizations safely, securely, and efficiently house their data without requiring additional staff or expensive capital expenditures (CapEx).

In this blog post, we’ll explore what managed cloud storage is and provide some examples of how businesses can use it.

What is managed cloud storage?

Managed cloud storage is a service provided by a third-party organization in which the provider manages the entire storage infrastructure — including hardware, software, and data management responsibilities. Common cloud management operations include cloud migration, service optimization, and security monitoring that help companies offload the responsibility of installing and maintaining storage infrastructure so they can focus on core business activities.

What’s an example of managed cloud storage?

Many well-known companies offer managed cloud storage services on a subscription basis in which the provider charges a fee based on the amount of storage used. Popular managed cloud storage services include Google Cloud Platform, Amazon Web Services (AWS), Microsoft Azure, and Oracle Cloud.

These services enable an organization to conveniently and securely store important information such as data from their customer relationship management (CRM) or enterprise resource planning (ERP) platforms off-site and managed by someone else.

Managed vs. Unmanaged Cloud Storage

Unlike managed cloud storage, unmanaged cloud storage is the sole responsibility of the company that owns the data. With unmanaged cloud storage, an organization is responsible for selecting a data center and deploying the storage array. The company is also responsible for increasing storage capacity, updating and upgrading infrastructure, and troubleshooting any issues that arise.

How to Choose the Best Cloud Storage Management Solution for You

As cloud storage continues to gain popularity, businesses have a wide range of cloud storage options available. Determining which is the best for your business frequently comes down to a handful of specific factors. Here are some steps to take when choosing a cloud storage management provider.

Determine the location of the data center

Cloud-based storage solutions require a data center to house the physical infrastructure upon which virtualized infrastructure can be run. Choosing the right data center is often a matter of its location.

A data center’s proximity to sufficient power and connectivity services is an important consideration when choosing a location. Having adequate power helps to ensure that storage systems can run uninterrupted as expected, while proximity to public cloud provider availability zones is necessary for maintaining a strong, stable connection to cloud resources.

Evaluate the provider’s security features

Data privacy and security are paramount in today’s high-risk, data-driven business landscape. Cyber attacks continue to increase in frequency and sophistication, causing an average of nearly $4.5 million worth of damage per incident, leading governments to impose regulations such as GDPR in Europe and CRPA in California to compel organizations to bolster their data security efforts.

For organizations using managed cloud storage, it’s important to evaluate the various security safeguards the provider has in place. These measures include physical security at the data center site to prevent unauthorized access to storage hardware, as well as software-enabled security like network intrusion detection, built-in firewalls, and advanced data encryption.

Look at performance data

Like other areas of a business, managed cloud storage should be evaluated with measurable performance data. Cloud storage systems are typically measured by the data transfer rate to and from storage media, which is an indication of the overall performance of the system.

It’s also important to look at broader performance metrics such as service availability (measured in “nines”) and how quickly the storage system comes back online following an outage or interruption, called recovery time objectives (RTOs).

Assess integrations and APIs

One of the biggest benefits of managed cloud storage is that it enables any user to access information from virtually anywhere. But for that to happen — accessing, adding, updating, or deleting data from cloud storage — applications must connect to the data store via an Application Programming Interface or API.

APIs typically come in either a REST (Representational State Transfer) or SOAP (Simple Object Access Protocol) architecture. Regardless of the design, it’s important that your managed cloud storage provider offer a wide variety of APIs, as each storage system must be connected by purpose-built APIs for that storage unit.

In general, a managed cloud storage service provider with a broader range of APIs will offer a more flexible and robust suite of solutions for your business.

Forward-thinking Infrastructure for Growing Organizations

Managed cloud storage is an excellent way for businesses to offload their storage infrastructure management tasks and focus on their core business activities. Managed cloud storage providers can help businesses reduce operating costs while improving scalability and data security that enable greater and more sustainable growth.

Download our Ultimate Buyer’s Guide to Managed IT Services to learn more about managed cloud storage and other essential solutions.

]]>
IoT in Healthcare: Security Risks and Patient Privacy https://www.oneneck.com/blog/iot-in-healthcare-security-risks-and-patient-privacy/ Fri, 05 May 2023 16:59:51 +0000 https://www.oneneck.com/?p=4238 The Internet of Things (IoT) has become a vital part of the healthcare industry, greatly impacting patient interaction and treatment. These connected devices collect and transmit patient data, allowing providers to monitor and manage patient health more effectively. However, the widespread adoption of IoT in healthcare exposes the industry to new risks, leading to a […]]]>

The Internet of Things (IoT) has become a vital part of the healthcare industry, greatly impacting patient interaction and treatment. These connected devices collect and transmit patient data, allowing providers to monitor and manage patient health more effectively. However, the widespread adoption of IoT in healthcare exposes the industry to new risks, leading to a surge in security threats.

A 2023 SonicWall Cyber Threat Report shows that malware attacks against IoT in the medical field increased by 123% in 2022. The result is a significant threat to the privacy and safety of patient information.

Data Collection Through IoT in Healthcare

IoT devices are now nearly ubiquitous in the medical field, collecting patient information to improve diagnosis, treatment and overall care. Some of the most common types of data collected are:

  • Vital signs– IoT devices can continuously monitor patients’ heart rate, blood pressure, oxygen saturation and other vital signs, allowing healthcare providers to track real-time health status.
  • Activity levels– Wearables and sensors track patients’ movements and activities, providing insights into daily routines, exercise habits and sleep patterns.
  • Medical device data– Connected devices, such as insulin pumps and pacemakers, transmit data on their operation and status, enabling doctors to monitor performance and make necessary adjustments remotely.
  • Health history– Electronic health records (EHRs) store patients’ medical histories, including previous diagnoses, treatments and medications. Providers can access and update this information, improving care coordination and decreasing the risk of errors.

Healthcare IoT Security Risks and Protecting Patient Data

This significant increase in IoT malware attacks against the healthcare sector is particularly concerning when viewed in the context of a Cynerio 2022 State of Healthcare IoT Device Security report. This study revealed that 53% of hospital IoT devices have security vulnerabilities. Devices that fell into the most vulnerable category included IV pumps, VoIP phones, ultrasounds, medicine dispensers and IP cameras.

These weaknesses pose significant risks to both patients and healthcare providers. One primary risk is data breaches. Cybercriminals exploit IoT security vulnerabilities to gain access to sensitive patient data, leading to identity theft, fraud or other malicious activities.

Another risk is ransomware, where attackers can encrypt patient data and demand payments in exchange for release. These attacks can disrupt healthcare operations and in extreme cases potentially endanger patients’ lives.

Device manipulation is an additional security risk. Cyberattackers can compromise IoT devices, altering their functionality and putting patients in jeopardy of receiving incorrect treatments or experiencing adverse health events. This type of threat not only endangers patient safety but can also undermine faith in the healthcare system as a whole.

Safeguarding Patient Information with Security Best Practices

To safeguard patient data and maintain the advantages of IoT devices in healthcare, healthcare providers must take a proactive approach to implementing security measures. These include:

  • Periodically reviewing IoT devices to identify potential vulnerabilities and prioritize security updates.
  • Encrypting patient data at rest and in transit to safeguard it against interception and unauthorized access.
  • Implementing robust authentication methods, such as two-factor authentication, helps protect IoT devices and ensure only authorized personnel access patient data.
  • Healthcare providers should work closely with IoT device manufacturers and software vendors to promptly apply security patches and updates.
  • Providers must ensure staff are well-versed in cybersecurity best practices. Knowing the risks associated with IoT devices is crucial in creating a culture of security awareness.
  • Developing a comprehensive incident response plan helps healthcare organizations quickly identify, contain and remediate security breaches, minimizing their impacts.
  • Healthcare providers must comply with industry-specific regulations, such as HIPAA, which sets strict criteria for safeguarding patient data and protecting privacy.

Building a Secure Future for IoT in Healthcare: Partnering for Success

IoT devices have transformed the healthcare sector, providing real-time data that enables providers to manage patient health more efficiently and effectively. However, the growing reliance on connected devices presents unique challenges in ensuring the privacy and safety of patient information. By implementing robust security measures and maintaining a proactive approach to risk management, healthcare organizations can harness the benefits of IoT technology while safeguarding the trust and well-being of their patients.

Securing your IoT devices, while extremely important, is just one part of healthcare security. OneNeck recognizes the critical nature of securing patient data and is dedicated to offering holistic security services that adhere to the strictest compliance standards. By partnering with OneNeck, healthcare organizations can update legacy systems, implement securely architected cloud solutions, design and implement robust backup and DR services, develop incident response plans and ensure continuous alignment with regulatory requirements.

Ready to talk to a security expert? OneNeck is here to help. Contact us today to discuss how you can better protect sensitive patient data and maintain a secure and healthy environment.

grey line

]]>
Windows Server 2012 will soon take its final bow. https://www.oneneck.com/blog/advanced-services/windows-server-2012-will-soon-take-its-final-bow/ Thu, 27 Apr 2023 16:06:42 +0000 https://www.oneneck.com/?p=2678 As of October 10, 2023, Microsoft is retiring support for the following platforms (both physical and virtual): Windows Server 2012 x64 (all editions) Windows Server 2012 R2 x64 (all editions) So, what does this mean for you and your organization? There are potentially serious impacts if you opt to skip the upgrade: Microsoft will no […]]]>

As of October 10, 2023, Microsoft is retiring support for the following platforms (both physical and virtual):

  • Windows Server 2012 x64 (all editions)
  • Windows Server 2012 R2 x64 (all editions)

So, what does this mean for you and your organization? There are potentially serious impacts if you opt to skip the upgrade:

  • Microsoft will no longer release security or quality updates for these platforms after October 10, 2023, which affects monthly patching.
  • Cloud Solution Providers (CSPs) like OneNeck will no longer be able to provide support escalation to Microsoft, which reduces support SLAs and the level of urgency to “best effort” support.
  • Third-party applications used for endpoint management, monitoring and backups may drop support for these platforms and, as a result, your CSP may be unable to provide these third-party applications to support your Windows 2012 servers.

Bottom line: Windows Server is too important to risk downtime, so it’s time to migrate.

Windows Server Migration Options

Microsoft has advised that the following Windows Server platforms are suitable upgrade/migration replacements for these end-of-life platforms .

  • Windows Server 2016 x64
  • Windows Server 2019 x64
  • Windows Server 2022 x64

Below is a summary of the Support Lifecycle for these supported platforms:

We can help!

At OneNeck, we know migrations can get complex fast, but we’ve pretty much seen it all and would love to help you determine your ideal-fit option and build an actionable plan to get your Windows Server current. So, contact us or your account rep today, and let’s help your Windows Server 2012 off the stage…

]]>
What Is Microsoft Intelligent Data Platform? https://www.oneneck.com/blog/microsoft-intelligent-data-platform-empowering-success/ Mon, 24 Apr 2023 14:13:52 +0000 https://www.oneneck.com/?p=4110 In today’s fast-paced business environment, data is golden. Businesses need to manage their data and provide advanced analytics in real-time. Enter the Microsoft Intelligent Data Platform, a unified solution that transforms data into insights and helps businesses succeed. The best part is that you likely have access to much of it already. Nearly one year […]]]>

In today’s fast-paced business environment, data is golden. Businesses need to manage their data and provide advanced analytics in real-time. Enter the Microsoft Intelligent Data Platform, a unified solution that transforms data into insights and helps businesses succeed. The best part is that you likely have access to much of it already.

Nearly one year ago, Microsoft introduced its Intelligent Data Platform. The platform was designed to integrate their database, analytics and data governance offerings, bringing different types of operational and analytical data together while allowing for greater understanding and discoverability of organizational data. This is accomplished as end-users work together on shared data, primarily using tools with which they are already familiar.

What Is The Microsoft Intelligent Data Platform?

The Intelligent Data Platform is a comprehensive suite of services and tools that empower organizations to manage, analyze and derive insights from their data by offering a unified approach to management, analytics and AI. The platform consists of several key components, including Azure Synapse Analytics, Azure Purview, Azure Machine Learning, Azure Cognitive Services and Power BI. These tools and services create a seamless data experience, enabling businesses to ingest, prepare, manage, analyze and visualize data across various sources.

Microsoft Intelligent Data Platform

Microsoft: https://news.microsoft.com/build2022/

Operational Databases

  • SQL Server 2022– SQL Server is a powerful, scalable, and secure relational database management system. It offers advanced analytics, high availability and robust security. SQL Server is designed to efficiently handle mission-critical workloads and can be deployed on-premises, in the cloud or in a hybrid environment. Integrating SQL Server 2022 with the Microsoft Intelligent Data Platform allows organizations to manage and analyze their relational data effectively and efficiently.
  • Azure SQL Services– A cloud-based relational database service, Azure SQL Database provides built-in intelligence, scalability and high availability. Azure SQL Managed Instance is a fully managed instance of SQL Server that provides near 100% compatibility with on-premises SQL Server. Azure SQL Edge is an optimized, small-footprint version of SQL Server designed for edge computing and IoT scenarios. The Azure SQL services seamlessly integrate with the Microsoft Intelligent Data Platform, enabling organizations to leverage the power of SQL Server in the cloud and quickly scale data workloads.
  • Azure Cosmos DB– A multi-model database service designed for building highly available, scalable, and responsive applications. It supports various data models, such as document, key-value, graph, column-family and multiple APIs. By integrating Azure Cosmos DB with the Microsoft Intelligent Data Platform, businesses can easily manage and analyze their data across various data models and APIs, ensuring a versatile and robust data management solution.
  • Azure Arc Data Services– Extends the capabilities of Azure data services to hybrid and multi-cloud environments. Azure Arc Data Services simplifies the deployment, management and monitoring of data services across environments with a unified control plane and consistent management experience. Organizations can implement governance policies, security configurations and monitoring solutions consistently across all their data workloads, regardless of where they are deployed.

 Analytics

  • Azure Synapse Analytics– Azure Synapse Link for SQL, added in SQL Server 2022, provides a seamless data pipeline to Azure Synapse Analytics. This service allows organizations to ingest, prepare and manage data for immediate business intelligence and machine learning needs. With its serverless SQL pools, Azure Synapse Analytics enables businesses to query data on their terms. In addition, Azure Synapse Analytics supports real-time data processing, allowing companies to analyze data and gain insights, which is crucial for making data-driven decisions.
  • Power BI– A business analytics tool that enables users to visualize and share insights from their data. With its easy-to-use interface and customizable visualizations, Power BI allows businesses to create interactive reports and dashboards, shareable across the organization. Power BI connects to on-premises and cloud-based databases, files and APIs, providing a seamless experience for data analysis and visualization. Furthermore, Power BI integrates with Azure Synapse Analytics, enabling businesses to gain insights from their data and make data-driven decisions more efficiently.
  • Azure AI– A collection of artificial intelligence (AI) services designed for developers and data scientists. The portfolio includes Azure Machine Learning (a comprehensive service that allows organizations to build, train and deploy machine learning models) more efficiently. Automated machine-learning capabilities streamlines model selection and hyperparameter tuning, making it easier for data scientists and developers to collaborate on AI projects.

Governance

  • Microsoft Purview– A data governance service that helps organizations discover, understand and manage their data across on-premises, multi-cloud and SaaS environments. With its automated discovery, classification and management capabilities, Microsoft Purview (formerly Azure Purview) enables businesses to comprehensively understand their data landscape, ensure compliance with data protection regulations and reduce the risk of data breaches. Azure Purview also integrates with Azure Synapse Analytics, providing a seamless experience for data discovery and governance.

Bringing Together Data Services

The Microsoft Intelligent Data Platform brings together all of Microsoft’s key data services, creating a unified solution for managing, analyzing, and deriving insights from your data. Services such as SQL Server 2022, Azure SQL, Cosmos DB, Azure Synapse, Power BI, Microsoft Purview and more may already be a part of your data ecosystem. However, using these services together effectively is often a challenge.

The primary goal is to simplify the process of integrating databases and operational data store, analytics and data governance. Sharieff Mansour, General Manager of Microsoft Data, AI and Mixed Reality, states, “Historically, customers have been thinking about each of those areas independent from one another, and what the Intelligent Data Platform does is bring all these pieces together.” Microsoft accomplishes this through a data experience that allows organizations to ingest, prepare, manage, analyze and visualize data across multiple sources and services more efficiently.

In addition to its integration capabilities, the Intelligent Data Platform enables organizations to deploy and manage data services across various environments, including on-premises, hybrid and multi-cloud. This flexibility ensures that businesses can choose the most suitable deployment options for their specific requirements: compliance, latency or cost.

Operational Benefits of the Microsoft Intelligent Data Platform

  • Unified Data Management and Analytics– Businesses can manage and analyze data across different sources. This unified approach eliminates data silos and enables faster, more accurate decision-making.
  • Advanced Analytics and AI Capabilities– Allows businesses to tap into the power of AI and machine learning for advanced analytics, predictions, and insights.
  • Scalability and Flexibility– Designed to grow with your business by providing the scalability and flexibility needed to handle increasing data volumes and changing business requirements.
  • Seamless Integration– Integration with other Microsoft products and services, such as M365, Dynamics 365, Power Platform and Azure, creates a cohesive data ecosystem that drives efficiency and collaboration.
  • Enhanced Data Governance– Robust data governance capabilities enable businesses to discover, understand and manage sensitive data while ensuring compliance with data protection regulations.

Maximize the Benefits of Microsoft Intelligent Data Platform with OneNeck

The Microsoft Intelligent Data Platform offers organizations an all-in-one solution for managing, analyzing and deriving insights from their data, enabling them to make faster, data-driven decisions and stay ahead of the competition. Its unified approach to data management, analytics and AI empowers businesses to unlock the full potential of their data estate and transform operations.

As an experienced and knowledgeable Microsoft CSP, OneNeck IT Solutions can help you harness the power of the Microsoft Intelligent Data Platform, delivering performance benefits across your entire organization. So, if your business is looking to stay ahead in the data-driven world, considering adopting the Microsoft Intelligent Data Platform or simply interested in implementing M365 as a part of your modern workplace, Contact Us today to speak with one of our Microsoft experts.

grey line

]]>
Enhancing Cybersecurity with Conditional Access Policies https://www.oneneck.com/blog/enhancing-security-with-conditional-access-policies/ Tue, 18 Apr 2023 18:48:54 +0000 https://www.oneneck.com/?p=4079 As organizations embrace cloud services and remote work to fuel business growth, they must reassess conventional security measures to safeguard sensitive data, applications and resources. Microsoft Azure Active Directory (Azure AD) offers Conditional Access as a powerful security solution, allowing companies to control access through user identity, device, location and other contextual variables. This blog […]]]>

As organizations embrace cloud services and remote work to fuel business growth, they must reassess conventional security measures to safeguard sensitive data, applications and resources. Microsoft Azure Active Directory (Azure AD) offers Conditional Access as a powerful security solution, allowing companies to control access through user identity, device, location and other contextual variables. This blog delves into Conditional Access policies, examines their significance for cybersecurity and discusses how they can enhance an organization’s security posture.

Understanding Conditional Access Policies

Conditional Access policies, at their most basic, are if-then statements; if a user desires to access a resource, they must complete an action. Example: A remote employee wants to access the company’s intranet portal and is required to connect through a secure VPN.

Conditional Access policies are rules and conditions within Azure AD that help organizations manage access to resources, applications and data. They enable administrators to enforce granular access controls based on the user’s access requests context, such as their device, location or risk level. The policies consist of several components, including assignments that specify the users, groups and applications to which a policy applies. Conditions determine the circumstances for policy enforcement, while access controls define the actions taken when a policy is triggered.

Overview of conditional access policies.
Microsoft: What is Conditional Access?

Once first-factor authentication is complete, the system applies Conditional Access policies. While Conditional Access does not serve as an organization’s first line of defense for scenarios like denial-of-service (DoS) attacks, it can utilize signals from these events to determine access. – Microsoft

Importance for Cybersecurity

Conditional Access improves an organization’s cybersecurity posture for several reasons:

  • Context-Aware Security – By considering user identity, device and location factors, organizations can make informed decisions about granting access and minimizing the risk of unauthorized access to sensitive data.
  • Adaptive Authentication – Implementing adaptive authentication mechanisms, like multi-factor authentication (MFA) when necessary, provides an additional security layer, especially during access to crucial resources, by adjusting authentication requirements based on contextual factors such as user behavior, device, location, time and other risk indicators.
  • Simplified Management – Azure AD’s centralized management console allows administrators to easily create, modify, and enforce organizational policies. This ability streamlines the process of managing access controls and reduces the likelihood of misconfigurations or security gaps.
  • Compliance Assurance – Organizations with strict compliance requirements can enforce specific access controls for regulated data and applications, thus meeting regulatory obligations and reducing the risk of fines or penalties.
  • Improved User Experience – Dynamically enforcing access controls based on context helps balance security and usability, allowing users to access resources seamlessly while protecting sensitive data and systems.

Implementing Conditional Access Policies in Your Organization

To effectively deploy Conditional Access policies within your organization, start by assessing security needs. Identifying critical applications, data and resources requiring enhanced security helps prioritize the policies to create and apply.

Next, establish access requirements for each sensitive resource, taking into account factors such as user roles, device compliance and geographic location. Create Conditional Access policies based on the defined requirements and test them in a controlled environment before deploying them across the organization. This approach ensures the policies function as intended and do not inadvertently disrupt access for legitimate users.

Regularly monitoring and adjusting your policies is essential to address new risks, changes in the threat landscape or evolving business requirements. Additionally, educating users is crucial. Inform them about the importance of Conditional Access policies and their role in resource protection. Encourage users to follow best practices for secure access, such as using MFA, keeping devices up-to-date and reporting suspicious activity.

Finally, integrate Conditional Access policies with other security solutions in your organization, such as threat intelligence, data loss prevention (DLP) and identity and access management (IAM) tools. This integration delivers a more comprehensive security approach.

Break the Glass Account

A “Break the Glass” account is an emergency account created within an organization’s IT environment to ensure continued access to critical systems and resources in case of unforeseen events. These emergencies could include a significant security incident or a misconfiguration in Conditional Access policies. These accounts must be created with highly privileged access and strong security controls.

The necessity of a Break the Glass account when using Conditional Access lies in the possibility of accidentally locking out administrators or users from essential resources, applications or services due to policy misconfigurations or unexpected changes in the organizational environment. In such situations, the Break the Glass account serves as a failsafe that allows designated personnel to regain access and rectify the issue, ensuring business continuity and minimal disruption. These accounts are also crucial to an effective incident response plan, enabling organizations to respond quickly to and recover from security breaches or other critical incidents.

Final Thoughts on Conditional Access Policies

Conditional Access is a basic and necessary component of modern cybersecurity strategies. By implementing context-aware access controls and adaptive authentication mechanisms, organizations can balance security and usability, allowing users to access resources when needed while protecting sensitive data and systems. As a fundamental aspect of access management, Conditional Access policies should be a priority for organizations looking to strengthen their security infrastructure.

While Conditional Access policies effectively help combat cyberattacks, they are only one aspect necessary to protect your data. OneNeck understands a holistic approach to security is essential for protecting your organization and its precious resources. As a skilled IT security services provider, we are here to help. Our team can assess your security posture, develop a protection strategy and help better leverage your security investments.

Contact us today to speak with a OneNeck security professional.

grey line

]]>
Windows 10 & 11 22H2 Rollout and Netlogon Protocol Changes https://www.oneneck.com/blog/april-2023-patching/ Sun, 16 Apr 2023 21:29:33 +0000 https://www.oneneck.com/?p=4579 As we move into the second quarter of 2023, several important patching updates have been released that warrant attention. These updates include critical Windows 10 & 11 changes, Netlogon Protocol and more. Here are the key updates from April. Windows 10 & 11 22H2: Feature Update version 22H2 for Windows 10 and 11 is in […]]]>

As we move into the second quarter of 2023, several important patching updates have been released that warrant attention. These updates include critical Windows 10 & 11 changes, Netlogon Protocol and more. Here are the key updates from April.

Windows 10 & 11 22H2:

Feature Update version 22H2 for Windows 10 and 11 is in its final rollout phase. Microsoft is offering this update to an expanded set of eligible devices running Windows 10, version 20H2, and later versions​. We at OneNeck recommend updating your devices to ensure future security updates install on your systems. This upgrade is not automatic via standard patching, so manual installation is necessary.

Devices that utilize BitLocker require a manual update to the Windows Recovery Environment for Windows 10 & 11. We recommend manually applying this update wherever applicable. If you have questions about how OneNeck can assist you with these processes, please contact the Service Desk.

Netlogon Protocol Changes – CVE-2022-38023:

Windows has released significant updates to address the Netlogon protocol vulnerability (CVE-2022-38023). This security patch for Domain Controllers was first included in the November 8, 2022, and later Windows updates, with the initial enforcement phase starting on April 11, 2023. Beginning in June 2023, Enforcement mode will be enabled on all Windows domain controllers and will block vulnerable connections from non-compliant devices. By July 2023, the ability to set the Compatibility mode setting will be removed​.

We recommend auditing for events related to this update. If you have contracted with OneNeck for Active Directory Management, we will notify you if we suspect you might be affected by these changes.

Please note that NetApp has provided guidance regarding the impact of the upcoming patch on ONTAP 9.

Active Directory Permission Updates – CVE-2021-42291:

The final deployment for the Active Directory Permission Updates (CVE-2021-42291) is now scheduled for January 2024, pushed back from the original date of April 2023. If you have questions about how OneNeck can assist you with enabling Audit Mode and monitoring for Events related to this vulnerability, please contact our experts.

Certificate-based Authentication Changes on Windows Domain Controllers:

The final deployment of updates related to certificate-based authentication changes on Windows Domain Controllers is now set for November 2023, moved back from the initial May 2023 date. The initial deployment of this patch for Domain Controllers began in May 2022. If you have questions regarding enabling Audit Mode and monitoring for Events related to this vulnerability, OneNeck is ready to assist.

OneNeck Has Your Back!

As always, we at OneNeck are here to support you through these changes. Reach out to us if you need assistance or have any queries. Stay safe and secure!

grey line for patching blog

]]>
Are Microsoft 365 Data Backups Important? https://www.oneneck.com/blog/are-microsoft-365-data-backups-important/ Tue, 11 Apr 2023 17:12:47 +0000 https://www.oneneck.com/?p=4012 Why You Should Stay on Top of Microsoft 365 Data Backups Businesses everywhere rely on Microsoft 365 for its cloud-based design and advanced collaboration. It is integral to many organizations’ services and workflows. Sometimes, however, core tools like this can lull customers into a false sense of security. Over 40% of IT organizations say they […]]]>

Why You Should Stay on Top of Microsoft 365 Data Backups

Businesses everywhere rely on Microsoft 365 for its cloud-based design and advanced collaboration. It is integral to many organizations’ services and workflows.

Sometimes, however, core tools like this can lull customers into a false sense of security. Over 40% of IT organizations say they no longer backup their Microsoft 365 data with third-party applications, even though Microsoft itself stresses the importance of Microsoft 365 data backups. This article discusses six important reasons organizations should always back up their Microsoft 365 data.

Do I need to back up Microsoft 365 data?

Backing up your Microsoft 365 data ensures that no matter what happens, you’ll always be able to recover your important files. Microsoft has some catastrophic guardrails in place in case your entire system crashes, but they don’t protect against accidental deletion or overwriting.

A regular backup schedule based on the frequency you create and update your documents and media will give you more control over your files — and give you significant peace of mind. Performing your own backups also allows for granular recovery, so you can restore a single file or email, rather than overwriting all data.

How often should I do a Microsoft 365 data backup?

Your backup schedule will depend on your organization’s compliance requirements, how often you access and make changes to your data, and how much downtime you can afford in the event of data loss. Downtime cost organizations an estimated $84,650 per hour in 2021. Organizations may need to perform data backups several times a day or as frequently as every five minutes to stay protected and in compliance.

Frequent backups give you up-to-date data recovery in the event of accidental deletions, as well as a recent restore point if a large part of your data is compromised by a ransomware attack.

Who is responsible for a Microsoft 365 data backup?

Microsoft 365 documentation states that Microsoft maintains the 365 application and infrastructure, while the customer is “…responsible for protecting the security of your data and identities, on-premises resources, and the cloud components you control.” That means you’re responsible for data backup and retention.

6 Important Reasons to do Microsoft 365 Data Backups

Here are six important reasons for regular Microsoft 365 data backups in your organization.

  • Microsoft 365 Data Backup Reason 1: Accidental Deletion
    We’ve all had that moment when we accidentally hit the “delete” button on a document — and then panicked. Regular backups make it simple to recover accidentally deleted files or emails so you don’t have to start an extensive project from scratch.This is especially important if you’ve accidentally deleted a Microsoft 365 user. Deleting a user account automatically replicates across the network, along with their personal SharePoint site and OneDrive data. Once the account is deleted, it’s gone from the entire network. You can only get user account data back by restoring it from a backup.
  • Microsoft 365 Data Backup Reason 2: Internal Security Threats
    Threats from inside the organization may be intentional, such as a disgruntled employee, or unintentional, such as an employee who clicks on a link in a phishing email. In the event of data loss from internal threats, backups let you restore files necessary for daily operations.
  • Microsoft 365 Data Backup Reason 3: External Security Threats
    External threats include malware, viruses, and ransomware. These malicious programs can corrupt or delete data and applications, bringing business to a halt. The importance of a Microsoft 365 data backup is that you can restore a clean copy of your data and cut your recovery time.
  • Microsoft 365 Data Backup Reason 4: Legal Compliance
    Certain industries and locations require data to be stored for a specified amount of time. For example, the U.S. financial regulation Sarbanes-Oxley has specific data retention rules. Organizations that fail to meet these regulations can be subject to fines and penalties.
  • Microsoft 365 Data Backup Reason 5: Outages and Shutdowns
    Off-site data backups are extremely important when organizations experience an unplanned outage or shutdown due to hardware or software failure, or after a natural disaster. Terabytes of data that might have been lost can be restored quickly, getting everyone back on the task of building the business.
  • Microsoft 365 Data Backup Reason 6: Overall Business Continuity
    Business continuity is incredibly important for growing businesses with an expanding technology portfolio. Backups let you remain in control of your data and lower your downtime in the event of a data loss due to deletion, threats, or outages.

Does Microsoft 365 Recommend Backups?

Microsoft highly recommends backing up your 365 data. You don’t necessarily need to back up every file but prioritize content that can’t be easily replaced.

Microsoft does back up Microsoft 365 data every 12 hours and keeps it for 14 days. However, if you need to restore from their backup, it will be a full restore — everything will be overwritten. You can’t recover a single data point, like a file or an email.

Safeguard your Microsoft 365 Investment: Backup your Data

No one plans to lose files. But when you need to restore lost data, you’ll be glad you have a robust backup plan.

The importance of Microsoft 365 data backups cannot be overstated. That’s why OneNeck has partnered with Commvault to bring you Metallic® Microsoft 365 backup to help protect your documents, emails, and conversations.

Metallic backup offers powerful, enterprise-grade Microsoft 365 data protection across Exchange, Teams, OneDrive, and SharePoint data. With Metallic backup, you’ll get seamless SaaS data protection and hassle-free deployment, with 24/7 Microsoft expert support provided by OneNeck (with optional monitoring available).

Learn about how OneNeck and Commvault Metallic keep Microsoft 365 data safe from deletion and attack, with the simplicity of SaaS. Read about our Microsoft 365 backup solution here.

]]>
The Need for AI Education https://www.oneneck.com/blog/the-need-for-ai-education/ Fri, 07 Apr 2023 16:44:42 +0000 https://www.oneneck.com/?p=3990 Artificial intelligence (AI) has become indispensable in today’s fast-paced digital world. It permeates virtually every industry, driving innovation, efficiency and transformation. Generative AI, such as the increasingly prevalent ChatGPT, is revolutionizing customer support and engagement, streamlining communication and providing valuable insights. Launched on November 30th, ChatGPT alone has over 100 million users, making it the […]]]>

Artificial intelligence (AI) has become indispensable in today’s fast-paced digital world. It permeates virtually every industry, driving innovation, efficiency and transformation. Generative AI, such as the increasingly prevalent ChatGPT, is revolutionizing customer support and engagement, streamlining communication and providing valuable insights. Launched on November 30th, ChatGPT alone has over 100 million users, making it the fastest-growing application of all time. Not to be outdone, Microsoft and Google have also recently unveiled generative AI tools designed for business.

AI continues to grow in significance and complexity, becoming increasingly integrated into various aspects of business operations. Companies need to invest in educating their workforce, from the CEO to entry-level employees, to ensure they have a solid comprehension of AI technologies. Understanding AI’s uses, limitations and ethical applications is crucial for successful and safe integration. By doing so, organizations can harness AI’s full potential for a more efficient, innovative and responsible future.

Benefits of a Well-Rounded AI Education

Enhancing Team Competence and Confidence

A primary reason to educate your team on AI fundamentals is to enhance their competence and confidence when working with AI technologies. As AI increasingly integrates into diverse business processes, a company-wide understanding of AI basics will undoubtedly be more effective. This knowledge improves productivity and innovation while ensuring the organization can utilize AI fully.

Comprehensive AI education covers aspects such as machine learning, natural language processing, computer vision (including object recognition, facial recognition and video analysis) and deep learning. Providing your team with this foundational knowledge better equips them to use and understand the technology’s complexities.

AI Education Promotes Responsible and Ethical Adoption

Educating your staff is crucial for responsible adoption. A thorough understanding of the potential risks, limitations and ethical considerations enables your team to make informed decisions about when and how to use AI. By fostering responsible adoption, your organization can avoid pitfalls and negative consequences, ensuring successful and sustainable long-term integration.

As the ethical use of generative AI becomes a growing concern, organizations must address the potential consequences of biased or unfair AI systems. Educating your team helps them grasp the ethical implications of AI decisions and actions, ensuring responsible and principled usage. AI instruction should contain principles like fairness, accountability and transparency. By integrating these principles, your team will be more likely to consider the ethical ramifications of AI projects, ensuring decisions align with organizational values and mission.

Mitigating Risks and Ensuring Safe AI Integration

AI, particularly generative AI, has limitations and risks, including biased algorithms, security vulnerabilities and potential data misuse. Education helps employees recognize and address these issues, mitigating risks and ensuring safe and secure integration.

Employees must understand data privacy, security and the potential risks of AI-driven decision-making. This understanding helps ensure the implementation of appropriate safeguards, such as data anonymization and encryption, to protect sensitive information and maintain compliance with applicable regulations.

Fostering Collaboration, Decision-making and Innovation

AI education encourages cross-functional collaboration, innovation and decision-making. A shared understanding enables teams to work together more efficiently and effectively, combining their unique perspectives and expertise.

For example, marketing and sales teams can work together to analyze customer data using AI tools, enabling the development of more targeted campaigns and improved lead conversion rates. Meanwhile, product development and engineering teams can collaborate on AI-driven solutions that enhance product functionality and user experience, accelerating development. Even human resources and management can utilize AI-driven tools to analyze employee performance and engagement data, identifying opportunities for staff development.

Additionally, AI-driven analytics tools help identify patterns and trends in large datasets, enabling companies to make informed decisions about resource allocation, pricing strategies and product development. Moreover, organizations can identify potential bottlenecks and areas for improvement, allowing for more effective problem-solving and optimized workflows.

Attracting and Retaining Top Talent

Organizations that invest in AI education are more attractive to top talent in the industry. In today’s competitive job market, professionals seek companies that provide growth and development opportunities. Offering AI-focused educational opportunities demonstrates a commitment to a culture of continuous learning and staying at the forefront of technology.

Providing access to AI training and resources not only helps to attract new talent but also aids in retaining existing employees. Those who feel supported and encouraged to learn and grow are likelier to stay with an organization, reducing turnover rates and improving performance. Investing in AI education sends a powerful message about the importance of continuous learning and professional development, encouraging employees to stay curious, seek new knowledge and continue growing in their roles.

Preparing for Future Innovation

The world of AI is constantly evolving, with new technologies and applications continuously emerging. Investing in AI education helps prepare your workforce for tomorrow’s technologies, providing them with the foundational knowledge needed to adapt to future developments. This proactive approach will keep your organization at the cutting edge of technology, helping you stay ahead of the competition.

Regularly updating AI education is crucial to keeping your organization up-to-date on recent breakthroughs and trends. This knowledge empowers your company to spot new opportunities and helps leverage emerging technologies. A proactive approach to AI education significantly drives business success, fosters innovation and maintains a competitive edge.

Embracing an AI-powered Future with AI Education

Educating your team on AI fundamentals is an essential investment for any organization looking to thrive in the digital age. This training enhances competence and confidence while promoting collaboration, innovation and safe AI integration. It also helps ensure ethical AI use, attracts top talent and prepares for future developments. Investing in AI education better positions your organization for long-term success in an increasingly competitive and complicated landscape. Don’t wait – empower your team with AI knowledge today and lay the groundwork for a brighter, more innovative, ethical future in artificial intelligence.

Are you interested in learning more about emerging technologies, data modernization or how your organization can thrive in the modern workplace? Check out OneNeck’s Resources for IT Professionals, or Contact Us today to find a hybrid IT solution built for you.

grey line

]]>
Microsoft Bookings: The Simple Way to Manage Appointments https://www.oneneck.com/blog/microsoft-bookings-the-smart-way-to-manage-your-appointments/ Mon, 03 Apr 2023 16:00:27 +0000 https://www.oneneck.com/?p=3826 In today’s fast-paced business world, time is of the essence. Whether running a small business or a large enterprise, scheduling appointments, meetings and events can be cumbersome. Fortunately, Microsoft has developed a solution that can help streamline the process – Microsoft Bookings-and it’s likely already included in your licensing. What is Microsoft Bookings? Microsoft Bookings […]]]>

In today’s fast-paced business world, time is of the essence. Whether running a small business or a large enterprise, scheduling appointments, meetings and events can be cumbersome. Fortunately, Microsoft has developed a solution that can help streamline the process – Microsoft Bookings-and it’s likely already included in your licensing.

What is Microsoft Bookings?

Microsoft Bookings is an online scheduling tool that allows businesses to schedule appointments, meetings, and events more efficiently. Bookings is designed for small businesses, but larger companies with multiple employees can also take advantage of it.

Bookings allows businesses to create customized booking pages that are easy to use and accessible from any device. Customers can schedule appointments or make reservations directly from the booking page, which helps to reduce administrative overhead and saves time for both businesses and customers.

Once an organization has enabled Microsoft Bookings, users can set up a Bookings page and share a simple link for creating new meetings while keeping their calendars private.

 

Microsoft Bookings

 

Why Microsoft Bookings is Useful

A valuable tool for your users and small teams for several reasons. Here are just a few:

  • Streamlines Appointment Scheduling– With Bookings, users and small teams can simplify scheduling appointments, saving time and making people happy. Customers like it too – they can schedule appointments online, see your available time slots based on parameters you control, keeping your calendar private without having to spend time on the phone or exchanging emails to set up appointments.
  • Improves Customer Experience– Allows businesses to customize appointment types, duration and availability, ensuring customers can easily find a time that works for them. Automatic reminders and appointment confirmations are sent, keeping the customer engaged throughout the process while reducing no-shows.
  • Integration with Other Microsoft Products– Bookings integrates seamlessly with Exchange Online and other Microsoft products, such as Outlook and Microsoft Teams. For example, you still view all appointments in your Outlook calendar – requiring no change or additional steps from what you already do today.
  • No Time Delays – One of the most significant benefits of using Bookings is the ability to schedule appointments 24/7. Making an appointment can be done anytime, even outside regular business hours. This ability makes sense when you work with partners or clients in different time zones or those with busy schedules who often need to make appointments outside of regular business hours.
  • Customization– A customizable tool that tailors itself to what you need to do. You can modify a booking page with branding, service offerings, and basic availability. You can also set up appointment types, duration, and pricing, meaning businesses offer customers a personalized experience that increases satisfaction and loyalty.

Getting Started with Bookings

Microsoft Bookings is part of Microsoft 365 and accessed through a web link. Once your organization turns on Bookings, it doesn’t take long to get a new page set up:

  1. Setup a Main Page
  2. Create a Calendar
  3. Setup Your Service
  4. Staff Your Service
  5. Customize and Publish Your Booking Page

Congratulations! You now have a personalized page to handle your scheduling needs.

Use Cases for Microsoft Bookings

End users in virtually any industry can find value in Microsoft Bookings by utilizing it to streamline appointment scheduling processes and improve their customer experience. Here are just a few examples:

  • Healthcare Providers– Providers can customize their booking page with availability, service offerings and pricing, allowing patients to easily schedule appointments or consultations while reducing wait times. Patients can select a date and time that works best for them and receive a confirmation email with all the necessary details. This customization helps boosts efficiency and allows the provider to keep their focus on providing quality care and creating stronger patient connections.
  • Consulting & Sales– Businesses can easily set up and manage client meetings, customizing appointment types, duration, and pricing to suit their needs. Features like automatic reminders and appointment confirmations help to reduce no-shows and increase efficiency, allowing sales professionals to focus on building relationships and closing deals.
  • Education and Training– A useful tool for educational institutions and training centers, permitting them to schedule appointments for visitors, students, or trainees effortlessly. Teachers can present office hours in a format that is easily accessible and understood. At the same time, students can conveniently set up appointments with tutors and classmates or coordinate group meetings.

Ready to Simplify Your Scheduling?

Microsoft Bookings is a helpful tool that can help businesses streamline appointment scheduling, improve customer experience, and increase efficiency. The tool is easy to use and can be accessed from any device, making it convenient for employees and customers.

An experienced Microsoft CSP OneNeck can guide you on how to best utilize Microsoft Bookings and other M365 tools to improve your business’s productivity and efficiency. Whether you are trying to find hidden gems in your existing M365 licensing, need to adjust a current licensing subscription or are considering adopting M365 as your productivity tool of choice, contact us today.

Or you can always Book some time with me.

grey line

]]>
Incident Response Planning: Defend Against Cyberattacks https://www.oneneck.com/blog/incident-response-planning-a-critical-part-in-defending-against-cyberattacks/ Tue, 28 Mar 2023 15:50:41 +0000 https://www.oneneck.com/?p=3807 How Incident Response Planning Helps Contain Cyberattacks Despite businesses pouring resources into cybersecurity, breaches aren’t going away — or even slowing down. In 2022 alone, companies reported a near-record 1802 breaches, affecting 422.1 million people. Unfortunately, it’s not a matter of if your data will be breached, it’s a matter of when. Incident response planning […]]]>

How Incident Response Planning Helps Contain Cyberattacks

Despite businesses pouring resources into cybersecurity, breaches aren’t going away — or even slowing down. In 2022 alone, companies reported a near-record 1802 breaches, affecting 422.1 million people.

Unfortunately, it’s not a matter of if your data will be breached, it’s a matter of when.

Incident response planning helps your organization prepare for security incidents by outlining objectives, processes, and evaluation criteria your team can follow every step of the way. Your organization’s custom plan will guide you through the aftermath of a breach, assist in recovery, and help you fix the vulnerabilities that led to the incident.

What is incident response planning?

Incident response planning means taking the time before a breach occurs to write down the actions you’ll take after it occurs. The Cybersecurity and Infrastructure Security Agency (CISA) describes an Incident Response Plan as a written strategy, approved by your organization’s senior leadership, that guides your organization before, during, and after a confirmed or suspected security breach.

Why do you need an incident response plan?

Once a breach happens, time is of the essence. You need to stop the attack, minimize the damage, and fix the problem quickly so that you can return to work. That’s why pre-planning is essential. By determining your incident response plan before a breach occurs, you’ll know which employees are responsible for which actions, when, and how they will complete them — speeding up your recovery time.

Having a written incident response plan and securing leadership approval tells your team exactly what to do and who will do it.

How do you write an incident response plan?

Starting your incident response plan with a blank page can be difficult. Instead, begin with the guidance the National Institute of Standards and Technology (NIST) issued for computer security incident response. The NIST Special Publication 800-61, Rev. 2 provides a framework for creating your own plan.

Along with NIST’s guidance, customize your incident response plan for your organization by assessing your:

  • assets and their level of risk
  • priorities
  • potential vulnerabilities
  • communication methods
  • incident response team members
  • distribution of responsibilities

And, of course, once you write your plan, you’ll need to train your team members so they can effectively communicate and mitigate when the next incident occurs.

The 6 Incident Response Phases

At a minimum, your plan should cover these phases of incident response and recovery:

  • Incident Response Planning Phase 1: Prepare
    During the first phase of incident response, ensure that your employees understand their roles and the steps they must take to respond. Practice your response procedures with exercises designed to simulate a breach. You’ll also use this phase to determine how you’ll identify breaches through testing, logs, alerts, or other procedures.
  • Incident Response Planning Phase 2: Identify
    You can receive an immediate alert that an attack may be taking place by implementing a monitoring tool or partnering an MDR provider. You may also be notified by receiving communication from another organization, law enforcement, or a customer. Once your team has evaluated the alert and determined that an attack is taking place, you’ll kick off the remainder of the incident response phases.
  • Incident Response Planning Phase 3: Control and Contain
    You know you have a breach; now it’s time to do something about it. Prevent further damage by isolating the network segment or infected servers. Document exactly what happened and the extent of the damage. If possible, preserve forensic data so you can analyze it in the Review phase.
  • Incident Response Planning Phase 4: Resolve
    Fix the vulnerability that caused the breach by removing malware, hardening and patching systems, and applying software updates.
  • Incident Response Planning Phase 5: Recover
    Return the isolated systems to regular operation and restore normal business processes.
  • Incident Response Planning Phase 6: Review
    Gather the incident and the forensic evidence you documented for the incident response team. Analyze the breach, and the team’s response, and discuss the lessons learned from the process. Revise your incident response plan based on what worked and what didn’t so you’re fully prepared for the next incident.

Protect Your Network with Incident Response Planning from OneNeck

Incident response planning can make the difference between a quick recovery from a data breach and a long, painful one. That’s why OneNeck’s security experts can work with you to prepare an incident response plan and recover from breaches faster — so you can get back to business.

OneNeck has your back. Read more about our incident response services here.

]]>
Simulated Phishing Campaigns Can Improve Employees Awareness https://www.oneneck.com/blog/how-simulated-phishing-campaigns-can-improve-cybersecurity-awareness/ Mon, 27 Mar 2023 20:00:20 +0000 https://www.oneneck.com/?p=3770 Anyone who watched TV in the 90s will undoubtedly remember the NBC PSAs with the catchy jingle, “The more you know…”. It was sage advice then, and in today’s modern technological world, where cybersecurity is paramount, it still holds true. As such, businesses are increasingly embracing education related to cybersecurity. These organizations realize that there […]]]>

Anyone who watched TV in the 90s will undoubtedly remember the NBC PSAs with the catchy jingle, “The more you know…”. It was sage advice then, and in today’s modern technological world, where cybersecurity is paramount, it still holds true. As such, businesses are increasingly embracing education related to cybersecurity. These organizations realize that there must be a focus on both external and internal threats, with increased awareness of the defenses that staff can employ.

Simulated Phishing Campaigns

Many businesses find that training services like those offered by OneNeck partner, KnowBe4, are effective options to protect both data and personnel. One specific strategy employed is to simulate common threats that focus on the human element through phishing campaigns. This approach is particularly valuable since, according to Verizon’s 2022 Data Breaches Investigations Report, 82% of data breaches involved a human component.

Through these simulated phishing attacks, end users can increase awareness of the methods used by attackers and the proper procedures to follow upon identifying such an attack.

Pushback Against Simulated Phishing Attacks

I recently listened to a podcast where a story was shared about an arguably ill-timed simulated phishing attack that a company ran against its employees. This particular business was in the process of rolling-out organizational-wide Multi-Factor Authentication. The simulated phishing attack – allegedly not coordinated on purpose to coincide with the MFA effort – implied that recipients needed to follow the email link to complete an MFA task. The podcaster – who works from home and has youngsters at home – was among those inside the company who fell victim to the simulated attack.

As they shared the events, they placed some blame for falling victim to the attack on outside distractions – notably balancing work and home life with littles. (Whether it’s children, pets, mobile devices, etc., we all know distraction far too intimately.) While admitting ultimate responsibility for falling victim to the simulation, they expressed significant frustration surrounding the timing. They decried the simulated attack as counter-productive when the organization’s goal was to get employees to buy in and support the MFA effort.

The Perfect Time

While I appreciate the expressed frustration, there are a few reasons that I believe the timing was not only excellent but should, in fact, be coordinated to align with company initiatives, such as the implementation of MFA.

  1. Attackers and bad actors don’t exactly work within a system of morals and ethics. They will exploit as many opportunities and weaknesses as they can find. Testing employees using guerrilla-style tactics theoretically serves to better educate and prepare users within the target audience.
  2. Multitasking (read: distraction) is an attacker’s best friend. Most of us have our attention divided by at least a few things at any given moment. When we make snap judgments or act without thought or careful review of what we are looking at, the odds of making a costly mistake skyrocket.
  3. Security in layers is critical for any organization. Educating users is a significant step in the right direction, but as we’ve seen, other factors come into play – and ultimately, we’re only human. IT organizations should employ overlapping solutions that prevent a distracted mistake or clever attack vector. Policy and procedure should be augmented by solutions like MFA, email filtering, and DNS filtering, to name a few. Layers of human and technical defenses together are key.

The More You Know with OneNeck and KnowBe4

Cyberthreats remain highly dynamic and ever-changing to adapt to defenses and human nature. Proactive measures such as education and coordinated campaigns help condition users on what to look for and can be highly effective tools. Simulated phishing campaigns stand out as a particularly successful method to train employees and raise awareness about the importance of cybersecurity. By simulating common threats that focus on the human element, end-users can become more accustomed to the methods used and the proper procedures to follow when discovering such attacks.

However, it’s important to note that educating users is just one step in reducing the likelihood of a cybersecurity breach. Investment in procedure/planning and defensive technical solutions is crucial in adequately protecting your business. Organizations should employ overlapping solutions that prevent a distracted mistake or clever attack vector.

In today’s fast-paced technological world, businesses must take cybersecurity seriously to avoid costly and damaging breaches. By incorporating education, training, and defensive technical solutions, organizations can significantly reduce the likelihood of a breach and protect their data and infrastructure.

Have questions about awareness, training or any aspect of cybersecurity? Contact us today to speak with a OneNeck security expert.

]]>
Managing CSP Licensing with NCE and Legacy Subscriptions https://www.oneneck.com/blog/managing-csp-licensing-with-nce-and-legacy-subscriptions/ Wed, 22 Mar 2023 17:01:40 +0000 https://www.oneneck.com/?p=3754 Microsoft has significantly changed its licensing subscription services by moving to the New Commerce Experience (NCE) platform. The old rules still apply to a few subscriptions, and the latest rules apply to new subscriptions. This change has created confusion among Microsoft clients as there are now two rule sets for CSP licensing to follow: one […]]]>

Microsoft has significantly changed its licensing subscription services by moving to the New Commerce Experience (NCE) platform. The old rules still apply to a few subscriptions, and the latest rules apply to new subscriptions. This change has created confusion among Microsoft clients as there are now two rule sets for CSP licensing to follow: one for legacy subscriptions and another for those converted to NCE.

We will likely live in both worlds for a while. Microsoft originally planned to retire Legacy subscriptions upon expiration and only provide NCE subscriptions upon renewal. However, Microsoft retraced its steps and allowed existing Legacy subscriptions to renew indefinitely. Currently, academic, nonprofit and government/GCC licensing remain on Legacy subscriptions, with no specific dates for when they may be compelled to convert to NCE.

Managing CSP Licensing with NCE and Legacy Subscriptions

Let’s examine what is essential to know about managing Microsoft CSP licensing and working with Microsoft’s NCE cancellation policy.

  • Cancellations– Legacy subscriptions may be canceled or reduced at any time. Under NCE policy, subscriptions are cancelable with a prorated refund within the first 168 hours of any term. After the 168-hour window, cancellation is no longer available. The client will be billed for the entire duration, even if the customer stops using the subscription (applicable to any billing plan).
  • Adding Subscriptions– For legacy subscriptions, you can add anytime, whereas, for NCE subscriptions, you may also add anytime, but the cancellation policy clock starts ticking. After 168 hours, users may not cancel until the term expires.
  • Upgrading– Legacy subscriptions are not capable of receiving an upgrade. NCE subscriptions allow upgrades to qualifying packages and can cancel included add-ons through a qualified CSP, such as OneNeck, via a support ticket to Microsoft.
  • Auto-renew– Automatic renewal occurs for Legacy subscriptions until cancelation. NCE subscriptions will also, by default, auto-renew. However, to cancel the subscription at the end of the term, one only needs to uncheck the auto-renew option.
  • Alignment of Subscription End Date– Aligning with a subscription end date is not possible for Legacy subscriptions. With NCE subscriptions, you can pick an end-of-term date when ordering that matches an existing subscription.
  • Schedule Changes– Legacy subscriptions can make changes at any time and are not tied to an end-of-term. NCE subscriptions have some limitations in their ability to change during the term. However, customers can schedule many changes, including quantity modifications, term date alignment and term change to occur at renewal.

Strategy for Managing CSP Licensing

Managing CSP licensing is a daunting task for any organization. Knowing the best strategy to manage licensing and improve productivity can be challenging with so many options and promotions available. Fortunately, OneNeck provides a comprehensive plan for managing CSP subscriptions that helps businesses navigate this complex landscape.

Maintaining Legacy Subscriptions

One of the components of the OneNeck CSP licensing strategy is to advise organizations to consider keeping Legacy licensing until they feel it is necessary to move to NCE. While Legacy licensing might not seem as appealing as newer options, in many cases, it may be helpful to maintain until Microsoft further incentivizes clients to move. For example, organizations can reduce or add to the quantity of Legacy licensing whenever needed. OneNeck’s self-service portal allows clients to make these changes quickly and easily. Organizations with a regular need for licensing fluctuation would be wise to maintain their Legacy subscription.

Moving to NCE Subscriptions

There are several reasons for organizations to consider the move to NCE licensing, including upgrading to a higher-level package, taking advantage of promotions and moving to OneNeck CSP.

Upgrading Licenses– If an organization needs to upgrade to a higher-level package, Legacy licensing won’t be sufficient. Customers will need to order new NCE subscriptions for commercial or corporate clients. Microsoft is currently offering promotions for first-time subscribers to Microsoft 365 Business Premium. This subscription includes basic security functionality, such as MFA, conditional access policies, endpoint management and protection. If an organization currently uses Legacy Microsoft 365 Business Basic or Microsoft 365 Business Standard licenses, this promotion may be a reason to convert. While the current promotion is good until June, other incentives will undoubtedly be forthcoming.

Moving to OneNeck as your Microsoft CSP– OneNeck’s Microsoft CSP Program delivers superior support, customer success, advanced managed service options, and a focus on security and productivity for clients. If an organization is not a client of OneNeck, they will need to order new NCE subscriptions through OneNeck and cancel their Legacy subscriptions with their old provider.

Adoption Score– OneNeck’s CSP licensing strategy includes turning on Adoption Score, a free tool provided through Microsoft 365 Admin. This tool recommends how to use licensing to improve user experience and productivity. After a listening period, Adoption Score gives feedback based on the organization as a whole rather than singling out individuals.

The information provided gives businesses a holistic view of how their organization utilizes Microsoft licensing and highlights areas where they can improve. Adoption Score allows companies to understand which licenses are used most and which are underutilized. Based on this data, they can make informed decisions about reallocating licenses to improve user experience and boost productivity.

Aligning subscription end dates– Organizations can align subscription end dates, making it easier to renew all subscriptions simultaneously. By doing so, businesses can manage licensing more efficiently and effectively.

One way to achieve good alignment is to request that subscriptions be aligned to existing ones at order or renewal time. This approach ensures the management of licenses from a central location and eliminates overlap or duplication. It also streamlines the management process by allowing businesses to simultaneously change and update all licenses.

License Assignment Hygiene– One essential part of good hygiene is periodically unassigning licenses from old users who no longer require them. By doing this, businesses can avoid wasting licenses and reduce their overall cost. An apple a day, …

In addition to unassigning licenses, it is also important to establish reasonable account control. Businesses can achieve this by implementing group-based licensing assignments through Active Directory. This approach reduces the number of steps and possible mistakes when assigning licensing while simplifying provisioning and making licensing management easier.

Annual Renewal Cycle Planning– Finally, participating with OneNeck in the annual renewal cycle is crucial for organizations that want to be as efficient as possible with their Microsoft licensing usage. This annual planning process, determined by when your subscriptions expire, can help organizations stay updated with the latest licensing rules and ensure they take full advantage of all available options.

OneNeck, A Microsoft CSP That Has Your Back

Managing CSP licensing can be a complex and challenging task. As a Microsoft Gold Cloud Service Provider OneNeck offers a broad range of solutions for organizations looking to optimize their use of M365. Our services include consulting, implementation and ongoing support to help organizations maximize their M365 investment.

Our experienced team is ready to assist you throughout your Microsoft licensing experience. Through our work with hundreds of customers, we know the ins and out of M365 and use that hands-on expertise to help our customers save time, reduce costs and get maximum value from their M365 subscriptions.

 

Contact a OneNeck Microsoft expert today to discuss a CSP solution tailored to your organization’s needs.

grey line

]]>
To MFA or Not to MFA – It’s Not Really a Question Anymore https://www.oneneck.com/blog/to-mfa-or-not-to-mfa/ Mon, 20 Mar 2023 20:01:15 +0000 https://www.oneneck.com/?p=3750 If you’ve ever used Microsoft 365, you’ve likely encountered multi-factor authentication (MFA). And if you’re like most, you probably find it a bit of a hassle. But the truth is that MFA is essential today, where cyberattacks are becoming increasingly common. In this blog, we’ll explore the importance of MFA and other steps to keep […]]]>

If you’ve ever used Microsoft 365, you’ve likely encountered multi-factor authentication (MFA). And if you’re like most, you probably find it a bit of a hassle. But the truth is that MFA is essential today, where cyberattacks are becoming increasingly common. In this blog, we’ll explore the importance of MFA and other steps to keep your accounts secure.

The Problem with Passwords

Passwords are the most common form of authentication. And while better than nothing, they’re not particularly secure. One of the most significant issues is their vulnerability to being compromised. Cyber-attackers employ various methods to obtain passwords, including phishing, keyloggers and dictionary attacks. Additionally, many users choose weak passwords, such as “123456,” “password,” or “guest,” making it simple for hackers to access accounts and steal sensitive information, putting users’ data at risk.

However, using passwords that are not easily guessable creates challenges in password retention. With numerous accounts and logins to remember, it can be challenging to track them all. As a result, people often reuse passwords across multiple accounts or write them down, leaving them vulnerable to security breaches.

Even with best practices in place, there are still risks. If an organization’s password database is compromised, all its users’ passwords are exposed. Several high-profile breaches have compromised millions of passwords and associated user IDs.

Better Passwords

Passwords are the first line of defense against unauthorized access to accounts. Therefore, it’s essential to make them as secure as possible. Complex passwords should include letters (upper and lowercase), numbers and symbols. By using a mix of characters, passwords become more challenging to crack.

According to Microsoft, passwords should be at least 14 characters long. Lengthier passwords make it harder for attackers to use brute-force methods to crack them. However, longer passwords can be harder to remember. One way to manage password length is to use passphrases. A passphrase is a sentence or combination of words that are easy to remember but difficult to guess.

Microsoft also recommends users change passwords periodically. Over time, passwords can become compromised. Organizations can reduce this risk by compelling users to change their passwords regularly. However, it’s important to note that changing too frequently can be counterproductive, creating weaker passwords or resulting in the user writing them down.

Finally, using a good password manager is helpful. Password managers can generate strong passwords, store them securely and automatically fill them in when needed. By employing a password manager, users do not have to remember every password while still keeping them safe from prying eyes.

Better Accounts

Creating a “break-the-glass” account is a critical security measure every organization should consider. In a security breach, having an emergency account with the highest level of access can be a lifesaver. However, it’s crucial to remember using this account should only occur in extreme situations. Companies must store these account credentials securely and make them accessible only to a limited number of individuals.

Assigning roles and permissions to security groups is another worthwhile step in securing your accounts. Limiting resource access is vital so users can only access what they need to do their job. Separating admin and user accounts is also critical and reduces the risk of security breaches. Admin accounts should only be used when necessary and assigned on a limited basis.

When it comes to admin accounts, it’s essential to have control over them. Privileged Identity Management (PIM) and Privileged Access Management (PAM) are two solutions that can provide the necessary controls. PIM allows you to manage, monitor, and audit the use of privileged accounts and resources. PAM isolates privileged accounts to reduce the risk of stolen credentials and helps re-establish control over a compromised Active Directory environment by maintaining a separate bastion environment unaffected by malicious attacks.

MFA and Conditional Access Policies

Microsoft recommends using conditional access policies to enforce layers of control around admin and user accounts. These policies often require MFA and specify where, when, what, and how users can access specific resources. Additionally, they log the use of privileged accounts to track who is accessing what.

Conditional access policies also provide an extra control layer to secure admin and user accounts. Conditional access policies allow organizations to set specific rules around access to resources based on conditions, such as user location, the device used and even the time of day.

For example, you could create a conditional access policy that requires MFA for any user attempting to access your company’s financial data outside of regular business hours or from an unrecognized device. This example ensures only authorized individuals access critical financial information under specific circumstances that meet your organization’s security standards.

Implementing MFA and conditional access policies strengthen your organization’s security posture and reduce the risk of security breaches. As always, it’s essential to work with a trusted IT partner like OneNeck to ensure security measures are correctly implemented and maintained.

The MFA Difference

So how much of a difference does MFA truly make? According to Microsoft and the Cybersecurity and Infrastructure Security Agency (CISA), MFA can prevent 99.9% of hacks. Even if a cyber attacker compromises your password, they won’t be able to meet the second authentication requirement, which ultimately stops them from gaining access to your accounts.

MFA is not a one-size-fits-all solution but rather an essential step in securing your accounts. While it may seem like a hassle to set up MFA and follow password management and account protection best practices, it is important to remember that the consequences of a data breach or account compromise can be far-reaching and costly. In addition to the potential loss of sensitive data, there can be legal and regulatory ramifications, reputational damage, and financial losses. It is much better to take proactive measures to prevent these outcomes than to deal with the aftermath of an attack.

Another benefit of MFA is that with a bit of finesse and conditional access, it can improve or at least minimally impact the user experience. While the initial setup and authentication process may take a few extra seconds, users feel more secure knowing that an additional layer of security protects their accounts. Additionally, many MFA solutions offer the option for “remembered devices” or “trusted locations” where the user will not be prompted for an MFA login. This automation makes the process smoother and less disruptive while maintaining security.

It is worth noting that while MFA is highly effective at preventing most types of account attacks, it is not the end of your security journey. Some attacks, such as phishing or social engineering, can bypass MFA by tricking the user into providing their credentials to a malicious actor. Additional layers, such as Endpoint protection, will be the next step on your path to a more secure environment.

Get the Most from Microsoft 365 with OneNeck

Whether you need support securing Microsoft environments, backing up M365 data or maximizing your licensing investment, OneNeck is here to help. We are a skilled Microsoft Cloud Service Provider with wide-ranging experience assisting hundreds of clients throughout their M365 adoption journey. Let us help you find the right-fit solutions for your organization’s productivity needs.

Contact us today to speak with a member of our team.

grey line

 

]]>
Navigating the Outlook Elevation of Privilege Vulnerability https://www.oneneck.com/blog/march-2023-patching/ Sat, 18 Mar 2023 16:00:10 +0000 https://www.oneneck.com/?p=4573 In the ever-evolving digital landscape, maintaining the security and integrity of your systems is not just a necessity; patching is a commitment we at OneNeck IT Solutions take seriously. This March, our attention is specifically drawn to a critical issue within Microsoft Office products: the Microsoft Outlook Elevation of Privilege Vulnerability (CVE-2023-23397). Microsoft Outlook Elevation […]]]>

In the ever-evolving digital landscape, maintaining the security and integrity of your systems is not just a necessity; patching is a commitment we at OneNeck IT Solutions take seriously. This March, our attention is specifically drawn to a critical issue within Microsoft Office products: the Microsoft Outlook Elevation of Privilege Vulnerability (CVE-2023-23397).

Microsoft Outlook Elevation of Privilege Vulnerability (CVE-2023-23397)

A zero-day vulnerability, this particular security issue emerged without prior warning. Organizations should consider these vulnerabilities to be especially critical since cyber attackers can often exploit them before there is an opportunity to correct or even identify them fully. In the case of this Outlook vulnerability, a potential attacker could elevate their privileges within the system, leading to an increased level of access and control.

Please note as part of our standard procedure, OneNeck does not include Microsoft Office products during scheduled patching. OneNeck will not automatically distribute the zero-day patch for Outlook. Nevertheless, we strongly recommend all customers take immediate action to apply this important update to their environment as soon as possible.

Exchange Management and Patching

We are going a step further for those of you contracted with OneNeck for Exchange Management. We’re utilizing a script provided by Microsoft to determine if your organization is a target of malicious entities attempting to exploit this vulnerability. This assessment can be conducted for Exchange On-Prem and Exchange Online, providing a comprehensive safeguard regardless of your Exchange configuration. If you have questions about how OneNeck can assist you with either of these processes, don’t hesitate to contact the Service Desk.

Identifying and swiftly responding to such threats is fundamental to our service at OneNeck. In an era where cyber threats can arise and evolve rapidly, the ability to adapt and react quickly is not just an advantage; it’s a necessity. This Outlook Elevation of Privilege Vulnerability is an excellent reminder of the importance of vigilance and proactive actions in the face of cyber threats.

OneNeck Has Your Back!

While patching is essential to maintaining cybersecurity, it’s also a complex and continuous process. Each patch brings challenges and demands, and navigating this landscape requires a blend of technical expertise, industry knowledge, and a deep understanding of each client’s specific needs and contexts.

At OneNeck, our commitment is to support you through each update, each challenge, and each opportunity for improvement. We are not merely your IT solutions provider but your partners in navigating the dynamic landscape of IT security. We are dedicated to providing you with the best possible solutions for your IT security needs.

Stay safe, stay updated, and remember, OneNeck is here to assist you every step of the way.

grey line

 

]]>
Data Backup vs. Disaster Recovery: The Differences Matters https://www.oneneck.com/blog/data-backup-vs-disaster-recovery-why-knowing-the-differences-matters/ Wed, 15 Mar 2023 20:28:18 +0000 https://www.oneneck.com/?p=3736 Data backup and disaster recovery are two critical components of any business continuity plan. They are necessary for ensuring the safety and security of data and systems in the event of an unexpected interruption or disaster. However, backup and disaster recovery are different, and organizations need to understand their distinctions to develop an effective business […]]]>

Data backup and disaster recovery are two critical components of any business continuity plan. They are necessary for ensuring the safety and security of data and systems in the event of an unexpected interruption or disaster. However, backup and disaster recovery are different, and organizations need to understand their distinctions to develop an effective business continuity strategy.

Data Backup vs. Disaster Recovery

Data Backup– Backups refer to copying data and files to prepare for an event where the original data is lost or damaged. A backup system duplicates data and files, providing an on-site primary copy along with one or more off-site auxiliary copies. The goal is swift restoration in the event of a loss. Several backups exist, including full, incremental, differential and point-in-time.

A full backup includes all data and files, while incremental only copies the data that has changed since the last backup. Differential backups, however, copy all changes since the previous full backup. In comparison, point-in-time captures a snapshot of a computer system or application at a specific moment in time. Each of these backup types has its advantages and disadvantages. The best solution for a given organization depends on the size and complexity of the data, available storage space and desired recovery time.

Disaster Recovery– Disaster recovery (DR) refers to restoring systems and data upon a significant interruption or disaster. The goal of a DR plan is to minimize the impact of an interruption on business operations and to restore normal operations as quickly as possible. Disaster recovery is, by nature, more comprehensive and complex than data backup, as it involves reestablishing data and rebuilding infrastructure and systems.

DR plans often involve a combination of backup systems, redundant hardware and software and failover procedures. In addition, due to stringent RTO, technologies, such as replication and SQL AOAG, are used to instantiate a particular environment. The specific details of a DR plan depend on the nature of the organization’s operations and potential risks. A company with a mission-critical website may have a DR plan that includes failover to redundant servers in multiple locations. In contrast, a company with a small local network may have a more straightforward DR plan that primarily involves data backup to a remote location.

Important Differences

RTO and RPO– Backups and DR plans have significant yet distinct impacts on Recovery Time Objective (RTO) and Recovery Point Objective (RPO). RTO is the maximum allowable downtime, and backups are crucial in limiting RTO by enabling organizations to restore data quickly. A DR plan outlines the complete scope of restoration procedures extending beyond data recovery to ensure the speedy return of operations.

RPO is the maximum allowable data loss, and backups are essential in meeting RPO objectives by ensuring a copy of critical data is available. DR plans impact RPO in several ways, including defining the frequency of backups and their role in restoration.

Redundancy– Another difference between backup and disaster recovery is the level of redundancy and failover. Backup systems typically involve creating multiple copies of data, ideally storing them in separate locations. Many experts recommend adhering to the 3-2-1 backup rule. Simply put, this suggests organizations have three copies of data, on two different media types, with one copy residing off-site.

Disaster recovery typically involves redundant systems and failover procedures to keep operations running when a system or component fails. This level of redundancy is necessary to ensure the quick restoration of functions. The result is that resources and infrastructure requirements significantly increase over that needed for data backup. Additionally, while an off-site location is strongly recommended for data backup, it is an absolute necessity for a successful DR solution.

Planning Process– Planning a backup process is relatively simplistic compared to that of a DR plan. Typically, an organization first identifies the data requiring backup. The organization then determines the backup frequency, method and number of backup targets needed to avoid a sole point of failure.

A comprehensive disaster recovery strategy requires significant additional planning beyond just those concerning data. These steps include, but are not limited to:

  • Determining which systems are mission critical.
  • Prioritizing the importance of business applications and the recovery order of the systems running such applications.
  • Establishment of a DR site to house backups and replicas ready for potential failover operations.
  • Maintenance of the DR site to ensure it is fully operational.
  • Design and creation of end-to-end DR processes, including active maintenance of blueprints and runbooks, as an organization’s environment evolves.
  • Assembling clear communication steps, roles and access assignments for staff to follow upon a disruption.
  • A DR plan is only ready upon the completion of extensive testing. Failure to execute during a disaster has dire repercussions. Regular testing must occur to ensure business continuity is maintained and discover potential gaps or weaknesses.

Data Backup vs. Disaster Recovery in the Cloud

Backup as a Service (BaaS) is a cloud-based backup solution that allows users to back up and restore data in the cloud. With BaaS, users store their data securely in the cloud and easily access it without worrying about maintaining a backup infrastructure. While some consider the inherent latency of data stored in the cloud a hurdle, the issue has largely been resolved through data locality considerations and the increasing variety of private cloud options, alongside high-speed internet bandwidth, becoming more affordable. BaaS providers typically offer multiple backup options, such as file-level, block-level, or image-level backups, and can also provide features like data deduplication, compression, and encryption.

Disaster Recovery as a Service (DRaaS) is a cloud-based solution that enables organizations to recover their IT infrastructure and data during a disaster, cyber-attack, or human error. DRaaS providers typically replicate a company’s entire IT environment to the cloud, allowing them to quickly failover and access their systems and data in case of a disruption. DRaaS also involves planning and testing to ensure the recovery process is smooth and efficient. Management of this service by the provider is also often utilized. This management is a desirable component as it performs regular testing and adherence to the provisions established in the DR runbooks.

Data Backup and Disaster Recovery: Working Together for Business Continuity

Organizations of all sizes benefit significantly from implementing backup and DR procedures as part of their business continuity plans. These measures protect vital data, minimize downtime, and reduce the impact of unexpected disruptions or disasters on the organization’s operations.

By having a reliable backup system, organizations can significantly reduce the impact of data loss or corruption on their business operations, quickly restoring lost data. While DR plans outline procedures to help an organization rapidly resume operations after a disruption, minimizing the impact on customers, employees and stakeholders.

In today’s technology-driven world, businesses must prioritize the protection of data and technology systems. Implementing reliable backup and disaster recovery measures can help organizations minimize the impact of disruptions and ensure business continuity. With these measures in place, businesses can continue to operate smoothly, meet their obligations, and maintain customer satisfaction even in the face of unexpected disruptions.

OneNeck, We’ve Got Your Back

OneNeck understands that every organization is unique regarding business continuity. Our experienced team works with clients to assess their data infrastructure and business requirements to develop the right-fit Backup and DR strategies to meet their needs.

Need assistance managing your organization’s backup and disaster recovery? OneNeck-managed data backup and disaster recovery services ensure you have a partner who truly has your back. We guide our clients through the initial setup and ensure that DR solutions are in place, maintained and regularly tested.

Free up your IT staff from the complex and time-consuming backup and disaster recovery aspects. Contact us today to speak with one of our experts.

grey line

 

]]>
Solving Data Management Challenges with Data Modernization https://www.oneneck.com/blog/solving-data-management-challenges-with-data-modernization/ Wed, 08 Mar 2023 20:41:12 +0000 https://www.oneneck.com/?p=3715 Data modernization is vital for businesses to stay competitive and make informed decisions in today’s digital age. As companies generate, store, and analyze increasing volumes of data, effective management and protection have become significant challenges. Data management encompasses various activities, from collecting and storing data to analyzing and utilizing it to drive outcomes. But, with […]]]>

Data modernization is vital for businesses to stay competitive and make informed decisions in today’s digital age. As companies generate, store, and analyze increasing volumes of data, effective management and protection have become significant challenges. Data management encompasses various activities, from collecting and storing data to analyzing and utilizing it to drive outcomes. But, with data growing exponentially, it can be difficult for businesses to prioritize what data is essential and how to manage it effectively.

Data management has become an increasingly important priority for leaders. However, achieving modern data management goals comes with equally modern hurdles and roadblocks.

According to a 2022 Deloitte survey, technology industry leaders listed three primary challenges when attempting to manage data effectively. While most of the leaders surveyed stated assurance in their ability to navigate these challenges, they nonetheless admitted organizational struggles to overcome them.

This blog will explore data leaders’ three common challenges and how data modernization services offer effective and efficient solutions.

Data Management Challenges

#1: Collecting and Protecting Data

Collecting and protecting ever-growing volumes of data is the top challenge for data leaders. As data volumes continue to rise, it can be difficult to prioritize which data is necessary to maintain. To tackle this challenge, data leaders call for better technologies to help collect data, make sense of it, and make it meaningful.

Achieving a holistic view of the enterprise’s data landscape and identifying sensitive information are significant challenges. With increasing amounts of data to handle, managing policy implementation and audits becomes harder. Data leaders must implement strong data management policies to protect their data from threats and ensure that it is neither breached by outside forces nor accessed internally by those that do not need to use it.

#2: Shifting Regulations

Shifting regulations are a significant challenge for data leaders. Regulations continuously change, making it difficult to maintain the latest requirements. Many leaders feel resigned that inconsistencies will arise and new data-related regulations will lead to higher costs, increased complexity, and challenges to software development.

As part of the broader regulatory landscape, cross-border transfers and data localization issues worry data leaders. Some businesses are trying to avoid or minimize transferring data out of the country while others are establishing additional cloud data centers worldwide and developing new preferred partners. In this ever-changing regulatory landscape, businesses must be vigilant and adaptable to avoid unintentional violations.

#3: Cost and Complexity of Data Privacy

The cost and complexity of implementing data privacy measures is the third significant challenge faced by data leaders. Many companies are facing increased focus on data privacy due to customer requests and requirements, regulations, and expanded internal access. Data breaches can result in significant financial and reputational damage to businesses, so leaders must prioritize data privacy as part of an overall data management strategy.

Employing data privacy measures can be costly and complex. There are several factors to consider, such as data classification, authorization and access controls, encryption, and data retention policies. In most cases, budgets aren’t rising to keep up with security maintenance costs, forcing data leaders to balance the need for privacy with available resources. Despite the challenges, businesses must prioritize implementation to protect customers’ personal information and maintain trust.

The Benefits of Solving Data Management Challenges through Data Modernization Services

If you ask twenty people in the tech industry what data modernization means, you will likely get twenty different answers. While no two companies use data precisely the same way, some concepts and philosophies do serve as foundations of data modernization and transformation.

OneNeck understands data transformation, when broken down to its most basic elements, centers around collecting, transforming and storing data through utilizing modern services and consuming it in an automated manner. To achieve this, we base our data modernization services on five necessary technologies: The cloud, active metadata, automation, advanced analytics and artificial intelligence (AI) and machine learning (ML).

Businesses must ensure their data is accurate, reliable, and easily accessible. Data modernization enables organizations to improve data management practices and make better-informed decisions. Microsoft Azure offers a variety of services and solutions to help companies address the afore-listed critical challenges.

Data Collection and Protection Solutions

In today’s digital era, data is arguably a business’s most valuable asset. It is essential to ensure data collection and protection solutions are in place to manage it efficiently.

Azure’s data storage solutions, such as Blob Storage, Data Lake Storage, SQL Database, Cosmos DB (NoSQL) and Azure Synapse Analytics, provide scalable and cost-effective options for storing and analyzing large amounts of data. Blob Storage is ideal for storing unstructured data, such as images, videos, and documents, while Data Lake Storage is suitable for big data scenarios. SQL Database offers a fully managed relational database service that provides high performance and availability with built-in security features. Cosmos DB is a multi-model NoSQL store. Azure Synapse Analytics is a fully integrated service for ingesting and curating data, making it available for consumption via Power BI.

Besides data storage solutions, Azure offers robust data protection services to help businesses safeguard data against cyber threats. Azure Security Center delivers a centralized platform for managing and monitoring security across Azure, hybrid cloud environments, on-premises and various cloud platforms. Security Center also provides recommendations and threat intelligence to help organizations stay ahead of evolving threats.

Additionally, Azure’s sophisticated threat protection capabilities, such as Azure Advanced Threat Protection (ATP), help businesses detect and respond in real-time before they cause significant damage. Azure ATP provides cutting-edge security features, including behavioral analytics, machine learning, and threat intelligence.

Regulatory Compliance

Azure offers a range of compliance and governance tools to help businesses stay compliant and reduce the risk of penalties or legal action. Azure Policy creates, assigns, and manages compliance policies across Azure resources and ensures companies meet regulatory standards by automatically auditing resources for policy compliance and flagging violations.

Furthermore, Azure provides a range of compliance certifications, including ISO, SOC, HIPAA, and GDPR, that help organizations demonstrate compliance. Azure’s compliance certifications assure customers their data is managed and protected following regulatory requirements and industry standards.

Azure provides a single platform to amass data, ensuring data management practices comply with the latest regulations and standards. Businesses can streamline their compliance efforts and reduce the complexity of managing regulatory requirements. This all-in-one solution reduces the risk of costly penalties, legal action and damage to a company’s reputation.

Ensuring Privacy

Privacy-enhancing technologies are a staple of Azure. Utilizing Azure organizations can better protect sensitive data, prevent data breaches and leaks, and comply with privacy regulations, all while leveraging big data analytics and machine learning benefits.

One of the critical privacy solutions is Azure Information Protection (AIP). AIP enables businesses to classify, tag, and protect data. With AIP, companies apply labels to sensitive data that determine who can access it and how it can be used, enabling controlled access to sensitive data and preventing breaches and leaks.

Additionally, Azure Purview provides advanced data governance capabilities. Purview enables businesses to discover, classify, and manage data assets across hybrid cloud environments. Purview creates a comprehensive inventory of data assets, allowing organizations to protect sensitive information more efficiently, comply with regulations, and optimize data storage and usage.

Partnering for Success: Meeting Your Modern Data Management Challenges

Data modernization is a critical process for any organization looking to unlock the full potential of its data assets. Effective execution requires extensive planning, expertise, and the right tools. Through Microsoft Azure’s comprehensive suite of data management and analytics tools, combined with the knowledge and insights of an experienced cloud solutions provider like OneNeck, your organization can accelerate modernization and transformation initiatives, enabling greater efficiency, agility, and competitiveness.

At OneNeck, we are a trusted partner with extensive experience in data architecture and a Microsoft Gold-level Cloud Service Provider. Our IT proficiency ensures your organization navigates complexities, reduces technical commitments, and achieves maximum ROI from your data. If you’re ready to unlock the power of your data and modernize your data management infrastructure, contact us today to schedule a consultation and see how we can guide you to data modernization success.

grey line

]]>
How Microsoft Adoption Score Can Reveal Unexplored Benefits https://www.oneneck.com/blog/find-hidden-gems-with-microsoft-adoption-score/ Fri, 03 Mar 2023 19:15:12 +0000 https://www.oneneck.com/?p=3683 The Microsoft Adoption Score helps organizations understand how effectively their employees use Microsoft 365 (M365) tools. The score measures the level of adoption of M365 products and services and provides a data-driven view of how well employees use the tools to get work done. We’ll explore the Microsoft Adoption Score and how to interpret the […]]]>

The Microsoft Adoption Score helps organizations understand how effectively their employees use Microsoft 365 (M365) tools. The score measures the level of adoption of M365 products and services and provides a data-driven view of how well employees use the tools to get work done. We’ll explore the Microsoft Adoption Score and how to interpret the results to find available hidden gems already waiting for utilization.

What is the Microsoft Adoption Score?

Microsoft Adoption Score is a productivity and collaboration analytics tool measuring employees’ adoption of M365 products and services. The score is based on predefined parameters that track engagement and usage of M365 tools such as Outlook, Teams, SharePoint, OneDrive and more. Microsoft explicitly states that all insights are calculated using data at the organizational level, NOT the individual level.

To enable the Adoption Score, perform the following steps:

  1. Sign into the Microsoft 365 admin center as a Global Administrator and go to Reports > Adoption Score
  2. Select “Enable Adoption Score.” It can take up to 24 hours for insights to become available.

The score presents itself in a graphical form, with a maximum score of 100 points. The higher the score, the more effectively employees use M365 tools to collaborate and complete work.

Microsoft Adoption Score Results shown in graphical form

 

Microsoft Adoption Score Calculation

Calculated based on a set of eight parameters, split into two categories:

People Experiences​

Focuses on five categories that quantify how effectively an organization works​ with M365.

  1. Communication– Assess how users find and share information through emails, chats, and shared community posting to unify an organization, regardless of location.​​
  2. Content collaboration– Learn how organizations create, read, and collaborate on cloud-based content.
  3. Mobility– Get insights into how employees access files and utilize Outlook and Microsoft Teams across all platforms.
  4. Meetings– See how an organization leverages meeting best practices to help improve the quality of discussions and what types of meetings.
  5. Teamwork– Examine uses of shared workspaces like SharePoint team sites, group mailboxes, and Microsoft Teams to collaborate and share information.

Technology Experiences

Focuses on three categories to help enable user experiences and achieve digital transformation goals.

  1. Endpoint analytics– Examines how performance and health issues with endpoint hardware and software impact an organization while providing recommended actions for remediation.​​
  2. Network connectivity– Gain visibility into factors affecting networks, paired with suggestions to address problem areas, enabling organizations to identify quickly and remedy network issues.
  3. Microsoft 365 apps health– Get insights into how many devices have the latest productivity and security features by being on the recommended monthly channels for M365 Apps.

Adoption sCore parameters displayed in two column chart

Why is the Microsoft Adoption Score Important for Businesses?

The Adoption Score provides a data-driven view of how effectively employees utilize tools to get their work done. Some of the benefits provided by the Adoption Score include:

  • Measure ROI– Gauges organizational ROI of Microsoft 365. By tracking how effectively employees use the tools, businesses can determine whether they are getting value for their investment.
  • Identify Adoption Challenges– Assists organizations in identifying where users may need more training or support, allowing for targeted training and support.
  • Improve Collaboration and Productivity– Providing insights into how employees use Microsoft 365 and identifies areas where cooperation is low.
  • Increase Security– Helps organizations ensure that employees use MS365 securely by providing targeted training and support.
  • Enhance User Experience– Identifies tools causing user frustration or being utilized ineffectively, allowing organizations to address these issues.
  • Drive Digital Transformation– Drive digital transformation via the adoption of MS365 tools. Organizations can set adoption goals and track progress.
  • Facilitate Decision-Making– Provides insights into how employees collectively use MS365 tools. Organizations can use this data to decide which tools to invest in, which to retire and how to allocate resources.

Maximize the Microsoft 365 Experience

Ultimately the point of the Microsoft Adoption Score is not to maximize the results simply for the sake of achieving a high score. Rather, the intent is about genuinely finding the value in your licensing.

Altering user behavior is hard, very hard. Microsoft would undoubtedly like an organization to view its Adoption Score and attempt to improve across the board. Changing anything is difficult. Changing everything is impossible. The most effective way for an organization to use the Adoption Score is to analyze the data and determine one or two areas where it can focus on positively impacting productivity and efficiency. For example, while saving a couple minutes on meetings by better-utilizing Teams may seem like an insignificant improvement, the benefits quickly add up when applied organization-wide.

Saving Your Organization 5 Minutes with OneNeck

OneNeck is a Microsoft Gold Cloud Service Provider offering a broad range of solutions for organizations looking to optimize their use of Microsoft 365. Our services include consulting, implementation, and ongoing support to help organizations maximize their M365 investment.

OneNeck’s value is in its ability to help organizations identify “hidden gems” within their M365 then translate that knowledge into actionable improvements. We are looking at adoption scores across hundreds of our customers, seeking nuggets of information and common themes, to help you save five minutes a day or more! Our experienced team is designed to help organizations save time, reduce costs, and get maximum value from their Microsoft 365 licenses.

Are you ready to get the most from your M365 investment? Contact us today to speak with one of our Microsoft experts.

grey line

]]>
What Data Modernization Looks Like in 2023 https://www.oneneck.com/blog/what-data-modernization-looks-like-in-2023/ Fri, 17 Feb 2023 23:16:03 +0000 https://www.oneneck.com/?p=3621 Data modernization— specifically, data-first modernization—is central to successful digital transformation. With data growing at an explosive rate, businesses need more efficient ways to manage it and new ways to use it to glean deeper insights that can help fuel growth. Organizations that adopt a data-first approach and harness the power of today’s new technologies are […]]]>

Data modernization— specifically, data-first modernization—is central to successful digital transformation. With data growing at an explosive rate, businesses need more efficient ways to manage it and new ways to use it to glean deeper insights that can help fuel growth.

IDC Prediction

Organizations that adopt a data-first approach and harness the power of today’s new technologies are 20 times more likely to beat their competitors and 11 times more likely to exceed their revenue goals by 10% or more. Here’s why.

Why Is Data Modernization Important?

Data modernization is the process of converting data into a form that is easier to access, manage, and use. It eliminates silos and unlocks the value of data to enable faster decisions and better insights. Data modernization helps businesses achieve the scalability, agility, and speed they are looking for in cloud solutions.

Data modernization involves migrating data from legacy systems to a modern, often cloud-based, solution and merging data from disparate sources into one database to create a single source of truth. First, the data must be cleaned up, unified, and normalized across all fields and records. Then, it can be imported into the new system.

What Is Data-first Modernization?

Data-first modernization is a business strategy rather than a process. An organization that takes a data-first modernization approach understands that data is its primary asset. Putting data at the forefront generates valuable insights that drive better decision-making.

With data-first modernization, businesses can extract value from all their data, regardless of where it lives—whether on the edge, in a data center, or in the cloud. Companies can then leverage technologies, such as advanced analytics, to generate intelligence that accelerates business.

5 Important Technologies for Achieving Data Modernization

Many new technologies are driving data modernization in today’s business landscape. This shortlist summarizes the top five.

The Cloud

The Cloud offers a golden opportunity for businesses looking to move away from legacy technologies and on-premises data centers. Companies that adopt cloud solutions not only reduce the total cost of ownership (TCO) associated with IT infrastructure but also gain tremendous flexibility and scalability.

Modern cloud providers offer a full range of services that include Software-as-a-Service (SaaS) solutions, cloud-based storage and processing, and data modernization capabilities. The cloud enables businesses to take advantage of powerful new technologies, such as big data, advanced analytics, and artificial intelligence (AI).

Active metadata

If metadata is data about data, then what is active metadata?

Active metadata provides context that gives details about everything that is done to the data. It provides additional information that enables organizations to discover, categorize, maintain, use, and govern their data.

Metadata must be generated, assembled, and indexed continuously whenever data is created, updated, or moved. As the volume of data grows, so does metadata. This makes it crucial for businesses to replace traditional metadata management tools with a modern active metadata management solution that continually collects and analyzes metadata and creates intelligence from it.

Automation

Manual routine tasks make employees’ jobs boring and lead to fatigue, which increases the chance of human error. But with modern digital tools, businesses can automate those repetitive tasks and ensure greater accuracy. Automation frees up time, allowing employees to focus on more critical endeavors like business intelligence and data analysis.

But automation isn’t just for routine tasks. Companies can also automate complex business processes. For example, active metadata management can be automated using APIs.

Advanced analytics

Advanced analytics is a broad term that refers to three separate, but related, technologies: predictive analytics, prescriptive analytics, and artificial intelligence.

Predictive analytics uses data to create models of possible future scenarios. Leaders can then use these models to choose the best course of action, whether immediate or long-term. Prescriptive analytics uses algorithms to evaluate data and recommend ways to optimize business processes to achieve desired outcomes. It can identify the cause of bottlenecks and other problems and show how making strategic changes would improve various aspects of a business.

Artificial intelligence and machine learning

The most advanced type of analytics—artificial intelligence—includes machine learning (ML). AI differs from predictive and prescriptive analytics in three ways: it is capable of learning, evolves over time, and understands natural language.

AI and Machine Learning are Top IT Priorities

AI and ML work hand in hand to drive business by providing convenience, accessibility, automation, and efficiency—all of which lead to greater productivity and better user experiences. Together, AI and ML can rapidly analyze large volumes of data, find connections between multiple data sets, and identify patterns and anomalies. Because AI can make decisions faster and more accurately than humans, it saves companies considerable time and money.

Data Modernization Fuels Business Growth

Data modernization fuels every digital transformation initiative, enabling organizations to gain valuable insights from their data. OneNeck IT Solutions offers advanced technologies like Azure Data Analytics that can help your business achieve a competitive edge.

Contact us to learn more about how OneNeck can help you scale your business and maximize performance.

grey line

Frequently asked questions…

What is the goal of data modernization?

The goal of data modernization is to transform traditional data architectures and processes into modern, more agile, and efficient ones that can support the growing demand for data-driven insights and decision-making. Data modernization involves migrating data from legacy systems to modern platforms, implementing advanced data analytics and machine learning capabilities, adopting cloud-based technologies, and ensuring data security and compliance.

What is advanced analytics vs analytics?

Analytics refers to the process of examining data to draw conclusions or insights about past events or trends. Advanced analytics, involves using complex and sophisticated techniques such as data mining, machine learning, predictive modeling, and artificial intelligence to analyze data and make predictions or recommendations. Advanced analytics allows organizations to gain deeper insights and achieve more accurate predictions, optimize business processes, reduce risks, and identify new opportunities.

What is difference between machine learning and artificial intelligence?

Artificial intelligence (AI) involves creating intelligent machines that can simulate human cognitive processes such as learning, reasoning, and problem-solving. Machine learning (ML) is a subset of AI that involves training computer algorithms to learn patterns in data, make predictions, and improve their performance over time without being explicitly programmed.

What is Azure Data Lake?

Azure Data Lake is a cloud-based storage and analytics service provided by Microsoft that enables businesses to store and analyze large amounts of structured, semi-structured, and unstructured data. It allows users to store data of any size, shape, and speed easily and securely, and perform powerful analytics and processing tasks.

]]>
Managed Threat Detection & Response: Prevent Cyberattacks https://www.oneneck.com/blog/managed-threat-detection-and-response-get-ahead-of-cyberattacks/ Thu, 16 Feb 2023 20:04:21 +0000 https://www.oneneck.com/?p=3613 With 70% of breaches today originating at endpoints—such as servers, laptops, Internet of Things (IoT), and mobile devices—it’s increasingly important for organizations to implement a robust security strategy like managed threat detection and response to protect against threats. But navigating the threat detection and response solutions landscape can be confusing, especially for businesses that lack […]]]>

With 70% of breaches today originating at endpoints—such as servers, laptops, Internet of Things (IoT), and mobile devices—it’s increasingly important for organizations to implement a robust security strategy like managed threat detection and response to protect against threats. But navigating the threat detection and response solutions landscape can be confusing, especially for businesses that lack deep cybersecurity expertise.

This article describes two popular approaches to threat detection and response and helps you choose the right one for your business.

What Is Managed Threat Detection and Response?

Managed detection and response (MDR) is an outsourced cybersecurity solution offered by a managed security serviceMDR-callout provider (MSSP). MDR comprises a

comprehensive array of network, host, and endpoint security tools that perform ongoing monitoring to identify and respond to threats pre-emptively. MSSPs also provide specialized cybersecurity expertise.

What Is MDR vs. EDR?

Unlike MDR, which is a service, endpoint detection and response (EDR) is a cybersecurity platform that helps organizations identify and respond to threats that target vulnerable, network-connected endpoints. The biggest difference between EDR and MDR is scale.

  Benefits Best for organizations that… May not be ideal for organizations that…
EDR
  • Protection against many cyberattacks
  • Visibility into the attack surface
  • Artificial intelligence to analyze logs
  • Forensics to investigate attacks
  • Use standalone anti-virus or anti-malware solutions to protect endpoints
  • Use few, if any, cloud solutions
  • Have skilled, in-house security personnel to handle high alert volumes
  • Use cloud solutions extensively
  • Lack skilled, in-house security personnel to handle high alert volumes
MDR
  • Turnkey 24/7/365 threat-hunting and critical incident response services
  • Comprehensive tools that are costly to buy
  • Expert support
  • Use cloud solutions extensively
  • Need robust threat protection
  • Have a large team of highly skilled, in-house security personnel who can perform ongoing threat detection and response across all endpoints, networks, and cloud implementations

Managed Detection and Response Addresses Common Security Threats

To manage threats effectively, organizations first need to know what kinds of threats MDR can help mitigate. This list covers the most common types.

Ransomware

Ransomware is malware that attacks a computer, network, or server. Malicious software locks the victim’s device, then a cybercriminal demands payment to restore it.

cost-of-ransomware

Phishing

Phishing attacks target individuals using social engineering methods, such as email, phone, texting, and social media. They aim to manipulate the recipient into revealing sensitive information like their password or credit card number. Some phishing attacks install viruses on the victim’s device.

Denial of Service

Denial-of-Service (DoS) attacks target organizations with the goal of disrupting business operations by inundating a network or server with spam requests. When the target becomes overwhelmed, necessary business services become unavailable, so employees can no longer perform their tasks. Although DoS attacks rarely exploit ransomware, the disruption they cause can be costly.

A Distributed Denial-of-Service (DDoS) attack is a more serious type of DoS attack. Here, multiple machines overload an edge network device—such as a router or switch—rather than targeting a server.

Man in the Middle

Man in the Middle (MitM) refers to a category of identity-based cyberattacks in which a bad actor surreptitiously eavesdrops on an online communication between a client and a server. The most common MitM attack exploits vulnerabilities in the victim’s browser to inject malware into their device. Cybercriminals commonly use MitM attacks to capture sensitive financial data in real time by intercepting traffic between a user and a banking website.

Other cybersecurity threats

Today’s cybersecurity environment includes many other dangers, including blended threats that leverage multiple methods and previously unseen zero-day threats.

As the IT perimeter continues to blur, organizations need to stay ahead of threats, such as

  • Sophisticated mutating software
  • Advanced persistent threats (APTs) that gather intelligence through surveillance
  • Cloud vulnerabilities
  • Web application attacks, such as a SQL injection (SQLI)
  • Supply chain attacks that target trusted relationships and third parties
  • Spoofing attacks disguised as legitimate websites and email addresses

How to Get the Protection You Need

OneNeck partnered with Fortra’s Alert Logic to bring together a powerful set of capabilities that ensure businesses get all the security protection they need:

  • The Platform—Provides comprehensive security coverage, regardless of whether your workloads are in one or many clouds, containers, serverless, or on premises
  • The Intelligence—Includes dozens of seasoned security researchers, data scientists, and engineers with vast industry experience
  • The Expertise—Fortra’s 150 skilled security operations center (SOC) analysts partner with OneNeck’s security experts, who act as your point of contact. As your managed services provider, we understand your IT environment and are committed to keeping it safe.

Let Fortra’s Alert Logic and OneNeck Protect Your Network

No organization is too small to experience a breach. Make sure you don’t become a victim.

Do you need a better security strategy for the cloud or expert security talent to help protect your IT infrastructure? Or maybe you just want to reduce your total cost of ownership (TCO)?

Together, One Neck and Fortra’s Alert Logic can help you implement a managed threat detection and response strategy that provides comprehensive security in today’s risky IT landscape.

Contact us to learn how you can protect against threats in real time.

grey line

Frequently asked questions…

Does MDR replace SIEM?

Managed Detection and Response (MDR) and Security Information and Event Management (SIEM) are both security solutions, but they serve different purposes and are not direct replacements for each other. SIEM is primarily focused on log management, correlation, and event analysis to provide a comprehensive view of security threats, while MDR is a more proactive solution that combines threat intelligence, behavior analytics, and expert analysis to detect and respond to advanced threats.

What’s the difference between MSP and MSSP?

Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) both provide managed services to clients, but their focus areas differ. MSPs primarily provide managed services for IT infrastructure and operations, while MSSPs specialize in managed security services, such as threat detection, incident response, and compliance management. MSSPs typically offer a broader range of security-focused services and have more specialized expertise than MSPs.

Is EDR the same as antivirus?

Endpoint Detection and Response (EDR) and antivirus (AV) software are both security solutions that protect against malware and other threats, but they have different approaches and capabilities. AV software uses signature-based detection to identify known threats and prevent them from infecting the system, while EDR is a more advanced solution that uses behavior-based analysis and machine learning to detect and respond to both known and unknown threats.

What is endpoint security?

Endpoint security refers to the practice of securing endpoints, such as desktops, laptops, smartphones, servers, and other network-connected devices, from cyber threats. The goal of endpoint security is to protect these endpoints from unauthorized access, data theft, malware, and other types of cyberattacks by using a combination of technologies, tools, and policies to detect, prevent, and respond to threats.

 

]]>
What is Patch Management? https://www.oneneck.com/blog/what-is-patch-management/ Mon, 13 Feb 2023 20:51:17 +0000 https://www.oneneck.com/?p=3601 What is Patch Management? Patches are software and operating system updates that address security vulnerabilities and are used to keep all digital assets up to date. On an individual level, patch management is fairly straightforward. A vulnerability is discovered, a patch is developed and then run by the end-user when time allows or performed via […]]]>

What is Patch Management?

Patches are software and operating system updates that address security vulnerabilities and are used to keep all digital assets up to date. On an individual level, patch management is fairly straightforward. A vulnerability is discovered, a patch is developed and then run by the end-user when time allows or performed via the system’s auto-update feature.

Scaling up to an organizational level, however, significantly increases complexity, and efficient patch management becomes a necessity. Systems today are interconnected, and changes or downtimes in one area can have unforeseen and unintended effects throughout an organization. Because of these factors, many businesses struggle to implement company-wide patching, leaving themselves vulnerable to cyber attacks or other disasters.

Importance of Patching

Patching foremost helps secure computer systems and servers against potential security threats. Cybercrime is a problem all organizations face, and malicious actors constantly search for new ways to exploit known vulnerabilities. A report from Positive Technologies shows 31% of companies have detected attempts to exploit software vulnerabilities.

Organizations can close security gaps by regularly applying patches and preventing attackers from accessing sensitive data or compromising systems. While neglecting to promptly patch systems leaves them vulnerable to cyberattacks, data breaches, loss of sensitive information or financial damage. According to a Ponemon survey, unpatched vulnerabilities were involved in nearly 60% of data breaches.

Patching also helps maintain the stability and compatibility of software systems. Many patches include fixes for bugs and other issues that can cause the software to crash or behave unexpectedly. Patching ensures that software remains functional and uninhibited by errors, reducing the risk of downtime and the need for costly technical repair.

In addition to resolving bugs and security issues, patching often provides access to new features and enhancements. Software vendors regularly release updates that add new functionality. Organizations can utilize these improved features to enhance their workflow.

Finally, patching is essential for compliance with various regulatory requirements. Many industries are subject to strict regulations and standards that require the protection of sensitive information and consistent maintenance of technical environments. By regularly patching systems and servers, organizations can demonstrate their adherence to these regulations and avoid potential legal penalties.

Common Problems with Patch Management

While the benefits of patching are pretty straightforward, many organizations face challenges in implementing a consistent approach to patch management. There are several reasons why system-wide patch management is problematic for businesses, including:

Complex IT Environments­­

Many organizations have complicated IT environments, with a variety of systems, servers, and applications running on multiple platforms. This inherent complexity makes tracking which systems need patching and when challenging. Additionally, older systems and applications may not be compatible with all patches, making it difficult for organizations to maintain security and stability.

Patch Testing & Review

Before applying any patch, organizations must review all new releases alongside their accompanying notes and run tests to ensure updates won’t trigger compatibility issues with existing systems. This process is time-consuming and resource-intensive, especially for larger organizations with expansive IT environments.

Downtime Concerns

Applying patches often requires systems to be offline for a period of time. This downtime can potentially lead to a temporary loss of productivity and revenue. Because of this concern, patching is often pushed to non-typical business hours, forcing IT staff to work overnight or during weekends.

Resource Limitations

Many organizations have limited IT resources, making it challenging to prioritize patching in the face of other pressing demands on time and within budget.

The difficulty in patching for businesses is often due to a combination of these factors, including the sheer volume of systems and applications that need to be maintained and the need to balance security and stability with the demands of day-to-day operations. Despite these challenges, organizations must prioritize patching and adopt effective strategies for maintaining their systems.

Outsourcing Patch Management

Outsourcing patch management can be an effective solution for organizations that lack the expertise or resources to manage this process in-house. By working with an experienced vendor, organizations can ensure their systems are secure and up-to-date while freeing up internal resources to focus on other important tasks and initiatives. A business might choose to outsource patch management for numerous reasons:

Lack of In-house Expertise

Organizations may not have the technical expertise or resources to manage patching effectively. By outsourcing patch management, a business gains access to the skills and know-how of a partner specializing in this area.

Reviews, Tests and Validation

Review of release notes for all pertinent information and testing the effects of each patch are essential steps. An organization tackling this on its own will undoubtedly find the process both demanding and laborious. Enlisting external assistance speeds up validation and likely reduces cost.

Time and Staff Usage Reduction

Outsourcing patch management helps organizations save time and reduce expenditures by eliminating the allocation of internal staffing resources, thus freeing their IT teams to focus on more strategic projects and initiatives.

Improved Efficiency and Security

Organizations can benefit from a partner’s streamlined processes and automated tools, helping to reduce downtime and ensure patches are applied consistently and punctually.

Access to Best Practices

An experienced patch management vendor can bring best practices and expertise that an organization might not have access to otherwise.

Compliance

Many industries have strict regulations regarding data and systems security. By outsourcing patch management, organizations can ensure that they meet these protocols and maintain compliance with industry standards.

The benefits, especially for small and mid-sized businesses, of obtaining outside assistance with patch management go beyond those listed above. Engaging a partner to perform patch management allows for a patching timetable that compliments an organization’s production environment. Additionally, an experienced partner works with multiple clients, meaning well-rounded, real-world experience and the ability to adapt whenever necessary.

OneNeck Has Your Back!

While patching may be time-consuming and complex, it is critical to ensuring your organization is safe and secure from cyberattacks. OneNeck is here to help with an experienced team that provides solutions for patching and any other aspect of systems management that your organization may require. We have extensive experience across multiple platforms and industries, allowing us to provide a right-fit solution for you.

Contact us today to speak with a member of our team, and learn more about our patch management services here.

Check out our Monthly Patching Blog series to keep up to date on the latest critical updates from our vendors.

 

Frequently asked questions…

Who is responsible for patch management? 

While patching is often the responsibility of the operations or infrastructure team, it is a process that involves everyone in the organization.

What is a patch management plan? 

Patch management is the process for identifying, acquiring, testing, installing and verifying software and/or firmware updates. An effective patch management plan ensures all identified system components are the latest version supported by a vendor.

How do I create a patch management plan? 

Creating a patch management plan is accomplished by developing a process that performs necessary patching in a consistent and timely manner. Organizations must identifies updates, review release notes, test for system compatibility and perform installs with minimal disruption to operations.

Is patch management a part of cybersecurity? 

Patch management is an essential aspect of an organization’s cybersecurity posture. Unpatched software applications or operating systems are a prime cause of security breaches.

 

]]>
ESXiArgs Ransomware Targets VMware Vulnerability https://www.oneneck.com/blog/esxiargs-ransomware-targets-vwware-vulnerability/ Fri, 10 Feb 2023 18:08:14 +0000 https://www.oneneck.com/?p=3587 ESXiArgs Ransomware – How to Protect Your Organization In case you haven’t heard by now, the recently discovered ESXiArgs ransomware attack is quickly becoming a big deal. It has impacted thousands of servers worldwide, specifically targeting nearly ubiquitous VMware ESXi hypervisor and ESXi servers, and as such, VMware has issued a critical alert regarding this […]]]>

ESXiArgs Ransomware – How to Protect Your Organization

In case you haven’t heard by now, the recently discovered ESXiArgs ransomware attack is quickly becoming a big deal. It has impacted thousands of servers worldwide, specifically targeting nearly ubiquitous VMware ESXi hypervisor and ESXi servers, and as such, VMware has issued a critical alert regarding this vulnerability.

The vulnerability allows attackers to execute malicious code on the affected systems and potentially compromise sensitive data. The attacks are purportedly targeting servers that have remained unpatched against a vulnerability first revealed in 2021. The vulnerability specifically affects the OpenSLP service in older versions of ESXi and can be exploited to enable the remote execution of code to enable Command and Control (C2).

VMware released a statement declaring they have found no evidence that the attack disseminating the ransomware is from an unspecified vulnerability (0-day). Rather, the attack bases itself on a previously known vulnerability (CVE-2021-21974) disclosed and addressed by VMware on 23 February 2021. They add that thus far, only significantly out-of-date products or those already reaching End of General Support (EOGS) have been affected or are believed to be potentially vulnerable.

VMware Recommendations to Protect Against the Vulnerability

VMware advises all customers to upgrade to the latest supported releases of vSphere components to address these currently known vulnerabilities. In addition, VMware has recommended disabling the OpenSLP service in ESXi. OpenSLP has been disabled by default since 2021, beginning with ESXi 7.0 U2c and ESXi 8.0 GA.

Long-term Protection Against Ransomware

Incidents involving ransomware continue to accelerate, doubling the number of attacks from 2021 to 2022. This trend is a cause for concern for businesses and organizations, as they risk losing sensitive information and experiencing costly downtime. The good news is that there are steps organizations can take to protect themselves against ransomware attacks. These steps include implementing an effective patch management system, having efficient and accessible Disaster Recovery (DR) backups and developing incident response (IR) plans.

  • Patch Management– One of the principal ways organizations can protect themselves against ransomware attacks is by promptly patching and updating their systems. Upon identification, vulnerabilities in software become a target for cybercriminals, who can exploit these weaknesses to launch attacks. According to a study by the Ponemon Institute, 57% of cyberattack victims report their breaches could have been prevented by installing an available patch (i.e., ESXiArgs ransomware), with 34% of those victims knowing of the vulnerability but failing to take action. Organizations must keep their systems up to date with the latest security patches. Unfortunately, neglecting patching systems is an all too common practice, making it extremely important for organizations to prioritize this aspect of their IT hygiene.
  • Disaster Recovery– Another critical aspect of protecting against ransomware attacks is having reliable DR backups. A robust DR plan helps companies mitigate the impacts of a ransomware attack by providing a roadmap for quickly and effectively responding to the incident. DR plans may also include steps to prevent the ransomware spread, restore data and systems from backups, and ensure business continuity. A well-designed DR backup plan can also provide companies with the means to recover their data and systems without paying the ransom, reducing the risk of becoming a repeat target for cyber-criminals. By neglecting DR, companies put themselves and their operations at significant risk, often leading to costly financial impacts.
  • Incident Response– Having an IR plan is a fundamental component of cybersecurity protection. This detailed set of procedures outlines the steps a company should take in the event of a security incident, including ransomware attacks. IR plans provide a clear and concise roadmap for responding to security incidents, including guidelines for identifying and containing the attack, recovering data and systems, and preventing future incidents. Thus, companies can minimize the risk of confusion and delays, further exacerbating an already stressful situation. IR procedures also help ensure that all stakeholders, including IT and security personnel, management, and other key employees, are aware of their roles and responsibilities in the event of an attack.

Additionally, a detailed IR strategy helps companies quickly and effectively contain the ransomware attack and prevent its spread to other systems and networks. This decisive action helps reduce the attack’s impact and minimize the risk of data loss. The plan can also assist companies in reclaiming their data and systems via the above-mentioned disaster recovery backups, allowing for the restoration of normal operations with minimal downtime or financial impact.

Protecting Your Organization with OneNeck

Protecting your organization from cyberattacks, including ransomware, is a complex process that requires significant time, staffing and financial resources. For many, the most effective and cost-efficient way to meet these demands is by working with an experienced partner.

OneNeck’s managed backup and disaster recovery services guarantee quick recovery of critical data, minimizing downtime and, most importantly, keeping your business up and running. Our experienced team will monitor and manage your backup solution, protecting your data and ensuring it runs efficiently. Our DR services set up, manage and test recovery solutions to ensure your organization is fully protected when a disaster occurs.

OneNeck’s incident response plans are carefully designed, real-world-tested and updated to fit organizational needs. We help revise existing IR plans or write new ones from scratch, evaluate existing procedures, and lead tabletop exercises to test resiliency. Each engagement reduces the risk of confusion, delay, and further damage while ensuring a quick and effective response that protects your data, systems, and operations.

Patching is critical to ensuring any organization’s security and safety. Though simple in concept, the execution of patching activities is often neglected due to its complex and time-consuming nature. OneNeck’s experienced team provides patch management solutions alongside comprehensive systems management. We have extensive knowledge across numerous industries and platforms, allowing us to provide solutions tailored to your organizational needs and allowing your staff to remain focused on mission-critical business activities.

Contact Us today to speak with a member of our experienced team to help secure your organization against the ESXiArgs ransomware attack and ensure ample preparation for future incidents.

grey line

Frequently asked questions…

What is OpenSLP used for in ESXi?

In ESXi, OpenSLP is utilized to enable the discovery of other ESXi hosts and vCenter Servers, as well as for integration with various management tools that use OpenSLP for resource discovery and management.

Does ransomware affect ESXi?

ESXi, as a bare-metal hypervisor, is less susceptible to ransomware attacks compared to traditional operating systems as it has a smaller attack surface and lacks direct user access. However, ransomware attacks can still potentially compromise ESXi hosts through vulnerabilities in the management interfaces or by encrypting virtual machines running on the hosts.

Is ESXi secure?

ESXi is designed with security in mind and includes various security features, such as secure boot, lockdown mode, role-based access control, and encrypted VMotion, to protect against threats. However, as with any software, there may be vulnerabilities that could be exploited. It is crucial to regularly apply security patches and updates and follow security best practices to ensure the security of ESXi hosts and virtual machines.

Can ransomware affect VMware?

Yes, ransomware can affect VMware environments by encrypting virtual machines, disrupting operations, and potentially spreading to other hosts and VMs. It is crucial to have proper security measures, such as network segmentation, access control, and backups, in place to protect against such attacks, and to regularly update and patch VMware products to address any security vulnerabilities.

 

]]>
GLBA Audit for Educational Institutions https://www.oneneck.com/blog/glba-audit-for-educational-institutions/ Tue, 07 Feb 2023 16:28:12 +0000 https://www.oneneck.com/?p=3554 What the GLBA Audit Includes and How to Navigate the Pre-Audit Process   The  Gramm-Leach-Bliley Act (GLBA) is longstanding United States law that includes provisions protecting the privacy of consumers’ financial information. The GLBA applies to all institutions offering consumers financial products or services. The U.S. Department of Education Federal and Student Financial Aid Office […]]]>

What the GLBA Audit Includes and How to Navigate the Pre-Audit Process

 

The  Gramm-Leach-Bliley Act (GLBA) is longstanding United States law that includes provisions protecting the privacy of consumers’ financial information. The GLBA applies to all institutions offering consumers financial products or services. The U.S. Department of Education Federal and Student Financial Aid Office has asserted that Title IV Institutions of Higher Education are considered “financial institutions” and thus subject to the GLBA.

In October 2021, the FTC announced revised provisions of the Safeguards Rule requiring non-banking financial institutions, such as institutes of higher education, to develop, implement and maintain a comprehensive security system to keep their customers’ information safe.

Successfully enacting these provisions is critical for passing a GLBA audit. Initially set to take effect on December 9, 2022, a six-month extension was granted, pushing the deadline to June 2023.

Safeguards Rule

The Safeguards Rule instructs organizations to implement administrative, physical and technical protections as safeguards against cyberattacks, email spoofing, phishing schemes and similar cybersecurity risks. These provisions are where educational institutions will likely struggle to achieve and maintain compliance. Identifying and assessing risks, developing and maintaining an information security program and creating detailed incident response plans are a heavy drain on time, staffing and a school’s limited resources. Obtaining outside assistance in these areas is often a necessity.

GLBA Audit
GLBA Audit- Safeguards Rule updates for June 2023

GLBA Audit for Educational Institutions

With the June deadline fast approaching for institutions of higher education, it is imperative that schools not only understand what provisions auditors are examining but also how to prepare for the GLBA audit process. A proper pre-audit assessment demands action and input from multiple staff members, including those in the financial offices (Financial Aid Office, Registrar, etc.), security (both physical and digital) and others in information technology. Coordinating and performing such an undertaking will likely involve teaming with an experienced outside partner.

Your organization may already be employing some provisions, such as encryption of sensitive data, limiting and monitoring information access, as well as staff training on security and information security. If not, these practices should be part of your institution’s overall security program.

Other provisions, such as the designation of a qualified individual to oversee an institution’s information security program and the training of security personnel, are aspects that organizations must plan out based on available personnel. While the Safeguards Rule does mandate a qualified individual oversees the GLBA-required security program, this individual may certainly receive assistance (internal or external) in this management.

The provisions for which educational institutions will likely require outside assistance are the performance of risk assessment and the development of an IR plan as part of a comprehensive security program. Even if some aspects already exist within an educational organization, the scope and complexity of the GLBA requirements will likely exceed the time and resources available to a school’s IT staff. Engaging a knowledgeable partner who can perform a comprehensive pre-audit assessment and communicate effectively on risk and mitigation steps is highly recommended – and by doing so – completes one of the audit requirements.

Pre-Audit Risk Assessment

Performing a Risk Assessment should utilize industry-standard security frameworks such as the Center for Internet Security (CIS) Controls or NIST SP 800-171. Use of these frameworks, while not currently obligatory, does represent a best practice when preparing for any cybersecurity audit. The Student Financial Aid Office has suggested Title IV institutions consider using the NIST SP 800-171 framework for risk self-assessment. However, the simplicity of the CIS Controls framework is a viable option that may be a better fit for organizations with less robust security staff. The CIS controls are a straightforward set of 18 controls that provide actionable steps for minimizing data breaches and significantly reducing the risk of cyberattacks.

Using a chosen cybersecurity framework, like NIST or CIS Controls, institutions must conduct a risk assessment across all covered organizational units. Upon risk identification, concise documentation for each safeguard employed is necessary for tracking implementation progress. Risk assessments that meet auditor requirements will address the following:

  • Employee security training and management
  • Organizational vulnerabilities
  • Understanding of threats that might exploit those vulnerabilities
  • Creating concise documentation for the actions taken to mitigate all discovered risk

Security Program’s Incident Response Plan

While self-assessment helps identify risks and creates measures for eschewing them, breaches are always possible. Constructing a response plan for security events is vital to passing the audit. In the unfortunate but likely event that a breach occurs, it is critical to have an established plan to handle communications and coordinate investigation, containment and rapidly eradicate the attack. Auditors are looking for institutions to have a security program that includes a written IR plan providing for the following components:

  • Identification of types of incidents that could occur, such as data breaches, cyberattacks or natural disasters
  • Establishment of an IR team with specific roles and responsibilities
  • Procedures for identifying and responding to incidents, including steps for containment and mitigation, preservation of evidence, as well as notification to affected individuals, key stakeholders (including employees, students or parents) and regulatory authorities
  • Testing of the IR plan through scheduled drills and exercises
  • Periodic review and update of the IR plan that adapts to institutional changes or external threats
  • Recording of incidents, responses, outcomes and measures to prevent reoccurrence

Beyond the Assessment

Ultimately the goal is not just to pass the audit through a series of ‘check the box’ exercises but to truly secure data and infrastructure. The GLBA audit process is not just a one-time action but rather a long-term commitment to a series of best practices. To be done correctly requires significant resources and time and involves constant reassessment and adjustments to meet current and future risks.

OneNeck’s experienced team is here to help prepare for GLBA audit compliance and continue working with your technology team to allow your security posture to mature. Our pre-audit services include a requisite risk assessment of security controls that fall under GLBA, assistance documenting your security program and review or development of an IR plan that assists in accurately identifying processes and procedures in the event of an incident.

Contact us to speak to a member of our experienced security team today.

grey line

Frequently asked questions…

What happens if you violate GLBA?

Violating the GLBA (Gramm-Leach-Bliley Act) can result in severe penalties, including fines and legal action. The exact consequences depend on the severity of the violation and can range from monetary penalties to imprisonment for individuals found guilty of criminal violations.

What are the three key rules of GLBA?

Firstly, financial institutions must provide customers with privacy notices explaining how they collect and share customers’ personal information. Secondly, customers must be given the option to opt-out of having their information shared with non-affiliated third parties. Thirdly, financial institutions must implement appropriate safeguards to protect customers’ personal information.

Who does the GLBA Safeguards rule apply to?

The GLBA Safeguards rule applies to financial institutions, including banks, credit unions, securities firms, and insurance companies, as well as non-financial institutions, that receive or maintain personal information about customers of financial institutions in connection with providing services to those institutions.

What is the goal of the FTC Safeguards Rule?

The goal of the FTC Safeguards Rule is to protect consumers’ personal information held by financial institutions by requiring them to develop and implement comprehensive information security programs. The rule aims to ensure that financial institutions are taking appropriate measures to safeguard sensitive customer information from unauthorized access, use, or disclosure.

 

]]>
Microsoft CSP Self-Service Portal Available for Clients https://www.oneneck.com/blog/microsoft-csp-self-service-portal/ Thu, 19 Jan 2023 18:50:42 +0000 https://www.oneneck.com/?p=3444 Microsoft CSP Self-Service Portal for OneNeck Clients Microsoft continues to evolve the rules for ordering and changing licensing. Changes such as moving clients to one-year terms, charging a premium for monthly flexibility and enforcing the cancellation policy (can’t cancel an order after 168 hours) require OneNeck and clients to up our Microsoft licensing game. OneNeck […]]]>

Microsoft CSP Self-Service Portal for OneNeck Clients

Microsoft continues to evolve the rules for ordering and changing licensing. Changes such as moving clients to one-year terms, charging a premium for monthly flexibility and enforcing the cancellation policy (can’t cancel an order after 168 hours) require OneNeck and clients to up our Microsoft licensing game.

OneNeck continues to develop service offerings to help our clients navigate the world of Microsoft licensing and Azure. We have invested in a CSP self-service portal built on an industry-respected SaaS solution that gives our clients access to their licensing and enables them to see what they are using – whenever they want – following the Microsoft rules, of course.

CSP Self-Service Portal Basic Management Capabilities

The portal uses Azure Active Directory, so clients are in complete control of the usernames, passwords and permissions. OneNeck only needs to give access to the portal. The portal then uses Microsoft APIs to make changes to your subscriptions, following Microsoft rules. In the portal, clients can:

  1. Review licensing usage and licensing assignments
  2. Add additional seats to licensing subscriptions
  3. Order new licensing subscriptions
  4. Remove licenses for clients with Legacy subscriptions (nonprofit, government and academic)
  5. Assign licenses to end users
  6. Add admins to the portal with role-based access
  7. Review Azure consumption data within 24 hours of usage
  8. Review historical Azure consumption data 

Now Available for OneNeck Clients

Our CSP Self-service portal is now available for clients. If interested, please schedule an orientation meeting and get access today.

 

grey line

Frequently asked questions…

What does Azure directory do?

Azure Active Directory (Azure AD) is a cloud-based identity and access management service that provides authentication and authorization for users, groups, and applications across a variety of platforms and devices. Azure AD enables access external resources, such as Microsoft 365, the Azure portal, and thousands of other SaaS applications, in a centralized manner, providing a single sign-on (SSO) experience for users and enabling secure access to cloud-based and on-premises applications.

What is the difference between Active Directory and Azure AD?

Active Directory (AD) is an on-premises directory service used to manage user identities, computers, and other resources in a Windows domain environment, while Azure Active Directory (Azure AD) is a cloud-based identity and access management service that provides authentication and authorization for cloud-based and on-premises applications.

What is a Microsoft CSP?

A Microsoft Cloud Solution Provider (CSP) is a partner program that enables Microsoft partners to resell Microsoft cloud services such as Azure, Microsoft 365, and Dynamics 365 to their customers. CSP partners provide their customers with the services, support, and billing for Microsoft cloud solutions, allowing them to bundle Microsoft cloud services with their own offerings and provide a single point of contact for their customers.

What is the difference between Microsoft EA and CSP?

Microsoft Enterprise Agreement (EA) is a licensing program that allows organizations to license Microsoft software for multiple devices and users, typically for a three-year term, while the Cloud Solution Provider (CSP) program is a partner program that enables partners to resell Microsoft cloud services and provide services and support to their customers.

 

]]>
Recovery of Links Deleted by Defender ASR Update https://www.oneneck.com/blog/recovery-of-links-deleted-by-defender-asr-update/ Wed, 18 Jan 2023 20:08:09 +0000 https://www.oneneck.com/?p=3439 On January 13th, Microsoft released an update for Microsoft Defender that incorporated a change to the Attack Surface Reduction (ASR) rule known as “Block Win32 API calls from Office macro” in Configuration Manager and “Win32 imports from Office macro code” in Intune. The rule detects and blocks malware from using VBA macros to call Win32 […]]]>

On January 13th, Microsoft released an update for Microsoft Defender that incorporated a change to the Attack Surface Reduction (ASR) rule known as “Block Win32 API calls from Office macro” in Configuration Manager and “Win32 imports from Office macro code” in Intune. The rule detects and blocks malware from using VBA macros to call Win32 APIs. However, an unplanned inclusion in the Defender ASR update caused Microsoft Defender to exhibit a series of false positive detections. These detections resulted in the deletion of files matching the incorrect detection logic, primarily impacting Windows shortcut (.lnk) files, including shortcuts from the desktop, the Start menu, and the Windows Taskbar.

Impacted users

Microsoft has stated that all users who updated to security intelligence builds between 1.381.2134.0 and 1.381.2163.0 face potential impact.

However, Microsoft adds that there is no danger of impact for users who do not have the “Block Win32 API calls from Office macro” rule turned on in block mode or did not update to security intelligence update builds 1.381.2134.0, 1.381.2140.0, 1.381.2152 or 1.381.2163.0.

 

Steps for those affected

Impacted users will need both the updated security intelligence build and to run a secondary script to recover the start menu shortcuts.

Firstly, all users should update to build 1.381.2164.0 or later. Users employing automatic updates for Microsoft Defender do not need to take any additional steps, as the updated security intelligence build will be pushed out to them. However, enterprise customers managing updates must download and deploy the latest update across their environments. One important aspect of which to take note, the security intelligence build does not restore deleted files.

 

How to recover deleted shortcuts

Microsoft swiftly established the steps necessary for users to recreate start menu links for a substantial subset of the affected applications. Detailed instructions can be found here.

Microsoft also has provided additional guidelines for deploying the script using Microsoft Intune.

The latest updated script (Version 3.0) includes restores from Volume Shadow Copy Service by default, recovery of “.url” files in a user’s profile’s favorites and desktop directories, improvements for non-English language machines, as well as enhanced error handling. At this time, the script does not currently restore taskbar shortcuts, though Microsoft is continuing to work on a solution.

 

Manual recovery

Customers preferring to employ manual steps to resolve the issue may run the Application Repair functionality for programs such as Microsoft 365, Microsoft Edge, and Microsoft Visual Studio.

Instructions for Windows 10 and Windows 11 machines are as follows:

Windows 10:

  1. Start > Settings > Apps > Apps & features
  2. Select the app you want to fix
  3. Select Modify link under the name of the app if it is available
  4. A new page will launch and allow you to select the repair

Windows 11:

  1. Type “Installed Apps” in the search bar
  2. Click “Installed Apps”
  3. Select the app you want to fix
  4. Click on “…”
  5. Select Modify or Advanced Options if it is available
  6. A new page will launch and allow you to select the repair

 

OneNeck, We’ve Got Your Back

If you have any questions on how to update, recover deleted links or are unsure if your organization has been affected, we’re here to help. Talk to one of our skilled team members today.

grey line

Frequently asked questions…

What does the Microsoft Defender do?

Microsoft Defender is a unified endpoint security platform that provides advanced threat protection to devices running Windows, macOS, iOS, and Android. It includes a range of security technologies, such as antivirus, firewall, and intrusion prevention, and uses machine learning and behavioral analysis to detect and respond to threats in real-time.

What is ASR in Microsoft?

Attack Surface Reduction (ASR) is a set of features in Microsoft Defender for Endpoint that helps organizations reduce their attack surface by blocking common malware delivery techniques, such as email and web-based attacks. It uses advanced heuristics and machine learning to detect and block suspicious activity, reducing the risk of successful attacks and improving overall security posture.

What is ASR advanced protection against ransomware?

This rule provides an extra layer of protection against ransomware. It scans executable files entering the system to determine whether they’re trustworthy. If the files closely resemble ransomware, this rule blocks them from running, unless they’re in a trusted list or exclusion list. You must enable cloud protection to use this rule.

 

 

]]>
Is My Password as Safe as I Think It Is? https://www.oneneck.com/blog/is-my-password-as-safe-as-i-think-it-is/ Tue, 17 Jan 2023 17:07:39 +0000 https://www.oneneck.com/?p=3414 Password Security Challenges Passwords have long been the leading method of authentication and protecting sensitive information. However, as technology advances and the sophistication of cyber threats continue to evolve rapidly, the security of passwords is critical. Everyone must ask, “Is my password as safe as I think it is?” The principal issue with passwords is […]]]>

Password Security Challenges

Passwords have long been the leading method of authentication and protecting sensitive information. However, as technology advances and the sophistication of cyber threats continue to evolve rapidly, the security of passwords is critical. Everyone must ask, “Is my password as safe as I think it is?”

The principal issue with passwords is that they can be easily compromised. Hackers use various techniques to obtain passwords, including socially engineered phishing attacks, keyloggers, and dictionary attacks. Additionally, many users employ weak, easily guessable passwords, some of the most common being “123456”, “password,” or “guest.” Using unsafe passwords makes it easy for hackers to access accounts and steal sensitive information.

Another challenge of passwords is that if users forgo short and obvious passwords, they often run into the issue of password retention. Everyone has multiple accounts and passwords, and it can be challenging to keep track of them all. As a result, people often reuse passwords across multiple accounts or write them down (monitor sticky-note, anyone?), thus compromising security.

Finally, even when following best practices, there are still risks concerning the security of password databases. If an organization’s password database is hacked, all of its users’ passwords face the potential of being exposed. These breaches have occurred in several high-profile instances, compromising millions of passwords and associated user ids.

So, are passwords as safe as most users think they are? Probably not. While passwords certainly provide some level of protection, they are not infallible, especially on their own. However, everyone can employ several tips and strategies that vastly decrease the likelihood of their accounts being compromised.

Ways to Protect Your Passwords

It should come as no shock that strong and unique passwords are safer and more challenging to crack. Even with this knowledge, many individuals still fail to put it into practice consistently. Length, complexity and account separation are all crucial factors to consider when creating strong passwords.

Password Length–

The length (total number of characters) is one of the essential aspects of password effectiveness. At its most basic, longer passwords are more difficult to crack because they have a larger number of possible combinations. Thus, it is harder for an attacker to guess the correct password through a “brute force” attack, which systematically tries many combinations of characters to guess a password. The attacker uses software to automate the process of trying different combinations and often starts with the most commonly used characters or words. More sophisticated brute force attacks can also include “password dictionaries,” lists of words and phrases of the most widely used passwords.

Each character increase in the length of a password exponentially adds to the possible combinations a brute force attack must try to compromise that password successfully. The generally accepted minimum password length by cybersecurity experts is 14 characters. A 14-character password made up of random letters and numbers has possible combinations of approximately four quadrillion (yes, with a “q”). The sheer volume of possible combinations significantly fortifies passwords against brute-force attacks.

Password Complexity–

A second vital aspect of password effectiveness is complexity. Ultimately complex passwords are more difficult to crack than simple ones and thus provide a more robust level of security. A complex password includes a mix of characters, such as uppercase and lowercase letters, numbers, and special characters – including spaces when permitted. Using a mixture of characters vastly increases the number of possible combinations.

Another reason why complexity is essential is that it makes it harder for an attacker to use the aforementioned “dictionary” attack. If your password is a complex, unique and random string, it is not likely to be found in the attacker’s pre-computed list. This complexity also makes it difficult for anyone, even individuals in direct contact with a user, to deduce or guess a password.

Password Separation–

Using separate passwords for different accounts is vital for security as it reduces the risk of compromising multiple accounts if a password is stolen or otherwise obtained by an attacker. If the same password is used for multiple accounts, and an attacker can obtain that password, they potentially have access to all associated accounts. Breaches like this can be particularly problematic if one of the accounts is sensitive, such as an organizational or financial account.

If an attacker obtains a password, when using separate passwords for all accounts, the attacker will only be able to access the account associated with that password. They will not be able to access any other accounts, limiting the damage they can do. This separation of passwords keeps individuals protected against automated attacks called “credential stuffing,” where attackers use lists of stolen usernames and passwords (often from another data breach) and try them on a variety of accounts (emails, credit cards, businesses, etc.). Using a unique password for each account reduces the possibility of a compromised password having a far-reaching negative impact.

How Long Does it Take to Crack a Password?

Here is an excellent visual representation that illustrates the above concepts. It shows how long, via today’s modern computing power, it takes for brute force attacks to crack passwords of various lengths and complexity. Many public email providers require a minimum 8-character password, which, even when using a combination of numbers, upper and lowercase letters and symbols, can be cracked in 8 hours—increasing this by one character ups the total to 3 weeks. Utilizing a password with 14 characters raises the estimate to 200 million years!

Is my password safe? Protect your passwords. Visual chart of password length and time necessary to hack
Is my password safe?

Creating a Strong Password

To review, a password must be long (preferably at least 14 characters) and complex (including numbers, letters, symbols and spaces when permitted). Additionally, each account should have a unique password. Since the average person has dozens of accounts, keeping track of and managing passwords can be challenging. There are recommended strategies to incorporate and some things to avoid that benefit not only strong password creation but also organization.

  • Don’t use obvious details as passwords. Family members or pets’ names are among those most commonly associated with passwords. While variations of these names may be simpler to remember, this information is generally easy to find online as open-source intelligence (OSINT) and result in readily compromised passwords. The same holds for important dates (birthdays, anniversaries, etc.) and locations (addresses or hometowns).
  • Instead of passWORDS, think more in terms of passPHRASES. Passphrases are typically longer than passwords and, therefore, harder to crack. A passphrase made of multiple random words can be more difficult to guess than a shorter, alphanumeric password, even if the password is considered complex. As with passwords, combinations of uppercase and lowercase letters, special characters and numbers are recommended.

Additionally, passphrases are often more memorable than random strings of characters, making it less likely that the user will have to write the passphrase down or store it in an unsecured location. They can also be harder to steal through phishing or social engineering tactics because, in most cases, they don’t contain personal information.

  • Password managers are a great way to keep track of login credentials. These tools use encryption to store and generate complex passwords for all online accounts. Additionally, they are configurable to fill in login information automatically, eliminating manual entry of usernames and passwords. Thus, logging into accounts is more convenient and secure by making it less likely for accounts to be vulnerable via weak or reused passwords. Another benefit of password managers is minimizing exposure to phishing attacks. If a user unknowingly clicks a bad link, the password manager will not offer to fill in login credentials because it does not recognize the imposter website.
  • Finally, whenever possible, use multi-factor authentication (MFA). MFA makes it considerably more difficult for attackers to gain unauthorized access to an account, even when they have access to an account password. MFA can help defend against phishing, keyloggers and malware attacks by requiring the attacker to steal or replicate a second factor (e.g., a phone) to pass the MFA check. Security in layers is a best practice, and while not foolproof, MFA provides an additional layer of security that can significantly reduce the risk of unauthorized access to your accounts.

OneNeck – A Security Partner You Can Trust

As an experienced IT security services provider, OneNeck is here to help. Our team can assess your current security posture, develop a defense strategy, and help you better leverage your existing security investments. Contact us today to speak with a OneNeck security professional.

grey line- Is my password safe?

Frequently asked questions…

What is the safest way to protect passwords?

The safest way to protect passwords is to use a strong, unique password for each account, and to store them securely using a password manager. A password manager encrypts and stores your passwords, making them accessible only with a master password or biometric authentication, and can generate strong, random passwords to help ensure maximum security.

What is a passphrase?

A passphrase is a series of words or other text used as a password or key to protect access to an account, device, or other resource. Passphrases are typically longer and more complex than traditional passwords, and can be easier to remember while also providing greater security against brute-force attacks.

Do security experts recommend password managers?

Yes, many security experts recommend using password managers as a secure way to manage passwords. Password managers can generate strong, unique passwords for each account, store them securely, and automatically fill them in for you, reducing the risk of password reuse, weak passwords, and other security issues. However, it’s important to choose a reputable password manager and follow best practices for password security, such as using multi-factor authentication and regularly changing passwords.

What is the difference between 2FA and MFA?

2FA stands for “two-factor authentication,” which requires users to provide two forms of authentication to access a resource, typically a username/password combination and a one-time code sent via SMS or generated by an app. MFA, or “multi-factor authentication,” is a more advanced form of 2FA that requires additional forms of authentication, such as a fingerprint or facial recognition, in addition to the traditional username/password and one-time code.

 

]]>
Microsoft SQL Server 2022 – Update & Price Increase https://www.oneneck.com/blog/microsoft-sql-server-2022/ Tue, 10 Jan 2023 17:57:41 +0000 https://www.oneneck.com/?p=3351 SQL Server Price Increase for 2023 Moving into a new year always brings about changes to business and technology, with pricing increases and adjustments often playing a significant part. The start of 2023 is no different. With the calendar turning to January 1st, Microsoft introduced a pricing increase for SQL Server and implementation a global […]]]>

SQL Server Price Increase for 2023

Moving into a new year always brings about changes to business and technology, with pricing increases and adjustments often playing a significant part. The start of 2023 is no different. With the calendar turning to January 1st, Microsoft introduced a pricing increase for SQL Server and implementation a global US Dollar price list for its Microsoft Cloud offerings.

As of January, Microsoft has increased the price of all Microsoft SQL Server on-premises licenses by 10%. The first increase in nearly a decade is across all licensing programs. It is also worth noting that these increases impact the cost of Software Assurance – which is a fixed 25% of the licensing price.

Microsoft Cloud and SPLA Service Providers are the notable exceptions to this new pricing structure. Providers saw matching 10% price increases on Standard and Web editions but face a slightly reduced rise of 8% on Enterprise editions. Currently, prices for SQL Server on Azure (Azure SQL Managed Instance, SQL Server IaaS and Azure SQL Database) remain unchanged.

Customers with existing subscriptions will see price changes once their current subscription has ended. At renewal, prices will be adjusted to the current US Dollar rate and locked in for the subscription duration. Updates for classic on-premises licensing reflect this new methodology.


SQL Server 2022 New Features

While an increase in pricing is seldom met with cheers by consumers, SQL Server customers are gaining several new features with SQL Server 2022 (16. x). Microsoft has introduced numerous new and improved functionalities, including noteworthy additions to performance, security and availability.

SQL Server 2022 enhances performance via a new feature known as Intelligent Query Processing. Customers can use this new feature not only to build better execution plans but also to perform multiple execution plans based on the parameters stipulated at runtime. Additionally, Query Store is now enabled for all new databases and now supports availability group read-only replicas and allows query hints within the Query Store, thus improving queries without needing to make code modifications.

Availability and continuity also saw improvements with the full integration of Managed Instance link into SQL Server 2022, enabling near real-time data replication from SQL Server to Azure SQL Managed Instance. This link provides hybrid flexibility and database mobility while allowing for features such as scaling read-only workloads, offloading analytics and reporting to Azure and migrating to the cloud. Furthermore, with SQL Server 2022 comes the addition of disaster recovery. Via the link feature, users can replicate data from SQL Server 2022 to Azure SQL Managed Instance, manually fail over to SQL MI during a disaster and back to SQL Server upon mitigation. This link runs as long as needed, potentially even for years.

“Microsoft SQL Server 2022 is a game changer when it comes to modern hybrid data systems,” says Lee Grant, Principal Application Architect and Certified Azure Data Engineer. “It is a key non-Azure component of the Microsoft Intelligent Data System. The inclusion of Azure Synapse Link to SQL 2022 makes getting on-premises data into Azure Synapse Analytics Dedicated SQL Pools a breeze. This and Managed Instance Link will help enterprises modernize their data systems to leverage advanced data services in Microsoft Azure.”

Security upgrades considerably in SQL Server 2022 via the Defender for SQL plan. Defender for SQL protects database estate wherever they live: on-premises, hybrid, or multi-cloud environments. Included functionalities are the ability to discover and mitigate potential database vulnerabilities and deliver the capacity to detect anomalous activities that indicate threats to your databases. (SQL Server Extension for Azure must be enabled.)

Another significant security addition is the new Ledger feature which provides tamper-evidence capabilities in your database. Ledger provides a detailed history of data modifications, which can be used internally or externally for reviews with auditors, business partners and clients.

With the aforementioned updates and the inclusion of several additional new and enhanced features, SQL Server 2022 delivers significant improvements over previous versions and supplies plenty of rationale for making the switch.

OneNeck – A Trusted Partner

Whether you are a current SQL Server subscriber or considering the switch, OneNeck can help you find the right fit for your organization. Ready to update to SQL Server 2022? Our experienced team will ensure that the upgrade is performed efficiently and that your data is securely protected. Contact us for more information.

grey line

Frequently asked questions…

What is SPLA Microsoft?

The Services Provider License Agreement (SPLA) is a licensing program offered by Microsoft that allows service providers to offer Microsoft software to their customers as a service. SPLA licenses are designed for hosting service providers who want to offer Microsoft software applications and services on a rental basis to their customers, rather than selling licenses directly to end-users.

What is the difference between Microsoft CSP and SPLA?

The Microsoft Cloud Solution Provider (CSP) program and the Services Provider License Agreement (SPLA) are both licensing programs offered by Microsoft, but they differ in their target audience and licensing models. The CSP program is designed for partners who want to resell and manage Microsoft cloud services for their customers on a subscription basis, while the SPLA program is designed for hosting service providers who want to offer Microsoft software applications and services on a rental basis to their customers.

What is query store?

Query Store automatically captures a history of executed queries, their performance metrics, execution plans and runtime statistics. It allows database administrators to separate data by time windows in order to see database usage patterns and understand when query plan changes happened on the server.

 

 

]]>
Is Your Active Directory Connect Headed Out to Pasture? https://www.oneneck.com/blog/is-your-azure-active-directory-connect-headed-out-to-pasture/ Fri, 06 Jan 2023 18:27:36 +0000 https://www.oneneck.com/?p=3333 Change is a given with evolving technology, and more is coming with Azure Active Directory Connect. Here’s what you need to know to make sure you stay ahead of the changes… On March 15, Microsoft will begin retiring past versions of Azure AD Connect Sync 2.0.x, 12 months from the date they are superseded by […]]]>

Change is a given with evolving technology, and more is coming with Azure Active Directory Connect. Here’s what you need to know to make sure you stay ahead of the changes…

On March 15, Microsoft will begin retiring past versions of Azure AD Connect Sync 2.0.x, 12 months from the date they are superseded by a newer version. This upgrade is especially important since Microsoft had to update their prerequisites for Azure AD Connect and you may need additional time to plan and update your servers to the newer versions of these prerequisites.

The following versions will retire on March 15, 2023:

  • 2.0.91.0
  • 2.0.89.0
  • 2.0.88.0
  • 2.0.28.0
  • 2.0.25.1
  • 2.0.10.0
  • 2.0.9.0
  • 2.0.8.0
  • 2.0.3.0

If you’re not already using the latest release version of Azure AD Connect Sync, you should upgrade your software before the March 15 deadline.

What happens if you don’t upgrade your Azure AD Connect?

If you’re running a retired version, it might unexpectedly stop working. You also might not have the latest security fixes, performance improvements, troubleshooting and diagnostic tools, and service enhancements. If you require support, Microsoft might not be able to provide you with the level of service your organization needs.

What about auto-upgrade?

Not all releases of Azure AD Connect are made available for auto-upgrade. The release status indicates whether a release is made available for auto-upgrade or for download only. If auto-upgrade was enabled on your Azure AD Connect server, that server automatically upgrades to the latest version of Azure AD Connect that’s released for auto-upgrade. Not all Azure AD Connect configurations are eligible for auto-upgrade.

Auto-upgrade is meant to push all important updates and critical fixes to you. It isn’t necessarily the latest version because not all versions will require or include a fix to a critical security issue. (This example is just one of many.) Critical issues are usually addressed with a new version provided via auto-upgrade. If there are no such issues, there are no updates pushed out by using auto-upgrade. In general, if you’re using the latest auto-upgrade version, you should be good.

In conclusion…

For Microsoft’s detailed information on Azure AD Connect’s version release history, refer to their documentation here. And as always, if you’d like help getting it done, or need any other Azure related help, we are here to assist.

KEEP MOVING FORWARD. WE GOT YOUR BACK.

grey line

Frequently asked questions…

What is Microsoft Azure Active Directory Connect?

Microsoft Azure Active Directory Connect is a tool that allows organizations to integrate their on-premises identity infrastructure with Azure Active Directory. It provides health monitoring, synchronization of users, groups, and contacts, as well as authentication and authorization for accessing Microsoft cloud services such as Office 365 and Azure.

What is Azure AD portal?

The Azure AD portal is a web-based interface that allows administrators to manage and configure Azure Active Directory  resources, such as users, groups, applications, and devices. It provides a central location for managing identity and access in Azure, and includes features for managing authentication, conditional access policies, and security settings.

]]>
What Is Low-Code Development and Its Future Impact? https://www.oneneck.com/blog/what-is-low-code-development Mon, 19 Dec 2022 17:42:32 +0000 https://www.oneneck.com/?p=3260 Low-code development is a phrase you are likely hearing a lot lately. Many organizations are already utilizing this form of application development, and the vast majority plan to increase its usage in the future. Let’s examine two important questions surrounding low-code application development, starting with, what  is low-code development? Secondly, is low-code truly the future […]]]>

Low-code development is a phrase you are likely hearing a lot lately. Many organizations are already utilizing this form of application development, and the vast majority plan to increase its usage in the future. Let’s examine two important questions surrounding low-code application development, starting with, what  is low-code development? Secondly, is low-code truly the future of app development?

What is Low-Code and Its Future Impact?

The answer to the first question is fairly straightforward: low-code development is a method to build software applications faster by diminishing the need to write code. With a low-code application development platform, one uses visual development tools, such as drag-and-drop modelers, point-and-click interface creation, smart services, elements and pre-built connectors. They reduce the necessity to write code and facilitate business applications’ speedy design, deployment and maintenance.

The second question takes a little more consideration. According to a Gartner study, it is predicted that by 2024 more than 65% of all business applications will be built using low-code programming, with about 2/3 of enterprises employing a minimum of four low-code platforms. Based on these statistics, it is somewhat safe to say – yes, low-code is going to play a large role in the future of application development. Let’s assess in more detail exactly why low-code’s future appears so bright.

Benefits of Low-Code

The fundamental benefits of low-code solutions are speed and collaboration. The inclusion of pre-built components and integrations make it simpler to create sophisticated and powerful applications. More specific benefits include:

automation and agility webinar

  • Improved Agility– Low-code tools are designed to allow users to create and deploy applications fast and efficiently without extensive programming knowledge. Businesses gain the ability to be more agile, quickly developing and deploying the applications they need to support operations and respond to changing business needs.
  • Lower Costs of Entry and Deployment– Low-code platforms often include pre-built components and features that can be assembled into complete applications. These features make it possible to develop apps in-house rather than paying for costly custom software development services.
  • Small Business Staffing Issues– With little to no coding required, low-code tools are usable by a broad range of individuals within an organization, including those with no background in programming. Small businesses gain the ability to create the apps they need to support operations and respond to changing business needs, without the necessity of having a large IT staff.
  • Higher Productivity– Low-code technology helps to streamline the development process and allows teams to be more productive and efficient. Development teams are able to focus on design and functionality, rather than spending time on the tedious and time-consuming process of writing code. Changes and updates that once took large chunks of time can now be nearly instantaneously implemented.
  • Effective Risk Management and Governance– Organizations gain the ability to respond quickly to changing business needs or new regulatory requirements, reducing the risk of compliance issues. Additionally, built-in security controls help to protect sensitive information and reduce the risk of data breaches or other incidents. Furthermore, low-code platforms often include version control and other collaboration features, assisting in maintaining a clear audit trail and ensuring applications are developed, controlled and maintained consistently.
  • Automation of Business Ideas and Processes– By offering pre-built workflow templates, low-code tools allow automation to be accessible to teams of all skill levels. Additionally, it permits these teams to handle related service requests independently without requiring more extensive involvement from IT staff.
  • Democratization of Software Development– The addition of more people in the development process allows organizations to develop custom software quickly and efficiently. With the presence of enhanced collaborative features, it is possible for multiple individuals to simultaneously work on an application. This cooperation allows businesses to maximize limited staffing resources while fostering a more inclusive approach to software development.

Is Low-Code the Same as No-Code?

The term no-code generally suggests a platform is intended for non-professional developers. The reality is there is always code and software running someplace, but with these types of tools, the coding is hidden from the user. No-code solutions are typically marketed towards non-developers and small businesses as an approachable or entry-level option.

Due to their nature of not requiring the user to utilize any coding, customization is often relatively limited. However, it is worth noting that despite the lack of required programming language, some knowledge in development is often necessary to use the required visual modeling tools or if the organization wishes to make more advanced customizations via the addition of some code.

Example of Low-Code Usage in Business

Microsoft’s Power Platform is a low-code suite of applications that enables users to build custom applications, automate processes, and analyze data without extensive coding knowledge. It consists of four main components:

  • Power BI– A business intelligence and data visualization tool that allows users to create interactive reports and dashboards from various data sources.
  • Power Apps– A platform for building custom business applications without the need for coding.
  • Power Automate– A tool for automating business processes by allowing users to create custom “flows” that are triggered and can integrate with other applications and services.
  • Power Virtual Agents– Used to build chatbots and other conversational AI agents.

All organizations have bottleneck processes that slow everyone down. These procedures don’t add particular value but are ultimately necessary for operation. Such processes might include managing complicated Excel spreadsheets or approval processes that require constant emailing back and forth, resulting in digging through these emails for each request to get them to the right people. Power Platform’s low-code tools make it possible to build a better way to accomplish these tasks.

Another aspect worth pointing out is that for software an organization is already using, the Power Platform offers an extensive list of connections to those existing systems. If one is currently using a platform with specific APIs, chances are there is a connector already built into Microsoft’s Power Platform that allows access and interaction with that data. Ultimately, Microsoft’s Power Platform’s purpose is to fix processes minus the need for advanced coding expertise and is of particular value to smaller organizations that want to do things better without significantly draining limited resources.

What Does Low-Code Mean for Professional Developers?

With the exponential increase in low-code app development, it might be easy to assume that professional developers should be worried their value to an organization is decreasing. However, the reality is precisely the opposite. Low-code tools make experienced developers even more useful.

Low-code can be beneficial for professional developers for numerous reasons, including:

  • Allows professional developers to be more productive. By permitting non-technical users to help create software applications, experienced developers can focus on complex tasks and on building high-quality software.
  • Helps developers to stay relevant in a rapidly changing market. As the demand for software development continues to grow, low-code tools can help experienced developers quickly learn new skills and adapt to emerging technologies.
  • Enables more collaboration with all stakeholders. Because low-code platforms allow non-technical users to participate in the software development process, skilled developers can more easily communicate and collaborate with other teams and departments within their organization.
  • Assists experienced developers in creating more innovative solutions. Using low-code tools, developers can quickly prototype and test new ideas, helping them design creative and effective solutions to problems.

The aim of low-code platforms is not to cut out professional developers from helping an organization build its processes. Rather, it is about trying to make it easier for IT and business users to work together to create more efficient processes that work for everyone. Ultimately, low-code is valuable for professional developers, helping them to increase productivity, stay relevant and create innovative solutions.

Embrace the Low-Code Revolution

Low-code platforms will undoubtedly play an essential role in the future of software development. These tools not only save time and money but also allow more people to participate in the process, enabling businesses to be more agile and responsive. Low-code technology is revolutionizing the way software is developed and is poised to become a standard for application creation in the coming years. As it continues to evolve and improve, expect to see even more exciting and innovative applications built via these platforms.

Are you interested in finding additional information on Microsoft’s Power Platform and the broader applications of low-code tools? Sign up for a Free Power Platform Workshop led by Kaitlyn Montour, and see how the process automation apps already included in your M365 subscription can bring your big ideas to life.

grey line

Frequently asked questions…

Is low-code in demand?

The demand for low-code platforms has grown significantly as businesses look to digitize their operations and streamline their processes. The worldwide market for low-code development tools is projected to total $26.9 billion in 2023, increasing nearly 20 percent from 2022, according to the latest forecast from Gartner, Inc.

What is Microsoft Power Platform used for?

Microsoft Power Platform is a low-code development platform that enables organizations to rapidly build custom business applications, automate workflows, and analyze data using Power Apps, Power Automate, Power BI and Power Virtual Agents. Each area may be used independently or collectively.

What is the Power Platform admin center?

The Power Platform admin center is a web-based administrative console that enables administrators to manage the Microsoft Power Platform services. It provides a centralized location to view and manage environments, permissions, data policies, and more. Administrators can also access the Power Platform admin center through the Microsoft 365 admin center.

How does automation enable business services to support agility?

Automation helps businesses streamline and optimize their processes, reducing manual work and human error while increasing speed and efficiency. This allows organizations to respond more quickly to changes in the market and adapt services to meet evolving customer needs. By automating routine tasks, businesses free up their workforce to focus on higher-value work, leading to enhanced outcomes and increased innovation.

 

]]>
Protect Your IT With Strong Cybersecurity Practices https://www.oneneck.com/blog/protect-your-it-with-strong-cybersecurity-practices Wed, 07 Dec 2022 18:12:29 +0000 https://www.oneneck.com/?p=3238 The end of the year is a time when businesses are wrapping things up. This sense of closure, coupled with the fact that people are taking time off, brings everyone’s guard down. While letting your guard down may be good for your family, it’s not the best idea when it comes to cybersecurity.  Cybercriminals are […]]]>

The end of the year is a time when businesses are wrapping things up. This sense of closure, coupled with the fact that people are taking time off, brings everyone’s guard down. While letting your guard down may be good for your family, it’s not the best idea when it comes to cybersecurity. 

Cybercriminals are savvy and look for opportune times to conduct their attacks. They know the holiday season is a great time to take advantage of people’s generosity and goodwill. The best defense for your business is to understand the tactics bad actors use to infiltrate IT security. To that end, we’ll consider seven best practices to protect your organization as the end of the year rolls around. 

7 Best Practices to Help Secure Your IT Infrastructure

1. Install software updates and patches promptly.

Security patches are created in response to developing threats and are usually released because the threat is deemed too serious to wait until a major software update. Installing patches as they become available helps businesses mitigate risk by ensuring vulnerabilities exist for as short a time as possible. Additionally, having policies to keep up with updates when employees are out of the office and during downtime (especially at the end of the year) helps keep your business systems running smoothly.

2. Use strong passwords and change them regularly.

It’s estimated that 81% of data breaches happen because of poor passwords. A seemingly small change can make a huge difference in your organization’s security. The end of the year is a great time to prompt employees to change their passwords. When doing so, encourage them to use 16 characters or more, as this strengthens password security.

3. Restrict access to sensitive data to authorized users only.

By restricting access to what’s strictly necessary, companies can reduce the risk of unauthorized users accessing and compromising that data. When attacks are likely, such as during the holiday season, reviewing your access policies helps ensure there are fewer people who can possibly mishandle sensitive data. Another reason is compliance. Many regulatory bodies require companies to restrict access to sensitive data in order to meet compliance requirements.

4. Educate employees on cybersecurity best practices.

Education is one of the best ways to defend against potential security risks. Training should be relevant to employee jobs to keep them engaged; the less generic, the more likely they are to heed the warnings. Training can include topics like the dangers of clicking on links, opening attachments from unknown sources, using strong passwords, and keeping their personal devices updated. Why not schedule training right before security is on high alert and send out a refresher when employees are more likely to let their guard down? 

5. Protect against phishing scams and malware attacks

Person reading message that's obviously a scam
Train employees to recognize warning signs of a scam.

New phishing scams and malware attacks arrive daily, so there’s no way you can train on the specifics. But you can help your employees practice good cyber vigilance to recognize the signs. For example, they should be aware of the red flags of a scam email or phishing call, such as poor grammar or requests for personal information from people they don’t know. They should also be cautious about approving application authorizations if they don’t have explicit knowledge of who’s requesting it. Tips like these could be included in the cybersecurity refresher we recommend sending out.  

6. Use two-factor authentication whenever possible.

Two-factor authentication is a cybersecurity best practice that requires employees to use two forms of identification to log in to their accounts. So even if a password becomes compromised, the hacker still needs a second authentication. In fact, a 2019 Microsoft report found that two-factor authentication blocked 99.9% of automated attacks.

7. Have a plan in place for dealing with a cybersecurity incident.

Whatever your efforts, no security plan is impenetrable. And a cybersecurity incident can have many negative consequences for an organization, including loss of data, decreased productivity, and financial damage. Having a plan in place will help you mitigate the effects in case of an incident. This plan should include steps for preventing and responding to incidents, as well as procedures for communicating with stakeholders.

Don’t Stress. Take the Proactive Approach Instead

At the end of the year, security isn’t always top of mind. By educating your organization on how to work securely, you mitigate many of the dangers hackers use during the holiday season.  

It’s also possible you’re looking for a partner to help fortify your security practices or provide needed security leadership. If that sounds like you, visit our IT security services page to learn more about what we offer. We’re here to help! 

Stay safe out there, and happy holidays! 

grey line

Frequently asked questions…

Why is patch management important?

Patch management is important because it helps to ensure that software and systems remain up-to-date and secure. By regularly applying patches, organizations can fix vulnerabilities and reduce the risk of cyberattacks or other security breaches. Additionally, patch management can help to improve system performance and reliability.

What is incident response in cybersecurity?

Incident response is the process of identifying, investigating, containing, and recovering from security incidents in order to mitigate the impact of a cybersecurity breach or attack. The goal is to minimize the damage caused by the incident, prevent it from spreading, and restore normal operations as quickly as possible.

What type of password are hardest to crack?

Having a long mix of upper- and lower-case letters, symbols and numbers is the best way make your password more secure. The safest way to protect passwords is to use a strong, unique password for each account, and to store them securely. Security experts recommend using passwords of at least 14 characters.

 

]]>
The Difference Between Cybersecurity and Cloud Security? https://www.oneneck.com/blog/difference-between-cybersecurity-and-cloud-security/ Mon, 05 Dec 2022 15:07:52 +0000 https://www.oneneck.com/?p=3229 What is the difference between cybersecurity and cloud security? Which of these security aspects is appropriate for your organization? On their face, these two terms appear to cover similar topics. While there is undoubtedly some crossover, they are, in reality, distinct aspects of digital security and focus on specific and unique areas. However, due to […]]]>

What is the difference between cybersecurity and cloud security? Which of these security aspects is appropriate for your organization? On their face, these two terms appear to cover similar topics. While there is undoubtedly some crossover, they are, in reality, distinct aspects of digital security and focus on specific and unique areas. However, due to perceived similarities, there can be confusion over each term. As we delve into these concepts, let’s first define each term.

  • Cybersecurity is the art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.CISA
  • Cloud security refers to the processes, mechanisms and services used to control the security, compliance and other usage risks of cloud computing. It specifically addresses the security of the cloud service and security within the cloud service. Still, the term does not encompass security services delivered from the cloud (security as a service) that are intended to be used outside the cloud.Gartner

What do these definitions mean? At its core, cybersecurity ensures that end user devices stay free of compromise. Cybersecurity’s ultimate goal is protecting data belonging to an organization from unauthorized access, use or modification. In other words, it safeguards computer networks and the data stored within from being lost, corrupted or stolen.

While also focused on data protection, the purpose of cloud security is to ensure data stored in the cloud is inaccessible to unauthorized users or servers. Cloud security safeguards data in the cloud. This protection extends to unauthorized access attempts both through the cloud service provider and the end user. Rather than protecting data from unauthorized theft or modification, the fundamental concept of cloud security focuses on protecting data from ever being breached.

Critical Components of Cybersecurity and Cloud Security

Cybersecurity– The vital elements of cybersecurity incorporate:

  • Application Security
  • Network Security
  • Disaster Recovery Planning
  • Information Security
  • End User Security
  • Operational Security

Cloud Security– The fundamental aspects of cloud security include:

  • Data Security
  • Identity and Access Management (IAM)
  • Governance (Policies on Threat Prevention, Detection and Mitigation)
  • Data Retention and Resiliency
  • Legal Compliance

Differences Between Cybersecurity and Cloud Security

While the intricacies of cybersecurity and cloud security can fill numerous pages of content, we will focus on areas where fundamental differences occur. Understanding these distinctions assists in determining the how, why, where and when of applying each security concept.

Security of Personal Information

Cybersecurity offers specific functionalities to protect computer networks and devices against potential threats on a network. It protects from viruses, malware, etc., on the server side. These measures often involve the end user utilizing protocols, such as avoiding suspicious links and deploying solid passwords or two-factor authentication to protect their personal information.

Cloud security filters all traffic trying to access data stored in the cloud by letting authorized users access information while blocking unauthorized traffic from gaining access. All authorized traffic is pointed directly to a specifically intended server instead of any other server where user data could be compromised.

Liability

Generally, an organization and its users are liable for protecting any data stored on their devices. Simply put, they must ensure unauthorized individuals do not gain access. While manufacturers of devices hold the obligation to provide appropriate patches and security updates, the cybersecurity responsibility ultimately falls to the organization to protect their clients’ data. Failure to do so can have severe financial and reputational consequences.

Within cloud security, cloud service providers and organizations share liability when using cloud services for data storage. The cloud service provider mitigates privacy breaches through both software and hardware by maintaining and upgrading security features and adding additional functionality to protect private information. Organizations are accountable for keeping their customer’s data confidential and may be held liable if they fail to follow required security protocols.

Responsibility for Security

Within cybersecurity, the device owner and the organization are responsible for maintaining the security of private personal information. Individuals, or IT Security, have the duty to monitor this data, with the responsibility ultimately resting on the device owner to follow appropriate best practices to secure data from being stolen by hackers.

Cloud security is generally a shared security model where any services provided fall under the service provider’s scope. However, how these services are configured and utilized is up to the customer using the cloud platform. For example, utilizing cloud services and setting up non-secure passwords would shift accountability to the user. In contrast, responsibility for a breach due to a faulty update would fall on the cloud service provider.

Threat Detection

Traditional cybersecurity methods employ antivirus software to find and eliminate security risks. The principal downside of antivirus technology is that it tends to lag behind ever-changing threats and must be updated frequently to continue its effectiveness. This maintenance requires buy-in from internal IT security to patch internal systems and distribute updates, as well as from end users who must install all updates promptly.

Cloud security uses Artificial intelligence (AI) to detect and interpret threats. This differs from cybersecurity methods in that it does not entail consistent organizational-initiated updates. AI discovers and monitors hacking efforts as they arise, keeping servers shielded from attacks and greatly diminishing the possibilities of a breach. Furthermore, advanced analytics are collected and examined through automated processes to determine if abnormal activity or protocol violations have transpired and, if discovered, send automated alerts to both the service provider and customer.

Backup and Recovery

Cybersecurity-based data backup is accomplished through physical and external storage media. This process is primarily conducted manually by either end users or security professionals. Restoration of damaged or lost data is performed via an organization’s predetermined recovery protocols. While this allows for tailor-made recovery solutions, it requires sizable organizational resources.

All data stored under the auspice of cloud security is securely and automatically backed up within designated servers. Backups are created for primary and secondary storage, allowing for rapid data restoration via assigned recovery methods. Cloud service providers generally offer built-in recovery methods, but depending on an organization’s size and specific needs, the deployment of 3rd party recovery tools may also be applied.

Data Storage

With cybersecurity methods for backup and storage, organizations have strict control over who has access to data. Protocols for admission are determined based on organizational needs or regulatory compliance. Access must be granted and monitored via company IT security or a hired 3rd party. Additionally, in most cases, backups will need to be manually maintained by the organization and can be both expensive and time-consuming. Scaling requires significant infrastructure investments as well as increased staffing.

The cloud provider categorizes all data traffic to protect sensitive information when utilizing cloud security for data storage. Here, multiple security layers, including data encryption, are used. Additionally, strict access control methods safeguard user privacy and information. Furthermore, with increasing numbers of cloud storage providers and various services, storage space is readily accessible and scalable, with relatively low investments necessary.

Conclusion

Both security aspects benefit organizations utilizing data in the modern workplace. For those storing data in the cloud, or hybrid environments, cloud security plays a crucial role in keeping threats at bay by ensuring data is safe from loss and unwanted access. The low infrastructure investment and 3rd party security management will undoubtedly be attractive to small and mid-sized businesses and those new to utilizing data in the cloud.

While cloud security reduces the burden on companies and their end users, cybersecurity allows for the customization of security protocols, including configuring all organizational devices and systems to meet individualized requirements. Also important is the inherent agility to adjust protocols to meet challenges as they are presented. Additionally, deploying traditional cybersecurity methods is essential in securing physical assets and internal networks.

Any organization utilizing or storing data in the cloud must use both cloud security and more traditional aspects of cybersecurity, as these safeguards complement each other. Application and adherence to recommended cybersecurity and cloud security protocols strengthen overall security posture. Following proper cybersecurity measures will make it much more difficult for unauthorized actors to compromise your data and devices while employing strong cloud security, which blocks access for those seeking private information to utilize in an attack.

Recognizing that these specific safety measures enhance each other is why OneNeck employs a holistic approach to security. We build security solutions specifically for an organization’s needs. Our experience and attention to detail have made us a preferred security services provider for companies of all sizes in just about every industry from coast to coast.

If you would like to know how we can assist you with your security needs, please contact us to learn more.

grey line

Frequently asked questions…

Who is responsible for cloud security?

Cloud security is a shared responsibility between the cloud service provider and the cloud customer. The cloud vendor is responsible for the security of the cloud infrastructure, while the cloud customer is responsible for securing their data and applications running in the cloud.

When is cybersecurity awareness month?

Cybersecurity Awareness Month, launched in 2004, is observed every year in October, to raise awareness and promote best practices for staying safe and secure online. The Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA) use the month to lead a collaborative effort between government and industry to raise cybersecurity awareness nationally and internationally.

What is threat detection and response?

Threat detection and response is the process of identifying, analyzing, and responding to potential security threats in a proactive manner. It involves the use of various security tools and techniques to monitor and detect threats, and the development of incident response plans to quickly contain and mitigate any potential damage. This is a critical aspect of cybersecurity, as threats are constantly evolving and becoming more sophisticated.

 

]]>
7 Ways a Microsoft CSP Can Benefit Your Business https://www.oneneck.com/blog/7-ways-a-microsoft-csp-can-benefit-your-business/ Mon, 14 Nov 2022 17:03:54 +0000 https://www.oneneck.com/?p=3197 Work from home was trending before the pandemic, but since COVID, it has become the norm for many businesses. Now, as we come out of the pandemic, we’re entering another crisis: inflation. Companies that embrace remote work are being praised because it helps employees cope with the financial impacts of inflation. However, remote work has […]]]>

Work from home was trending before the pandemic, but since COVID, it has become the norm for many businesses. Now, as we come out of the pandemic, we’re entering another crisis: inflation. Companies that embrace remote work are being praised because it helps employees cope with the financial impacts of inflation. However, remote work has brought new challenges, like the need for more cloud computing tools.

Cloud computing is the most effective way to provide remote employees with the software they need to do their job. To give them access, companies must incorporate cloud applications into their tech stack. Many turn to software providers like Microsoft because they offer a plethora of tools that help businesses fill their digital gaps. These tools include Azure, Teams, and Office365.

However, teams often lack the digital expertise to deploy these applications at scale. A Microsoft cloud service provider (CSP) supplies the know-how and personnel needed to deploy with ease.

Give Up the Management Headache with a CSP

Professional has a headache while working on a project.

If you’ve ever watched a cooking show, you’ve undoubtedly noticed the speed and precision at which professional chefs work. But what happens when we try to copy their recipe? It usually takes us three times longer to recreate it, and if we’re being honest, it probably doesn’t taste as good. Similarly, while customers can set up Azure on their own, their success is often greatly improved with the help of a CSP. Consider seven benefits of working with a Microsoft CSP.

  1. Support. Businesses that do it alone have to troubleshoot issues and ensure their installation is up to date and secure. A CSP provides a storehouse of experience and application-specific knowledge to help you resolve issues with minimal effort.
  2. Deployment. It’s one thing to test new technology on a small scale and quite another to deploy it across your organization. If you don’t have the processes to deploy cloud applications at scale, you may find your deployment stalling at different stages as you figure things out. A CSP’s expertise will not only speed up deployment but can help roll out the software in predictable stages that simplify migration for your team.
  3. Bundled applications. Cloud service providers often deliver configured or proprietary in-product features that help manage users and monitor and secure your applications.  They know how to package solutions because of their experience with other vendors – saving you the time and effort to develop your own software stacks.
  4. Managed services. Microsoft partners are required to do more than resell Microsoft products; they must provide value on top of the service. For example, many CSPs manage your services, ensure security, and provide the support that eliminates the need to escalate issues to Microsoft.
  5. Flexibility. Cloud solutions are inherently flexible, but scaling up and down services can still present administrative challenges. Your CSP can handle the complexities of scaling, like managing users, licensing, and resource allocation.
  6. Licensing support. Identifying a single person’s subscriptions is enough to give you a headache, let alone your entire organization. A Microsoft CSP can manage all your Microsoft cloud licenses. And in addition to simplifying administration, your CSP can ensure you don’t have unused licenses sitting around and advise you on how to get more out of your subscriptions.
  7. Control without management. Partnering with a CSP doesn’t mean you have to give up control. Your provider can still provide full admin control over your Office 365 and Azure subscriptions without the headache of managing everything else.

You can free up your team to focus on your company’s core mission by empowering them with cloud tools. A CSP can take over management so that your team only has to decide which tools to use and where you need them.

Partner With OneNeck for Microsoft Administration

OneNeck is a Microsoft CSP that provides a modern approach to software-as-a-service. We understand that the way companies use services is constantly evolving, so our offering is designed to adapt to those needs. With consolidated monthly billing, a simple subscription model, and no upfront costs, it’s easy to understand how your business uses its subscriptions. If you want to simplify your Microsoft services administration and gain world-class support, contact us.

]]>
How Azure Public Cloud Enhances Your IT Infrastructure https://www.oneneck.com/blog/how-azure-public-cloud-enhances-your-it-infrastructure/ Fri, 21 Oct 2022 18:00:45 +0000 https://www.oneneck.com/?p=3165 Cloud computing solves a major challenge for many IT departments. It allows them to provide on-demand computing for their team, regardless of location or time of day. Teams are thus not limited to the capacity of an internal data center that may restrict usage to location or users. How does the cloud accomplish this feat? […]]]>

Cloud computing solves a major challenge for many IT departments. It allows them to provide on-demand computing for their team, regardless of location or time of day. Teams are thus not limited to the capacity of an internal data center that may restrict usage to location or users. How does the cloud accomplish this feat?

It does so by providing ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort. Public cloud computing benefits from economies of scale, which allow it to draw from seemingly limitless resources.

While the benefits of the public cloud are considerable, teams may wonder about the benefits of choosing one provider over another. In this article, we’ll consider some specific ways Microsoft Azure is increasing the capabilities of many organizations.

Azure Extends Your IT Capabilities

Often, businesses look for more than simple cloud storage or computing power. Azure is an excellent option because it adds so many features and enhancements. For example, it offers a variety of pre-built applications that you can use to get started quickly. These applications are easy to configure and use, and they can help you get your business up and running quickly.

Another concern for business owners is security. Azure offers robust security features to keep your data safe. It has built-in firewalls that protect your data from unauthorized access and encrypts all data stored in the cloud, which adds redundant protection in case of a breach.

Lastly, Azure is backed by Microsoft and benefits from the scale of a global company. What does this mean for your company as a user?

  • You can rely on Microsoft to provide world-class support for your Azure environment.
  • You benefit from their large global footprint, with data centers in over 42 regions, ensuring that your applications are always close to your customers.
  • Your apps and services are highly scalable, allowing you to scale up or down as needed.
  • Your systems are highly reliable, with multiple layers of redundancy built in.

Azure’s features ensure that your computing infrastructure is always ready to meet demand and available to your entire organization. With that in mind, let’s look at a few specific applications of the technology.

No two companies are the same, and neither are their computing needs. Perhaps you’re interested in creating a modern workplace for your employees. Or maybe you want to improve the use of data in your organization. While we can’t cover every use case, let’s briefly consider how Azure fits into a few specific use cases.

 

Remote team on a conference call using Teams.
Azure provides work-from-home tools that enable the modern workplace.

Modern workplace. You likely already use Microsoft products in your operations. When using Azure, it’s easy to integrate and deploy Microsoft 365 tools like business-class email, collaboration tools including Microsoft Teams, and Office apps which are the standard in most businesses. The breadth of business applications makes it easy to create a holistic tech stack that supports your modern workplace.

 

Data and analytics. Learning from your data helps improve nearly every aspect of your business. However, collecting and managing large amounts of data requires powerful data tools. Microsoft Azure has many applications to help you analyze your data, like Azure SQL, Cosmos DB, Data Factory, Data Lake, Power BI, and more. These advanced tools plug right into your Azure environment, extending your IT data capabilities instantly.

 

Government agencies. Government organizations are subject to stricter data requirements, limiting their choices for cloud partners. Azure Government Cloud meets these rigorous requirements by completely separating your cloud data and providing enhanced security. It’s also compliant with regulations like HIPAA, FedRAMP, and IRS 1075.

Partner With OneNeck, a Certified Microsoft Cloud Service Provider

While reading about the advantages of using Azure, you’ve likely thought of a few applications for your business. As both a Microsoft cloud service provider and a hybrid IT solutions provider, we are uniquely qualified to help you leverage Azure to reach your business goals. For example, we help optimize your Azure spend, so you’re not wasting precious budget on unused resources.

Our goal is to provide value beyond just your Microsoft licenses, and help you make best-fit cloud decisions that fuel your business growth and while continually optimizing your current investments. And if your needs go beyond what Azure offers, we’ll help you make strategic decisions that benefit your company for the long haul. Do you want to find out which Azure applications are most suitable for your business needs? Contact us to learn more.

]]>
How to Get Board-Level Buy-In for Cybersecurity Awareness https://www.oneneck.com/blog/how-to-get-board-level-buy-in-for-cybersecurity-awareness-campaigns/ Tue, 18 Oct 2022 16:15:50 +0000 https://www.oneneck.com/?p=3114 It’s October, which everyone knows means time for trick-or-treating, pumpkin-spiced everything and cybersecurity awareness. Ok, possibly you didn’t immediately think of that last part. However, October is Cybersecurity Awareness month and with it comes the announcement from the Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA) that this year’s theme is […]]]>

It’s October, which everyone knows means time for trick-or-treating, pumpkin-spiced everything and cybersecurity awareness. Ok, possibly you didn’t immediately think of that last part. However, October is Cybersecurity Awareness month and with it comes the announcement from the Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA) that this year’s theme is “See Yourself in Cyber.” The goal is to highlight that whether one works in network security or is exclusively an end user, everyone has a role to play in strengthening cybersecurity.

After years of highly publicized ransomware attacks and expensive data breaches, it has become clear that organizations must allocate considerable resources for cybersecurity. This emphasis is necessary to protect company data, promote customer trust, and maintain compliance with the government and other regulatory agencies. Investment in secure and resilient infrastructure and applications such as next-generation firewalls, advanced backup and disaster recovery solutions, and utilizing IaaS and SaaS continues to significantly increase. However, broader cybersecurity awareness campaigns have yet to obtain such ubiquitous adoption status.

While most organizations acknowledge the importance of cybersecurity mindfulness, investing in and committing to cybersecurity awareness initiatives still lag significantly behind this stated recognition. This lack of prioritization, in many cases, is originated at the Board of Directors (BOD) level. There are many reasons for potential BOD hesitancy to support fully implementing cybersecurity campaigns, but some of the more common themes and means to address them include:

  • Budgetary Concerns– All organizations have a limit to the resources designated for security. In many cases, it is often easier to convince board-level members to allocate these assets for infrastructure, applications or even additional staffing. Garnering support to assign these resources to less-tangible elements, such as security awareness training, is often challenging. Bringing to the BOD assessments that demonstrate how security training aids an organization while concurrently underscoring the costs of inaction can go a long way in convincing board members of the elevated ROI they will see from implementation.
  • Lack of Cybersecurity Understanding– Education is vital. Company leadership will not support or approve campaigns they do not understand. It is common for leadership to view cybersecurity as an “IT issue” and not something that involves the entire organization. To raise the levels of understanding, one must ensure board members themselves are involved in cybersecurity training and are aware of not only the benefits of proactive company-wide approaches to cybersecurity but simultaneously understand the financial and reputational ramifications of breaches or attacks.
  • Resistance to Change– Technology is evolving, and so are the threats. The modern workplace requires a modern approach where everyone is part of the solution. Ultimately individuals, including board members, don’t like change and often want to continue doing things as they have always been. A prospective way to combat this inertia is by increasing board member involvement in planning cybersecurity activities and training. When you have full board-level support for a cybersecurity awareness initiative, all employees and team members will eventually be able to “see themselves in cybersecurity” and recognize that compliance with training exercises or policies is a core component of their profession.

When asked about obtaining board-level support for cybersecurity awareness campaigns, Katie McCullough, Chief Information Security Officer at OneNeck, advised, “At its core, cybersecurity is about assessing, managing or removing risk to the availability of customer’s critical data and services. By ensuring cybersecurity is included as part of any Enterprise Risk Management (ERM), one can typically help drive the awareness and support of these campaigns through scheduled reviews of the ERM, by the Board of Directors.”

Clarification of why organization-wide cybersecurity awareness matters before successfully bringing cybersecurity campaign concepts to the BOD’s attention is imperative. Begin by stressing that critical concepts such as data protection and holistically solid security posture are at their core intelligent business decisions. This can be followed by emphasizing awareness training provides significant ROI, with expenses for designing and implementing awareness campaigns being greatly overshadowed by the cost of a breach. Finally, it is wise to highlight the short-term inconvenience of awareness training will materialize into significant long-term gains. Ultimately, the goal is to work with your BOD to answer questions and provide information, so they feel comfortable making informed decisions.

Another area to underscore to board members is that they are accountable for the organization’s cybersecurity. We see an extreme example of this accountability by analyzing the well-publicized breach of SolarWinds. In November of 2021, investors sued the BOD, claiming knowledge of cybersecurity vulnerabilities before a data breach and subsequent failure of action.

While a lawsuit may not be the most likely outcome of a cyberattack, it nonetheless serves as a stark reminder to board members that they are ultimately responsible for how organizations secure themselves. Having proactive board-level conversations about cybersecurity awareness helps protect the organization’s customers, profits, reputation and the Boards of Directors themselves.

Encouraging professional education for board members is another technique for getting board-level buy-in. Katie McCullough notes, “More and more companies are looking for Board of Directors to consider certifications such as NACD Certification program, which includes a certification for Cyber-Risk Oversight as an emerging area of board oversight.”  Board members can use training resources to:

  • Learn foundational principles for board-level cyber-risk oversight.
  • Increase comprehension of issues, including allocating cybersecurity responsibilities, legal implications, setting expectations about the organization’s cybersecurity processes and ways to improve employee engagement in security practices.
  • Gain the ability to apply procedures and tools to improve organizational practices by focusing on specific risk components, including insider threats, third-party exposures, merger and acquisition due diligence, and adequate risk disclosure.

Board of Director buy-in is key to any organization having an effective cybersecurity awareness culture. For everyone in an organization to “see yourself in cyber,” the impetus must come from the top. Implementations of awareness campaigns, whether specifically designed to coincide with Cybersecurity Awareness Month or throughout the year, will only be effective if they are supported and promoted by company leadership.

While we have discussed several strategies and potential tools that can be used to secure top-level support, the essential thing to remember when dealing with board members is that despite their lofty positions, they are ultimately still just people. Effective communication, proper education and comprehensive information on the organization-wide benefits of cybersecurity awareness campaigns will go a long way in securing board-level support and approval.

]]>
Zero Trust is effective – what else is needed for security? https://www.oneneck.com/blog/zero-trust-is-really-effective-but-what-else-do-you-need-for-a-holistic-security-strategy/ Thu, 06 Oct 2022 15:58:12 +0000 https://www.oneneck.com/?p=3073 In my last blog on Zero Trust (on June 6 of this year), I talked about the reasons why Zero Trust is becoming more popular and why the change is necessary.  In this blog, I want to delve more into what does a Zero Trust model buy you and what you still need to do […]]]>

In my last blog on Zero Trust (on June 6 of this year), I talked about the reasons why Zero Trust is becoming more popular and why the change is necessary.  In this blog, I want to delve more into what does a Zero Trust model buy you and what you still need to do in your security program alongside Zero Trust.

At its core, Zero Trust is making the decision that all access to applications, data and resources should be checked and strongly verified on a continuous basis.  This helps your organization in several ways…

Zero Trust helps provide a mechanism for strong identity protection. As protecting identities (both normal and privileged) has become one of the main focuses of security, more and more security tools and business processes hone in how to recognize how identities are being used and what access should they have.

This is really important because of the way applications and data are now dispersed. As security operation teams are trying to baseline access, it becomes instrumentally important to know the context of which identities are logging in, from where, and on what device.

One of the goals of Zero Trust should be to limit the number of people or identities that access your systems, data and applications, allowing you to watch possible compromised account activity and prevent compromises. Using strong authentication and just-in-time access, along with watching login activity, will greatly reduce the chance for compromised accounts. This makes life a lot simpler operationally and maybe in application development.

Now that you have a single method for access and are using a consolidated identity with strong authentication and baseline login activity, this allows organizations to expose resources internally as they would externally. Now internal applications and resources can feel like cloud applications and resources when it comes an employee access – the login method could be the same and the security can be the same. This innately helps with identity protection and gives flexibility to possible new ways for remote access for remote workers.

This also increases visibility with security operational staff, as security operations can now focus on less things to monitor and alert on. They can develop access polices that can be applied to more applications, data and infrastructure because the access method has be simplified, and reacting to compromised account indicators will be faster since logins have been baselined.

Additionally, the number of security tools might go down because access has changed and simplified. This is in contrast the older security model where access could wildly vary depending on endpoint network location and identity used.

What do you need beyond Zero Trust?

There are things that still need to be done beyond Zero Trust. While Zero Trust does help in many ways, it does not cover all aspects of what an effective security program still requires.

  • Organizations still need to have strong policies and standards.
  • They need to have a working vulnerability program that covers as many assets as possible.
  • Remediation for found vulnerabilities needs to happen in a timely manner.
  • Data protection has to be carefully planned and documented in case someone or thing has compromised the integrity of the data.
  • Business continuity plans need to be in place and rehearsed.
  • Endpoint security must works with your Zero Trust strategy.
  • Security operations has to be built or outsourced to provide a response to security indicators.
  • Tools have to be in place to take in those indicators and provide alerts.

In summary…

This is a high-level view of the benefits of Zero Trust and what other aspects of security must coexist alongside that architecture and solution for effective security strategy.  In my next post, I will go into more detail on the components of Zero Trust and things to consider to get started planning and implementing it in your organization.

In the meantime, if you’re considering Zero Trust in your environment and want to discuss,  just contact us, and one of our security experts is here to help.

]]>
Leverage Collaboration Services to Empower Your Team https://www.oneneck.com/blog/leverage-collaboration-services-to-empower-your-team/ Tue, 04 Oct 2022 16:50:46 +0000 https://www.oneneck.com/?p=3062 If you were to survey your employees about aspects of their jobs that could be improved, you’d likely find better collaboration tools and meetings at the top of the list. In fact, in a PwC survey, 73% of respondents said they know of systems that would help them produce higher quality work. While employees don’t […]]]>

If you were to survey your employees about aspects of their jobs that could be improved, you’d likely find better collaboration tools and meetings at the top of the list. In fact, in a PwC survey, 73% of respondents said they know of systems that would help them produce higher quality work.

While employees don’t always think executives listen to their concerns, that’s not often the source of collaboration problems. As your company grows, you’ve had to assemble your tech stack on the fly — trying your best to provide the tools employees need while staying focused on the company’s larger goals.

But eventually, you get to the point where your tech stack starts having a cumulative effect on productivity, whether for better or worse. In this article, we’ll consider some factors that can hinder or help your utilization of collaboration tools.

Under-utilization Leads to Fragmentation

The problem with collaboration tools not being used to their full potential is that it can lead to fragmentation. When employees don’t have the same tools, it becomes difficult for them to communicate and collaborate effectively. In some cases, this can even lead to employees working on different parts of the same project without realizing it.

Nowadays, there are many collaboration services available that can help your team work more effectively. These services can provide a common platform for employees to share files, communicate, and collaborate on projects. By leveraging a collaboration service, you can ensure that your team is using the same tools and is working together towards a common goal.

Team looking at different collaboration tools.
Choosing the right collaboration tools starts with understanding employee needs.

Choosing a collaboration service isn’t as simple as using a product the technical team finds appealing. It’s crucial to leverage data, employee input, and company goals to ensure you’re committing to the right platform.

  1. Define your needs. To select the ideal collaboration service, you must first decide what you want it to do for your team. During the selection process, employee feedback is critical. Is executive opinion aligned with what employees actually need? From there, you can ask questions about your technical needs. Are you looking for something that will allow employees to share files and communicate easily, or are you looking for a service that facilitates meetings and client communication? You may also need a service that provides an all-in-one solution. Getting clarity on your actual needs will help you use your budget more effectively.
  2. Research and test different services. There are many services available today, so it’s important to find one that fits your needs. In your previous analysis, you may discover that your team only lacks a rock-solid communication app. With that knowledge, you may decide to use a niche app that does the job superbly. However, it’s good to keep in mind that the biggest collaboration boosts will come from tools that allow you to do many jobs within the same ecosystem. So, while your needs today may not be as intensive, you may opt to choose your tools planning for future growth. Some popular communication apps include Microsoft Teams, Slack, and Zoom.
  3. Deploy the collaboration service. Often, deployment can be the most challenging step since it requires training, technical capabilities, and administrative management. A solid transition plan will ensure that collaboration services are deployed uniformly across departments. Additionally, instituting a regular training program will help employees make the switch faster, increasing adoption rates.

Implementing new technology can be a phase that employees dread or are excited about. Much of their feelings will depend on the groundwork you do to get buy-in from your team. You can generate excitement by including your team in the decision-making process — clearly articulating why you’re making the change and providing training. When your team is excited about the change, you’ll have the momentum you need for successful integration.

Facilitate Deployment with a Collaboration Services Partner

Many businesses hit a roadblock when they get to deployment. Their team is excited about migrating to tools that provide a holistic collaboration experience. But they lack the technical expertise and migration experience to get started. If you feel stymied by the prospect of migrating your tools, we can help.

OneNeck offers managed collaboration services that give you the tools you need without the technical headache. We partner with companies like Cisco and Microsoft to provide complete solutions that cover the A to Z of your collaboration needs. And if you’re looking for something more streamlined, we can adapt our solutions to fit your needs. Contact us to learn more.

]]>
Azure Government: The Cloud Solution for Federal Agencies https://www.oneneck.com/blog/azure-government-the-cloud-solution-for-federal-agencies/ Thu, 29 Sep 2022 20:17:21 +0000 https://www.oneneck.com/?p=3054 Government agencies impact the life of everyone in the country, so they must operate as efficiently as possible. Cloud tools increase the efficiency of large organizations by offering a way to collaborate and share data with ease, but government agencies must be cautious since they need to maintain a high level of security. These requirements […]]]>

Government agencies impact the life of everyone in the country, so they must operate as efficiently as possible. Cloud tools increase the efficiency of large organizations by offering a way to collaborate and share data with ease, but government agencies must be cautious since they need to maintain a high level of security. These requirements make Azure Government the ideal cloud solution. It offers the same features and functionality as Azure but has been specifically designed to meet the rigorous demands of government organizations. This blog provides a brief overview of Azure Government and some of its key benefits.

A Quick Look at Core Features of Azure Government

While Azure Government operates similarly to the public version in many ways, it is subject to additional compliance and security requirements — providing government agencies with the needed security and cloud flexibility. Some of the key benefits of Azure Government include:

  • Enhanced security and compliance. Azure Government includes built-in security and compliance features that ensure data is protected.
  • Dedicated resources. Azure Government offers each client dedicated computing resources that are not shared with other customers. Providing each client with dedicated hardware ensures that government data is stored in a secure and isolated environment.
  • Flexible deployment options. Azure Government offers both on-premises and cloud-based deployment options, so organizations can choose the option that best meets their needs.
  • Scalability and reliability. Azure Government is a scalable and reliable solution that can meet the needs of even the most demanding or fastest growing workloads.

If you are looking for a cloud solution to help your organization meet its compliance and security requirements, then Azure Government may be the right choice. Consider some specific ways it provides government-specific security features.

Illustration with electronic circuit board connections and cybersecurity icons.
Protect your organization’s data with advanced cybersecurity features.

Azure Government delivers a unique blend of standard cloud and advanced security features. It offers all that you would expect from Microsoft, including encryption, role-based access control, and activity monitoring. But Azure Government goes a step further by providing many government-specific features, such as:

  • A segregated cloud environment that is separate from the public Azure cloud
  • Dual data control, which means that both Microsoft and the customer have access to encrypted data at all times
  • Compliance with a wide range of government security standards, including the Federal Information Security Management Act (FISMA), Federal Risk and Authorization Management Program (FedRAMP), and Criminal Justice Information Services (CJIS)

Compliance with government standards makes it easier for your agency to obtain an Authority to Operate (ATO) from the Designated Approving Authority (DAA). Additionally, these security features enable government organizations to store sensitive data securely while retaining all the flexibility of a cloud solution.

Azure Government’s segregated cloud environment is one of its most important security features. Since this environment is separate from the public cloud, government data is isolated from other customers’ data. As a result, government data is protected from cyber-attacks and unauthorized access.

Another reason government organizations leverage cloud solutions is to improve their scalability. How does Azure Government perform in this area?

Azure Government Makes Your Agency More Scalable

At its heart, Azure Government is a cloud solution. By giving you the ability to auto-scale applications and provision and scale services on demand, Azure makes your infrastructure more responsive to user needs. It also simplifies provisioning new services and managing applications through a self-service portal.

Azure Government enhances scalability by offering a cost-effective way to expand your agency’s resources. You pay for only the resources you use and can easily add or remove resources as needed. It also offers discounts for volume licensing and reserved instances which can help you save money when operating in a large organization.

Drive Your Organization Forward With the Cloud

When cloud tools align with your organization’s goals, they can help you boost efficiency, increase speed, and cut costs. The challenge is finding a partner to help you tailor Azure to your needs and deploy at scale.

As a Microsoft Cloud Partner, OneNeck is uniquely positioned to help you integrate Azure into your government agency. Our services enhance your IT capabilities while reducing the complexity of managing your Azure environment. If you’re looking for a way to make your agency more scalable, contact us to learn how Azure Government can benefit your agency.

]]>
Cisco UC and the End of Microsoft Basic Authentication https://www.oneneck.com/blog/cisco-unity-connection-and-the-end-of-microsoft-basic-authentication/ Wed, 28 Sep 2022 15:44:21 +0000 https://www.oneneck.com/?p=3049 For the past two years, Microsoft has been winding down the allowance of Basic authentication for its Exchanges services, and in September, Microsoft announced the altering of the authentication method supported by Exchange Online. As a result, Cisco Unity integrations to Exchange Online (M365) for Unified Messaging will be affected. Traditionally, applications have connected to […]]]>

For the past two years, Microsoft has been winding down the allowance of Basic authentication for its Exchanges services, and in September, Microsoft announced the altering of the authentication method supported by Exchange Online. As a result, Cisco Unity integrations to Exchange Online (M365) for Unified Messaging will be affected.

Traditionally, applications have connected to servers, services and API endpoints by sending a username and password via every request. Basic authentication is typically enabled by default due to its simplicity of setup. However, this authentication method is now viewed as an outdated industry standard and has become increasingly vulnerable to threats.

End of Microsoft Basic Authentication

On October 1, 2022, Basic authentication will be deprecated. As a result, support will only continue for applications using OAuth-based authentications. How does this affect those who utilize Cisco Unity? Simply put, it means that for any users of Cisco Unity Connection 11.5(1) SU7/12.5(1) SU1 and all older releases, Unified Messaging with Microsoft 365 will cease to work after the deprecation of Basic authentication.

Cisco Unity Connection Must Use OAuth-based Authentication

Cisco has stated that releases 11.5(1)SU8 / 12.5(1)SU2 and all newer versions of Cisco Unity Connection support both OAuth-based and Basic authentication for Microsoft 365:

Microsoft will support both types of authentications until the complete deprecation of Basic authentication. Upon completion of this changeover, users must exclusively utilize OAuth-based authentication.

Therefore, any customer currently using an earlier version of Cisco Unity Connection will need to update their deployment should they wish to continue using Unified Messaging with M365. Upon completing this upgrade, Cisco instructs that system administrators can configure the authentication method via the Unified Messaging Service Configuration page of the Cisco Unity Connection Administration.

Need More Time? What Can You Do?

For any organization that still requires updating its Unity Connection but needs additional time, Microsoft has announced there will be an opportunity to postpone this change. Customers can use self-service diagnostics to re-enable Basic authority for any protocols they need, once per protocol.

This postponement will be allowed between October 1 and December 31, 2022. However, it is critical to note that any protocol exceptions or re-enabled protocols will be turned off during the first week of January 2023, with no possibility of further use.

OneNeck, We’ve Got Your Back

If you have any questions or are unsure your Cisco Unity Connection is ready for OAuth-based authentications, we’re here to help.  Talk to one of our experienced team members today, and ensure your Cisco Unity Connection is future-ready.

 

]]>
Is Microsoft Teams HIPAA Compliant? https://www.oneneck.com/blog/is-microsoft-teams-hipaa-compliant Wed, 21 Sep 2022 17:46:34 +0000 https://www.oneneck.com/?p=3036 OneNeck customers dealing with electronic private healthcare information (ePHI) often ask the question is Microsoft Teams HIPAA compliant? These customers utilize M365 and Teams within their organizations and value the easy and effective collaboration it brings. Still, they are concerned about the implications of using these services when PHI is so critical to their business. […]]]>

OneNeck customers dealing with electronic private healthcare information (ePHI) often ask the question is Microsoft Teams HIPAA compliant? These customers utilize M365 and Teams within their organizations and value the easy and effective collaboration it brings. Still, they are concerned about the implications of using these services when PHI is so critical to their business.

So, is Microsoft Teams HIPAA compliant?

Absolutely. However, there are steps that every organization must take to establish and maintain this compliance.

The safeguards of the HIPAA Security Rule for compliance are broken down into three main sections: technical, physical and administrative safeguards. For our purposes, we’ll primarily focus here on the necessary technical safeguards.

One of the most important technology-related security HIPAA requirements is that all ePHI must be encrypted, so only authorized users can access the data or, in the event of a breach, compromised data will be indecipherable. Another crucial security requirement is that every authorized user with access to ePHI must have a unique user identification to monitor their use. As for physical devices, technology with HIPAA compliance must have an automatic log-off feature to prevent unauthorized access if said device is left unattended.

Microsoft Teams is developed with security at the forefront of its design and is well suited to meet HIPAA security requirements. Microsoft Teams has the following safeguards in place that assist in the securing of ePHI:

  • Access Controls provide users with login credentials that are unique to them, ensuring that PHI is only accessible to authorized users.
  • Single sign-on (SSO) enables users to secure access to related systems with one login credential (Microsoft Teams, M365, etc.).
  • Multi-Factor Authentication (MFA) requires users to submit multiple credentials to access data (username and password, biometrics, security questions, etc.), thus certifying legitimacy.
  • Audit Logs track access to ePHI to ensure observance of all the necessary standards.
  • Encryption transforms ePHI into a format only accessible via a decryption key, preventing unauthorized access to data at rest and in transit.

It is essential to note that while Microsoft Teams does include the necessary security features for HIPAA compliance, in many cases, the organization and its users must properly configure specific settings along with the implementation of companywide policies ensuring the safeguards above are followed. Ultimately, your organization’s policies, IT department and users must actively work together to ensure compliance is not only initially attained but constantly maintained.

BAA (Business Associate Agreement)

Per HIPAA 45 CFR 164.504(e), a business associate agreement (BAA) is required for any organization that will process PHI on another company’s behalf. This agreement provides the required security controls, the responsibilities of the parties involved and how PHI can be used. Even with all necessary security policies and controls enabled in Microsoft Teams, it would not qualify for HIPAA compliance until a signed BAA is in place.

Fundamental aspects of a HIPAA BAA include:

  • A description of how business associates are permitted and required to use PHI.
  • A requirement that PHI only is used or disclosed as contracted or required by law.
  • Business associates must utilize applicable security measures to ensure PHI is used in agreement with all contract terms.
  • Requires reasonable steps be taken to resolve any breach as soon as one is detected.

Fortunately, Microsoft states on its website that it is willing to sign a BAA with organizations utilizing Microsoft Teams for PHI. It is important to note they also provide a disclaimer that the end user assumes the responsibility of ensuring that Microsoft Teams is configured for HIPAA compliance. Once this BAA is signed, an organization can process and store ePHI with Microsoft Teams. One additional important aspect of which to take note, is that even if an organization already has a signed BAA with Microsoft for M365 or other services, they must confirm that Microsoft Teams is specified; if not, an additional Microsoft Teams BAA is required.

Organizational Responsibility for Maintaining Teams Compliance

Even with Microsoft Teams’ built-in security controls and a signed BAA, every organization must understand that they ultimately bear the responsibility of ensuring their use of Microsoft Teams is HIPAA compliant. Organizations must place a priority on practicing the appropriate security hygiene necessary to minimize security risks.

To remain HIPAA compliant, your organization must make the security and safety of PHI paramount. This requires top-down buy-in from the entire organization. Not only must HIPAA policies and procedures be established, but appropriate security awareness training must be routinely conducted, so everyone involved understands these best practices.

Ultimately, Microsoft Teams is capable of meeting all security features and legal agreements of HIPPA compliance. Nonetheless, whatever tools are used, maintaining compliance relies on your organization and its ability to establish and enforce HIPPA policies and procedures.

]]>
Add Security Leadership with a Virtual CISO https://www.oneneck.com/blog/add-security-leadership-to-your-organization-with-a-virtual-ciso/ Mon, 19 Sep 2022 21:05:49 +0000 https://www.oneneck.com/?p=3028 Small businesses are the backbone of the American economy, yet they are often neglected when it comes to information security. While large businesses can afford to hire a chief information security officer (CISO) full-time, small businesses often cannot, leaving them vulnerable to data breaches and other cyberattacks. However, there is a solution: hiring a virtual […]]]>

Small businesses are the backbone of the American economy, yet they are often neglected when it comes to information security. While large businesses can afford to hire a chief information security officer (CISO) full-time, small businesses often cannot, leaving them vulnerable to data breaches and other cyberattacks.

However, there is a solution: hiring a virtual CISO (vCISO). A vCISO is a professional who provides information security leadership to an organization remotely. They are typically part-time and work with the business owner to advise on the business’s security. Is a virtual CISO right for you? In this article, we’ll look at the benefits of hiring a virtual CISO, their limitations, and what to look for when hiring.Virtual

Why Consider Hiring a Virtual CISO

Ideally, every company would have experienced in-house information security leadership. However, even when a business has the budget, talent can be hard to come by. Virtual CISOs are a great solution to budget and talent concerns. They typically cost less than half of what a full-time CISO costs and are available when you need them.

That said, it’s important to understand what a virtual CISO brings to the table. Virtual CISOs serve as advisors that can help you develop and implement a security plan that meets your business needs. You can often find someone who has experience in your specific industry and can take into account regulatory standards like HIPAA.

Virtual CISOs also focus on bringing the right people on board and designing processes that keep your business secure. While an engineer can help you with the tactical implementation of your security program, people and processes are key to protecting data long-term. This focus is the sweet spot for CISOs.

The Limitations of a Virtual CISO

Since they are not a permanent member of the team, virtual CISOs serve as advisors rather than project owners. Therefore, a vCISO does not have the same level of authority as a full-time CISO. This difference can lead to communication issues between the virtual CISO and other team members.

Another difference between a virtual and full-time CISO is that your team will ultimately be responsible for the implementation and management of the budget. These limitations may cause problems for businesses with extensive attack surfaces or those who operate in heavily regulated industries. A final consideration is cost. While a vCISO is significantly cheaper than a full-time employee, the cost may still be too high for smaller firms to take on.

However, security is something businesses of all sizes need to take seriously. So, while the cost of information security leadership may seem steep, data breaches and legal action are much higher. That’s why many businesses bolster their organization’s security through CISO leadership. The key is analyzing your company’s needs and finding the right talent.

Person meeting with potential vCISO candidate.When hiring a virtual CISO, consider the individual’s experience and qualifications. The virtual CISO should have a deep understanding of information security in your industry. A CISO like that is more likely to be proactive and think outside the box when creating solutions to novel security challenges.

A vCISO should also be able to communicate effectively with employees at all levels of the organization. Since the virtual CISO will be working with your team closely in a leadership role, they must be able to build relationships and establish trust. Hence, a virtual CISO should be a good fit for your company culture.

Ultimately, hiring a virtual CISO is an important decision that can help protect your business’s data and reputation. But finding the right person can be an intimidating task. Our team at OneNeck can help you analyze your security needs and advise you on the best options available to you. Contact us to learn more.

Ten questions to ask before hiring a vCISO:

  1. What is your company’s budget?
  2. What are your company’s security goals?
  3. What is your company’s current security posture?
  4. What are your company’s compliance requirements?
  5. What is your company’s threat landscape?
  6. What experience does your vCISO need to have?
  7. What availability do you need from your vCISO?
  8. What services are necessities, and which are nice to have?
  9. What rates and pricing model are you comfortable with?
  10. How will you work with your vCISO?
]]>
Improve Availability and Scalability with Managed Storage https://www.oneneck.com/blog/improve-availability-and-scalability-with-managed-storage/ Fri, 09 Sep 2022 17:14:03 +0000 https://www.oneneck.com/?p=3009 The concept of managing storage is simple: as computing needs grow, you should add more storage. But doing this in a business is anything but simple. That’s because factors like speed, location, type, data architecture, access requirements, and, yes, size are all important to your storage infrastructure decisions. On top of choosing the proper storage […]]]>

The concept of managing storage is simple: as computing needs grow, you should add more storage. But doing this in a business is anything but simple. That’s because factors like speed, location, type, data architecture, access requirements, and, yes, size are all important to your storage infrastructure decisions.

On top of choosing the proper storage solutions for your current business needs, you must also plan for the future. Will the storage solution you implement today be viable in three years? How soon will it be before you need to scale your infrastructure once again? These are just a couple of questions that give your IT team nightmares.

Managed storage is when an organization outsources its storage management to a third-party provider. Depending on the organization’s needs, this may involve cloud storage, offsite storage, onsite storage, or a combination of the three.

Leverage the Benefits of Managed Storage

Support team actively working on client storage administration.
Empower your IT team with expert support.

With a traditional storage setup, once you run into the limits of your capacity, it’s time to upgrade or add to your hardware. As your organization grows, adding to your infrastructure becomes more complex because you must fully integrate new resources and make them accessible to your team. In contrast, a managed storage provider lets you scale storage resources on demand and only pay for what you need. How does managed storage benefit availability and scalability?

  • Dedicated storage administrator. One of the challenges of IT infrastructure is procuring the talent to manage essential components. Working with a managed storage provider allows you to leverage their team’s storage administrators for an instant injection of storage expertise.
  • Scale with advanced hardware. When managing hardware in-house, the goal is to get the most ROI out of every component. Reaching this goal often requires teams to use hardware for as long as feasible. A managed storage provider will have access to modern infrastructure with low latency capabilities. They can also provide node-based infrastructure, which is essential for scaling out your network.
  • Scalable security. Security is another concern when scaling resources since your attack surface grows as your business grows. Many teams lack the internal expertise to ensure systems stay secure. But working with a managed storage provider gives you access to their security team and partners. Your provider should also be able to adapt and secure onsite and offsite storage to fit your needs.
  • Near zero downtime. Managed storage providers have the infrastructure to provide redundancies at a level that’s hard to emulate for those doing it independently. Additional redundancies make possible techniques like live migration, allowing you to move systems without taking them offline. Moreover, systems can be backed up and restored, and resources can be allocated to workloads without users experiencing a hiccup.
  • Operational efficiencies. Working with a managed storage provider simplifies tasks like deploying additional resources and billing, providing an accurate view of existing storage resources. Since your storage provider takes care of management, you also remove this workload from your IT team’s plate so they can focus on company applications, services, etc.

Typical in-house storage infrastructure gets updated every three to five years, which likely happens when teams look at how well the previous system served their needs. Managed storage solutions are attuned to your business’s needs and can be optimized actively — leading to systems that perform better throughout their entire lifecycle.

Managed Storage for Your Evolving Infrastructure Needs

We don’t expect our personal computing devices to handle applications that come up five years from now (thus, the average replacement time is under three years). So, why should we expect differently from our business infrastructure where machine learning, computer vision, and blockchain applications are becoming more common?

Organizations are using their computing resources to power virtual desktop infrastructure (VDI), analytics software, private clouds, and more. Managed storage provides elastic infrastructure that allows you to allocate resources for a number of different needs and manage growing user bases. But how can you get started?

OneNeck is an IT solutions provider that offers managed storage services and more. We can help you use Azure, HPE, Cohesity, Commvault, NetApp and many more solutions in your storage strategy to ensure your data is always available. If you want to control your infrastructure and save money while harnessing deep storage expertise, contact us today.

]]>
Multi-cloud & Hybrid Cloud: How They Improve Infrastructure https://www.oneneck.com/blog/multi-cloud-vs-hybrid-cloud-how-do-they-improve-your-computing-infrastructure/ Wed, 07 Sep 2022 18:58:37 +0000 https://www.oneneck.com/?p=2979 A teammate who doesn’t work well with others is a liability, and the same is true of your business’s technology. When applications and systems can’t communicate, it creates all types of problems for your team. Disparate systems hurt productivity in many ways, like having to move data manually and getting an incomplete picture of your […]]]>

A teammate who doesn’t work well with others is a liability, and the same is true of your business’s technology. When applications and systems can’t communicate, it creates all types of problems for your team. Disparate systems hurt productivity in many ways, like having to move data manually and getting an incomplete picture of your company’s data.

Companies recognize the issues with disparate systems and have responded with solutions to overcome these hurdles. These solutions include multi-cloud and hybrid cloud computing. How do these computing methods work?

A multi-cloud setup is a cloud configuration that includes more than one cloud deployment of the same type (private or public). For example, a company may leverage several public cloud services like AWS and Azure. A hybrid cloud setup includes multiple deployment types (private and public) and integrates these deployments to work together seamlessly. For example, a company may mix a private cloud hosted by their organization with a public cloud service like Azure.

The benefit of these technologies is that they allow different systems to communicate and share data, making your team’s life easier. Both cloud setups increase the flexibility of your network and your computing potential.

The Benefits of Multi-cloud and Hybrid Cloud Computing

A canoe team rowing with power in order to win the competition

Moving to the cloud can improve your computing reliability and agility. In what ways? To answer that, we’ll look at the benefits of hybrid cloud and multi-cloud computing.

Flexibility. Cloud solutions give companies additional options when they upgrade their infrastructure. The hybrid cloud lets businesses keep part of their infrastructure on-premises. As a result, businesses can transition to cloud solutions incrementally. Many teams find this incremental move more feasible and less daunting.

Multi-cloud computing provides flexibility by allowing you to leverage different cloud services simultaneously. This gives your team access to additional tools and cloud providers that serve specific regions — bringing data closer to users and improving network performance.

Reliability. Outages in your infrastructure can hurt performance, stall work, and even cause you to lose customers. A reliable network isn’t one that never has issues but rather a network with contingencies that protect users from the effects of infrastructure problems.

Multi-cloud and hybrid cloud computing help you create robust backups that allow for dynamic failover switching. So, even if your system experiences an outage, it won’t impact your users. The difference between hybrid and multi-cloud is that a hybrid cloud setup will use a combination of onsite infrastructure and cloud services. In contrast, multi-cloud computing will use a mixture of cloud providers to achieve the same result.

Security. Factors like shadow IT and security requirements for sensitive data can dictate the setup of your cloud computing. Sensitive data requires fine-tuned controls that allow your organization to control access to documents and where data is stored. A hybrid setup permits organizations to store sensitive data onsite while using the cloud for other services.

Multi-cloud setups help you better assimilate shadow IT applications. For example, it may be more cost-effective and productive to embrace a new cloud application and add it to your toolset instead of migrating data from shadow IT applications. Embracing the shadow application gives IT control and visibility over these previously unmonitored applications.

Scalability. The beauty of cloud computing is that it enables businesses to respond to business growth efficiently. Instead of purchasing new infrastructure every time demand spikes, you can quickly increase and decrease computing power based on usage — keeping resources aligned with needs and avoiding over-purchasing.

A hybrid cloud setup further allows companies to keep some infrastructure onsite for lower long-term costs while leveraging cloud computing for overflow and specific application use cases.

Use the Cloud to Plan Long-Term

We know that computing infrastructure is critical to the success of our applications and services. However, we don’t know what traffic and demand will look like tomorrow. The cloud gives companies the best of both worlds by providing them with the resources they need today and the flexibility to pivot to the needs of tomorrow.

The choice between multi-cloud and hybrid cloud computing depends on your business’s requirements. OneNeck can help you analyze those requirements and make a choice that will benefit your company long-term. Talk to our team today and learn how cloud computing can supercharge your IT infrastructure.

]]>
Why Consider a Hosted Private Cloud Solution https://www.oneneck.com/blog/why-consider-a-hosted-private-cloud-solution/ Fri, 26 Aug 2022 17:36:38 +0000 https://www.oneneck.com/?p=2929 Cloud computing is an important business tool for companies that want to improve infrastructure flexibility and scalability. It allows them to easily share resources, such as servers, storage, applications, and services over a network. In contrast to a public cloud, where multiple organizations share resources, a private cloud is one where resources are dedicated to […]]]>

Cloud computing is an important business tool for companies that want to improve infrastructure flexibility and scalability. It allows them to easily share resources, such as servers, storage, applications, and services over a network.

In contrast to a public cloud, where multiple organizations share resources, a private cloud is one where resources are dedicated to a single organization. Businesses may choose the private cloud over the public cloud if they want more control over their hardware or need to meet strict security requirements. They may also want to avoid losing performance when another organization’s workload hogs the machine’s resources.

There are two main options when setting up a private cloud: setting up your own on-premise hardware or working with a provider to set up a hosted private cloud. Let’s consider the differences between each option.

Digital representation of a cloud with network connections.

Differences Between Hosted and On-Premise Private Cloud Solutions

The challenge with a private cloud is that the company using it is responsible for its hardware, security, and administration. Many businesses find this too much for their current team to handle but may still need the security and control that the private cloud offers. How can they gain control without infrastructure management?

A hosted private cloud is a private cloud that is maintained and operated by a third party. This third-party manages the infrastructure and ensures that the cloud meets the customer’s needs. Resources are isolated from other clients and dedicated to a single client — allowing for a private cloud experience.

Setting up the private cloud with a hosted service is a great solution for businesses who want to move away from on-premise hardware and software but still want some level of control over their data.

Benefits of a Hosted Private Cloud:

  • Complete oversight of the network
  • Hardware is managed by the provider who is more likely to keep pace with emerging technology
  • Access to experienced system administrators
  • Full control over security to maintain strict security standards for data protection like HIPAA and other government regulations
  • Infrastructure that is ready to scale
  • Controlled costs that are billed as an operating expense

On the other hand, on-premise private clouds offer more control over data and infrastructure but come with a higher upfront cost and require more maintenance. Additionally, businesses can get locked into using a particular hardware vendor’s technology if they choose this option. Lock-in can create compatibility and budget concerns during future upgrades. Choosing between an on-premise or hosted private cloud will typically come down to budget, control and future requirements.

Benefits of an On-Premise Cloud:

  • Complete oversight of the network
  • Full control over security to maintain strict security standards for data protection like HIPAA and other government regulations
  • Ability to choose specific hardware based on computing workloads
  • Authority to direct future hardware upgrades and management software decisions

Both on-premise and hosted private clouds offer isolated infrastructure that protects your data from the risks of shared hardware. However, by removing the burden of hardware management, hosted private clouds become much more accessible. How can you find the right private cloud partner?

Choosing a Hosted Private Cloud Partner

While choosing a hosted provider isn’t as permanent as on-premise equipment, making the right choice will speed up deployment and integration. There are a few key steps that can help you with your consideration.

  1. Make sure that the provider has a solid track record in your industry and is able to meet your specific needs.
  2. Ensure that the provider has the necessary resources and expertise to help you scale and help your organization leverage the available cloud tools.
  3. Review the contract’s terms and conditions carefully to make sure that you are comfortable with them.

Hosting your private cloud with a reputable provider can offer many benefits, including support and guidance as you move to the cloud.

Leverage OneNeck to get access to ReliaCloud, a hosted private cloud that provides dedicated compute resources from a Nutanix hyperconverged (web-scale) architecture. These services run in OneNeck’s data centers, where you get a managed cluster solution containing common services like hardware, cluster software, network, AOS management, hypervisor management and more.

At OneNeck, our goal is to help you protect what’s working in your core infrastructure while helping you navigate your path to IT modernization. Talk to us today about how you can build a private cloud solution that meets the demands of your workload.

]]>
Citrix ADC and Citrix Gateway Security Vulnerability https://www.oneneck.com/blog/citrix-adc-and-citrix-gateway-security-vulnerability/ Mon, 15 Aug 2022 20:20:19 +0000 https://www.oneneck.com/?p=2831 Citrix Security has discovered a vulnerability in Citrix ADC (formerly Netscaler) and Citrix Gateway, enabling an attacker to create a specially crafted URL redirecting to a malicious website. Citrix and OneNeck highly recommend that all customers utilizing these Citrix services take note of this vulnerability and determine if they are among those who may be […]]]>

Citrix Security has discovered a vulnerability in Citrix ADC (formerly Netscaler) and Citrix Gateway, enabling an attacker to create a specially crafted URL redirecting to a malicious website. Citrix and OneNeck highly recommend that all customers utilizing these Citrix services take note of this vulnerability and determine if they are among those who may be affected.

Vulnerability Description

The vulnerability (CVE-ID: CVE-2022-27509 and CWE: CWE-345) is an unauthorized redirection to a malicious website. Additionally, two pre-conditions determine potential susceptibility. The first is that appliances must be configured and operating as a VPN (Gateway) or AAA virtual server. Secondly, the targeted victim must use an attacker-crafted link.

Affected Versions

According to Citrix, the following supported versions of Citrix ADC and Citrix Gateway have been affected by this vulnerability:

  • Citrix ADC and Citrix Gateway 13.1 before 13.1-24.38
  • Citrix ADC and Citrix Gateway 13.0 before 13.0-86.17
  • Citrix ADC and Citrix Gateway 12.1 before 12.1-65.15
  • Citrix ADC 12.1-FIPS before 12.1-55.282
  • Citrix ADC 12.1-NDcPP before 12.1-55.282

A critical aspect of which to note is that organizations using Citrix-managed cloud services are not in danger of being affected by this vulnerability and do not need to take additional action. However, those with customer-managed ADC and Gateway appliances should take the following steps.

The Solution

Citrix recommends those who are currently affected or could potentially be in the future install all relevant updated versions of Citrix ADC or Citrix Gateway.

Updated Versions:

  • Citrix ADC and Citrix Gateway 13.1-24.38 and later releases
  • Citrix ADC and Citrix Gateway 13.0-86.17 and later releases of 13.0
  • Citrix ADC and Citrix Gateway 12.1-65.15 and later releases of 12.1
  • Citrix ADC 12.1-FIPS 12.1-55.282 and later releases of 12.1-FIPS
  • Citrix ADC 12.1-NDcPP 12.1-55.282 and later releases of 12.1-NDcPP

OneNeck Can Help!

Based on the potential harm these vulnerabilities could cause an organization, OneNeck recommends installing updated versions immediately, and our experienced team is here to help. Through our long-standing partnership with Citrix, we will quickly and effectively assess your Citrix appliances and determine which units face the potential of being affected. We will install all necessary updates so that you can get back to doing what you do best, knowing that you and your clients are protected. So, please Contact Us or your account rep today and let us help you continue to run efficiently, effectively and securely.

]]>
How Managed Network Services Can Lower IT Costs https://www.oneneck.com/blog/managed-services/how-managed-network-services-can-lower-it-costs/ Mon, 27 Jun 2022 21:08:52 +0000 https://www.oneneck.com/?p=2675 Imagine that your network is experiencing a surge in activity. You decide to respond by investing in infrastructure. However, weeks later, the surge drops since it was an anomaly, and you return to normal activity levels. Your business is now stuck paying for an investment they didn’t really need. Companies often face fluctuations in demand, […]]]>

Imagine that your network is experiencing a surge in activity. You decide to respond by investing in infrastructure. However, weeks later, the surge drops since it was an anomaly, and you return to normal activity levels. Your business is now stuck paying for an investment they didn’t really need.

Companies often face fluctuations in demand, forcing them to consider infrastructure investments long before they’re ready. That’s why many businesses are weighing the pros and cons of setting up their own on-premise network services or leveraging a managed service provider. Instinct tells us that it will be cheaper to run our own services, but the numbers tell a different story. A 2021 report by Mordor Intelligence found that businesses that use managed services can save between 25% and 45% on their IT budget. So, what contributes to the lower IT costs of managed services?

Save Money by Offloading IT Management

Every job in your company has an associated cost; it may come from employee time, hardware, software and other tools used to get the work done. IT management requires a combination of all these factors to operate smoothly, and teams that leverage managed network services can save money in seven key ways:

  1. Less downtime. Managed network service providers have large amounts of IT infrastructure in addition to the people and processes to ensure system continuity. They also have system redundancies (a significant capital expenditure) that work seamlessly so that users don’t realize when a server or system crashes on the provider’s side.
  2. Constant monitoring. In conjunction with redundant systems, these providers monitor their systems 24/7 using IT professionals and specialized software. For a company to achieve this level of monitoring would be costly and difficult given the market’s overall need for IT professionals.
  3. Costs as an operating expense. Setting up your own network services requires substantial upfront hardware investments, which must also be maintained and secured. In contrast, managed services are charged as a flat fee in which the provider takes care of the people, power, hardware, and software required to provide the service.
  4. Increased focus on the core business. Today most companies require some type of IT department, but running all your IT infrastructure on-premise will significantly increase hiring needs. Using managed services allows you to keep team efforts primarily focused on your core business, including the talent you try to acquire.
  5. Scale with ease. Whether you are a small or large company, managed services can scale to your needs. You can scale up and down based on current demand without making costly changes to your infrastructure.
  6. Speed of implementation. Implementing new technology takes research, time, and labor. All of which can slow down operations and distract from your team’s main tasks. Managed services can be implemented in a fraction of the time as on-premise solutions and be easily added to additional departments.
  7. Unified software solutions. Mismatched software solutions limit the potential for sharing data and extracting insights within your team. They also often lead to duplicative work and lower productivity. Managed service providers offer unified software platforms that allow you to manage everything from a single place and upgrade solutions without needing to upgrade your underlying infrastructure.

Offload IT Management by Leveraging Managed Network Services

Your company’s network infrastructure should help your team get work done instead of hindering productivity and frustrating your people. You can use managed network services to offload your day-to-day network operations and maintenance responsibility. This includes installing, monitoring, and maintaining network hardware, managing security, and troubleshooting any issues that arise.

At OneNeck, we help our customers lower costs through managed network services. We provide the expertise you need to deploy efficient and fully secure network hardware — analyzing usage trends to help you plan for the future. If you’d like to learn more about the ROI of managed network services, talk to our team today.

]]>
Comparing Data Center Colocation and Cloud Computing https://www.oneneck.com/blog/cloud/comparing-data-center-colocation-and-cloud-computing/ Tue, 21 Jun 2022 21:01:39 +0000 https://www.oneneck.com/?p=2672 So, how can business owners decide on the best IT strategy? It comes down to three requirements: administrative control, security and hardware. For example, if your business is in the healthcare or finance industry, you’ll have to abide by regulations that dictate how you handle customer data. Additionally, if you operate in Europe, you’ll be […]]]>

So, how can business owners decide on the best IT strategy? It comes down to three requirements: administrative control, security and hardware. For example, if your business is in the healthcare or finance industry, you’ll have to abide by regulations that dictate how you handle customer data.

Additionally, if you operate in Europe, you’ll be under GDPR regulations, which may not allow you to store data on cloud servers outside of the region. As we’ll see, choosing between data center colocation and cloud computing solutions has a lot to do with how much control you need.

Cloud Computing Solutions Simplify IT Management

Cloud computing is a service typically provided by a cloud provider, wherein they offer computing resources located in their own fully managed data centers. Customers use the cloud provider’s servers, network and storage to host their data and applications — eliminating the need for IT management.

The cloud provides a low entry cost for businesses, especially smaller companies. It also facilitates scaling hardware up and down based on consumption, allowing businesses to meet fluctuating demands more easily. Cloud computing makes it easier for businesses to get up and running since they only have to worry about application and data management and can leverage the cloud provider’s support staff.

The cloud can have downsides when it comes to long-term costs and compliance. As a company’s data usage increases, its associated costs will rise. Eventually, it can reach the point where its data needs are no longer cost-effective. Furthermore, since data is stored with a third party, they may face compliance challenges. Some of which may make cloud computing unfeasible.

Data Center Colocation Provides Unparalleled Flexibility

Colocation data centers are facilities that allow companies to rent secure space for their IT resources. The colocation facility provides power, space, network connections and sometimes physical security. But the client is responsible for its own hardware, as well as its management and maintenance.

Colocation data centers help businesses expand IT infrastructure without building their own data center. Thus, companies can place computing hardware closer to users, tapping into the latency benefits of edge computing. Since they are in full control of their hardware, they can maintain compliance with regulatory and industry requirements.

Additionally, since the hardware is not shared among different companies, businesses have a smaller attack surface — improving security. However, it’s not all positive. Companies must provide their own hardware, taking care of deployment, maintenance and support. This job can be challenging if the data center is in a different region and may necessitate the hiring of remote staff.

Side-by-Side Comparison of Colocation and Cloud Computing

Cloud Computing Data Center Colocation
Low cost of entry Infrastructure expansion without building a data center
Up/down scalability Strategic placement of resources closer to users
Easier implementation over owned infrastructure Full control over hardware and data
Cost inflation as data needs grow Business must provide the hardware
Data stored with 3rd-party Business need to maintain and support the hardware

Work With a Partner Who Understands Cloud Computing and Colocation Requirements

Cloud computing and colocation data centers have an important place in modern business. They provide needed options for the unique requirements of different organizations. Consider a financial institution based out of California that needs to equip its office in New York with private cloud resources.

Industry regulations may dictate specific requirements on how they transmit data. Using a colocation in New York would allow the company to provide local IT resources, improving performance while maintaining control over the data. However, less stringent requirements in a different industry may make a company favor cloud computing.

A prudent computing choice will take into consideration costs, performance and accessibility. At OneNeck, we help our customers deploy both cloud and colocation solutions in their operations, as well as a myriad of hybrid solutions that bridge the gap between. Contact us to learn more.

]]>
Microsoft 365 Audio Conferencing with Unlimited Dial-in Now Free https://www.oneneck.com/blog/cloud/microsoft-audio-conferencing-now-free-but-requires-action/ Fri, 17 Jun 2022 20:52:58 +0000 https://www.oneneck.com/?p=2668 Microsoft Announcement on Extending Audio Conferencing Capabilities …today, we are announcing that we will add unlimited dial-in capabilities for Microsoft Teams meetings across our enterprise, business, frontline, and government suites over the next few months. Even as cloud connectivity increases, we know that people join Teams meetings while they are on the go or struggling […]]]>

Microsoft Announcement on Extending Audio Conferencing Capabilities

…today, we are announcing that we will add unlimited dial-in capabilities for Microsoft Teams meetings across our enterprise, business, frontline, and government suites over the next few months. Even as cloud connectivity increases, we know that people join Teams meetings while they are on the go or struggling with a bad internet connection. Currently included with Microsoft 365 E5 and Office 365 E5, we have come to see dial-in as an important part of the complete Teams experience. Available with subscription in over 70 countries and with interactive support in 44 languages and dialects, unlimited dial-in provides peace of mind that users will be able to join their Microsoft Teams meeting from virtually any device regardless of location.
(Source: Microsoft’s Aug 2021 Announcement)

With the offer, anyone who is assigned the license can use unlimited dial-in minutes. There is also 60 minutes of dial-out minutes included per license, which is pooled at the tenant level and can be used by everyone with a license. If you have some end users that require a lot of dial-out licenses, an additional subscription can be added for that user.

How to Take Action and Turn On Free Microsoft 365 Audio Conferencing

If you already have Microsoft 365 Audio Conferencing licensed and configured, making the switch is quite simple:

  1. Work with your CSP to request their assistance.Or, if you’re a OneNeck customer, send a service request to servicedesk@oneneck.com for the quantity needed. The quantity should be the number of office licenses you have or less.
  2. Assign a license to one user, and remove the old Microsoft 365 Audio Conferencing license from that user.
  3. Finally, test the functionality. While we have not had issues with the new offer, we still recommend testing in your environment.
  4. Roll out to other users as you are comfortable with the process.
  5. Send a request/ticket to your CSP (OneNeck if applicable) to turn off auto-renew on the old M365 Audio Conferencing subscription.

If you do not have Audio Conferencing, in addition to adding the new subscription and assigning it to users, you will need to configure Audio Conferencing. Information on the configuration can be found on Microsoft’s site.

OneNeck – We’re Here to Help

If you are an existing Microsoft client and would like to enable Audio Conferencing in your environment, we can help with our Audio Conferencing Quick Start. Let one of our experienced Microsoft architects help you choose a right-fit subscription, configure the solution and then educate your team to manage your Audio Conferencing. Add-on hours can be scheduled for additional configuration if your Teams’ policies need to be addressed.

Common Questions We Get on Microsoft Teams Audio Conferencing

What is Microsoft Teams Audio Conferencing?

Audio Conferencing in Microsoft 365 and Office 365 enables users to call in to meetings from their phones. Audio Conferencing allows up to 1000 phone attendees.

What online services/office packages now qualify for MS Teams Audio Conferencing select dial-out?

Office 365 E5 and Microsoft 365 E5 already include Audio Conferencing and you don’t need to change or add anything for those licenses. Office 365 E1, E3, and F3, Microsoft 365 E3, F1, and F3 and Microsoft 365 Business Basic, Standard and Premium now qualify for free audio conferencing.

What is “Unlimited dial-in?”

Unlimited dial-in is the ability to assign a phone number to a Teams meeting so that roaming users can dial-in instead of using the Internet.

What is “Select dial-out?”

Microsoft includes 60 minutes/month/license of dial-out capability. This feature can be used when on a Teams call. For example: Jim and Mike are on a call and they decide they need Doug to answer a question. Jim and Mike can add a participant using Doug’s cell # and dial-out to get him into the call. Dial-out can also be used when you lose connection during a Teams meeting. If enabled, Teams will ask if you want a call back if you lose your meeting connection.

What if I need more dial-out minutes?

You can add the Extended Dial-out Minutes to USA/CAN ($4/user/month) license to a meeting organizer and they can schedule meetings with unlimited dial-out.

What is Operator Conferencing?

With Operator Connect Conferencing capabilities, organizations can use phone numbers from a third-party operator to join Microsoft Teams meetings. If your current operator is part of the Microsoft Operator Connect program, you can add phone numbers from your operator to your Audio Conferencing bridge and use them to join meetings. Without Operator Connect Conferencing capabilities, organizations can only use phone numbers provided by Microsoft for their audio conferencing bridge. To see if your operator participates in the Microsoft Operator Connect program, see the Microsoft 365 Operator Connect directory.


In conclusion, if you’re unsure of what to do next, remember OneNeck’s Microsoft experts are here to help!

]]>
Understanding Zero Trust https://www.oneneck.com/blog/security/understanding-zero-trust/ Mon, 06 Jun 2022 20:23:30 +0000 https://www.oneneck.com/?p=2665   The Zero Trust Network, or Zero Trust Architecture, model was created in 2010 by John Kindervag, who at the time was a principal analyst at Forrester. He defined it as a security concept centered on the belief that an organization should not automatically trust anything inside or outside its perimeters and instead verify anything […]]]>

 

The Zero Trust Network, or Zero Trust Architecture, model was created in 2010 by John Kindervag, who at the time was a principal analyst at Forrester. He defined it as a security concept centered on the belief that an organization should not automatically trust anything inside or outside its perimeters and instead verify anything and everything trying to connect to its systems before granting access.

Cisco lays out the original tenants of a Zero Trust network as follows…

 

 

At the core, even though Zero Trust has been defined by many in different ways, the message is always same – only allow “just in time access” to resources on premise or in the cloud in your organization, and treat all applications and resources as internet-facing. But this concept can send many an IT pro into a spiral. What about critical infrastructure? What about VPNs? How do you do this? Why is this better?

 

Why all the Zero Trust fuss?

Let’s take a step back and look at why Zero Trust is getting so much traction in the first place. This comes down to a few things – the growth and severity of security incidents in recent years, and how organizations are trying to stop and defend against those threats. The defending teams in organizations (aka “blue teams”) have been losing this threat war for a while now. It seems that breaches happen more and more, and the adage is not if but when.

So, why the increase in breaches? Security budgets are increasing. More professionals are being trained. More security products are available. So, it only stands to reason that blue teams should be seeing a decline in breaches, but we are not.

Possible reasons for the increase abound. Some see the security frameworks we use as the issue. Others blame the changes in access to IT resources since COVID. Now organizations have employees and customers access data, applications and infrastructure in both cloud and on-premises scenarios, accessing that data from anywhere. Our older security models made it harder to gain access to those things and maybe allowed too much access for too long, and our digital identities were not sufficiently protected.

This brings us back to Zero Trust. This new access need with data being in the cloud, via SaaS and on premise dictated a new security model to meet these new requirements. In future blogs, I will break down this Zero Trust more in-depth, helping you navigate the pros and cons of a Zero Trust approach in your organization. Stay tuned!

]]>
Is Cloud Storage Right for Your Business? https://www.oneneck.com/blog/cloud/is-cloud-storage-right-for-your-business/ Wed, 25 May 2022 18:43:00 +0000 https://www.oneneck.com/blog/cloud-is-cloud-storage-right-for-your-business/ Analyzing the Pros and Cons of Cloud Storage There’s no denying that cloud storage is convenient. The challenge is figuring out if cloud storage will provide the performance and security your business needs. Another consideration is whether your company will move 100% to the cloud or use a hybrid setup. Let’s consider a few pros […]]]>

Analyzing the Pros and Cons of Cloud Storage

There’s no denying that cloud storage is convenient. The challenge is figuring out if cloud storage will provide the performance and security your business needs. Another consideration is whether your company will move 100% to the cloud or use a hybrid setup. Let’s consider a few pros and cons to help you decide which storage solution will satisfy your team’s requirements.

The Pros of Cloud Storage

  • With physical infrastructure, you have to invest in hardware when you need to scale. These purchases can be costly, and they take time. Cloud storage allows you to scale up and down on-demand to keep your capacity aligned with your current business needs.
  • Updated technology. It’s unlikely that your company updates its IT infrastructure very often. The competitive nature of cloud storage solutions forces providers to keep up with modern technology, giving you access to updated hardware without the costs.
  • Storing your files in the cloud ensures that your people have access to important data wherever they have an internet connection. Accessibility is vital for teams with remote workforces and traveling sales people.
  • Disaster recovery. Every business should have a plan for recovering its data when disaster strikes. A crucial part of these plans is an offsite location for storing data. Cloud storage is ideal for the job as it is often located in a completely separate region and providers have their own redundancies in place.

Employee working remotely while drinking coffee.

The Cons of Cloud Storage

  • Security and privacy. Unless you host a private cloud, a third party will store your data. Their security policies and infrastructure will directly affect your complicity with regulatory and industry requirements. Additionally, some industries have more stringent rules for how you can store your data, like healthcare.
  • Long-term costs. Depending on your storage needs, on-premise solutions can be cheaper in the long run. To understand the big picture, your procurement team needs to factor in hardware costs and upgrade frequency, bandwidth costs, and performance and accessibility requirements.
  • Integration. Your systems may differ quite a bit from the data structure of some cloud providers, making integration difficult. You must make sure you have alignment beforehand to ensure a smooth transition.

Even though there are downsides to cloud storage, many solutions can be adapted to your needs — eliminating or mitigating these cons. For example, organizations that handle sensitive data can apply a hybrid approach to cloud storage. In this scenario, they may have a private storage infrastructure for data that isn’t uploaded to the cloud and use a cloud provider for other data needs. Additionally, many top-tier providers offer solutions that are compliant with strict industry regulations. How can you choose a storage solution for your company?

Tailor Data Storage to Your Needs

There is no one-size-fits-all solution for data storage. Some companies need ultra-low latency, others need scalability and accessibility, and yet others are just looking for a simple solution that can be implemented immediately. At OneNeck, we help our clients implement cloud solutions that range from a fully private cloud to a fully public cloud, and hybrid options in between.

Security and accessibility are crucial to getting the most out of your data. Our team can help you create a roadmap that prioritizes these qualities in your data storage solution. We’ll also analyze your business and technical requirements to ensure you have a final product tailored to your needs. Contact us to learn more.

]]>
When to Use OneDrive vs SharePoint https://www.oneneck.com/blog/cloud/when-to-use-sharepoint-vs-onedrive/ Wed, 04 May 2022 20:55:00 +0000 https://www.oneneck.com/blog/cloud-when-to-use-sharepoint-vs-onedrive/ SharePoint and OneDrive for Business are each great options when it comes to file-sharing software. Both are fully integrated into the Microsoft® 365 ecosystem for easy collaboration and allow users to store, share and synchronize files across locations and devices. While they have many similarities, they also offer distinct differences. OneDrive vs SharePoint: which is […]]]>

SharePoint and OneDrive for Business are each great options when it comes to file-sharing software. Both are fully integrated into the Microsoft® 365 ecosystem for easy collaboration and allow users to store, share and synchronize files across locations and devices. While they have many similarities, they also offer distinct differences. OneDrive vs SharePoint: which is the best option for your company? Can these applications be used interchangeably? Should we use them both?

These are questions raised in almost every organization.

Let’s explore how each of these applications operate and delve into some of their most common use cases.

The Similarities between OneDrive vs SharePoint

SharePoint and OneDrive both come fully integrated into the M365 environment. Each application stores files in the cloud and utilizes Microsoft’s data center infrastructure to securely store and move your files. As part of Microsoft 365, each application allows users to access their files from anywhere with internet access. Both can allow for access by other users to facilitate collaboration within a team. At their core, the two applications appear to serve very similar functions.

Common Features:

  • Cloud storage: Both offer cloud storage via Microsoft cloud space environment, meaning data is securely stored in Microsoft’s geo-redundant network of data centers.
  • Security: Both options enjoy the same enterprise level of security (SSL/TLS connection) guaranteed by Microsoft for all its M365 applications.
  • Global access: As part of the cloud-based M365 suite, SharePoint and OneDrive are accessible from virtually anywhere connected to the Internet.
  • Syncing to local storage: Both options offer the ability to sync to a local drive, either manually or via automation.

The Differences Between OneDrive vs SharePoint

While SharePoint and OneDrive share several characteristics, they also contain several distinct features that allow for significant differences in their usage.

The fundamental difference between SharePoint and OneDrive is the type of file being stored. OneDrive is primarily used for the storage of personal files. These could be early drafts, incomplete projects, or files that contain confidential information. By default, these files will be accessible only via an individual’s account. One does have the ability to make them available to share with select individuals at any point. Still, this permission needs to be given by the user before any others in the organization can access them. Collaboration can be easily accomplished within a team via OneDrive, but it will usually be on a more intentionally narrow scope.

SharePoint is Microsoft’s original workspace, designed for collaboration and productivity. Files placed here will immediately be accessible by an entire team. It is a content management system whose scope can range from small teams to an entire company and even those outside the organization. Accessibility to others is not just a feature of SharePoint; it is the goal. SharePoint is where content created within Teams and Outlook is stored. Users can see what other team members have opened and if anyone has updated a file. Team members can also easily track changes and quickly revert to previous versions of any file.

SharePoint has another unique aspect that differentiates it from OneDrive, the ability to create a modern intranet. This feature allows an organization to create a site that can only be accessed by its employees or on more minor scales to include select members of a particular team.

Common Organizational Intranet Uses:

  • Human Resources (onboarding, payroll, benefits, etc.)
  • Training
  • DevOps
  • Organizational specific applications

Determining Factors for Your Organization

Most organizations will decide on using both in some capacity. But for an individual or team choosing where they should store specific files, the answer will be determined by a few key aspects.

Purpose of the File ­­— Determining the purpose of the file will go a long way in deciding whether to use SharePoint or OneDrive. Why is the file being produced, and who needs to see it? The intended audience is critical. Is this meant to be viewed company-wide or sent confidentially to a customer?

Who is Working on the Project — Is the file produced by an individual, or is this a team project? A single user working independently on a project may choose to store the files in OneDrive until they are ready to be more widely dispersed. Files involving many users, or ones that require input from multiple sources, will be a more natural fit for the features found within SharePoint.

Workflow of the Team — Files should be saved according to how and where a team works! Ultimately, determining which application will be the most effective likely comes down to what team members are willing to use. SharePoint, in particular, requires a high level of buy-in from an organization and its teams to be effective. If all team members follow consistent procedures of uploading files to and editing documents within SharePoint, seamless collaboration can occur.

The Choice: Probably Both

Both SharePoint and OneDrive are robust cloud-based collaboration and storage solutions. OneDrive is a personal file storage solution where the individual to whom the drive belongs manages access. The user decides both the when and what of file sharing. Organizations use SharePoint for many purposes, from file storage to enabling intranet portals, pages and business applications.

In the end, it is impossible to say that one of these applications is better than another. It is more about an organization assessing their needs and workflow practices to determine where SharePoint or OneDrive will be most effective. Both, when used effectively, whether independently or in conjunction, are extremely powerful and productive collaborative tools.

OneNeck Has Your Back!

Need more information on SharePoint, OneDrive or any of the collaborative tools found in Microsoft 365? OneNeck can help. We are a Gold Certified Microsoft partner, and our expert team is here to help you choose, implement and optimize the right-fit M365 subscription plan for your business. We’ll help your organization thrive in the Modern Workplace with a secure, cost-effective solution that allows your team to be productive from anywhere!

]]>
Cyber insurance prices are soaring. What should you do? https://www.oneneck.com/blog/security/cyber-insurance-prices-are-soaring-what-to-do/ Tue, 26 Apr 2022 23:28:00 +0000 https://www.oneneck.com/blog/security-cyber-insurance-prices-are-soaring-what-to-do/ Cyber insurance is getting harder for companies to find — and it’s likely going to get harder. While cyber insurance is becoming more of a must-have for businesses, the explosion of ransomware and cyberattacks mean it’s also becoming a less enticing business for insurers. (Source: Harvard Business Review) This quandary is putting today’s business in […]]]>

Cyber insurance is getting harder for companies to find — and it’s likely going to get harder. While cyber insurance is becoming more of a must-have for businesses, the explosion of ransomware and cyberattacks mean it’s also becoming a less enticing business for insurers. (Source: Harvard Business Review)

This quandary is putting today’s business in a tough spot. Cyber insurance is important, but in order to secure a policy, premiums are steep (and climbing) and the requirements to qualify are also growing. To keep premium costs affordable, insurers are requiring a comprehensive list of good hygiene practices around security controls. These include:

  • Multifactor authentication (MFA) for remote access and admin/privileged control.
  • Endpoint Detection and Response (EDR).
  • Secured, encrypted and test backups.
  • Privileged Access Management (PAM).
  • Email filtering and web security.
  • Patch management and vulnerability management.
  • Cyber incident response planning and testing.
  • Cybersecurity awareness training and phishing testing.
  • Hardening techniques including Remote Desktop Protocol (RDP) mitigation.
  • Logging and monitoring/network protections.
  • End-of-life systems replaced or protected.
  • Vendor/digital supply-chain risk management.

While the list above may seem overwhelming, each one is key in maintaining a defense against attack, as well as providing a roadmap to more efficiently address the growing demands to maintain cyber insurance.

What if cyber insurance isn’t an option?

Having cyber insurance is always an important element to include in a company’s security program. However, we are also seeing situations where coverage may not be obtained because:

  • Insurers are moving away from providing coverage for certain types of ransomware events and/or adding huge increases in deductibles to provide these types of coverage.
  • Customers want to add or obtain coverage for the first time and can’t find an insurer willing to cover them.

When customers are faced with the option of not being able to obtain insurance, then the most important approach is to make investments in their security program.

An effective security program doesn’t always mean more tools.

At OneNeck, we take a different, “non-tool” approach to security first. Instead of starting with point solutions, we align with the Center for Internet Security’s Security Controls as a framework that provides a prioritized set of actions that address security gaps, which then later aligns with tools. In fact, we believe so strongly in the CIS Controls that we use them in our own business as a Managed Services Provider (MSP) that must pass rigorous annual compliance audits.

The CIS Controls allow our clients to understand where they are from a security risk perspective and then build out a step-by-step security plan that aligns to their unique environment.

OneNeck – We’ve got your back.

Whether it’s a service, an infrastructure solution or a cloud solution, we are here to help you decide what the best, most-secure course of action should be.

We proactively work with our customers to understand their current security controls, provide recommendations on how to better leverage the current investments in people, process, and tools. We then provide recommendations for the next investments, that will not only provide better security for their business, but also provide a roadmap to more efficiently and timely address the growing demands to maintain cyber insurance.

]]>
Stay Ahead of Threats with Managed Detection & Response https://www.oneneck.com/blog/security/leverage-managed-detection-and-response-to-stay-ahead-of-threats/ Mon, 18 Apr 2022 20:43:00 +0000 https://www.oneneck.com/blog/security-leverage-managed-detection-and-response-to-stay-ahead-of-threats/ We live in an age when passive security isn’t enough to protect company infrastructure. Security solutions must seek out and respond to unknown threats. Managed detection and response (MDR) provides companies with the security capabilities they need for the modern era. MDR is an outsourced cybersecurity solution that seeks out and remediates threats that standard […]]]>

We live in an age when passive security isn’t enough to protect company infrastructure. Security solutions must seek out and respond to unknown threats. Managed detection and response (MDR) provides companies with the security capabilities they need for the modern era.

MDR is an outsourced cybersecurity solution that seeks out and remediates threats that standard security controls miss. There are two factors that make MDR services a must-have for organizations. One is the lack of available cybersecurity talent. According to the annual Cybersecurity Workforce Study by ISC, there were 2.7 million unfilled cybersecurity positions in 2021. The second factor is the abundance of collected data at the enterprise level and the need to protect it.

With that in mind, we’ll dive into the challenges MDR solves and the benefits of implementing it in your business.

Seek and Destroy Security Threats With Managed Detection and Response

New technology can make your business more agile, profitable, and capable. However, it can also make security increasingly complex. Since companies need new technologies to thrive, it’s essential to keep security robust enough to handle the change. Consider five challenges managed detection and response addresses.

  1. Lack of cybersecurity talent. MDR counters the talent shortage by providing businesses with access to a fully-trained team of security experts. The outsourced organization handles talent acquisition and training. Thus, organizations get an instant injection of cybersecurity expertise.
  2. Alert fatigue. Teams are often inundated with security alerts. The sheer volume of alerts makes it difficult to sift through the noise and find malicious threats. MDR lightens the load by using active scanning technology to detect and analyze threats automatically.
  3. Protect against lateral movement. Once a bad actor gains access to your system, they’ll attempt to move deeper into your network and increase their control. MDR can detect this activity and limit the impact an attack has on your system.
  4. An increasing number of endpoints. The amount of devices your organization has to protect continues to increase. From edge devices to remote work hardware, your organization needs a holistic approach to security. MDR uses a network intrusion detection system (NIDS) which employs signature-based behavioral analysis to filter through millions of connections. The NIDS then passes on the threats that need further inspection to the MDR team.
  5. Access to advanced security technology. An MDR firm uses machine learning and AI technology to analyze and sift through massive amounts of data. This advanced technology is expensive and may be beyond the reach of many organizations. However, when working with an MDR firm, you get access to the advanced toolsets of a dedicated security company.

To sum up, managed detection and response gives teams of all sizes the security expertise and technology needed to protect against modern threats.

Leverage Partner Expertise for Enhanced Security

Leverage a mature security team with lots of talent.The security landscape continues to become more complex. Increasingly sophisticated attacks, more endpoints to protect, and talent shortages require innovative security solutions. You need cost-effective solutions that can detect intrusions, malware, and other malicious activity — helping you take rapid action to eliminate or limit the damage.

Finding technology partners to power your applications and protect your data is challenging. OneNeck provides services for your security needs, including MDR, endpoint protection, backup, disaster recovery, and more. For MDR, we partner with Alert Logic to provide you with advanced threat protection.

Here are four benefits you get from this strategic partnership:

  1. Centralized platform. Alert Logic’s platform covers all of your workloads, wherever they may be. Everything is managed from a single location in the cloud.
  2. Threat and response expertise. Work with a team of security researchers, data scientists, and engineers who have years of experience analyzing security threats.
  3. 24/7 monitoring. Your network is being monitored constantly, and OneNeck security experts are alerted within 15 minutes of any critical incident.
  4. Large talent pool. Alert Logic has 150 SOC analysts who partner with OneNeck’s security team to provide you with comprehensive coverage.

Our team helps manage security so you can focus on providing the best service to your customers. Through strategic partnerships, we ensure there are no gaps in your coverage. We have the experience to implement technology solutions for organizations of all sizes. Talk to our team about how you can implement MDR in your business today.


Want to learn more about MDR’s critical role in your cybersecurity strategy?  Check out the MDR Resource Library.

]]>
Wasting Money Trying to Save Money in the Cloud? https://www.oneneck.com/blog/cloud/wasting-money-trying-to-save-money-in-cloud/ Fri, 15 Apr 2022 00:25:00 +0000 https://www.oneneck.com/blog/cloud-wasting-money-trying-to-save-money-in-cloud/ The question is no longer if your company should invest in the cloud, but rather how much of your organization’s resources must go towards cloud-based infrastructure and services. In 2020 over 90% of all organizations used public cloud services (Source: DevOps) while spending over $50 billion. Cloud usage will only increase as the world evolves […]]]>

The question is no longer if your company should invest in the cloud, but rather how much of your organization’s resources must go towards cloud-based infrastructure and services. In 2020 over 90% of all organizations used public cloud services (Source: DevOps) while spending over $50 billion.

Cloud usage will only increase as the world evolves from traditional on-premises models to the Modern Workplace. Estimates suggest spending could surge to nearly $800 billion by 2025 and that enterprise spending on the cloud will comprise nearly 15% of IT revenue. (Source: Cision)

Organizations will continue to further move their workflows to the cloud due to the efficiency, flexibility and cost savings that cloud computing provides. The prospect of cost-saving is, for many, a leading factor in the transition and increased utilization of the cloud. It will likely then come as a shock to learn that in 2020, “cloud waste” accounted for a nearly $18 billion drain on company resources. (Source: Gartner)

What is Cloud Waste?

Cloud waste is defined as the purchase of cloud resources that are underutilized or, in many instances, go completely unused. This wasted spend increases operating costs and prevents using those resources in other areas of your business. So how do so many companies waste money trying to save money? There are two primary culprits that lead to cloud waste, overprovisioning and idle resources.

  • Overprovisioning of resources means that an organization pays for more resource capacity than it needs. Think of buying an expensive sports car when you could bike a few blocks to work. While all organizations desire capacity for continued growth, in many cases, the cloud resources invested are well beyond a company’s immediate needs. Simply put, your company should not be paying for infrastructure and other resources that you rarely or never use.
  • Idle resources are what exist between your maximum computing load and the actual load your company uses. While it certainly makes sense for organizations to plan for periods of increased consumption, there is often a significant gap between what is used on a typical basis (even what is consumed during peak activity) and the maximum load available.

Steps to Minimize Cloud Waste

So, where do you start when setting out to minimize cloud waste?

  • Effectively Estimating Capacity – Think before you purchase and ensure you accurately assess current and future needs.
  • Monitoring and Auditing – Closely track and audit your usage to discover under-used or idle resources.
  • Optimize Your Cloud Footprint – Find the right-size cloud infrastructure for your needs and continually optimize your investment as your cloud service needs evolve.
  • Automate Cloud Management/Scaling – Establish processes, and automate where possible, to direct resources where they are needed during usage fluctuations and release or shut down any idle resources.

OneNeck Has Your Back

If avoiding cloud waste was easy, the problem would not exist on such a massive scale. The steps mentioned above will limit the resources wasted in cloud computing, but how does a company estimate capacity, consistently monitor usage, as well as automate and optimize its cloud footprint?

OneNeck is a partner who has proven experience in hosting and managing both cloud and hybrid infrastructures. Our expert team can provide you with thorough IT Assessment Services to ensure that you understand how your current network is operating today and what its capabilities are for the future.

Utilizing OneNeck’s Cloud Cost Optimization service will uncover inefficient uses of your cloud resources. It can help identify exactly how much you are spending and where and how the waste can be eliminated. OneNeck knows that cloud cost optimization is not a one-time instance but an ongoing practice. Let us become a member of your cost management team so that you can focus on what you do best.

]]>
Microsoft 365 Pricing Updates for Nonprofits Coming Soon https://www.oneneck.com/blog/cloud/microsoft-pricing-updates-for-nonprofits/ Thu, 14 Apr 2022 20:25:00 +0000 https://www.oneneck.com/blog/cloud-microsoft-pricing-updates-for-nonprofits/ There’s been a lot of changes happening in recent months around Microsoft’s license pricing (aka New Commerce Experience), and most recently, Microsoft announced new pricing is coming for Microsoft 365, directly impacting nonprofits. On September 1, 2022, the following nonprofit price updates* will go into effect: Enterprise: Office 365 E1: $2.50 (from $2), Office 365 E3: $5.75 […]]]>

There’s been a lot of changes happening in recent months around Microsoft’s license pricing (aka New Commerce Experience), and most recently, Microsoft announced new pricing is coming for Microsoft 365, directly impacting nonprofits. On September 1, 2022, the following nonprofit price updates* will go into effect:

  • Enterprise: Office 365 E1: $2.50 (from $2), Office 365 E3: $5.75 (from $4.50), Office 365 E5: $15.20 (from $14), Microsoft 365 E3: $9 (from $8)

    Note that up 2000 seats of Office 365 E1 continue to be available as a grant via an Enterprise Agreement for eligible users, if they meet the requirement of 250 paid users of qualifying products.

  • SMB products: Business Premium: $5.50 (from $5)

    Note that up to 10 seats of Microsoft 365 Business Premium continue to be available as a grant. 300 seats of Microsoft 365 Business Basic continue to be available as a grant as well.

  • Also note they are NOT changing pricing for Microsoft 365 E5, Microsoft Business Standard, or the Frontline SKUs.

Why is the price of Microsoft 365 changing at this time?

This reflects the significant value that Microsoft has added to Microsoft 365 over the past decade and maintains the 60-75% nonprofit discount level they have had in place since 2013.

This change builds on the product innovation Microsoft has delivered over the past ten years to meet the changing needs of their customers. Since its initial release, they’ve added 25 new apps and over 1,400 features including:

  • The introduction of Microsoft Teams as the only solution with meetings, chats, calls, collaboration, and the ability to automate business processes.
  • Added capabilities like data loss prevention (DLP) for documents and emails, Office messaging encryption, and attack surface reduction capabilities.
  • New AI-supported capabilities that help automate tasks, more easily find information in a timely manner, and enables communication in ways that are more accessible for everyone.
  • Unlimited audio-conferencing dial-in across all Microsoft/Office 365 suites for nonprofits and Microsoft Defender security value into both Microsoft 365 E3 and Microsoft 365 Business Premium

How will this price change impact existing customers?

Existing customers are not impacted until their next renewal on or after September 1, 2022.

*Pricing indicated is equivalent to USD in your local currency.

We’ve got your back.

If you have questions about any of Microsoft’s recent price updates, our Microsoft experts are here to help you understand your options and optimize your Microsoft license investment.

]]>
A Quick Overview of Azure DevOps https://www.oneneck.com/blog/cloud/quick-overview-of-azure-devops/ Tue, 12 Apr 2022 20:43:00 +0000 https://www.oneneck.com/blog/cloud-quick-overview-of-azure-devops/ Advances in technology are happening faster than ever. Just look at the increase of patents filed every year. No wonder business leaders feel the pressure to deliver applications and services at mach speed. But a common challenge they run into is that siloed development infrastructure makes fast development difficult. This is where Azure DevOps can […]]]>

Advances in technology are happening faster than ever. Just look at the increase of patents filed every year. No wonder business leaders feel the pressure to deliver applications and services at mach speed. But a common challenge they run into is that siloed development infrastructure makes fast development difficult. This is where Azure DevOps can help. DevOps was developed to tear down the walls between departments, improving communication and collaboration.

However, working in a high-tech environment means that DevOps is extremely challenging to implement without the proper tools. Azure DevOps is a collection of developer services that help teams get past this. According to Microsoft, the tool set is designed to help teams plan work, collaborate on code development, and build and deploy applications.

The following sections will discuss what Azure DevOps is, why teams choose it, and how you can get started with Azure.

What Does the Azure DevOps Platform Include?

Azure DevOps is a flexible platform that provides users the tools they need to work efficiently in the DevOps framework. It gives its users flexibility by allowing them to work in the cloud or deploying it as an on-premises server solution. The platform has five main components that provide a complete DevOps solution.

  1. Azure Repos. Repos are version control tools that help track changes made to your code over time. When edits are made to the code, snapshots are saved, which you can revert to if needed. Version control is an indispensable tool for developers making changes at a rapid pace as it allows them to easily undo errors introduced into the system.
  1. Azure Pipelines. Pipelines automatically build and test code projects. It uses continuous integration and continuous delivery principles to test, build, and ship anywhere. Continuous integration is a DevOps technique that allows developers to catch bugs early and improve code quality. And continuous delivery helps ensure teams can keep up a high-velocity development environment.
  1. Azure Boards. Agile, Scrum, and Kanban are all integral DevOps processes. Azure Boards provide native support as well as configurable dashboards, calendar views, and integrated reporting that help improve project and issue tracking in your organization.
  1. Azure Test Plans. Testing is crucial to quality control and needs to happen quickly in a DevOps environment. Azure Test Plans provides a browser-based test management solution that provides the capability needed for planned manual testing, user acceptance testing, and exploratory testing. It also has tools for gathering feedback from stakeholders.
  1. Azure Artifacts. Software artifacts can help developers create development roadmaps that save time, improve flexibility, and make software easier to upgrade and maintain. Azure Artifacts can be used alongside Azure Pipelines to deploy packages, publish build artifacts, and integrate files between pipeline stages.

Azure DevOps provides developers with the tools to collaborate and code efficiently — living up to the DevOps philosophy.

Sticky notes that list the reasons to choose Azure DevOps. Azure DevOps is backed by one of the biggest names in technology: Microsoft. It offers powerful features, including quick setup, centralized control, and robust security. Azure is built around collaboration which is essential to DevOps. Tools like Azure Boards facilitate communication and help team members to understand what everyone is working on.

Additionally, Azure is an open platform that plays well with other tools like Slack and AWS. As a result, companies don’t have to change their tech stack completely to use Azure. In fact, Azure DevOps services can be used on a standalone basis if users don’t need all the platform’s features.

Another core tenet of DevOps is continuous integration and delivery. Azure DevOps services, like Azure Pipeline, facilitate implementing the CI/CD methodology. With so many moving parts in a large organization, it’s no wonder that people choose a platform like Azure to streamline their DevOps integration.

The Right Partner Can Help You Deploy DevOps Faster

Your IT team works hard to support your development team and business applications. It’s unlikely that they have the bandwidth to research different options and implement large-scale solutions. Our team at OneNeck has the hands-on Microsoft experience to answer your questions and get you up and running quickly.

As a Microsoft Cloud Service Provider, we understand the challenges of adopting a new DevOps solution. Leverage our expertise to harness the collaborative capabilities of Microsoft Azure in your business. Contact us today.

]]>
Why Your Company Should Care About Endpoint Security https://www.oneneck.com/blog/security/why-your-company-should-care-about-endpoint-security/ Thu, 31 Mar 2022 21:35:00 +0000 https://www.oneneck.com/blog/security-why-your-company-should-care-about-endpoint-security/ Businesses are increasingly dependent on technology. And data is essential to the efficiency of that technology as well as future business decisions. With its increased use in business operations comes a larger attack surface. So, shouldn’t companies that prioritize technology also prioritize security? Yes, especially when you consider the frequency that malware is released. The […]]]>

Businesses are increasingly dependent on technology. And data is essential to the efficiency of that technology as well as future business decisions. With its increased use in business operations comes a larger attack surface. So, shouldn’t companies that prioritize technology also prioritize security?

Yes, especially when you consider the frequency that malware is released. The  AV-TEST Institute registers over 450,000 new malicious programs and potentially unwanted applications every day. On top of that, remote work has exploded since the beginning of the pandemic. The sheer volume of malware and growing endpoints, especially unknown endpoints from BYOD, has put a spotlight on security concerns.

This new environment has pushed companies to look for advanced security solutions that can protect against more intelligent and widespread malware. Endpoint security is designed to be that advanced solution.

What is endpoint security?

Endpoints are devices connected to your company’s network. These can range from servers, personal computers, mobile devices, and even IoT devices like smartwatches. When you consider the range of devices, it’s easy to see why there are security concerns. But to fully protect enterprise infrastructure, a new layer is needed.

Traditional antivirus software methods take a preventative approach to security, intercepting known threats before they enter the system. While this is an important security component, the sheer quantity of malware created daily means that databases will always have gaps in knowledge. Additionally, antivirus software is typically installed and managed at the user level, restricting the control and access capabilities of security admins.

Endpoint security improves on traditional antivirus technologies in several key ways:

  • Continuous detection capabilities. With large amounts of malware created every day, it’s unlikely that your preventative defenses will recognize every threat and be able to defend against them. Endpoint security continuously monitors devices on the network to detect abnormal file behavior, leveraging AI and machine learning. It can then add new malware entries to the cloud for preventative detection.
  • Cloud-based malware registry. Antivirus software used to rely on downloadable databases to ensure your software was updated on the latest malware. However, this process depends on user updates which are slower and unreliable. Cloud-based solutions allow endpoints to share a single database that’s always updated with known threats — eliminating security holes from endpoints that are slow to update.
  • Unified admin controls. Managing an organization full of devices is hard enough, but the challenge is multiplied when using varied software solutions and processes. Endpoint security provides a single dashboard for all users and devices. Additionally, security admins have the needed controls to act when threats arise.

By combining preventative security with continuous detection and response capabilities, endpoint security helps companies defend against a growing number of threats.

Secure Your Network with OneNeck and Cisco

Data is one of your business’s most valuable assets and is also one of the most vulnerable. Security admins must protect devices that vary widely and are located in different regions, even more so since COVID has pushed many companies to leverage remote work in their operations. OneNeck partners with best-in-breed partners like Cisco to provide modern endpoint security that helps keep your data safe.

Endpoint protection is designed to prevent known threats, detect new ones, and respond to eliminate them promptly. Cisco Secure Endpoint uses the cloud to provide the latest threat intelligence, as well as advanced algorithms to detect new threats and rapidly respond to them — isolating the endpoint to mitigate damage and remediating malware across all devices.

Cisco Secure Endpoint brings together endpoint protection platform (EPP) and endpoint detection and response (EDR) capabilities in a unified solution, and it eliminates the need to manage separate solutions for complete coverage while simplifying deployment and management tasks.

OneNeck Simplifies the Integration of Your Security Solution

Security is essential, but we realize it’s only one piece of your network. Time is limited, and you need solutions that work reliably and reduce the complexity. OneNeck can advise you on the strategies and solutions you need to keep your endpoints safe and protect your data. Contact us to learn how you can protect against threats in real-time.

]]>
.NET 5.0 Will Reach End of Support in May https://www.oneneck.com/blog/net-5-0-will-reach-end-of-support-in-may/ Tue, 29 Mar 2022 00:00:00 +0000 https://www.oneneck.com/blog/net-5-0-will-reach-end-of-support-in-may/ For organizations using .NET 5.0, you’d better take note of Microsoft’s recent announcement. .NET 5.0 will reach end of support on May 8, and after the .NET May 2022 updates, Microsoft will no longer provide updates including security fixes or technical support for this version. .NET and .NET Core refer to several technologies including the […]]]>

For organizations using .NET 5.0, you’d better take note of Microsoft’s recent announcement. .NET 5.0 will reach end of support on May 8, and after the .NET May 2022 updates, Microsoft will no longer provide updates including security fixes or technical support for this version.

.NET and .NET Core refer to several technologies including the runtime, ASP.NET Core, and Entity Framework Core. Looking for the support policy for another part of the .NET platform? See the .NET Support Policy page.

The following table tracks release dates and end of support dates for .NET and .NET Core versions.

NET Blog

So, what should .NET 5.0 customers do? It’s time to migrate your applications to .NET 6.0. You can download .NET 6.0 from the .NET website.

For more information about installing the newest version of .NET, check out this informative Microsoft blog.

And, as always, if you have any questions, our Microsoft experts are here ready to help.

]]>
The Importance of an Upfront Cybersecurity Policy Framework https://www.oneneck.com/blog/security/upfront-cybersecurity-policy-framework/ Sat, 12 Mar 2022 02:34:00 +0000 https://www.oneneck.com/blog/security-upfront-cybersecurity-policy-framework/ Organizations are in a hurry to mature their cybersecurity programs. Whether it is world events, prior incidents, or just the desire to be security conscious that is driving these efforts, there is one thing that makes these efforts less complicated along the journey – develop your cybersecurity policy framework first. Developing a policy framework to […]]]>

Organizations are in a hurry to mature their cybersecurity programs. Whether it is world events, prior incidents, or just the desire to be security conscious that is driving these efforts, there is one thing that makes these efforts less complicated along the journey – develop your cybersecurity policy framework first.

Developing a policy framework to support your cybersecurity program can seem daunting and is often left for last when prioritizing a 2-, 5- or even a 10-year roadmap. By creating a policy framework at the beginning of your roadmap, you lay the foundation for decision making that can be followed and referenced during the project lifetime and beyond.

A strong policy foundation will help facilitate the tracking, guidance, and enforcement of your cybersecurity program. Building a policy framework can be as simple as starting with one policy that encompasses the most important aspects of your cybersecurity infrastructure. The Center for Information Security (CIS) has a great template to use when starting this effort.

Check out this CIS example of a completed Information Security Policy, which can be used as a template by editing details to better reflect your organizational environment.

As you develop your program’s policy framework, be sure to…

  • Build in requirements for annual reviews (at minimum) to ensure your policies are adapting to organizational changes and technological advancements.
  • Also consider that as your policies mature, it may be necessary to document supplemental processes, standards, guidelines, etc., to fully support your policies.

By creating a simple policy framework at the beginning of your roadmap, you create the guidance necessary for configuring tools, training employees, protecting data, and more. Having a policy framework already available, lets you build out your program to match your policy, instead of trapping yourself into writing policy based on your program after it is implemented.

We’ve got your back.

If you’re not sure where to start with your security framework and would like to talk with one of OneNeck’s security experts, we are here to help.

]]>
Conflict in Ukraine is raising cyber risk for organizations https://www.oneneck.com/blog/security/conflict-over-ukraine-is-raising-cyber-risk-for-us-organizations/ Fri, 25 Feb 2022 03:58:00 +0000 https://www.oneneck.com/blog/security-conflict-over-ukraine-is-raising-cyber-risk-for-us-organizations/ As the world watches Russia’s conflict with Ukraine, US services providers, like OneNeck, operating critical infrastructure are watching closely as cyber risk increases with any physical conflict. The FBI, CISA and the National Security Agency put out a joint advisory in January about potential cyberthreats against US critical infrastructure. CISA also warned US companies to […]]]>

As the world watches Russia’s conflict with Ukraine, US services providers, like OneNeck, operating critical infrastructure are watching closely as cyber risk increases with any physical conflict. The FBI, CISA and the National Security Agency put out a joint advisory in January about potential cyberthreats against US critical infrastructure. CISA also warned US companies to protect their IT systems against destructive wiper malware, which has been used against targets in Ukraine.

At OneNeck, our security teams across the OneNeck/TDS organization are closely monitoring the events related to this conflict.  As a telecommunications and service provider, we include ourselves as a key contributor to critical infrastructure, and have been evaluating all alerts from the CISA for the last several months, and we are constantly evaluating our security posture in alignment with those alerts.

Overall our core strategy is to stay disciplined and stay the course related to prior assessed risk reduction activities while increasing awareness and visibility to potential threats in this emerging area.  We have a solid foundation of controls that are monitored in the environment and multiple additional controls in the procress of being implemented to further reduce risk, in alignment with the recommendations that CISA Shields Up states.

The following are some key activities that teams across our organization have been performing in preparation:

  • Reviewing CISA advisories, briefings and checklists of protections to ensure recommended controls are in place and operating effectively.
  • Implementing increased threat monitoring of potential suspicious activities.
  • Reviewing security vendor advisories and verifying increased threat monitoring in security tools is activated.
  • Increasing communications to our associates on heightened awareness
  • Reviewing security risk mitigation objectives to determine if any priorities should shift.

Since traffic can easily come from anywhere in the world, it is incredibly important to have a full security program, and as CISA recommends, at a minimum…

  • Update your operating system and software.
  • Implement user training and phishing exercises to raise awareness about the risk of suspicious links and attachments.
  • If you use Remote Desktop Protocol (RDP), secure and monitor it.
  • Make an offline backup of your data.
  • Use multifactor authentication (MFA).

OneNeck – We’ve got your back.
We know these can be stressful times, so if you’d like to talk with one of OneNeck’s security experts regarding this situation and ensure your security defenses are sufficient to keep you safe, we are here to help.

]]>
Ransomware is still a top threat, especially in healthcare https://www.oneneck.com/blog/security/ransomware-is-the-top-security-threat-for-healthcare/ Tue, 22 Feb 2022 19:32:00 +0000 https://www.oneneck.com/blog/security-ransomware-is-the-top-security-threat-for-healthcare/ Ransomware continues to be the top threat to today’s organizations, with healthcare topping the list of verticals most at risk, putting millions of patient’s personal and financial data at risk, according to a recent threat summary report from Cisco Talos. Additionally, healthcare facilities are uniquely affected when breached, as it’s not just dollars lost as […]]]>

Ransomware continues to be the top threat to today’s organizations, with healthcare topping the list of verticals most at risk, putting millions of patient’s personal and financial data at risk, according to a recent threat summary report from Cisco Talos. Additionally, healthcare facilities are uniquely affected when breached, as it’s not just dollars lost as with manufacturing or enterprise – lives are potentially at stake.

The pandemic has further exacerbated security risks and strained IT teams at healthcare organizations as they’ve increased their remote work and telemedicine, making them even more vulnerable to bad actors. So, what should healthcare IT leaders do to ensure they’re not the next big news story?

OneNeck CISO, Katie McCullough, says, “Per the HIPAA Security Rule, the first step in identifying and implementing safeguards that keep healthcare organizations safe is to conduct a risk assessment. It’s foundational in protecting electronic health information. At OneNeck, our approach is to evaluate a healthcare organization’s current security capabilities against the Center for Internet Security’s recently published version 8 CIS Controls, and to provide an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity and availability of their electronic protected health information.”

The Security Rule regulations addressed in this assessment are divided into administrative, physical, and technical safeguards.

  • Administrative Safeguards:
    • Risk management process
    • Security personnel
    • Information access management
    • Workforce training and management
    • Periodic assessments
  • Physical Safeguards:
    • Facility access and control
    • Workstation and device security
  • Technical Safeguards:
    • Access control
    • Audit control
    • Integrity controls
    • Transmission security
    • Encryption

GettyImages-1245152030Katie continues with, “As the most-targeted industry, today’s healthcare organizations can’t afford to not proactively address these critical security safeguards. There’s just too much at stake. But don’t go it alone. An experienced security partner like OneNeck can bring the outside perspective and deep industry knowledge that will help a healthcare organization identify their risks and prioritize a mitigation plan that will keep the bad guys out and keep sensitive patient information safe.”

Want to talk to a OneNeck security professional? We’re here to help.

]]>
Embracing the Modern Workplace in Your Business https://www.oneneck.com/blog/cloud/embracing-the-modern-workplace-in-your-business/ Tue, 22 Feb 2022 02:51:00 +0000 https://www.oneneck.com/blog/cloud-embracing-the-modern-workplace-in-your-business/ People are a business’s most important asset. However, it’s harder than ever to attract and retain top talent in today’s labor market. The market favors employees, and people aren’t willing to put up with toxic environments or stagnating companies. Thus, businesses need to create a modern workplace that keeps employees happy and engaged. So, what […]]]>

People are a business’s most important asset. However, it’s harder than ever to attract and retain top talent in today’s labor market. The market favors employees, and people aren’t willing to put up with toxic environments or stagnating companies. Thus, businesses need to create a modern workplace that keeps employees happy and engaged. So, what do people want?

Gone are the days when businesses could offer a slightly higher wage and expect employees to flock to them. People are looking past salary to other benefits, like remote work capabilities. In fact, in a FlexJobs survey, 52% of men and 60% of women stated they would quit if they could not continue to work remotely. Remote work has gone from a nice perk to an expectation. And this shift has compelled businesses to adapt their technology and workplaces to accommodate changing expectations.

Helping your business evolve from a traditional office to a modern workplace is challenging. However, the right technology and infrastructure can simplify your transition.

Leverage Technology During Your Transition to a Modern Workplace

Transitioning to a modern workplace permanently requires that business leaders rethink employee workspaces. It’s no longer true that employees need to be in the same building to collaborate seamlessly. Tools like Microsoft Teams, Slack, Asana, and SharePoint help facilitate communication, project management, and collaboration among teams regardless of their location.

However, remote work does present some technical challenges. For example, it’s not easy to create a software stack where everything is connected seamlessly. This disconnect can be frustrating to employees and slow down productivity. Another challenge is that remote work often requires that companies provide cloud computing capabilities and secure connections to on-premise data — ensuring that teams have access to mission-critical applications.

Businesses are solving the modern workplace challenges by working with full-service IT partners who can provide both the technology and infrastructure to empower their remote teams. IT infrastructure is essential to leveraging technologies like virtualization and hyperconverged infrastructure, which enable businesses to manage incoming computing requests dynamically and give employees access to the needed software. Additionally, there are many positive business outcomes from transitioning to a modern workplace.

The working environment of a modern workplace is designed to meet your business’s physical and technological needs and those of your employees. It’s only reasonable that these needs would change as society’s norms and expectations transform. Business leaders that approach the transition to a modern workplace with a positive mindset experience the following five advantages:

  1. Draw talent from a global workforce. Enabling remote work in your organization expands your talent pool to a worldwide candidate list from those in your immediate area. This prospect gives businesses more flexibility in times of labor shortage and allows them to find the absolute best in their industry.
  2. Improve connections between customers and partners. Think about how much more comfortable we’ve become with video conferencing and other interactive web tools. For example, in traditional fields like appliance repair, teams can video chat through a company portal, review the customer’s issue and respond with precision.
  3. Lower overhead from physical infrastructure. With more people working from home, companies can lower physical office costs by embracing the modern workplace. Companies can then pass these savings on to employees to help improve their home office equipment while still improving their bottom line.
  4. Better integrated software. Businesses that ensure that employees can collaborate effortlessly, and that software works together seamlessly, enhance areas like customer service and business operations. For example, when employees aren’t spending their time troubleshooting or moving data from one application to another, they are more efficient – boosting profitability.
  5. Promote future IT investments. When your day-to-day work depends on your IT infrastructure, it’s easier to get leadership buy-in for future IT investments. This mindset shift can promote a culture of innovation and help your business respond with agility to future changes.

Building a modern workplace can make your business more technologically and operationally sound. These changes are already happening everywhere. The only difference is that the companies that embrace the change will be better integrated and better able to lead their industry.

OneNeck Can Help

We’ve discussed the challenges inherent in modernizing your workplace. But, you don’t have to do it alone. OneNeck can give you the tools to transition into a modern workplace. We’ve got you covered, from software stacks based on Cisco and Microsoft technologies to cloud, hybrid cloud, and colocation infrastructure resources. Let’s talk about how you can embrace the modern workplace. Contact us today.

]]>
Benefits of a 30-day Patching Cycle https://www.oneneck.com/blog/security/benefits-of-a-30-day-patching-cycle/ Mon, 14 Feb 2022 22:25:00 +0000 https://www.oneneck.com/blog/security-benefits-of-a-30-day-patching-cycle/ Maintaining your organization’s security is an ongoing process that never ends. With security threat constantly evolving, your defenses have to evolve too. That’s why many organizations choose to work with a managed service provider like OneNeck, which offers technology expertise at a scalable cost and built-in security processes that keep customers safe from attack. As […]]]>

Maintaining your organization’s security is an ongoing process that never ends. With security threat constantly evolving, your defenses have to evolve too. That’s why many organizations choose to work with a managed service provider like OneNeck, which offers technology expertise at a scalable cost and built-in security processes that keep customers safe from attack.

As OneNeck’s CISO, I lead the directive on patching frequency, and I’m often asked what goes into determining the timing of our patching schedule. When it comes to patching, we follow an every-30-day approach, and here’s why…

Consideration 1
Patching for vulnerabilities requires some risk analysis to understand and balance the cybersecurity risk and the business functionality risk.  The risk analysis needs to consider the severity and impact of vulnerability being patched, as well as assessing for potential adverse/unintended impact to users and business applications or processes.  Based on most vulnerabilities, a 30-day patching cycle allows for the balance of assessing the patches being released and proper business testing.

data-breach-report-graphicAdditionally, statistics in annual breach reports identify that most vulnerability exploits happen due to devices not being patched for months/years (see chart here from Verizon 2021 Data Breach Report.)

However, for zero-day vulnerabilities, the severity/impact can be significant, and we would completely agree that >30 days is typically not sufficient.  Frequently, a zero-day vulnerability has bad actors actively exploiting the vulnerability; therefore the cybersecurity risk is known to be high, the risk to the business functionality is recognized, and patching happens immediately.

OneNeck’s process for zero day vulnerabilities includes same-day notification to customers, <24 hours technical teams assess vendor provided workarounds or patches (if available), and our security teams assess the vulnerability for known exploits or other mitigating factors.  If factors warrant immediate patching, OneNeck provides that recommendation to customers and schedules the Change Record based on the customer’s business approval.

Consideration 2
At OneNeck, we highly recommend and work with our customers to take a Defense in Depth approach to cybersecurity. Defense in Depth refers to an approach in which a series of security mechanisms and controls are purposefully layered throughout a computer network to protect the confidentiality, integrity, and availability of the network and the data within.

These security controls include vulnerability management, which defines the need to complete timely patching, but also needs to include heuristic anti-malware protection, responsive 24×7 security monitoring, boundary control, and access and identity management to name a few.  With appropriate adoption of Defense in Depth, it is our perspective that then you can take the appropriate time to do the risk analysis for patching vulnerabilities balancing the cybersecurity risk and the business functionality risk.

Exceptions to the Rule
There are always exceptions, as noted above with zero-day vulnerabilities, a particular business critical device, or a device that Defense in Depth cannot be applied to, and in those situations, a more aggressive patch cycle should be considered.  However, for good security hygiene, OneNeck aligns with global security frameworks such as the Center for Internet Security (CIS Controls), whose guidelines recommend performing operating system updates on enterprise assets through automated patch management on a monthly, or more frequent, basis.

We’re here to help.
Maintaining a hardened security posture can weigh on the most seasoned IT professional, but you don’t have to go it alone. As a managed services provider, we’ve seen it all, and as a security services provider, we’ve helped many customers prevent, detect and respond to cyberthreats. So, let us know how we can help. We’ve got your back!

]]>
The Fundamentals of Backup and Disaster Recovery https://www.oneneck.com/blog/cloud/fundamentals-of-backup-and-dr/ Tue, 08 Feb 2022 04:55:00 +0000 https://www.oneneck.com/blog/cloud-fundamentals-of-backup-and-dr/ How would you like to pay your employees to do nothing? Paying people for nothing is not likely in your business plan. But without sufficient preparation, that’s exactly what many companies do when faced with a disaster or an outage. Systems go down for hours, days, or even weeks, and operations get shut down. The […]]]>

How would you like to pay your employees to do nothing? Paying people for nothing is not likely in your business plan. But without sufficient preparation, that’s exactly what many companies do when faced with a disaster or an outage. Systems go down for hours, days, or even weeks, and operations get shut down.

The consequences of critical systems going down for extended periods are self-explanatory. To protect your company, it’s important to prepare for disasters before they disrupt operations. The first step in tackling this daunting task is understanding the fundamentals of backup and disaster recovery.

Learn the Differences Between Backups and Disaster Recovery

Owning a parachute doesn’t mean you can use it in an emergency. The same holds true for using your backups. While it’s essential to make regular backups, you may not have a plan for how to use them during a natural disaster or outage. This example brings us to the first point: What’s the difference between making backups and disaster recovery?

  • A backup is a copy of your data. Backups can be stored on-premise, in the cloud, or a combination of the two. Additionally, they can be performed continuously or intermittently.
  • Disaster recovery refers to the plans and processes you’ll use to recover your data and applications (using your backups) after an outage. These plans will vary depending on the type of outage, which can range from a simple server glitch to a natural disaster.

For your plans to be successful, you need both a backup strategy that considers your company’s needs and a disaster recovery plan that helps you effectively use your backup data.

When you experience an outage, speed is critical. The longer employees sit idle, and applications are unavailable to your clients and team, the more damage it will do to your business. Planning is essential if you want to get your hardware applications running quickly. Below are five steps to help you cover the critical areas of backup and disaster recovery:

  1. Prioritize your business’s most vulnerable applications and data. While you’d like to get everything restored after an outage immediately, some applications will impact your business more than others. For example, a financial institution’s customer portal is more important than the software the development team uses to design new features. So start by evaluating which data and applications impact immediate operations the most.
  2. Calculate how long you can be without your applications. Gauging available recovery time is crucial to choosing the methods you’ll employ for disaster recovery. You’ll have different processes for applications that need to be restored immediately compared with those that can wait a few days. This knowledge will help you establish your recovery time objective (RTO), which is the time it takes to recover normal business operations.
  3. Determine how much data you can stand to lose. It may seem counterintuitive to plan on losing data, but it’s essential for determining your backup frequency. If losing even a small amount of data is unacceptable, then your team may opt for continuous backups.
  4. Choose where you’ll back up your data. Once you know your backup frequency and restoration needs, you should also consider your data privacy requirements. These three factors will help you determine backup location. For example, if speed is of the essence, you may choose a hybrid cloud model where data is stored both on-premises for speed and in the cloud for better distribution. Either way, a good rule of thumb is to store backup data in separate locations in case the disaster impacts your physical location.
  5. Document your restoration strategy. If you’re working with a disaster recovery plan that’s managed for you, your provider will handle failover during an outage. In a more hands-on approach, you’ll need to determine when and how your backup servers will activate during an outage as well as how you’ll handle power failures and the other effects of a natural disaster. Everything should be documented, easy to access, and in a format conducive to training.

A lot more detail and planning will go into your backup and disaster recovery plans, but these are some great steps to help you start the conversation. If you get stuck, don’t feel that you have to navigate the process alone.

Work With a Partner to Manage Backup and Disaster Recovery

A backup and disaster recovery plan is essential to a speedy response that mitigates the damage of an outage. However, navigating cloud backup and recovery options can be daunting. OneNeck’s team is experienced in both and can help you traverse the topic successfully.

Our managed backup services are hands-on and ensure that your backups are monitored continuously and always ready when you need them. We also tailor our disaster recovery solutions to your unique needs to ensure your applications are prioritized correctly. Contact us if you’d like to learn more about our managed backup and disaster recovery solutions.

]]>
5 Ways Microsoft Azure Can Upgrade Your Business https://www.oneneck.com/blog/cloud/5-ways-microsoft-azure-can-upgrade-your-business/ Fri, 28 Jan 2022 23:56:00 +0000 https://www.oneneck.com/blog/cloud-5-ways-microsoft-azure-can-upgrade-your-business/ Gartner expects end-user spending on public cloud services to grow 23.1% in 2021 to total $332.3 billion. This growth is why more companies are moving essential business processes to the cloud. And as mobile, web, and desktop applications become increasingly crucial to everyday operations and customer experience, growth will continue. How should businesses respond? It […]]]>

Gartner expects end-user spending on public cloud services to grow 23.1% in 2021 to total $332.3 billion. This growth is why more companies are moving essential business processes to the cloud. And as mobile, web, and desktop applications become increasingly crucial to everyday operations and customer experience, growth will continue. How should businesses respond?

It would be a mistake to ignore the growth in cloud computing. However, before moving everything to the cloud, organizations must determine which business functions can benefit from cloud-based tools and applications — and how they plan to migrate from local to cloud-based services. To help with this analysis, we’ll look at five ways Microsoft Azure can improve business operations.

Supercharge Your Business Operations with Microsoft Azure

Managing business operations is a balancing act, and efficiencies add up to greater margins as you scale. Microsoft’s scalable pricing model allows companies of all sizes to improve their business operations using Azure. Microsoft Azure can help streamline the following areas:

  1. Responsive marketing. If you ask your marketing team what they need, they’ll most likely say resources. Teams are constantly scrambling to release the next campaign. Marketing is finicky and requires a combination of skill, timing, and marketing collateral to be effective. Azure allows marketing teams to create new web applications for campaigns in minutes by leveraging templates. Marketing teams can then A/B test different assets and keep a pulse on how everything is doing using Azure’s advanced analytics.
  2. Personalized sales. Sales are integral to overall business health and growth. Leveraging Azure’s cloud tools can help you empower your sales team with essential data for finding prospects and closing deals. Three factors that greatly affect sales are customer relationships, employee performance, and data accessibility. Azure gives you access to customer relationship management (CRM) software, cloud-based project management, and real-time reports. These tools enable your team to approach customers with the most accurate data and help business leaders keep track of team performance and needs.
  3. Improved customer service and engagement. Customers are more likely to stay loyal and purchase more from a company they believe delivers superior value. One way companies can use Azure to improve engagement is by leveraging application analytics. This tool can be used to measure application performance as well as collect data that measures convenience, personalization, and trust. Then, using Azure’s intelligent cloud, you can tie all of this data together to gain a complete picture of your customers and how you can improve their experience.
  4. Immersive e-commerce. Shopping online is an immersive experience. A customer may start their shopping journey looking for a specific product only to find that personalized recommendations and the ease of the application have them looking at much more. However, a dynamic environment requires more than a static website. Microsoft tools like Application Insights and Azure’s app service help you ensure that your e-commerce website can scale with ease, perform as intended, and provide the needed analytics to improve the shopping experience.
  5. Advanced decision-making. Data and analytics are essential to making informed business decisions. Azure provides tools that help gather, organize, and analyze data to extract useful insights. Their tools range from Azure Synapse Analytics, which allows you to load any number of data sources from on-premise and cloud locations and analyze it in SQL, to Azure Machine Learning, which allows you to apply ML algorithms to your business problems.

Your organization can likely benefit from improvements in one or more of these areas. But you may be wondering what it will take to get started with Azure.

CRM sales dashboard open on a laptop.

OneNeck Can Help You Implement Azure in Your Business

Microsoft Azure is a powerful tool for any business in the cloud. Azure allows companies to build, manage, and deploy custom web applications using the tools and frameworks they’re most comfortable with. But migrating business-critical applications can be daunting since most businesses can’t afford downtime in those areas.

OneNeck is a top Microsoft Partner. We can leverage our experience to help you avoid the challenges common to migrating systems to the cloud. Additionally, we’ll ensure your installation is optimized for your business so that you’re taking advantage of the features that will have the greatest impact. Contact us to learn more.

]]>
Understanding Microsoft’s New Commerce Experience https://www.oneneck.com/blog/cloud/understanding-microsofts-new-commerce-experience-auto-renewals-grace-periods-and-scheduling-changes/ Tue, 11 Jan 2022 20:36:00 +0000 https://www.oneneck.com/blog/cloud-understanding-microsofts-new-commerce-experience-auto-renewals-grace-periods-and-scheduling-changes/ What is the New Commerce Experience? Microsoft has many licensing programs that often contradict, overlap and confuse the entire industry, and they recently launched a New Customer Experience platform that enables them to sell products under fewer, more aligned programs.  Their goal is to help customers be more flexible, move faster and, ultimately, provide greater […]]]>

What is the New Commerce Experience?

Microsoft has many licensing programs that often contradict, overlap and confuse the entire industry, and they recently launched a New Customer Experience platform that enables them to sell products under fewer, more aligned programs.  Their goal is to help customers be more flexible, move faster and, ultimately, provide greater value.  The end vision is that customers will buy through the Microsoft website, through a Microsoft sales rep, or through the Cloud Service Provider (CSP) program and only need to sign one contract.  They are accomplishing this goal over many years, as  Azure was moved to the New Customer Experience platform over the last two years, and now licensing is being moved.

Microsoft provides licensing subscriptions for products like Microsoft 365, Power BI, Exchange Online, etc.  Today those subscriptions are ordered for a term (1 Year) and then auto-renew on their anniversary date.  For several years, Microsoft has allowed CSPs like OneNeck to reduce the number of licenses or even suspend a subscription, and the CSP was not charged by Microsoft, nor the customer charged by the CSP.  This was often discussed with clients as being a Pay-As-You-Go monthly model and a benefit of partnering with a CSP.  All subscriptions were set to auto-renew, because you could change them at any time.  Now Microsoft has labeled the old program the “legacy” program and is discontinuing those products over the next year and a half (to be completed June 30th, 2023).

As the New Commerce Experience products replace the legacy products, you will still see the same or very similar names like M365 Business Premium; however, the rules for ordering and managing the subscriptions have changed.

  • Microsoft is now enforcing the cancellation policy, and you will no longer be able to reduce or cancel a subscription after 168 hours from order.
  • You can add to a subscription at the same rate anytime during the contract, or you can upgrade to a higher level package, but you cannot reduce or cancel it.  A service provider can schedule the cancellation or reduction, but it will not occur until the end of the term.
  • Microsoft has added a new monthly term subscription at a 20% premium to provide flexibility when you cannot commit to a full year. The monthly term subscriptions are available for most, but not all, products.
  • When a New Commerce Experience subscription is created, it is automatically set to renew at the end of the term – auto-renewal.  The service provider has the option to go back in after the order and uncheck the box, giving the client the ability to automatically cancel the subscription unless a manual renewal occurs.

Toggling Auto-renew

As of October 14, 2021, newly purchased licensing subscriptions (NCE) are set to auto-renew at their designated renewal date as a default, but this auto-renew component can be toggled on and off.  Software subscriptions purchased before October 14, 2021 don’t have auto-renew turned on and are not eligible for auto-renew to be applied. If a software subscription is either ineligible for auto-renew, or auto-renew is turned off, a partner can see the expiration date on the subscription detail page; otherwise, a renewal date is visible.

There are implications to unchecking the box.  If a subscription is not renewed by the expiration, a grace period starts.  The grace period is 7 days for a monthly subscription and 30 days for an annual subscription.  If you renew the subscription after the expiration, the term will start back immediately after the expiration date, and there is a risk of loss of service or even loss of data.

Microsoft has added a new change scheduling feature that can be used as a best practice to control the expiration.  If you want a subscription to expire or change, we can schedule the cancellation or reduction to occur on the expiration date.  This can be planned well in advance and is our recommended approach because it has the lowest risk to availability of the service and associated data.

We’re here to help.

There is a lot to wade through when it comes to these licensing changes, and most IT professionals are too busy to dig into them – but we’re here to help. We can review your current Microsoft licensing and make recommendations for optimizing your spend, making sure you get the most from your Microsoft investment.

]]>
How to Mitigate the Negative Effects of Shadow IT https://www.oneneck.com/blog/how-to-mitigate-negative-effects-of-shadow-it/ Thu, 06 Jan 2022 23:00:00 +0000 https://www.oneneck.com/blog/how-to-mitigate-negative-effects-of-shadow-it/ Your company may fear shadow IT because it limits its visibility into the applications on your network. Many organizations take the easiest path, which is to ban the use of any unapproved applications. However, this strategy may prove ineffective and even limit the productivity of your people. Employees typically install unapproved applications because they’re trying […]]]>

Your company may fear shadow IT because it limits its visibility into the applications on your network. Many organizations take the easiest path, which is to ban the use of any unapproved applications. However, this strategy may prove ineffective and even limit the productivity of your people.

Employees typically install unapproved applications because they’re trying to be more productive, not for any malicious reason. Still, these applications present a security risk, since it’s likely that employees will occasionally send sensitive information using these mediums — leaving IT with no way to mitigate risk.

This situation presents your IT team with a challenge. How can they ensure that the company’s network remains secure while empowering employees to do their best work?

Bring Balance to Your Shadow IT Mitigation

Most CIOs and IT professionals recognize that they will inevitably have a certain amount of shadow IT. But, when there is a culture of transparency and flexibility, it encourages employees to work with IT and bring this situation under control. If employees know that they will not be listened to and the company will block their efforts, they are unlikely to communicate their application needs. How can your business counteract this tendency?

The first step is to open the doors of communication. Show employees that you’re listening by integrating applications when possible and educating them on alternatives when it’s not. This attention to their needs will confirm your company is listening and reduce the number of employees who work around the company’s security policies.

Business leaders should also acknowledge that shadow IT can be a symptom of employees who feel that they don’t have all the tools they need. Instead of reprimanding them, IT can strive to figure out why they work around security policies. This understanding will help them implement controls that allow applications to be used with certain safeguards.

Team talking about how to control Shadow IT

Using policies and software to manage apps that aren’t part of your organization’s tech stack is a great way to mitigate shadow IT. It has the two-fold benefit of showing employees you care about their needs and helping them improve productivity. While enabling some applications will be impossible, there are many instances where IT leaders can say yes.

Your team can limit shadow IT risk by using software controls that limit the access of certain applications. For example, IT can enable employees to download from a particular platform without letting users upload files. This allows users to access necessary documents from business partners and customers while ensuring sensitive information isn’t shared on that platform.

Another way to protect against shadow IT risk is to control which instances of applications employees can access. For example, you can allow employees to access their corporate Google account while restricting access to a personal account where they could accidentally upload sensitive data.

Creating a culture of transparency and integration is a great goal. However, it’s essential that your team have the tools they need to detect and isolate shadow IT applications that are a security risk for your organization. Your tech stack should include software that helps IT monitor the network to identify possible security gaps. When your team and software work in unison, IT will have the visibility and control they need to ensure security requirements are met.

Collaborate with IT Leaders to Empower Your Employees

Disconnects between IT and business leaders can inhibit your team’s ability to support employee needs. This reality makes it essential for your company to include IT in important business conversations, especially those that have to do with computing infrastructure and applications. IT can then communicate the shortcomings they perceive in the organization’s systems and tools.

Shadow IT shouldn’t be shut down without a thought. Acting this way can have a damaging effect on employee productivity and morale. Instead, companies should find a way to open up communication and embrace a culture where shadow IT can be approved and secured.

CIOs are pivotal in fostering collaboration between IT and employees. They safeguard the company through carefully developed procedures without making security feel like a dystopian overlord. However, you may realize that you lack the necessary cloud tools to empower employees. OneNeck can help you integrate needed technologies into your tech stack securely and ensure they are ready to scale as needed. Contact us to learn more.

]]>
Zero-day Vulnerability for the Apache Log4j Java Library https://www.oneneck.com/blog/security/zero-day-vulnerability-apache-log4j-java-library/ Sat, 11 Dec 2021 03:32:00 +0000 https://www.oneneck.com/blog/security-zero-day-vulnerability-apache-log4j-java-library/ There is a new zero-day vulnerability for the Apache Log4j Java library, and it is being actively attacked right now. The bug, now tracked as  CVE-2021-44228 and dubbed Log4Shell or LogJam, is an unauthenticated RCE vulnerability allowing complete system takeover on systems with Log4j 2.0-beta9 up to 2.14.1. There are many applications this can and will affect, from a […]]]>

There is a new zero-day vulnerability for the Apache Log4j Java library, and it is being actively attacked right now. The bug, now tracked as 
CVE-2021-44228 
and dubbed Log4Shell or LogJam, is an unauthenticated RCE vulnerability allowing complete system takeover on systems with Log4j 2.0-beta9 up to 2.14.1. There are many applications this can and will affect, from a variety of open source projects to vendor supplied solutions.

Here  are some of the major Apache frameworks that are affected by this exploit. Many applications make use of these frameworks as well as many just make use of the log4shell log tool.

  • Apache Struts2
  • Apache Solr
  • Apache Druid
  • Apache Flink

Currently there are some mitigations that can be used. So seek out assistance for any vendor-supported applications you are running. There is also a thread discussing mitigations for this issue.

We are advising our customers to look into what java-based applications are affected in your environment, starting with anything that is internet facing. This Zero is actively being attacked right now.

Current recommendations (as of Dec 20) are:

  • log4j v1: Version 1.x of log4j is vulnerable to RCE attacks (like CVE-2019-17571), and if you’re using it you need to migrate to 2.17.0
  • log4j v2.x: External systems with log4j v.2.16 or less should be prioritized first, but all impacted systems should migrate to 2.17.0.  Version 2.16.0 appears to resolve the RCE exploits, but is vulnerable to a new DoS attack.
  • Can’t update? Additional mitigations include removal/disabling of Log4J, deploy a WAF, network isolation, and configuration changes depending on the software and vendor recommendations.  See sources below for additional information or check vendor websites for specific software recommendations.
  • Sources for these recommendations:

Listed below are some additional informational links:

Regarding OneNeck Systems

Regarding OneNeck’s  systems, no immediate threat has been detected, but our teams are actively reviewing the situation to determine any impact on our products and partners.

]]>
Azure Synapse Database Templates https://www.oneneck.com/blog/cloud/azure-synapse-database-templates/ Tue, 07 Dec 2021 01:30:00 +0000 https://www.oneneck.com/blog/cloud-azure-synapse-database-templates/ Microsoft Azure Synapse Database Analytics is one of Azure’s primary data services, tasked with analytics and data warehousing. In fact, it is a rebranding of Azure SQL Data warehouse. It brings together data warehousing and big data analytics by integrating ingestion pipelines, Spark clusters, Azure Data Lake and both serverless and dedicated SQL pools. As […]]]>

Microsoft Azure Synapse Database Analytics is one of Azure’s primary data services, tasked with analytics and data warehousing. In fact, it is a rebranding of Azure SQL Data warehouse.

It brings together data warehousing and big data analytics by integrating ingestion pipelines, Spark clusters, Azure Data Lake and both serverless and dedicated SQL pools. As it sits, it is a powerful and useful service bring “data lakehouse” like functionality into an Azure Data Service. Microsoft is calling the result of using these templates “lake databases.”

What is a Lake Database?

Microsoft defines “Lake Database” as follows:

“The lake database in Azure Synapse Analytics enables customers to bring together database design, meta information about the data that is stored and a possibility to describe how and where the data should be stored. Lake database addresses the challenge of today’s data lakes where it is hard to understand how data is structured.”

The below diagram shows how all components of Azure Synapse Analytics are tied together:

Azure-Synapse-Analytics

Azure Synapse Database Templates

At the Ignite 2021 Conference, Microsoft announced a new feature for Azure Synapse Analytics, Azure Synapse Database Templates. These templates are industry specific blueprints that provide comment elements to ensure best practices, governance and analytic needs. This feature is currently in preview and launched with six database templates:

  • Banking
  • Consumer Goods
  • Fund Management
  • Life Insurance & Annuities
  • Property & Casualty Insurance
  • Retail

Database templates address core requirements of an industry and contain a supporting set of business area templates and one or more enterprise templates. Something that Microsoft considers important to all industries is emission and carbon management. In the available templates are databases that will allow companies to track and report their direct and indirect greenhouse gas emissions.

What Are Synapse Database Templates?

They are standardized templates for the above industries. They allow organizations to easily and quickly create a database model for their organizations needs. Using the templates will allow you to create your lake database and then leverage the Azure Synapse analytical runtime to provide insights to your analytics team and business leaders.

Business Area Templates provide a comprehensive subject area data models. You will get tables and columns relevant to your particular business. Enterprise templates contain a subset of tables that will be of organizational interest for a specific industry. Think of enterprise templates as the glue between multiple business area templates.

As the product matures more templates will be added, so stay tuned. Also remember that this has just been announced for Public Preview, so expect some changes as it moves to General Availability (GA).

]]>
Stay Safe from Cyberattacks this Holiday Season https://www.oneneck.com/blog/security/a-security-strategy-for-the-holiday-season/ Wed, 24 Nov 2021 21:00:00 +0000 https://www.oneneck.com/blog/security-a-security-strategy-for-the-holiday-season/ It’s that time of year, where twinkling lights and Santa’s sleigh full of toys are everywhere. But with all the holiday bustle comes additional risk, the risk of mounting security threats as shoppers are eagerly swiping their credit cards while checking gifts off their lists. What does this mean for today’s organization, where the line […]]]>

It’s that time of year, where twinkling lights and Santa’s sleigh full of toys are everywhere. But with all the holiday bustle comes additional risk, the risk of mounting security threats as shoppers are eagerly swiping their credit cards while checking gifts off their lists. What does this mean for today’s organization, where the line between corporate and personal devices is blurrier than ever before?

With the rise in remote work, companies and organizations need to update their security policies and controls. Based on IDG’s 2021 Global Intelligence Report, 67% of organizations expect their security budget to increase this year. However, despite the increased security, key gaps remain, and additional policies need to be implemented for the remote workforce.

Be Aware of Holiday Inspired Phishing Emails
It’s unfortunate, but the “bad guys” are incredibly skilled at crafting meaningful emails, and with the holiday season, all sorts of creative phishing emails are bombarding the end user who might be thinking they are getting the latest-and-greatest 55” TV for $200, only to result in malware being download and potentially impacting all it touches.

And while TechTarget says most end users “think they know enough about the internet to not fall prey to these attacks, and that the cyberattacks they see in the news couldn’t possibly happen to them,” it’s this false sense of security that can ultimately lead to a disastrous breach.

Educate Your Staff to Watch Out for Phishing Attempts

It’s stats like the above that are keeping many IT leaders up at night. So, what’s an organization to do? OneNeck CISO Katie McCullough says, “It starts with end-user awareness. That’s your biggest potential for risk. It’s the age-old, phishing is the #1 way to exploit a company, and the bad guys are always going to be out in front of that. There’s always detection and prevention you can do at a technology level, but the more you can educate the co-workers in your business to be savvy and don’t click, even though it sounds basic, it’s these best practices that companies must constantly reinforce with their end users. They can invest all they want in technology, but if you’re not focused on training and reinforcing that training with your broad co-worker base, all it takes is one click.”

Key Steps to Prevent Cyber Breaches at Your Organization

Like anything where the human factor is involved, repetition is crucial, as is the right combination of technology and processes. This can include:

  • Annual security-awareness training
  • Quarterly updates, blogs and communication to keep it top of mind
  • The right mix of security technologies to stop malware and block access to malicious sites
  • Anti-phishing training, which enables IT to send fake phishes to employees, exposing the vulnerabilities

Ultimately, don’t fall into the trap of, “It hasn’t happened yet, so why should I worry?” It takes a diligent and continuous approach to mitigating constantly evolving security threats. But with a strategy that considers those personal devices and continuous employee education, the holidays don’t have to be the scariest time of the year.

Want to learn some more useful security tips? Check out our exclusive IT Professional’s Security Strategy Toolkit.

]]>
7 Benefits Microsoft Azure can Bring to Your Business https://www.oneneck.com/blog/cloud/7-benefits-microsoft-azure-can-bring-to-your-business/ Tue, 23 Nov 2021 23:06:00 +0000 https://www.oneneck.com/blog/cloud-7-benefits-microsoft-azure-can-bring-to-your-business/ Businesses today face daunting technological challenges. Customers expect uninterrupted service from anywhere and want it faster than ever. However, delivering digital applications and services requires immense amounts of computing resources, especially if they’re being delivered globally. For this reason, many large organizations employ a cloud or hybrid cloud model. These models allow them to leverage […]]]>

Businesses today face daunting technological challenges. Customers expect uninterrupted service from anywhere and want it faster than ever. However, delivering digital applications and services requires immense amounts of computing resources, especially if they’re being delivered globally.

For this reason, many large organizations employ a cloud or hybrid cloud model. These models allow them to leverage the computing infrastructure of a cloud provider to augment their own resources. This article will look at seven reasons why Microsoft Azure is the solution of choice for many organizations.

7 Microsoft Azure Benefits

  1. Speed to deployment. One of the most important metrics in the technology industry is speed. The faster a company can release updates, fixes, new features, etc., the easier it is to keep users happy and engaged. Azure’s benefits go beyond simple metrics like page speed. It helps companies quickly create, test and deploy new applications as well as scale infrastructure and perform recovery actions.With over 1,000 quick-start templates, you don’t have to start from scratch when building cloud tools. Additionally, Azure automates the configuration of virtual machines, infrastructure management, and deployment and delivery — greatly increasing your development velocity.
  1. Pay for what you use. Azure’s pricing model charges customers for what they use. This makes it easy for companies to start small and scale up as they migrate to the cloud in a sustainable way.
  2. Flexible scalability. Azure gives companies the power to quickly scale their storage, computing and support resources with the click of a button. In contrast, when companies upgrade their physical resources, they’re stuck with them even if workloads drop. This means a large investment could be wasted. Businesses using Azure can adjust resources based on current usage, allowing them to adapt quickly to changing needs. Additionally, Azure plays well with open-source technologies, making it easy to connect applications that use a variety of coding languages.
  3. Full suite of services, fully integrated. With a traditional development environment, it’s unlikely that all of your services will be connected. This makes testing more of a challenge when it’s time to release a new update or feature, as they are more likely to break parts of your ecosystem. Azure is built with a full suite of services within the development environment, meaning that updates can be accurately tested before being released to the public.
  4. Preloaded with analytics. Azure makes getting business insights easier by providing users with a number of analytics tools within its ecosystem. These include tools like Azure Data Lake Analytics that help users run massively parallel data transformation and processing tools in U-SQL, R, Python, and .NET.
  5. Built-in disaster recovery. Azure’s cloud-based backups allow you to speed up the time it takes to perform system backups and recovery functions. You can also leverage a hybrid cloud setup to benefit from the performance of the cloud while harnessing long-term cost savings of on-premise infrastructure.  Azure also provides a sandbox environment where you can test applications in a live environment, helping ensure that they work as expected when made available to customers — reducing the frequency that you must use recovery features. This environment allows users to test new versions with live data to ensure a smooth rollout.
  6. Enhanced security. Most companies don’t have unlimited IT budgets, and the level of security that can be provided on-premises is limited to their investment and expertise. Microsoft spends over a billion dollars each year in its efforts to improve security. When using Azure, you benefit from this security investment without overextending your resources. Azure also has over 90 compliance certifications such as GDPR and HIPAA. These certifications are indispensable in industries like healthcare, finance and government.

    Embrace the cloud with Microsoft Azure

    If you’re looking to expand your cloud infrastructure or begin your journey to the cloud, Microsoft Azure can help. With Azure, you’ll get enhanced security, advanced backup and recovery, and quick scalability that fits your business needs. Microsoft is also an essential tool for organizations undergoing a digital transformation. Empower your business with analytics, flexible infrastructure and the tools needed for a modern workplace.

    OneNeck is a top Microsoft partner. We can help you analyze your business case and technical requirements to understand where Azure fits best into your business and how you can implement it. Contact us to learn more.

]]>
Microsoft SPLA and 365 Licensing Price Changes https://www.oneneck.com/blog/cloud/microsoft-365-and-spla-price-changes/ Thu, 18 Nov 2021 02:51:00 +0000 https://www.oneneck.com/blog/cloud-microsoft-365-and-spla-price-changes/ Microsoft has announced their first price increase for Office 365 and Microsoft 365 services in a decade. These price increases will go into effect in early 2022.  There are two components to the price increase: Microsoft Service Provider License Agreement (SPLA) increases. Microsoft Office 365 increases. Microsoft SPLA Price Increases At OneNeck, we offer Microsoft […]]]>

Microsoft has announced their first price increase for Office 365 and Microsoft 365 services in a decade. These price increases will go into effect in early 2022.  There are two components to the price increase:

  • Microsoft Service Provider License Agreement (SPLA) increases.
  • Microsoft Office 365 increases.

Microsoft SPLA Price Increases

At OneNeck, we offer Microsoft licensing to our clients through the SPLA program for Microsoft Windows operating systems and applications.  This is a convenient way for our clients to source the software as part of the services they consume from us, as the licensing is provided for a contracted term and paid on a monthly basis.

Effective January 1, 2022, Microsoft is raising the price by 10% for Microsoft Windows Server and Office SKUs offered through the SPLA program. This applies specifically to the product families in the following table.

Screen Shot 2021-11-17 at 1.16.38 PM

These changes are directly tied to the new capabilities available in Windows Server 2022  (which will enable more hybrid and migration solutions) and Office (which is inclusive of the numerous features added over the past decade).

Microsoft Office 365 Increases

On March 1, 2022, Microsoft will update its pricing for the following commercial products: 

  • Microsoft 365 Business Basic (from $5 to $6 per user)
  • Microsoft 365 Business Premium (from $20 to $22)
  • Office 365 E1 (from $8 to $10)
  • Office 365 E3 (from $20 to $23)
  • Office 365 E5 (from $35 to $38)
  • Microsoft 365 E3 (from $32 to $36)

These increases will apply globally with local market adjustments for certain regions. There are no changes to pricing for education and consumer products at this time.

Additionally, Microsoft announced they are adding unlimited dial-in capabilities for Microsoft Teams meetings across enterprise, business, front-line and government suites over the next few months. While currently included with Microsoft 365 E5 and Office 365 E5, Microsoft has come to see dial-in as an important part of the complete Teams experience since consistent Internet connections are not always available.

We’ve Got Your Back.

While price changes are a given in today’s modern business climate, as an experienced Microsoft Gold Partner, we can work with you to understand the impact and help you make the best decisions regarding your SPLA licensing for your business. Contact your OneNeck account manager today to discuss.

]]>
Simplify Your Computing With Hyperconverged Infrastructure https://www.oneneck.com/blog/advanced-services/simplify-your-computing-with-hyperconverged-infrastructure/ Mon, 08 Nov 2021 23:25:00 +0000 https://www.oneneck.com/blog/advanced-services-simplify-your-computing-with-hyperconverged-infrastructure/ Scalability, flexibility and cost-efficiency are all hallmarks of a high-performing data center. However, with scale comes certain challenges. For example, organizations must decide which network architecture will best suit their business needs. Cloud computing offers many advantages for those who want to scale but can be expensive and fall short in the security department. Traditional […]]]>

Scalability, flexibility and cost-efficiency are all hallmarks of a high-performing data center. However, with scale comes certain challenges. For example, organizations must decide which network architecture will best suit their business needs. Cloud computing offers many advantages for those who want to scale but can be expensive and fall short in the security department.

Traditional three-tier architectures offer the advantage of scaling resources based on actual needs. IT teams can choose to add on to their storage or computing power while leaving networking as is. However, these architectures are often vendor locked, which makes it expensive to upgrade. And vendors may require customers to purchase full racks for every upgrade, far exceeding their needs.

An alternative is hyperconverged infrastructure (HCI). This architecture simplifies data center construction and streamlines purchasing. How does it accomplish this?

Explaining Hyperconverged Infrastructure

Hyperconverged infrastructure simplifies data centers by allowing businesses to use standard x86 servers for all of their computation needs. X86 servers are the industry standard and can be easily purchased when businesses need to extend their hardware’s capacity. How does HCI make this possible?

HCI uses software virtualization to abstract and pool resources dynamically. By leveraging compute, storage and networking virtualization, it’s possible to access resources across multiple servers as if from a single device — removing the constriction of what individual server racks can handle. For example, you could be using the processing power from two devices while using the storage capacity of 3, 10, or more servers. None of the computing power has to be located on the same rack.

Another advantage of hyperconverged infrastructure is administration. Previously, you may have needed separate teams to manage storage, compute and networking servers. Since HCI leverages the same devices for all of these functions, it’s possible to use the same team for everything. Simplified administration cuts costs and breaks down departmental silos.

A giant mess of electronics and cablesSimplifying your infrastructure from the traditional three-tier architecture has additional benefits, such as the ability to connect to the cloud. Whether your organization aims to increase security, computing capacity or something else, HCI reduces the need to manage disparate systems when moving capacity to the cloud. HCI can streamline the following cloud adaptations:

  • Private cloud. With hyperconverged infrastructure, your resources will be pooled together. This means that to achieve private cloud capabilities, all that’s needed is to ensure that compute resources are available to those who need them and establish processes that control resource allocation.
  • Hybrid cloud. Traditional server architectures might require a web of connections to ensure all three components of your architecture match up with the cloud. In contrast, HCI simplifies this to relatively few connections, as your network is already pooling resources into a single repository.
  • Public cloud. Simple infrastructure means that migration is also easier. Cloud providers will be more compatible with your hardware, and this will streamline connecting your business to the cloud.

More and more businesses are leveraging cloud resources to augment their private infrastructure. By implementing HCI in your business, you’ll be better prepared for the cloud.

Use HCI To Do More With Your Computing Hardware

Change for the sake of change isn’t progress. Businesses must ensure that upgrades, including moving to HCI, lead to improvement. Below are five ways hyperconverged infrastructure improves your business:

  1. Reduce total cost of ownership. HCI lowers costs in several ways, including better resource allocation, simplified upgrading and extending of hardware and elimination of vendor lockdown.
  2. Simplify deployment of hardware. HCI helps businesses unify the type of hardware they use since they only need x86 servers to run the infrastructure. This makes supply chain management and deployment easier.
  3. Increase scalability and flexibility. Since HCI pools resources, when organizations need to scale, it becomes a simple matter of adding servers to their infrastructure pool. Additionally, teams can use as little or as much computing power as they need, leaving the rest available to whoever needs it.
  4. Improve security. With HCI, organizations can gain cloud-like infrastructure while maintaining full control over their data.
  5. Balance your usage. With traditional server infrastructure, IT must allocate resources according to projected usage. These projections aren’t always accurate, and as soon as teams exceed projections, upgrades are needed. HCI allows IT teams to allocate resources dynamically based on current needs.

The advantages of hyperconverged infrastructure are compelling enough to make any IT team want to act. However, converting your hardware is more involved than buying a few servers. Our team is experienced in helping businesses transition to HCI infrastructure. Contact us to learn more.

]]>
WordPress Plugin Bug Lets Subscribers Wipe Sites https://www.oneneck.com/blog/security/wordpress-plugin-bug/ Fri, 29 Oct 2021 23:24:00 +0000 https://www.oneneck.com/blog/security-wordpress-plugin-bug/ A high-severity security flaw found in a WordPress plugin that has 8,000+ active installs can allow authenticated attackers to reset and wipe vulnerable websites. This plugin, Hashthemes Demo Importer, was developed to assist admins when importing demos for WordPress themes to import the full demo with one click. According to Wordfence’s QA engineer and threat […]]]>

A high-severity security flaw found in a WordPress plugin that has 8,000+ active installs can allow authenticated attackers to reset and wipe vulnerable websites.

This plugin, Hashthemes Demo Importer, was developed to assist admins when importing demos for WordPress themes to import the full demo with one click.

According to Wordfence’s QA engineer and threat analyst Ram Gall, “The flaw gives any authenticated attacker, even the subscriber-level user with minimal permissions, the ability to reset WordPress sites by zapping virtually all its databases and uploaded media.” He goes on to say that “if exploited, the flaw would render a website running the vulnerable plugin completely unrecoverable, unless of course its owners had properly backed it up.”

Note that a corrected version (version 1.0.7) has been uploaded by the plugin’s developer.

While this vulnerability is specific to WordPress users, it’s a prime example that plugins expand the attack surface. OneNeck CISO Katie McCullough states, “Best practice is to use the fewest number of plugins needed to complete work, and uninstall any plugins not being used. And specific to this vulnerability, ensure WordPress and plugins are updated to the latest versions and have the most recent patches applied.”

An effective security defense really starts with the basics. As Katie states, “Some companies think they can deploy patches on a quarterly basis or put them off indefinitely because they want to avoid downtime, but we’ve seen how costly such decisions can be.”

So, moral of the story, be diligent in your updates and patching. Good cyber hygiene can be what keeps your organization safe from bad actors.

Interested in talking to one of our security experts? Contact us today.

]]>
Use Digital Transformation To Monitor Technological Progress https://www.oneneck.com/blog/digital-transformation/use-digital-transformation-to-keep-pace/ Tue, 26 Oct 2021 22:05:00 +0000 https://www.oneneck.com/blog/digital-transformation-use-digital-transformation-to-keep-pace/ Digital transformation has given businesses across many industries a competitive advantage. While gaining an advantage is compelling, it’s not the only reason to embrace digital transformation. When you consider how quickly technology is evolving, digital transformation is no longer optional. Those who don’t familiarize themselves with the process will fall behind. Approaching digital transformation can […]]]>

Digital transformation has given businesses across many industries a competitive advantage. While gaining an advantage is compelling, it’s not the only reason to embrace digital transformation. When you consider how quickly technology is evolving,
digital transformation is no longer optional
. Those who don’t familiarize themselves with the process will fall behind.

Approaching digital transformation can be daunting as it’s easy to focus on the initiative as a whole. However, when broken down into its respective parts, the transformation becomes more feasible and organizations are able to stay focused. In this article, we’ll look at four types of digital transformation and how they impact the businesses that embrace them.

Four Different Types of Digital Transformation

Digital transformation used to be more centered on adopting digital tools to create efficiencies. However, as businesses find new ways to collect product and customer data, this goal has evolved. Teams are no longer limited to using digital tools just for creating operational efficiencies. Now they can use these tools to create new streams of revenue, anticipate customer needs and use data to develop new products and services.

Getting into all the nuances of digital transformation could fill the contents of a book. So we’ll focus on the overarching areas of digital transformation.

  1. Business process transformation is where most businesses begin their transformation journey. That’s because it’s easiest to visualize and measure how improvements to your operations will increase ROI. Digital tools can be used to detect defects in real time, ensure machinery is being used to its full potential, eliminate waste, etc. These efficiencies can lower costs, improve product quality or reduce the time it takes to deliver your products (digital or physical). For example, businesses in the agriculture industry use IoT devices to guide harvesting robots that can operate 24/7 and help solve labor shortages.
  2. Business model transformation has revolutionized how companies deliver goods and services. Just think about how Uber changed the way people get rides or how Amazon reinvented how we shop. While your transformation may not shape an industry as Uber and Amazon did, it can still be effective. For example, reducing friction in the ordering process with an intuitive digital tool may delight customers more than a groundbreaking new feature.
  1. Domain transformation. Some businesses have been able to enter new domains with the adoption of digital technologies. Consider Disney. Previously, they offered the majority of their entertainment through third-party retailers. But recently, they have been successful in entering the digital streaming marketplace. By leveraging their existing large content library, they were able to quickly gain a unique advantage in this domain.
  1. Cultural transformation. Technology has had profound effects on the way we work, facilitating communication and collaboration. Through digital tools, organizations can tear down departmental barriers and foster an environment that supports cultural transformation — which has been the breeding ground for industry-leading innovation and high-performing teams. Tech companies like HubSpot and Salesforce are great examples of how strong culture can lead to widely adopted products with loyal customers.

At first glance, these transformations may seem out of reach. But breaking them down into manageable goals will make digital transformation more attainable. Think of the one thing that would have the greatest impact on your organization and shape your strategy around that goal. Don’t let intimidation freeze your organization’s progress.

Team meeting to discuss digital transformation initiative.

Digital Transformation Requires Strong Communication and Digital Tools

Digital transformation can fundamentally change the way you do business. But in order for it to be successful, you’ll need to give special attention to your communication and digital tools.

Change can be scary for an organization, as people may not know how it will affect them. Will it involve downsizing? The good news is that productive change usually signifies growth for the business and realizing this can help alleviate employee fears. To facilitate the buy-in of digital transformation, you need to have good communication throughout your organization — be transparent about what the transformation involves and address the concerns of your staff.

Successful digital transformation also requires digital tools and a comprehensive strategy. OneNeck can help you navigate the complexities of digital transformation. One way we do this is by providing the digital tools you need to improve operations and pivot existing business models. Our team is experienced in data transformation, digital infrastructure assessments, project management, and more.

Technology will continue to march on whether your business is ready or not. Digital transformation is the only way to keep pace and not become obsolete. We’d love to discuss how you can use digital transformation to create new opportunities and operational efficiencies. Contact us to learn more.

]]>
NOBELIUM is Targeting IT Service Providers https://www.oneneck.com/blog/security/nobelium-is-targeting-it-providers/ Tue, 26 Oct 2021 02:21:00 +0000 https://www.oneneck.com/blog/security-nobelium-is-targeting-it-providers/ Today the Microsoft Threat Intelligence Center (MSTIC) released a statement regarding the threat actor, NOBELIUM, who launched a campaign against cloud service providers (CSPs), managed service providers (MSPs) and other IT services organizations. By targeting IT providers, they are attempting to gain access to privileged customer accounts so they may move laterally throughout the cloud […]]]>

Today the Microsoft Threat Intelligence Center (MSTIC) released a statement regarding the threat actor, NOBELIUM, who launched a campaign against cloud service providers (CSPs), managed service providers (MSPs) and other IT services organizations. By targeting IT providers, they are attempting to gain access to privileged customer accounts so they may move laterally throughout the cloud environment and gain access to downstream customers and systems.

Microsoft Recommendations to Protect Privileged Access

Microsoft recommends that customers that use service providers with elevated privileges review and implement the following actions to help mitigate and remediate the recent NOBELIUM activity.

1. Review, audit, and minimize access privileges and delegated permissions

  • Review, harden, and monitor all tenant administrator accounts: All organizations should thoroughly review all tenant admin users, including those associated with Administer On Behalf Of (AOBO) in Azure subscriptions and verify the authenticity of the users and activity. We strongly encourage the use of strong authentication for all tenant administrators, review of devices registered for use with MFA, and minimize the use of standing high-privilege access. Continue to reinspect all active tenant admin users accounts and check audit logs on a regular basis to verify that high-privilege user access is not granted or delegated to admin users who do not require these to do their job.
  • Review service provider permissions access from B2B and local accounts: In addition to using the delegated administrative privilege capabilities, some cloud service providers use business-to-business (B2B) accounts or local administrator accounts in customer tenants. We recommend that you identify whether your cloud service providers use these, and if so, ensure those accounts are well-governed, and have least-privilege access in your tenant. Microsoft recommends against the use of “shared” administrator accounts. Review the detailed guidance on how to review permissions for B2B accounts.

2. Verify multi-factor authentication (MFA) is enabled and enforce conditional access policies.

3. Review and audit logs and configurations.

  • Review and audit Azure AD sign-ins and configuration changes: Authentications of this nature are audited and available to customers through the Azure AD sign in logs, Azure AD audit logs, and the Microsoft 365 compliance center (formerly in the Exchange Admin Center). We recently added the capability to see sign-ins by partners who have delegated admin permissions. You can see a filtered view of these sign-ins by navigating to the sign-in logs in the Azure AD admin portal, and adding a filter ‘Cross-tenant access type: Service provider’ on the ‘User-sign ins (non-interactive)’ tab.
  • Review Existing Log Availability and Retention Strategies: Investigating activities conducted by malicious actors places a large emphasis on having adequate log retention procedures for cloud-based resources including Office 365. Various subscription levels have individualized log availability and retention policies which are important to understand prior to forming an incident response procedure.

GettyImages-1190355752_BlogWhat does OneNeck do to keep our customers safe?

As noted in Microsoft’s statement, MSPs like OneNeck are primary targets of this type of cyberattack. To ensure we have appropriate protections, detections and response, we leverage the Center for Internet Security’s (CIS) Critical Security Controls which are a series of cybersecurity actions prioritized by their criticality in preventing cyberattacks. OneNeck completes a CIS Critical Security Control’s assessment annually, along with incorporating the controls as part of any new service.

While we assess against all the controls, we also adhere to other top priority controls:

  • Inventory and control of hardware and software assets:Our ReliaCloud environment is maintained in secure data centers that meets or exceeds all physical and environmental controls (per our ISO/IEC 27001:2013 certification.) We complete regular scans of our environment to assure only known devices are within the environment, and we maintain a CMDB (Configuration Management Database), per ITIL good practices, for all managed devices and software.
  • Vulnerability management:OneNeck continuously acquires, assesses and takes action on new information in order to identify vulnerabilities, remediate and minimize the window of opportunity for attackers. Activities include:
    • Identifying vulnerabilities through vendor notifications, industry leading security research organizations and OneNeck’s own security testing program.
    • Completing regular authenticated scanning and determining the appropriate risk rating for the vulnerability type, the system’s usage and the impacted system’s architecture.
    • Closed loop activities are completed through automated software which ensures that operating systems are running the most recent security updates provided by the vendors.
  • Controlled use of administrative privileges:OneNeck uses non-default and unique passwords for all assets within ReliaCloud. Privileged accounts are managed in a secure password management system. Additionally, OneNeck leverages a remote access system that requires multi-factor authentication and tracks all privileged access and activities.
  • Secure configurations:OneNeck maintains security configuration standards for all authorized operating systems and software. We store all master images and templates on securely configured servers and assure that only authorized changes are made to the images.
  • Monitoring and analysis of audit logs:OneNeck has local logging on all critical infrastructure, and ensures all appropriate logs are aggregated to a central log management system for analysis and review. OneNeck’s Security Operations Center (SOC) leverages our Security Information and Event Management (SIEM) platform which provides correlation and analysis of all presented logs. Additionally, our SOC monitors and is alerted on critical situations 24×7 to assure the security of all OneNeck environments, in particular ReliaCloud.

As identified in the CIS Controls, we annually use third-party penetration (pen) testers to ensure the controls put in place are effective. A recent pen test revealed OneNeck has “Strong External Network Security Controls” in place and that our systems and services are well-patched and maintained.

Additionally, we stay informed through various mechanisms (vendors, industry, governments, dark web monitoring, etc.) to ensure we are aware of any emerging threats, in particular against MSPs. In a recent release by the FBI, they identified most of the attacks involved compromised credentials, and from there pivoting between MSP and customer shared networks. The most common attack vectors include spear phishing, malicious web content and credential theft. We have multiple controls in place for email including requiring MFA, blocking phishing emails, alerting for risky sign-ins and impossible travel alerts, along with regular end user training and testing. Additionally, there is a whole series of controls we focus on as an MSP which include:

  • Ensure MSP accounts are not assigned to administrator groups.
  • Restrict MSP accounts to only the systems they manage.
  • Ensure MSP account passwords adhere to organizational policies.
  • Use a dedicated Virtual Private Network (VPN) for MSP connection.
  • Restrict VPN traffic to and from MSP.
  • Ensure internet-facing networks reside on separate physical systems.
  • Separate internal networks by function, location, and risk profile.
  • Use firewalls to protect server(s) and designated high-risk networks.
  • Ensure internal and external Domain Name System (DNS) queries are performed by dedicated servers.
  • Disable or block all network services that are not required at network boundary.

Along with all the controls we manage/review above, our annual attestations for SOC1 Type II, SOC2 Type II, and HIPAA, further validate our commitment to a secure environment.

We understand that maintaining a strong risk profile is daunting as the threat landscape continues to grow. But as your partner, we are here to help. Don’t go it alone. Talk to one of our experienced security specialists today.

]]>
Apache HTTP Server 2.4.49 Vulnerability https://www.oneneck.com/blog/security/apache-http-server-vulnerability/ Thu, 07 Oct 2021 22:03:00 +0000 https://www.oneneck.com/blog/security-apache-http-server-vulnerability/ Two days ago, The Apache Foundation disclosed a path traversal and file disclosure flaw in Apache HTTP Server 2.4.49 (an open-source web server for Unix and Windows that is among the most widely used web servers), tracked as CVE-2021-41773, as actively being exploited in the wild. The advisory does not indicate when exploitation of CVE-2021-41773 was […]]]>

Two days ago, The Apache Foundation disclosed a path traversal and file disclosure flaw in Apache HTTP Server 2.4.49 (an open-source web server for Unix and Windows that is among the most widely used web servers), tracked as CVE-2021-41773, as actively being exploited in the wild. The advisory does not indicate when exploitation of CVE-2021-41773 was detected, but the exploitation drove the expedited release of a patch by Apache.

This is a threat because a bad actor could exploit this vulnerability and gain access to database credentials through the web server, leading to leaked sensitive content, like source code, passwords, configuration files and other confidential information.

These issues only impact Apache HTTP Server 2.2.49, and a patch is now available. It is important that anyone running Apache HTTP Server 2.4.49 update immediately.

If you’re interested in learning more or are impacted by this vulnerability, our security experts are here to help. We’ve got your back!

 

 


Ransomware Preparedness Roundtable Offer

 

]]>
3 Reasons to Get Excited About Next-gen HCI https://www.oneneck.com/blog/advanced-services/hpe-hci-2.0/ Sat, 02 Oct 2021 23:45:00 +0000 https://www.oneneck.com/blog/advanced-services-hpe-hci-2-0/ The uptake of hyperconverged infrastructure (HCI) over the last decade has been strong, for good reasons: the technology is simple to manage and makes it easier to administer virtual desktops, apps and data. Businesses enjoy being able to scale infrastructure performance and storage capacity easily, by just slotting in a new node. However, while HCI […]]]>

The uptake of hyperconverged infrastructure (HCI) over the last decade has been strong, for good reasons: the technology is simple to manage and makes it easier to administer virtual desktops, apps and data. Businesses enjoy being able to scale infrastructure performance and storage capacity easily, by just slotting in a new node.

However, while HCI is suited to virtual desktops and lower-tier, less critical workloads, behind its breakthrough ease-of-use lie architectural limitations that can’t support business-critical apps and mixed workloads without adding risk. It forces a trade-off between performance and simplicity, leading to system lags and even crashes. Businesses find themselves balancing performance, availability and cost on a tightrope of uncertainty.

There is a need for a better solution that delivers the HCI experience of unified management and VM-centric operations with higher availability, faster performance and flexible scaling. The good news is that HPE now offers  that solution. It’s more powerful, more cost effective, and fixes bad performance. It’s HCI without boundaries.

what-is-hciWhat’s the excitement about?

HCI 2.0 from HPE is an intelligent platform that disaggregates compute and storage, and integrates hyperconverged control for simple management on a flexible architecture. Powered with HPE InfoSight, it gives enterprises ultimate simplicity for their virtualized environments with fast app performance, always-on data resilience, and resource efficiency.

1. No more trade-offs

HPE HCI 2.0 scales compute and storage independently, so no resources are wasted. You don’t have to buy both when you only need one but, more importantly, you can scale your needs to ensure that your system never buckles under pressure and business continuity is ensured.

2. Intelligently simple

HCI 2.0 removes complexity in IT operations and provides greater stability. Predictive support automation and problem prevention mean no more time-wasting on mundane, routine tasks and firefighting. Problem-solving is left to InfoSight’s predictive analytics and expert to support services. It’s simple to deploy: Configuration is automated, completed in 15 minutes1, not hours or days and VM-centric data services and resource management make it simple to manage.

3. Absolutely resilient

HPE HCI 2.0 offers 99.9999% storage availability2, and there is no single point of failure. It has the ability to tolerate three simultaneous drive failures whilst enabling faster and more frequent backups with application-consistent snapshots and advanced replication.

We’re here to help.

hpe-1024x1024As an HPE Platinum Partner, we have extensive experience helping our customers accelerate innovation and time to market by consolidating their IT with an intelligent hyperconverged infrastructure. If you’re interested in learning more about HPE’s HCI 2.0, our HCI experts are here to help.

]]>
VMware’s Recent Announcement on ESXi Boot Devices https://www.oneneck.com/blog/vmwares-recent-announcement-on-esxi-boot-devices/ Wed, 29 Sep 2021 20:37:00 +0000 https://www.oneneck.com/blog/vmwares-recent-announcement-on-esxi-boot-devices/ VMware recently released an article titled Removal of SD card/USB as a standalone boot device option, where they announced a new stance on ESXi boot devices. The article states that starting with the next release of ESXi (soon to be announced), SD cards and USB devices will not be supported as boot devices. They will […]]]>

VMware recently released an article titled Removal of SD card/USB as a standalone boot device option, where they announced a new stance on ESXi boot devices. The article states that starting with the next release of ESXi (soon to be announced), SD cards and USB devices will not be supported as boot devices. They will require another local persistent device with a minimum of 32GB, but 128GB is recommended, for boot devices.

The reasoning behind the change is moving forward they will require higher performance and endurance that SD cards and USB devices rarely meet.

While we at OneNeck know that this information is fresh and could change, we feel it in the best interest of our clients to make them aware of this announcement. So, if VMware does not change their stance, which they potentially could due to pressure, what does this mean for you?

If you are currently booting from a local hard drive, SSD, or booting from SAN, you are not affected by this change.

If you are currently booting ESXi from and SD card or USB device, it means you will need to retrofit those ESXi hosts with new boot devices that meet VMware’s criteria. The replacement drives can be anything from 2.5” drives, M.2 SSD drives, or even boot from SAN. While VMware does state that SD cards and USB devices that meet performance and endurance criteria can still be used, we would recommend it only be considered short-term.

Another consideration as you look to replace your boot drive, keep in mind there is no easy way to transfer the install. So, we would recommend a reinstall of the ESXi hypervisor on those servers.

If you think you are affected by this and would like some help replacing your boot drive, we are here to help. Please reach out to you OneNeck Account Executive to discuss your options.

]]>
The Pros and Cons of Data Center Colocation https://www.oneneck.com/blog/datacenter-colocation/pros-and-cons-of-colocation/ Sat, 18 Sep 2021 01:56:00 +0000 https://www.oneneck.com/blog/datacenter-colocation-pros-and-cons-of-colocation/ The rise of data center colocation has added a third option for businesses thinking of expanding their cloud or on-premise infrastructure. Now organizations can expand their computing infrastructure without increasing their real estate. Changing customer expectations have pushed businesses to support new application features and employ more personalization — accelerating the increase of their data […]]]>

The rise of data center colocation has added a third option for businesses thinking of expanding their cloud or on-premise infrastructure. Now organizations can expand their computing infrastructure without increasing their real estate.

Changing customer expectations have pushed businesses to support new application features and employ more personalization — accelerating the increase of their data usage. These organizations need to ensure that growing data requirements don’t slow down performance and therefore hurt user experience. Plus, much of the data contains sensitive customer information that businesses are required to house on physical servers they own.

Colocation (colo) provides a middle ground for businesses. They can still own and manage their computing infrastructure while cutting down on the costs of building, maintaining and supporting a data center. Let’s look at how colocation stacks up against on-premise infrastructure and the public cloud.

Enhance Your IT Infrastructure with Colocation

In business, there are no one-size-fits-all solutions. Every organization must look at its IT needs and determine if colocation is the right fit. Considering the pros and cons can help you determine if your business would benefit from colocation or if you’d be better off with a fully managed cloud solution. Below are some of the most compelling advantages of data center colocation:

More control.

Colocation gives you more control over your infrastructure. Customers are essentially renting space in a shared data center, and they are responsible for purchasing and maintaining their own servers.

Simplify scaling.

When a company expands its on-premise infrastructure, it will likely need a new data center to house the equipment. Building a data center involves high upfront costs as well as the need for maintenance and security. By using colocations, all businesses need to do is rent the space for their equipment. This leaves them with additional resources to focus on expanding their business.

Better security.

Data center colocations come with heightened security, which can include active monitoring, fire detection and suppression, on-site technical personnel, security staff and more. Those building their own data centers must manage these costs.

Increased bandwidth.

Another benefit of sharing this purpose-built space is that networking equipment is typically more advanced than those found in your server rooms. This provides customers with excellent bandwidth, resulting in improved latency.

Connect with cloud providers.

Some colocations even work directly with cloud providers, giving businesses easy access to hybrid cloud setups. The cloud provider can easily integrate with your existing infrastructure since they already have a direct line through the colo provider.

Colo can give customers more flexibility, reliability and efficiency with their servers when compared to on-premise equipment. However, there are some downsides to using a shared facility.

Team analyzing the benefits of using colocation for their IT infrastructure.Analyzing the cons of colocation allows businesses to understand the tradeoffs and minimize their impact. This knowledge will help you prepare so that you get a smoother colocation experience. Below are a few disadvantages of using a colocation:

Shared facility

Because colos are managed by another organization, customers don’t have control over how utilities, physical security, building maintenance and other physical aspects are overseen. When leveraging colocation in your business, it’s important to thoroughly research the partner you’ll be working with.

No control over location

You’ll be limited to the location of your provider’s data centers, which can present logistics challenges for servicing your hardware. Additionally, colocation expansion will be determined by demand and not your individual needs.

Managed by you

With the public cloud, your provider fully manages their data centers, including upgrades and servicing equipment. In a colocation, this job will likely fall upon your team’s shoulders. If your IT team is limited, this may force you to hire new people or be at risk of extended downtime when servers go down.

Despite the cons, in many circumstances, the benefits of colocation outweigh the challenges. The following questions can help you determine if data center colocation is the right choice:

  • Do we have sensitive data that needs to be kept on internal servers?
  • Do our data requirements make it costly to rely entirely on the cloud?
  • How much security are we able to provide for on-premise equipment? Is it enough?
  • How important is the ability to scale my computing infrastructure quickly?
  • Is my business interested in the hybrid cloud?

Scale Your Computing Infrastructure Flexibly With OneNeck Colocation

Modern organizations can’t afford to keep static infrastructure. They need the flexibility and computing power to keep up with customer demand. OneNeck colocation services give you ample control over your services while providing unparalleled support. Are you interested in expanding your IT infrastructure with colocation services? Contact us.

For more information, check out our colocation provider checklist.

]]>
How Can Hybrid IT Benefit Your Organization? https://www.oneneck.com/blog/cloud/hybrid-it-benefits-your-organization/ Fri, 10 Sep 2021 20:16:00 +0000 https://www.oneneck.com/blog/cloud-hybrid-it-benefits-your-organization/ Agility is a major concern for modern businesses, especially those in the technology sector. Being slow to act can result in missed opportunities, performance drops and lower earnings reports. Hybrid IT helps technology-based organizations stay agile by combining private IT infrastructure with cloud-based services. The combination of private and cloud resources means that organizations can […]]]>

Agility is a major concern for modern businesses, especially those in the technology sector. Being slow to act can result in missed opportunities, performance drops and lower earnings reports. Hybrid IT helps technology-based organizations stay agile by combining private IT infrastructure with cloud-based services.

The combination of private and cloud resources means that organizations can scale and introduce new tools without immediately needing to expand their infrastructure. Additionally, because cloud-based services are readily available, there is less ramp-up time for deploying new applications. All of this means a faster time to market.

This is just scratching the surface of how Hybrid IT can benefit your business. Let’s take a detailed look at five advantages it brings.

Give Your Business an Edge With Hybrid IT

  1. Flexible scalability. Business workloads aren’t perfectly predictable and will fluctuate depending on the needs of your departments. Hybrid IT enables teams to adapt quickly to spikes in activity through cloud bursting. This network configuration allows the private cloud to overflow into the public cloud and access additional computing resources without disrupting service.

    Hybrid IT plays an important role in infrastructure planning. It gives businesses more time before they have to expand their private cloud. Teams can observe spikes in server usage over time and determine if usage spikes are an anomaly or an indication of a true need.

  1. Disaster preparedness. Disaster recovery is crucial to ensuring the unexpected doesn’t knock out your business. However, backing up all of your company’s data can take a lot of server space. Hybrid IT can help you leverage the public cloud to give you the necessary space while controlling your organization’s server costs.

    One way that businesses can ensure that they have ready access to essential data in a hybrid model is by splitting data into categories. For example, data needed for day-to-day operations can be kept on private servers, while data that merely needs to be stored can be uploaded to the cloud. Sensitive data may be a third category you need to consider depending on your industry. More on that later.

  2. Robust data privacy. Every business should be concerned about data privacy since failure to protect customer data will impact trust. But, industries that deal with sensitive data like healthcare are even more privacy-conscious. They must worry about meeting government regulations, including HIPAA and HITECH.

    The Hybrid cloud model allows organizations to isolate applications and data that contain sensitive information from the public cloud. This gives the organization complete control over data that must be protected. At the same time, these organizations can leverage the cloud to test applications, scale quickly, and access cloud-based applications.

Graph showing a visual representation of data analytics.

  1. Better big data analytics. Many big data tools are not available on private infrastructure. These tools allow businesses to tailor their messaging and offers to the unique behavior of each customer. In e-commerce, some data shows that
    80% of customers are more likely to buy from a company that personalizes their experience
    .

    Additionally, Hybrid IT gives teams a single dashboard where they can visualize the performance of all of their IT infrastructure both on the private and public cloud. Quickly viewing performance metrics across the organization is crucial to making informed IT infrastructure decisions.

  1. Scale your computing infrastructure manageably. It’s impractical and costly for businesses to make large computing investments every time they start to hit the limits of their computing infrastructure. It’s more efficient to make infrastructure upgrades gradually, based on consistent needs instead of usage anomalies. How does this work?

    As we discussed, Hybrid IT allows teams to push work to the cloud when workloads peak. This gives teams time to adopt a wait-and-see approach, testing whether these new peaks will hold or if they are anomalies — avoiding costly upgrades made on short-term data.

Hybrid IT Is Empowering Businesses to Scale Effectively

Scalability and flexibility are two essential qualities for business growth, especially when it comes to computing infrastructure. Hybrid IT can help augment your business’s computing capacity while helping to control costs and gain more visibility into your infrastructure’s performance.

Our team is well versed in Hybrid IT, multi-cloud, and cloud bursting technologies. We can help your team identify its computing needs and design solutions that keep you flexible. If you’d like to talk about how Hybrid IT could benefit your business, contact us.

]]>
The Future of Healthcare in the Cloud – Hybrid Cloud https://www.oneneck.com/blog/cloud/future-of-healthcare-in-hybrid-cloud/ Wed, 08 Sep 2021 21:00:00 +0000 https://www.oneneck.com/blog/cloud-future-of-healthcare-in-hybrid-cloud/ Healthcare is undergoing a radical transformation. In response to the pandemic, IT teams have had to accelerate digital transformations, greatly expand telemedicine, support an increasingly remote workforce, and cope with an increasing number of Internet of Medical Things (IMT) devices – all while ensuring that their systems and data remain secured. To move so quickly, […]]]>

Healthcare is undergoing a radical transformation. In response to the pandemic, IT teams have had to accelerate digital transformations, greatly expand telemedicine, support an increasingly remote workforce, and cope with an increasing number of Internet of Medical Things (IMT) devices – all while ensuring that their systems and data remain secured. To move so quickly, many organizations have embraced hybrid cloud.

Cloud is not a one-size fits all model. Hybrid enables each workload to live on its best venue and provides the needed level of security, elasticity, and application-aligned infrastructure better than a ‘one-size-fits-all’ ecosystem. According to Nutanix’s Enterprise Cloud Index 2020, 94.5% of healthcare companies said hybrid private/ public cloud is the ideal IT operating model and they’re evolving their infrastructures to get there.

But adopting a hybrid cloud approach is not without its own challenges – particularly in an industry as highly regulated as healthcare. For success, organizations need to have the right strategy in place.

We’ve curated a collection of relevant resources from OneNeck and our trusted partners with the Healthcare IT professional in mind to help you facilitate a more holistic approach to patient care with hybrid cloud. Access the toolkit now.


healthcare-toolkit

Hybrid Cloud, We’ve Got Your Back

OneNeck can help you build a realistic roadmap that ties IT strategy to business outcomes, and identifies the people, processes, and technologies required at every stage of the hybrid cloud journey, so as an IT leader, you can move forward with confidence to a multi-cloud operating model including:

  • Private Cloud: Leverage a pre-engineered solution like ReliaCloud to help you get up and running quickly, reduce TCO, minimize risk, and simplify the cloud migration experience. With a an agile, automated, software-defined private cloud like ReliaCloud, your organization can get all the benefits of public cloud, without the interoperability and dependency challenges that cause so many hybrid cloud strategies to flounder.
  • Hyperscale Cloud: We help you determine which workloads can take advantage of the full suite of services Azure provides, and then we can migrate and support them for you.

Contact us today to learn more.

]]>
Cosmos DB Vulnerability: Error on the Side of Caution https://www.oneneck.com/blog/cloud/cosmos-db-vulnerability-chaosdb/ Fri, 27 Aug 2021 22:49:00 +0000 https://www.oneneck.com/blog/cloud-cosmos-db-vulnerability-chaosdb/   On August 26, Internet security firm, Wiz, announced it had found a security flaw in Microsoft Azure Cosmos DB, a global multi-model NoSQL store used by thousands of enterprises around the world. The exploit, named “ChaosDB,” allows bad actors to access the primary keys to a Cosmos DB account. The exploit was found in […]]]>

 

On August 26, Internet security firm, Wiz, announced it had found a security flaw in Microsoft Azure Cosmos DB, a global multi-model NoSQL store used by thousands of enterprises around the world.

The exploit, named “ChaosDB,” allows bad actors to access the primary keys to a Cosmos DB account. The exploit was found in the recently added Jupyter Notebook feature of Cosmos DB.

In response to this threat, Microsoft immediately disabled this feature for a full security audit.

Our Recommendation

OneNeck recommends everyone who has implemented a Cosmos DB account immediately regenerate the primary and secondary access keys. This will ensure continued data privacy.  While Microsoft doesn’t believe any customer data has been leaked, but your keys should immediately be regenerated to be safe.

If you have any questions regarding this vulnerability, we are here to help. Don’t hesitate to reach out.

Keep Moving Forward. We Have Your Back.

]]>
Better Together in the Nutanix Service Provider Program https://www.oneneck.com/blog/cloud/better-together-with-nutanix/ Wed, 07 Jul 2021 19:30:00 +0000 https://www.oneneck.com/blog/cloud-better-together-with-nutanix/ You may have heard that Nutanix recently launched the Nutanix Elevate Service Provider Program, which OneNeck was excited to be a part of. This gives us the opportunity to expand and differentiate our managed cloud services to our customers and deliver even more value that accelerates our customers’ growth. But beyond the technology, what is […]]]>

You may have heard that Nutanix recently launched the Nutanix Elevate Service Provider Program, which OneNeck was excited to be a part of. This gives us the opportunity to expand and differentiate our managed cloud services to our customers and deliver even more value that accelerates our customers’ growth.

But beyond the technology, what is it about the OneNeck/Nutanix partnership that brings value to our customers?

CHOICE: As the lines between the public cloud, private cloud and on-premises environments have more or less disappeared and we sit in the middle of hybrid complexity, at OneNeck we’re trying to ensure our customers have the cloud options to succeed in their unique environment.

OneNeck Product and Strategy Director, Jim de la Pena, summed it up this way. “What we see as a huge advantage of working with a service provider like OneNeck partnered with Nutanix is that we give our clients the choice of where their workloads should land, whether that’s hyperscale public cloud, on a private cloud, a hosted private cloud or even on-prem. Often there’s a gap in their in-house expertise on where the workload would optimally run, and we can provide that advice that enables them to make the right choice, in some cases, even across multiple platforms.”

SUPPORT: Support is a huge part of the service provider relationship, support in migration and professional services that get the workload into the cloud. Then there’s the day-2 support beyond migration that manages the day-to-day uptime, as well as cost-optimization recommendations for future-facing decisions.

In a recent joint podcast with Nutanix, Jim goes into additional reasons the service provider relationship brings value to OneNeck customers.

Ultimately, when weighing the option to work with a service provider vs. going it alone, there are always many factors to consider. But it really can be summed up with this quote…

Stop asking people for directions to places they’ve never been.

It’s that hands-on experience that leads to context – that’s where the value in the service provider relationship really emerges. We’ve been there, and we can help guide you around the pitfalls and get you to your goal faster and more efficiently – because we’ve been down that road before.

Keep Moving Forward. We Got Your Back.

]]>
Windows Print Spooler Vulnerability PrintNightmare Zero Day https://www.oneneck.com/blog/security/windows-print-spooler-vulnerability-aka-printnightmare-zero-day/ Fri, 02 Jul 2021 20:11:00 +0000 https://www.oneneck.com/blog/security-windows-print-spooler-vulnerability-aka-printnightmare-zero-day/ The PrintNightmare Zero Day vulnerability allows attackers with a local presence on a device to execute malicious code that exploits the flaw in the Windows Print Spooler service, granting SYSTEM access. Specifically, an attacker can exploit the vulnerability by placing the exploit DLL in a subdirectory under “C:WindowsSystem32spooldrivers”. Microsoft notification for this vulnerability can be […]]]>

The PrintNightmare Zero Day vulnerability allows attackers with a local presence on a device to execute malicious code that exploits the flaw in the Windows Print Spooler service, granting SYSTEM access. Specifically, an attacker can exploit the vulnerability by placing the exploit DLL in a subdirectory under “C:WindowsSystem32spooldrivers”. Microsoft notification for this vulnerability can be found here:

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527

Windows operating systems that run the Windows Print Spooler service by default can be exploited via local access to the endpoint. This vulnerability has been classified with a local attack vector, which means that an attacker would theoretically need to have had authenticated to the device running the exploitable Windows Print Spooler service. Per Microsoft’s recommendation customer should prioritize assessing the need for print spooling on domain controllers.

The recommended mitigations to this known vulnerability include the following:

  • Stop and disable the Windows Print Spooler service on machines that do not require it
  • For the systems that require the Windows Print Spooler service to be running, enable the PrintService-Operational event logging
  • For the systems that do require the Windows Print Spooler service to be running ensure they are not exposed to the internet.

This is an evolving situation and we will continue to provide updates as they become available.

If you have questions, your OneNeck team is here to help. OneNeck customers, please contact the OneNeck Service Desk at 800-272-3077.

]]>
What is Shadow IT? Know the Risks and How to Control It https://www.oneneck.com/blog/cloud/managing-shadow-it/ Thu, 17 Jun 2021 17:00:00 +0000 https://www.oneneck.com/blog/cloud-managing-shadow-it/ No doubt about it — if your company has employees, you have shadow IT. According to a survey conducted by Stratecast and Frost & Sullivan, 80% of employees say they use applications on the job that aren’t approved by IT. Shadow IT brings up security, integration and operational challenges and companies have three paths to […]]]>

No doubt about it — if your company has employees, you have shadow IT. According to a survey conducted by Stratecast and Frost & Sullivan, 80% of employees say they use applications on the job that aren’t approved by IT.

Shadow IT brings up security, integration and operational challenges and companies have three paths to choose from when it comes to dealing with it — they can accept it, try to suppress it or ignore it. The latter option may be the path of least resistance but can put the organization at tremendous risk. Ignoring shadow IT can threaten enterprise systems and data, and a security-conscious enterprise must have a plan for effectively dealing with it.

What Is Shadow IT?

Shadow IT is an umbrella term referring to any technology, be it an application or device (smartphone, tablet, laptops, etc.), deployed within an organization without the approval from the IT department. IT departments are often unaware that applications are being used by either individual employees or entire line of business units.

Most employees who adopt unsanctioned solutions do so with good intentions, not to undermine security, but to more effectively do their job. With the plethora of business and productivity applications available and the ease of installing these applications, shadow IT continues to propagate. Oftentimes, the process of seeking official IT approval for new applications is onerous and long, so employees take matters into their own hands. The cloud and mobile are large contributors to the problem.

Common examples of shadow IT include:

  • Productivity apps (Trello, Slack, Asana )
  • Messaging apps on corporate-owned devices (Snapchat, WhatsApp)
  • Physical devices (flash drives, external drives)
  • Cloud storage (Dropbox, Google Drive)
  • Communication apps (Skype, VOIP)

Shadow IT Risks

According to Cisco, 80% of end users use software not cleared by IT, 83% of IT staff admit to using unsanctioned software or services, and only 8% of all enterprises actually know the scope of shadow IT within their organization!

Shadow IT, without a doubt, adds risk into your organization, and your employees are your weak link. Michael Bruemmer, vice president of Experian Data Breach Resolution explained, “As we have seen in our incident response service that we do for clients, about 80% of all the breaches we service have a root cause in some type of employee negligence.” When non-sanctioned applications and devices are in use, vulnerabilities can be introduced into the infrastructure, and without IT oversight, the root-cause is very difficult to find.  Some examples of risk includes:

  1. Software Asset Management (SAM): Organizations need to track all software applications used and licensing information. Unauthorized software makes this already difficult task nearly impossible, leading to our next risk.
  2. Compliance: Unauthorized applications once discovered can mandate a complete audit of the infrastructure to ensure you are compliant. Organizations who do not take this seriously risk hefty fines from non-compliance.
  3. Testing: IT infrastructures are complex organisms that require management. Introducing new applications without proper testing can compromise the entire infrastructure. Shadow IT also adds more complexity to the entire testing process by having to involve a third party.
  4. Configuration management: Creating a configuration management database (CMDB) and defining relationships between different systems is labor-intensive. When other employees use shadow IT, those systems are not included and can have compatibility issues as a result.

How Do You Control Shadow IT?

Organizations must place a high value on reigning in shadow IT and work closely with lines of business to mitigate their risk. Suggestions include:

  • Continuously monitor the network for applications and systems.
  • Conduct an audit, and ask your employees to come forward, promising that they will not face consequences for using shadow IT applications.
  • Create a system for ranking and prioritizing risk. Not all applications outside of IT control are equally threatening.
  • Develop a list of devices approved for BYOD use, and make sure employees know that “jailbroken” devices are prohibited.
  • Develop an internal app store for all applications that have been evaluated and approved for use within the corporate infrastructure.
  • Block applications that are deemed dangerous and require users to seek approval before downloading.

In the long run, CIOs need to develop comprehensive procedures for approving cloud applications that are fast and efficient so that employees will not need to go around the system in a rogue manner. When employees are given a choice on what devices and applications they can use, it improves productivity, drives innovation and increases morale. So, embrace shadow IT in a way that manages risk and keeps your organization safe and compliant. Explore our cloud solutions or contact us for support in dealing with shadow it security risks.

]]>
Tips to Manage Cloud Spend in Your Enterprise https://www.oneneck.com/blog/cloud/manage-cloud-spend/ Wed, 09 Jun 2021 19:30:00 +0000 https://www.oneneck.com/blog/cloud-manage-cloud-spend/ According to Flexera’s State of Cloud 2021 report, organizations are continuing to rapidly increase their cloud spend. In so doing, they struggle to accurately forecast their fast-growing cloud costs. In the figure to the right, respondents reported their public cloud spend was over budget by an average of 24 percent. Respondents also expect their cloud […]]]>

According to Flexera’s State of Cloud 2021 report, organizations are continuing to rapidly increase their cloud spend. In so doing, they struggle to accurately forecast their fast-growing cloud costs.

Organizational spend on public cloudIn the figure to the right, respondents reported their public cloud spend was over budget by an average of 24 percent. Respondents also expect their cloud spend to further increase by 39 percent in the next twelve months. This trend means it’s more critical than ever to get a handle on forecasting and cost optimization.

When there is a lack of visibility and control over their cloud resources, organizations are in trouble. Cloud sprawl is one of the biggest pitfalls associated with minimal oversight. Cloud sprawl refers to the unchecked proliferation of an organization’s cloud instances, services and service providers, which can lead to unexpected costs and security vulnerabilities.

3 Causes of Cloud Sprawl

Too much cloud can be a bad thing. Here a few common reasons cloud sprawl occurs within an organization.

  1. Shadow IT: The self-service, user-friendly nature of the cloud has made it easy for various LOB employees to spin up resources, commonly implemented without the knowledge of IT. As a result, knowing exactly how many cloud services and subscriptions that are being utilized companywide are difficult to track. (Learn more about Shadow IT.)
  2. Failing to Right-Size Your Environment: Oversized infrastructure is one of the most common sources of overspending. When enterprises don’t match cloud resources to their current demand it often leads to over-provisioned and underutilized resources.
  3. No Governance Plan: It’s easy to keep throwing money at cloud resources; however, without a clear strategy and governance plan, costs can spiral under the radar.

4 Tips to Help Managed Sprawl in Your Organization

Every cloud sprawl symptom has a cure, and below are a few tips on where to start reining in your cloud.

  1. Assess Your Current State
    Start with an initial analysis of your current cloud estate and identify any optimization opportunities for rightsizing, helping to identify and eliminate wasted spend.
  2. Develop a Clear Governance Plan
    Define and implement a plan regarding cloud purchasing and cloud spending. Your end users should know how to make use of cloud services by adhering to policies that control costs, minimize security risks, improve efficiency and accelerate deployment.
  3. Continuously Monitor
    Continue to monitor your cloud environment to identify any unused, idle or duplicate resources that can drive up costs.

OneNeck, We Got Your Back

Cloud can be complex. Understanding consumption, identifying patterns and then determining how (or where) to optimize is a huge challenge. Working with a credible IT provider, with experience optimizing cloud use can help reduce budget overruns while accounting for wasted cloud spend.

At OneNeck, we have hands-on experience helping our clients identify exactly how much they are spending, along with providing recommendations on how and where waste can be controlled.

Can your organization save on cloud costs with an Azure Cost Optimization Assessment? Start your free assessment now .

]]>
Colonial Pipeline a Victim of Ransomware: Are You Safe? https://www.oneneck.com/blog/security/colonial-pipeline-a-victim-of-ransomware/ Wed, 12 May 2021 18:45:00 +0000 https://www.oneneck.com/blog/security-colonial-pipeline-a-victim-of-ransomware/ As pretty much everyone knows by now, Colonial Pipeline, one of the US’ largest pipelines carrying 2.5 million barrels per day (45% of the East Coast’s diesel, gas and jet fuel supply) and spanning from Texas to New Jersey, was forced to proactively shut down on Friday, May 7, due to a cyber attack. The […]]]>

As pretty much everyone knows by now, Colonial Pipeline, one of the US’ largest pipelines carrying 2.5 million barrels per day (45% of the East Coast’s diesel, gas and jet fuel supply) and spanning from Texas to New Jersey, was forced to proactively shut down on Friday, May 7, due to a cyber attack.

The FBI issued a statement confirming that DarkSide, a well-known cyber-criminal gang, was responsible for the attack. The BBC states that many cyber-security researchers have speculated that the cyber-criminal gang could be Russian, as their software avoids encrypting any computer systems where the language is set as Russian.

It’s a storyline that’s become all too familiar, where ransomware is to blame for cutting a business off at the knees, leaving casualties in its wake far and wide. And while it can be overwhelming trying to combat these onslaughts of attack, it’s a good reminder to stop and assess your current security hygiene…

Are you doing what you can to keep your organization safe?

To effectively protect against cyber threats, you need solutions that:

  • Stop threats at the edge.
  • Control who gets on your network.
  • Simplify network segmentation.
  • Protect users wherever they are.
  • Find and contain problems fast.

CIS-Controls_AndresQuoteBut where does one even start? At OneNeck, our security experts believe that a solid place to start with any security strategy is with established security frameworks, such as the CIS Critical Security Controls.

These Controls represent the collective thinking of IT experts across multiple industries and can be used as a guide to assess for good cyber hygiene and provide a prioritized set of actions to be used to addresses security vulnerabilities. These practical actions, which combine technical security and risk management, can help mitigate the most common attacks against systems and networks and reduce corporate risk. Collectively, they can help you take a defense-in-depth approach to building your security program.

So, don’t wait until it’s too late to address the security gaps that can be exploited by bad actors. As OneNeck CISO, Katie McCullough, says… “To avoid becoming a ransomware victim, businesses should take actions that include putting security processes in place to ensure your IT environment is fully protected. It can be a journey, but you don’t have to go it alone.”

If you’re interested in talking with one of our security experts, we’re here to help.

Katie-McCulloughLearn more from OneNeck’s CISO about the Anatomy of Ransomware in this informative blog.

]]>
OneNeck Named to RCPmag.com Top 350 Microsoft Partners https://www.oneneck.com/blog/managed-services/oneneck-in-rcpmag-top-350-microsoft-partner-list/ Thu, 25 Mar 2021 18:47:00 +0000 https://www.oneneck.com/blog/managed-services-oneneck-in-rcpmag-top-350-microsoft-partner-list/ As a uniquely positioned group of Microsoft experts, the Redmond Channel Partner team advocates for Microsoft partners, offering advice on growing their Microsoft services and building productive partnerships. So, their recent recognition of OneNeck in their top 350 US Microsoft partners was evidence of OneNeck’s continued commitment to our partnership with Microsoft and growing our […]]]>

As a uniquely positioned group of Microsoft experts, the Redmond Channel Partner team advocates for Microsoft partners, offering advice on growing their Microsoft services and building productive partnerships. So, their recent recognition of OneNeck in their top 350 US Microsoft partners was evidence of OneNeck’s continued commitment to our partnership with Microsoft and growing our Microsoft portfolio of services.

RCPmag.com uses their 16+ years of experience in the Microsoft channel community to develop their list of 350 partners, intended for customers looking for an experienced Microsoft partner among the multitude of options. They list the technical expertise of each partner, making it simple to navigate the list and find a right-fit partner.

Microsoft’s 90,000+ ecosystem of worldwide partners creates a vast global community. This brings an array of opportunities to OneNeck as a provider, but even more to our customers as we bring data, infrastructure and modern workplace solutions to their organizations.

Microsoft’s mission is to empower every person and organization on the planet to achieve more. At OneNeck, we take this mantra to a very personal level with our customers. We succeed when they succeed. Ultimately, we’re here to help our customers build a strong foundation that spans on-premise, private and hyperscale cloud environments, and our Microsoft solutions bring myriads of options to our customers that meet them wherever they may be in their journey.

Icon_MoveBusinessForward-w-MSAzure

Learn more about Microsoft solutions offered by OneNeck in this eGuide.

]]>
Still Confused About Microsoft’s Product Names? https://www.oneneck.com/blog/managed-services/clarifying-microsofts-product-names/ Fri, 05 Mar 2021 23:15:00 +0000 https://www.oneneck.com/blog/managed-services-clarifying-microsofts-product-names/ From time to time, we still get questions related to Microsoft’s continuing effort to clarify product offerings and make it easier to use Microsoft Online Services such as Office/Microsoft 365. To do this, last year Microsoft made multiple product name changes to be more reflective of the range of features and benefits in the subscription. […]]]>

From time to time, we still get questions related to Microsoft’s continuing effort to clarify product offerings and make it easier to use Microsoft Online Services such as Office/Microsoft 365. To do this, last year Microsoft made multiple product name changes to be more reflective of the range of features and benefits in the subscription. So, I thought I’d recap for those still wondering, “Is it O or M?”

On the table is O365 vs M365. Last year Microsoft shifted O365 subscriptions to M365 subscriptions, made it easy so that existing subscribers did not need to reinstall or purchase another subscription, and kept pricing the same.

Microsoft 365 includes everything you knew in Office 365. Microsoft 365 is designed to help people and businesses achieve more with innovative Office apps, intelligent cloud services, and world-class security.

Microsoft has the following Microsoft 365 plans available:

Microsoft 365 for home plans

  • Microsoft 365 Family
  • Microsoft 365 Personal

Microsoft 365 for business plans

  • Microsoft 365 Business Basic
  • Microsoft 365 Business Standard
  • Microsoft 365 Business Premium
  • Microsoft 365 Apps for business

Microsoft 365 for enterprise plans

  • Microsoft 365 E3
  • Microsoft 365 E5
  • Microsoft 365 F1
  • Microsoft 365 Apps for enterprise

The existing Office 365 subscriptions for home and business have been moved to one of the existing Microsoft 365 plans or remain the same as follows:

  • Office 365 Personal becomes Microsoft 365 Personal
  • Office 365 Home becomes Microsoft 365 Family
  • Office 365 Business Essentials becomes Microsoft 365 Business Basic
  • Office 365 Business Premium becomes Microsoft 365 Business Standard
  • Microsoft 365 Business becomes Microsoft 365 Business Premium
  • Office 365 Business becomes Microsoft 365 Apps for business
  • Office 365 ProPlus becomes Microsoft 365 Apps for enterprise
  • Office 365 E1 will remain available under the same name
  • Office 365 E3 will remain available under the same name
  • Office 365 E5 will remain available under the same name

If you still have questions, we are definitely here to help. Don’t hesitate to reach out and talk with one of our Microsoft experts…

Learn more about M365 for Business

Learn more about M365 for Enterprise

SOURCES:

]]>
CVE-2021-26855 – Microsoft Exchange Server Vulnerability https://www.oneneck.com/blog/security/microsoft-exchange-server-remote-code-execution-vulnerability/ Thu, 04 Mar 2021 22:32:00 +0000 https://www.oneneck.com/blog/security-microsoft-exchange-server-remote-code-execution-vulnerability/ Over the last couple of days, Microsoft released out-of-band security updates to address multiple vulnerabilities in Microsoft Exchange that could allow an unauthenticated, remote attacker to exploit an Exchange Server by sending a specially crafted HTTP request over port 443 allowing the attacker to authenticate. These are the recommended security updates: Update KB5000871 has been […]]]>

Over the last couple of days, Microsoft released out-of-band security updates to address multiple vulnerabilities in Microsoft Exchange that could allow an unauthenticated, remote attacker to exploit an Exchange Server by sending a specially crafted HTTP request over port 443 allowing the attacker to authenticate.

These are the recommended security updates:

  • Update KB5000871 has been released for the latest release of the latest three versions of Microsoft Exchange (2013-2019) and the previous release for currently supported versions (2016, 2019).
  • Update KB5000978 has been released for the latest release of Microsoft Exchange 2010.

At OneNeck, we take these threats very seriously and are actively creating patching baselines, working on plans and scheduling to apply these vulnerability patches with customers that have Managed Exchange Services with OneNeck.

Additional Information From Microsoft:


Mitigations (From Microsoft CVE)


The initial attack requires the ability to make an untrusted connection to Exchange server port 443. This can be protected against by restricting untrusted connections, or by setting up a VPN to separate the Exchange server from external access. Using this mitigation will only protect against the initial portion of the attack. Other portions of the chain can be triggered if an attacker already has access or can convince an administrator to open a malicious file.
We recommend prioritizing installing updates on Exchange Servers that are externally facing.


FAQ (From Microsoft CVE)


Q: Is this vulnerability being used in an active attack?



A:

Yes. The vulnerability described in this CVE is one of four vulnerabilities that are being exploited in an active attack. The security updates address this attack.


Q: What is the target for this attack?



A:

The initial attack in this attack chain targets an Exchange On-prem server that is able to receive untrusted connections from an external source. In addition, the Exchange server would need to be running Microsoft Exchange Server 2013, 2016, or 2019.

Source Links:

If you have any questions or concerns that you’d like to discuss with a OneNeck security expert, we’re here to help.

]]>
Is Your Data Holding You Back? https://www.oneneck.com/blog/cloud/is-your-data-holding-you-back/ Wed, 03 Feb 2021 21:30:00 +0000 https://www.oneneck.com/blog/cloud-is-your-data-holding-you-back/ The stats are crazy. There are roughly 3.7 billion humans using the Internet, with 5.6 billion Google searches every single day! Data is the center of our lives, personal and business, leading to roughly 2.5 quintillion bytes of data being generated every single day – and that number just continues to grow. But not unlike water, so pivotal in our […]]]>

The stats are crazy. There are roughly 3.7 billion humans using the Internet, with 5.6 billion Google searches every single day! Data is the center of our lives, personal and business, leading to roughly 2.5 quintillion bytes of data being generated every single day – and that number just continues to grow. But not unlike water, so pivotal in our existence, too much of a good thing can lead to drowning.

As businesses have started to realize the potential insights they could be gleaning from their data, and the absolute necessity of using it to their advantage, they’ve also realized that harnessing it and making it usable can be daunting. But most recognize that data has to be a priority to remain relevant. So, where is a good place to start when embarking down the get-insights-from-my-data path? Here are some basic steps we follow as we help our customers tackle their data…

Step 1 – Define what you’re trying to achieve.

Before data even comes into the conversation, it’s critical to determine where are you trying to go. It does no good to embark on a data modernization initiative until you determine what your end state is – what are you trying to accomplish with your data? Some organizations are just looking for a way to capture the data more efficiently, where others actually want to take it to the point of using it, to analyze it and drive their business forward. Defining your end goal will ensure you don’t waste time and money on a pointless quest.

Step 2 – Understand and document what data you have and where it is ingested.

The majority of organizations don’t even know what data they have, as it lives all over their environment in various data silos. This is where due diligence comes in, understanding and documenting the who, what, when and where of your data.

Step 3 – Ingest and consolidate your data.

Once you’ve figured out where your data resides, it’s time to transfer it from those disparate systems to a single target destination. You must transform unstructured and semi-structured data via an ETL/ELT (extract, transform, load/extract, load, transform) process into usable formats, enabling a continuous flow of updated data that combats data decay. Effective analytics requires clean data, so this is critical in any data initiative – without accurate data feeding into the analytics tools, the value is greatly diminished.

Step 4 – Train and model your data.

AI and machine learning are two of the most impactful technology trends in generations, and really where data starts turning into insight. Define AI/ML models and desired outcomes, and then determine and ensure you have enough compute capacity to employ those models, and whether they should be in the cloud or on-premises.

Step 5 – Visualize, analyze and serve up the data.

Provide the organization with relevant analytics and data visualization, along with self-service analytics for daily line-of-business and departmental uses. There are many tools to accomplish this, depending on your specific environment and goals, making an experienced partner a strategic asset in determining the right-fit tool(s).

The bottom line.
SMorley_QuoteBlock

When it comes down to it, the really critical part of any data initiative is… rather than taking a system-centric approach to data, take a step back and take a business-centric approach. Define what you’re trying to achieve, and then use your data to get you there. Data modernization is more than just buying a bunch of data management tools. It’s much more a strategy and methodology than it is a shopping list.

The right methodology for data modernization starts with the end goal in mind. When you know what you want to get out of your data, then you can work with an IT services partner to evaluate your existing tech stack, personnel and in-house skills to discover what needs to evolve and which new tools should be added.

 

eBook_DataModernization_ThumbnailInterested in learning more? Check out this informative eBook on why data modernization is key to unlocking business opportunities – and how to get it right.

]]>
Virtualized Containers vs VMs: Which Is Best? https://www.oneneck.com/blog/cloud/containers-vs-vms-which-is-best-for-your-workloads/ Fri, 22 Jan 2021 02:33:00 +0000 https://www.oneneck.com/blog/cloud-containers-vs-vms-which-is-best-for-your-workloads/ Containers are quickly becoming commonplace in workplace applications, even replacing virtual machines in some instances. But how do you know if containers are right for your IT environment? In this article we explore containers vs vms What Is a Virtualized Container? Tech giants like Google, Microsoft and IBM have all invested heavily in virtualized containers. […]]]>

Containers are quickly becoming commonplace in workplace applications, even replacing virtual machines in some instances. But how do you know if containers are right for your IT environment? In this article we explore containers vs vms

What Is a Virtualized Container?

Tech giants like Google, Microsoft and IBM have all invested heavily in virtualized containers. At its most basic, a container is an OS-level virtualization method for executing and running applications. Containers eliminate the need to launch an entire virtual machine (VM) for every application. They run on an isolated system and single control host and access a single kernel.

You may have heard the name Docker, for example. Docker is the leading provider of enterprise-level containers. LXC, a Linux userspace interface that lets users create and manage containers, is another big name in virtual container provisioning.

What is a Virtual Machine (VM)?

A VM allows users to run an operating system in an app window on the desktop. The VM acts like a separate computer complete with its own virtualized hardware. This enables users to experiment with different operating systems, software and apps – all in a safe, sandboxed environment.

VMs run on a firmware, software or hardware manager called a hypervisor. The hypervisor itself runs on a physical computer – also known as a “host machine” – that provides the VM with resources like RAM and CPU. Multiple VMs can run on a single host machine with resources distributed as needed.

Containers vs VMs

Containers vs VMs – Which is Better?

Containers are a newer concept, and many argue that they hold several advantages over VMs. The latter consumes more resources since it runs on a full copy of the operating system (OS) as well as a virtual copy of every hardware component running the OS. This eats up quite a bit of RAM and CPU.

Containers, on the other hand, can generally handle about two to three times the number of applications as a VM since they require only parts of an OS, like the libraries and other system resources necessary to run a specific program. Modern containers also run in the cloud, giving users a portable operating environment for deploying, developing and testing new systems.

So, containers are the clear winner then, right?

Well, not exactly. VMs do have certain advantages. They’re relatively easy to create, so developers can install whatever OS they need and get straight to work since there isn’t much of a learning curve. With easily-accessible software on the market, users can even return to an earlier iteration of an OS, or create/clone a new OS entirely.

For enterprises and small businesses, however, containers may still be preferable. Containers use considerably less hardware, making them ideal for running multiple instances of a single application, service or web server. Containers function like VMs but without a hypervisor, resulting in faster resource provisioning and speedier availability of new applications.

Finding Which Solution is Best for Your Business

Every organization’s business needs and infrastructure are different and each requires its own unique strategy. In the big scheme of things, containers in no way make VMs obsolete. Containers simply provide a new solution for improving overall IT efficiency in specific areas of operation. If you think you could benefit from a single service that can be clustered and deployed at scale, then containers may be the better option for your organization. Or, instead of a full transition to containers, the best solution for you may be a hybrid approach. By implementing containers alongside VMs, you’ll be able to capitalize on the respective advantages of each.

Unsure of what’s best for your organization? Contact us and we’ll help you figure it out.

]]>
Microsoft Teams Adoption Strategy https://www.oneneck.com/blog/microsoft-teams-adoption-strategy/ Thu, 14 Jan 2021 23:00:00 +0000 https://www.oneneck.com/blog/microsoft-teams-adoption-strategy/ Microsoft Teams is the Hub for teamwork in Microsoft 365. To maximize Microsoft 365 investments, it’s important to plan for a successful deployment and adoption. Planning to ensure that users adopt new services and embrace those services and use them as part of their natural rhythm of work is critical to Teams success. I sat […]]]>

Microsoft Teams is the Hub for teamwork in Microsoft 365. To maximize Microsoft 365 investments, it’s important to plan for a successful deployment and adoption. Planning to ensure that users adopt new services and embrace those services and use them as part of their natural rhythm of work is critical to Teams success.

I sat down with Paul Frederickson, Senior Business Systems Analyst at TDS to discuss the value of Teams and best practices for driving Microsoft Teams adoption.

Why Teams and how are companies leveraging it to drive productivity?

With employees accessing unsanctioned SaaS applications, dozens of ways to share files, and multiple communication channels, the modern workplace presents many challenges for teamwork. With Teams, you get built-in access to everything employees need to work, in one place.

We do often find that many organizations aren’t leveraging Teams in its entirety, but rather as a point solution i.e. the messaging functionality of Teams. The full value comes from leveraging the entire collaboration platform including chat, calling, meetings and content sharing; allowing Teams to become the Hub for an organizations’ teamwork.

What is the best approach to implementing Teams and driving adoption?

I like to break this down into 3 phases, pre-pilot, pilot and post-pilot.

  • Pre-Pilot: An organization needs to ensure all the IT tasks are complete; determine baseline configurations and make key decisions on governance. For example, who can create teams, and Teams naming conventions, data security, etc. Adjustments can be made throughout the process, but organizations should attempt to do as much up front as governance decisions may impact the end-user experience.
  • Pilot: Onboard early adopters to Microsoft Teams. Engage with your users, send a message or post in a channel, this will encourage them to interact with the platform. The feedback loop is a critical step in this phase. Knowing how your users are using Teams and what their experience is with Teams gives you insights on where to prioritize training and adoption efforts in your wider rollout.
  • Post-Pilot: After an organization has onboarded an initial group of users leverage your go-forward plan to deploy Teams across the rest of your organization and continue to drive adoption.

How can OneNeck help organizations with Teams adoption?

As a Microsoft Cloud Solution Provider, our goal is to get clients up and running so they can begin their journey with Teams. Our Teams Foundation Services offering includes consulting implementation and adoption services to help our client’s gain the most value out of the platform including: getting started with Teams and planning for the initial adoption, making the key decisions on governance that I addressed in the pre-pilot phase of implementation, determining baseline configurations, piloting and training.

Let OneNeck help you deploy Microsoft Teams and realize the power of modern teamwork in your organization. Contact us today.


Paul-fredericksonPaul Frederickson is a member of the TDS Corporate Content & Collaboration Services Team. Paul is an expert with the Microsoft 365 toolkit, specifically with SharePoint, OneDrive, and Microsoft Teams and drives technology adoption within the TDS Family of Companies, comprising 10,000 associates. He is an MBA graduate from the University of Wisconsin – Whitewater.

]]>
What Is DevOps https://www.oneneck.com/blog/what-is-devops/ Thu, 07 Jan 2021 21:11:00 +0000 https://www.oneneck.com/blog/what-is-devops/ Today’s fast-paced world makes DevOps essential to all enterprises seeking to respond rapidly to changes in customer demands, market conditions and competitive pressures. But, what is DevOps and how do you get started? What tools do you need to leverage? How do you bring all the right technologies together successfully? I sat down with Lee […]]]>

Today’s fast-paced world makes DevOps essential to all enterprises seeking to respond rapidly to changes in customer demands, market conditions and competitive pressures. But, what is DevOps and how do you get started? What tools do you need to leverage? How do you bring all the right technologies together successfully?

I sat down with Lee Grant, a Principal Application Architect at OneNeck, to discuss what DevOps means and how enterprises can implement it to gain the promised business benefits.

What Is DevOps and Why Embrace It?

DevOps is an abbreviation for Development and Operations. DevOps is not a tool, it’s a way of doing things that unifies people, process and products.

By adopting a DevOps culture, along with DevOps practices and tools, teams can build, test and release applications at the speed of digital business.

What’s Driving DevOps Adoption?

The reasons for adopting DevOps vary based on the business need for it and the challenges that it addresses. The forces we typically see driving adoption include:

  • Accelerating time to market- Many enterprises seek to move at high velocity. DevOps allows them to innovate faster, adapt to changing markets better and grow more efficient at driving business results.
  • Adapting to the market and competition- DevOps enables an enhanced customer experience by having the ability to deliver more, faster, better, continuously and in an automated fashion helping to build a competitive advantage.
  • Maintaining system stability and reliability- Leveraging DevOps to deploy applications with repeatable, reliable processes also allows for continuous automated deployment and testing, lowering the risk of failures at release time.
  • Improving the mean time to recovery- With DevOps, recovery is much faster when the development and operations teams collaborate, sharing challenges during development. Recent research shows that high-performing DevOps teams recover from downtime 96 times faster, have a five times lower change failure rate, and deploy code 46 times more frequently.

How Do Organizations Get DevOps Right?

The DevOps journey involves significant changes in culture, processes and technologies.

DevOps should be structured to meet the unique needs of your organization. Consider your current culture. Identify the silos and bottlenecks that prevent rapid development and deployment to understand where to improve.

How Can OneNeck Help?

We have a team of highly certified and knowledgeable experts to help our clients improve application development and operations, using effective DevOps strategies and tools.

We start by defining clear objectives with your team. Then we conduct practice workshops to help define use cases for your business that deliver a cohesive goal for stakeholders. This alignment is the critical first step in the journey to transformation.

Finally, we architect and deploy solutions that help standardize application development and releases.

Contact us today to learn more.

]]>
FireEye Red Team Tools Breach – No One’s Safe. https://www.oneneck.com/blog/security/fireeye-breach-no-ones-safe/ Thu, 17 Dec 2020 22:30:00 +0000 https://www.oneneck.com/blog/security-fireeye-breach-no-ones-safe/ Data breaches are everywhere, and everyone is susceptible – even the security experts. This was recently put front and center by the state-sponsored adversary that stole FireEye’s Red Team tools. This particular breach was especially eye-opening, as FireEye is not only a well-recognized security company, but the stolen data includes the custom penetration tools utilized […]]]>

Data breaches are everywhere, and everyone is susceptible – even the security experts. This was recently put front and center by the state-sponsored adversary that stole FireEye’s Red Team tools.

This particular breach was especially eye-opening, as FireEye is not only a well-recognized security company, but the stolen data includes the custom penetration tools utilized by FireEye’s Red Team, a group of security professionals that specialize in cracking the code on attackers.

As a result of the breach, FireEye provided extensive information and countermeasures for security professionals to implement in defense of the stolen tools.

This type of breach is sure to make any security professional wince. But if you’re a tech leader at a mid-market organization with limited budget and minimal-to-no in-house security expertise, you have to wonder if you even have a chance against the bad guys. We’re here to tell you that you do.

While there are a plethora of tools on the market, an important security control is protecting your network boundary with a next generation firewall. Many organizations are still using outdated firewalls that are less efficient, less effective and vulnerable to attack – and often not integrated into the rest of the security point-products. You need a modern firewall that can block threats and quickly mitigate those that do breach your perimeter.

As a Cisco partner, we’ve seen firsthand the power of Cisco’s integrated system of security tools, with the next-generation firewall (Firepower) at its core. These tools work together to prevent breaches, automate operations, save you time and uncover and eliminate threats everywhere, fast.  FirePower includes an advance threat team (Talos, one of the largest commercial threat intelligence teams) at the ready 24×7 to ensure Cisco’s security tools are optimized to recognize and address advanced threats as they happen.

And as an added bonus, OneNeck can help you further by managing your next-gen firewall 24×7, so that we’re here on that wall, keeping watch, ensuring all advanced threat features are updated immediately and enabling your team to focus on other tasks outside of watching for attackers. It may seem overwhelming when even the big guys get breached, but you’re not alone. Let’s work together to keep the bad guys out!

]]>
OneNeck’s Response to the FireEye Breach https://www.oneneck.com/blog/security/onenecks-response-to-the-fireeye-breach/ Thu, 17 Dec 2020 02:00:00 +0000 https://www.oneneck.com/blog/security-onenecks-response-to-the-fireeye-breach/ Specific to the FireEye breach which identified a widespread compromise of Solarwinds software, OneNeck continues to ensure we are following security industry and vendor recommendations for securing our environment specific to any of the  Common Vulnerabilities and Exposures (CVE)  and any Indicators of Compromise’s (IoC) that become known to be associated with these breaches.  The […]]]>

Specific to the FireEye breach which identified a widespread compromise of Solarwinds software, OneNeck continues to ensure we are following security industry and vendor recommendations for securing our environment specific to any of the 
Common Vulnerabilities and Exposures (CVE)
 and any Indicators of Compromise’s (IoC) that become known to be associated with these breaches.  The
CVEs
 specifically associated with these breaches have documented solutions from the appropriate vendors that have been made available. Therefore through our standard process, such as normal patching, OneNeck devices have the appropriate protections.  While OneNeck does not leverage the SolarWinds Orion IT monitoring and management software to provide any of our services, we have and continue to:

  • Consume signatures and Indicators of Compromise (IOC) related to the Solarwinds and FireEye compromise into our monitoring and security platforms.
  • Contact our suppliers and vendors to review any use of Solarwinds, and to identify and mitigate any potential risk to OneNeck data or services.

Additionally, to continuously ensure our environment has the appropriate security protections, detections and response, OneNeck leverages the
Center for Internet Security’s
 (CIS) Critical Security Controls, which are a series of cybersecurity actions prioritized by their criticality in preventing cyberattacks. OneNeck completes a CIS Critical Security Control’s assessment at least annually, along with incorporating the controls as part of any new service.

For customer-specific environments where OneNeck provides managed services, OneNeck is monitoring for any additional updates from specific technology vendors to address potential threats.  As updates are identified, OneNeck will follow appropriate communication and change protocols to get approval from customers to implement.  As noted previously, where customers leverage our recommended patching process, the specific protections related to patches recommended by CVE’s would already be in place.  Where OneNeck provides additional security services such as Endpoint Detection and Response (via Cisco AMP for Endpoints), Next Generation Firewall (via Cisco Firepower) or Managed Detection and Response (via Alert Logic), we continue to work with these key vendors to implement additional monitoring and protections associated they provide with protecting against new threats associated with the FireEye or Solarwind breach.

]]>
Microsoft Combines & Renames Products Under Defender Brand https://www.oneneck.com/blog/security/microsoft-renames-products-under-microsoft-defender-brand/ Tue, 17 Nov 2020 03:33:00 +0000 https://www.oneneck.com/blog/security-microsoft-renames-products-under-microsoft-defender-brand/ “What’s in a name? That which we call a rose by any other name would smell as sweet.” True, Juliet, but a name does matter, especially when it’s simply arbitrary versus describing what it actually is. And this seems to be a truth that Microsoft has taken to heart… After rebranding Windows Defender as Microsoft […]]]>

“What’s in a name? That which we call a rose by any other name would smell as sweet.” True, Juliet, but a name does matter, especially when it’s simply arbitrary versus describing what it actually is. And this seems to be a truth that Microsoft has taken to heart…

After rebranding Windows Defender as Microsoft Defender in early 2019, Microsoft announced in September that they are renaming and bringing more products under the Defender brand.

The Defender product line is now larger and split into two buckets:

  • Microsoft 365 Defender for end user environments: Microsoft 365 Defender delivers XDR (Extended Detection and Response) capabilities for identities, endpoints, cloud apps, email and documents. It uses artificial intelligence to reduce the SOC’s work items, and in a recent test we consolidated 1,000 alerts to just 40 high-priority incidents. Built-in self-healing technology fully automates remediation more than 70% of the time, ensuring defenders can focus on other tasks that better leverage their knowledge and expertise.
  • Azure Defender for cloud and hybrid infrastructure: Azure Defender delivers XDR capabilities to protect multi-cloud and hybrid workloads, including virtual machines, databases, containers, IoT, and more. Azure Defender is an evolution of the Azure Security Center threat protection capabilities and is accessed from within Azure Security Center.

The Microsoft 365 Defender line now includes:

  • Microsoft 365 Defender (previously Microsoft Threat Protection)
  • Microsoft Defender for Endpoint (previously Microsoft Defender Advanced Threat Protection)
  • Microsoft Defender for Office 365 (previously Office 365 Advanced Threat Protection)
  • Microsoft Defender for Identity (previously Azure Advanced Threat Protection)

The Azure Defender line now includes:

  • Azure Defender for Servers (previously Azure Security Center Standard Edition)
  • Azure Defender for IoT (previously Azure Security Center for IoT)
  • Azure Defender for SQL (previously Advanced Threat Protection for SQL)

This rebranding of Microsoft’s security offerings is in alignment with other product renaming initiatives (such as the renaming of the Office 365 SMB SKUs) that have taken place over the last year or so.

OneNeck Product Director, Jim Brown, states, “It just makes sense. As Microsoft is striving to simplify and unify their security offerings to cover an end-to-end security portfolio, the names need to reflect this strategy and enable clear consumption models and make it easier for organizations to understand how to use them to be more secure.”

We’ve Got Your Back.

As an experienced Cloud Solution Provider (CSP) and Microsoft partner, we’re here to help. So, if you have any questions regarding the new Microsoft product names and how to use them to secure your data and applications, let’s chat.

]]>
How to Overcome IT Outsourcing Challenges https://www.oneneck.com/blog/how-to-overcome-it-outsourcing-challenges/ Tue, 27 Oct 2020 20:00:00 +0000 https://www.oneneck.com/blog/how-to-overcome-it-outsourcing-challenges/ Nowadays, many organizations eagerly use IT outsourcing to remediate IT skills shortages, control cost and gain access to world-class capabilities. Statistics show that the market size of the outsourcing industry in the US in 2020 is $132.9 billion and it is going to grow by 1.6% the same year. And while this approach has many benefits, […]]]>

Nowadays, many organizations eagerly use IT outsourcing to remediate IT skills shortages, control cost and gain access to world-class capabilities. Statistics show that the market size of the outsourcing industry in the US in 2020 is $132.9 billion and it is going to grow by 1.6% the same year. And while this approach has many benefits, it is not without challenges. 

Here are top 4 IT outsourcing challenges companies facing today and how to overcome them:

1. Choosing the Right Capabilities to Outsource – It’s important before an organization asks if they can outsource, that they know why they want to outsource.

Solution: Take a functional approach. Determine your reason for outsourcing:

  • Tactical – Eliminating cost, reducing investment or freeing up resources 
  • Strategic – Gaining strategic advantage or operational value from having an expert third party manage their IT infrastructure. 

The right option should be selected based on your unique business requirements and the outsourcing motivations of your company. Finally select a partner whose core competencies address your requirements.

2. Lack of Control You’ll experience a perceived lack of control as you’re now relying on a third-party provider’s expertise, resources, infrastructure, and skill to manage and maintain your environment.

Solution: The key to overcoming risk and fear is proper management of the relationship. If they are managed correctly through well thought out policies and procedures, these problems and fears can be mitigated.

3. Unforeseen Costs – Additional service requests or projects not covered by the scope in your initial contract may cause you to spend more than your contract suggests.

Solution: Make sure you clearly define the scope of work to help reduce the chance of unexpected costs. Get acquainted with pricing models offered by the provider and choose an engagement model that best fits your requirements.

4. Vendor Lock-in – Becoming dependent on a single managed IT services provider and technology implementation can lead to substantial costs, legal constraints, or technical incompatibilities.

Solution:The best way to avoid a potentially unpleasant and hostile situation is to negotiate both an entry and exit strategy upfront with your vendor. And remember there are plenty of managed services providers in the sea, so don’t settle if the provider isn’t a good fit for your organization – don’t be afraid to shop around.

Outsourcing your IT needs can help you lower costs, focus on core competencies, and ultimately achieve increased productivity. With the right approach, and the right managed services provider that has your back, you will easily resolve the aforementioned IT outsourcing challenges and ensure your customer/service provider relationship is mutually positive for both parties.

]]>
Why You Should Consider a Managed Backup Service https://www.oneneck.com/blog/why-you-should-consider-a-managed-backup-service/ Tue, 20 Oct 2020 20:00:00 +0000 https://www.oneneck.com/blog/why-you-should-consider-a-managed-backup-service/ For any modern organization, protecting business-critical data is vital. Yet protecting data assets has become complex and difficult as the rising tide of data grows in double to even triple digits compounding year over year. Businesses are also facing increasingly stringent regulatory compliance and IT governance mandates. The bottom line is that this is putting […]]]>

For any modern organization, protecting business-critical data is vital. Yet protecting data assets has become complex and difficult as the rising tide of data grows in double to even triple digits compounding year over year.

Businesses are also facing increasingly stringent regulatory compliance and IT governance mandates. The bottom line is that this is putting data at risk – and creating enormous pressure on IT budgets and resources.

However, very few organizations have evolved their data protection processes with the times, leading to the perception that backup is complex, and change will bring unnecessary risk. In short: it’s too hard.

If your organization falls into the backup challenged, then it could be time to consider a managed backup as a service (BaaS) solution for an easier, more efficient way to backup your data and applications across the enterprise.

What is BaaS?

Managed backup service provides backup and recovery operations from the cloud. The cloud-based BaaS provider maintains necessary backup equipment, applications, processes and management in their data center. So, there is no need to buy backup servers and software, run upgrades and patches, or purchase dedupe appliances.

What are the benefits of BaaS?

BaaS offers many benefits including the ability to:

Keep Moving Forward. We’ve Got Your Backups.

OneNeck’s BaaS solutions provide a resilient, cloud-based backup and recovery service offering the high levels of reliability demanded by organizations today. Our BaaS solutions offerings are powered by best-in-class technologies and services.

Let us conduct a Backup and Recovery Assessment to identify the first steps towards creating an efficient, reliable and appropriate backup and recovery solution for your business. Contact us today.

]]>
Estimating WAN Latency Calculator https://www.oneneck.com/blog/estimating-wan-latency-requirements/ Thu, 15 Oct 2020 16:00:00 +0000 https://www.oneneck.com/blog/estimating-wan-latency-requirements/ As services move into the cloud, more vendors are publishing the WAN latency requirements for their platform or application. These requirements could specify a maximum latency among computing nodes in a cluster, between a computing node and a storage array, or for an application-specific data flow like vMotion. Being able to estimate network latency between […]]]>

As services move into the cloud, more vendors are publishing the WAN latency requirements for their platform or application. These requirements could specify a maximum latency among computing nodes in a cluster, between a computing node and a storage array, or for an application-specific data flow like vMotion. Being able to estimate network latency between locations will help you identify which connectivity options are viable solutions. Use the latency calculator below to help.

The following are some items to consider when calculating (estimating) WAN latency:

1. One-way versus round-trip

Many vendor requirements specify a maximum supported latency, in milliseconds, but do not say whether it is round-trip time (RTT), or one-way latency. You can usually assume that the vendor’s intention is “round trip time,” but due to the large costs involved in WAN circuits, it’s good to ask for clarification.

2. Electronics

Modern network switches and routers have a forwarding latency of a fraction of a millisecond, depending mostly on frame/packet size. It is usually safe to assume that all the switches, routers and telecommunications equipment across a typical WAN circuit will add one millisecond in each direction (2 msec RTT, or round-trip time).

If you’re testing latency using the “ping” command, note that “ping” also measures the speed at which the remote device answers pings.  In many cases, that adds a millisecond to the ping results, above and beyond the latency of the network itself.

3. Distance

The biggest factor in typical WAN latency is the speed of light, through fiber-optic cable, which is about 124 miles per millisecond. A typical wavelength circuit within a metro area may travel from the data center to the serving telephone central office (e.g. 5 miles), then travel across the metro area on a metro fiber ring to another central office (e.g. 50 miles along a “beltway loop”), then travel to the destination data center (5 miles). The path will vary, depending on the local layout of your carrier’s fiber network, but a fiber path within a single metro area will usually be fewer than 100 fiber-miles in length. This should usually keep in-metro round-trip latency below 2 msec (fiber) plus 2 msec (electronics), or 4 msec., well within most clustering/application requirements.

How to Calculate Latency

To estimate latency of a wavelength between metro areas, take a look at your carrier’s proposed fiber route. Their fiber map is probably available on their website. An online mapping website can provide a rough estimate of highway distance between two cities, along the path used by your carrier.

  • Take the highway distance and add 10% to account for a few twists and turns at river crossings, freeway junctions, etc.
  • Add 100 miles for the local metro fiber path at each end
  • Double the result (to get the round-trip distance)
  • Divide by 124 miles/msec
  • Add 2 milliseconds (for the electronics)
WAN Latency Calculation Example:

For example, a Chicago/Dallas wavelength latency estimate might be:

  • 925 miles x 110% = 1017.5 miles
  • + 100 miles (Chicago local fiber) = 1117.5 miles
  • + 100 miles (Dallas fiber) = 1217.5 miles
  • x 2 = 2435 miles (round-trip)
  • / 124 msec/mile = 19.6 msec
  • + 2 msec = 22 msec (electronics)

Note that your carrier may provide a guarantee for latency which is a generic number of milliseconds (e.g. 50 msec for any wavelength within North America). It’s useful to name the fiber path to be used, on your contract or service order with the carrier, to ensure that your circuit is not routed through a fiber route which is unnecessarily long but is still within the carrier’s SLA.

4. Switched networks

The latency example above is primarily for “wavelength” services or dark fiber. For circuits which travel over a carrier switched network (e.g. MPLS), congestion at any point in the network path may increase latency by tens of milliseconds.  Additionally, the carrier may reroute traffic during maintenance, or may reroute traffic around a congested POP for days or weeks, using a longer network path.

5. Encryption and fragmentation

For VPNs such as IPSec tunnels, fragmentation/reassembly and encryption/decryption may significantly increase latency.

 

OneNeck provides our customers with remote, enterprise-wide network management and monitoring with uptime SLAs backed by security, power and redundancy requirements that exceed industry standards. Contact us to learn more about how our hosted managed services can help your network running at peak efficiency.

]]>
Your Windows version of Cisco Jabber poses a security risk https://www.oneneck.com/blog/your-windows-version-of-cisco-jabber-could-be-a-security-risk/ Fri, 25 Sep 2020 01:37:00 +0000 https://www.oneneck.com/blog/your-windows-version-of-cisco-jabber-could-be-a-security-risk/ On September 2nd, 2020, Cisco issued a Critical Security Advisory announcement regarding Cisco’s Jabber for Windows that customers should be aware of. A vulnerability in Cisco Jabber for Windows could allow an authenticated, remote attackers to execute arbitrary code. Attackers could achieve remote code execution by sending specially crafted chat messages. To exploit this vulnerability, an […]]]>

On September 2nd, 2020, Cisco issued a Critical Security Advisory announcement regarding Cisco’s Jabber for Windows that customers should be aware of. A vulnerability in Cisco Jabber for Windows could allow an authenticated, remote attackers to execute arbitrary code. Attackers could achieve remote code execution by sending specially crafted chat messages.

cisco-jabberTo exploit this vulnerability, an attacker must be able to send XMPP messages to end-user systems running Cisco Jabber for Windows. Attackers may require access to the same XMPP domain or an-other method of access to be able to send messages to clients.

The issue has the follow advisory code: CVE-2020-3495

The vulnerabilities affect all currently supported versions of the Cisco Jabber client for Windows (12.1 – 12.9). Systems using Cisco Jabber in phone-only mode (without XMPP messaging services enabled) are not vulnerable to exploitation. There are no workarounds that address this vulnerability.

What Should You Do if Your Version of Jabber is Impacted?

Any customers running an affected version of Jabber, should upgrade as soon as possible. See the fixes in the table below:

  • Users operating version 12.1 should upgrade to 12.1.3
  • Users operating version 12.5 should upgrade to 12.5.2
  • Users operating version 12.6 should upgrade to 12.6.3
  • Users operating version 12.7 should upgrade to 12.7.2
  • Users operating version 12.8 should upgrade to 12.8.3
  • Users operating version 12.9 should upgrade to 12.9.1

The latest versions can be downloaded from the following URL:

https://software.cisco.com/download/home/284324806/type/284006014/release/

If this vulnerability applies to you, it’s time to update. If you have any questions or would like to talk to a OneNeck expert about Cisco Jabber, we are here to help


Keep Moving Forward. We Got Your Back.

]]>
Is Your Citrix StoreFront Vulnerable to Exploit? https://www.oneneck.com/blog/is-your-citrix-storefront-vulnerable-to-exploit/ Thu, 17 Sep 2020 21:51:00 +0000 https://www.oneneck.com/blog/is-your-citrix-storefront-vulnerable-to-exploit/ On September 14, Citrix pushed out an announcement around a high-severity security vulnerability Citrix StoreFront customers should be aware of. An issue has been discovered in Citrix StoreFront (before 2006) that, if exploited, would allow an attacker who is authenticated on the same Microsoft Active Directory domain as a Citrix StoreFront server to read arbitrary […]]]>

On September 14, Citrix pushed out an announcement around a high-severity security vulnerability Citrix StoreFront customers should be aware of. An issue has been discovered in Citrix StoreFront (before 2006) that, if exploited, would allow an attacker who is authenticated on the same Microsoft Active Directory domain as a Citrix StoreFront server to read arbitrary files from that server.

This issue has the following identifier: CVE-2020-8200.

The issue affects the following supported Long Term Service Release (LTSR) versions of Citrix StoreFront:

  • Citrix StoreFront 1912 LTSR before CU1 (1912.0.1000)
  • Citrix StoreFront 3.12 for 7.15 LTSR before CU5 Hotfix (3.12.5001)
  • Citrix StoreFront 3.0 for 7.6 LTSR before CU8 Hotfix (3.0.8001)

Citrix StoreFront is included in deployments of Citrix Virtual Apps and Citrix Virtual Apps and Desktops as an infrastructure component, if you have Citrix Virtual Apps or Citrix Virtual Apps and Desktops then you have Citrix StoreFront deployed in your environment today. Also, customers running Citrix Virtual Apps and Desktops 2003 should be aware that the version of Citrix StoreFront included in that release, 1912 LTSR, is one of the affected versions.

If users are not in the same Microsoft Active Directory domain as the Citrix StoreFront server, the vulnerability is not exploitable, even if the users are authenticated in a transitively trusted domain. Note that this applies even if the user is logged into the Citrix StoreFront server.

What Should You Do if Your Version of Citrix StoreFront is Impacted?

Citrix has addressed this issue in the following Citrix StoreFront versions:

  • Citrix StoreFront 1912 CU1 (1912.0.1000) and later versions of Citrix StoreFront 1912 LTSR
  • Citrix StoreFront 3.0 for 7.6 LTSR CU8 Hotfix (3.0.8001) and later versions of StoreFront 3.0 for 7.6 LTSR
  • Citrix StoreFront 3.12 for 7.15 LTSR CU5 Hotfix (3.12.5001) and later versions of StoreFront 3.12 for 7.15 LTSR

Any customers running an affected version of Citrix StoreFront, both CR and LTSR versions, should upgrade as soon as possible.

The latest versions of Citrix StoreFront can be downloaded from the following URLs:

Earlier this year, another Citrix vulnerability resulted in numerous compromised systems and hours of remediation work for organizations that were slow to fix it. Don’t let this happen to you. If this vulnerability applies to you, it’s time to update. If you have any questions or would like to talk to a OneNeck expert about your Citrix StoreFront, we are here to help.

]]>
Protecting Your Backups from Ransomware https://www.oneneck.com/blog/security/are-your-backups-protected-from-ransomware/ Mon, 31 Aug 2020 19:45:00 +0000 https://www.oneneck.com/blog/security-are-your-backups-protected-from-ransomware/ Ransomware is at our doorstep. We cannot ignore it any longer or think we are not a target. In recent years at OneNeck, we have seen a significant upward trend of ransomware attacks. And even more troubling is in the last year, we have seen bad actors getting smarter, and they are now targeting your […]]]>

Ransomware is at our doorstep. We cannot ignore it any longer or think we are not a target. In recent years at OneNeck, we have seen a significant upward trend of ransomware attacks. And even more troubling is in the last year, we have seen bad actors getting smarter, and they are now targeting your backup server and backup data to prevent you from recovering from the attack. As ZDNet stated, “The number of ransomware strains targeting NAS and backup storage devices is growing, with users ‘unprepared’ for the threat.”

In response, the backup industry has replied with some key recommendations you can implement to make it more difficult for those bad actors to be successful. Below are some of the recommendations being made by the industry and what we at OneNeck have seen be successful in slowing and reducing the risk of ransomware infecting your backup infrastructure:

  1. Remove your backup servers from the domain.

The goal of this recommendation is to prevent a compromised domain account with privileged access from leap frogging from server to server until they gain full management access of your backup infrastructure. This is a great first step and depending on your backup infrastructure, it could be sufficient to keep those bad actors from gaining access to that data.

  1. Implement multi-factor authentication (MFA) on your backup servers.

Preventing the bad actors from accessing your backup management software is the goal of this recommendation. Removing all other management consoles from admin desktops and using a dedicated backup management server with multi-factor authentication makes it more difficult for bad actors to gain access to your backup infrastructure.

  1. Create an isolated network and control who can access it.

If your backup servers and repositories are on the same network as your production servers and data, it is not difficult for the bad actors to jump from a compromised server and reach your backup infrastructure via the network. By creating a separate network, it makes it easier to create access control lists and prevent certain types of traffic from reaching your backup infrastructure. You can also lock down which devices have access to that separated network as well, making it more difficult for the bad actors to gain access and wreak havoc.

  1. Send a third copy of your backup data into object storage.

Object storage changes the way the data is written and can be rewritten in your backup repositories. By the nature of ransomware, it wants to read and overwrite or append to the original file to encrypt it. Object storage by design only allows create and delete operations thus making it more difficult for ransomware to encrypt an object store.

  1. Implement an air-gapped backup repository.

This is the panacea to help keep your backup environment protected but does require the most cost and complexity. The goal of an air-gapped backup repository is to keep the backup copy and infrastructure offline from the production network, it is only online for a short period to pull the latest data copy and scan it for ransomware. It takes physical access to manage the air-gapped backup equipment which is extremely difficult for those bad actors.

To learn more about air-gapped backups, watch this webinar.

OneNeck would be happy to open the conversation to discuss how these preventative measures can be implemented in your environment to better protect your backup infrastructure. OneNeck can also help with an offensive approach to ransomware and business continuity. Backups always provide a good defense, but any good game plan has both an offensive and defensive component.

Keep Moving Forward. We Got Your Back(up).

]]>
Digging Deep into the Dark Web for User Credentials https://www.oneneck.com/blog/security/secure-data-from-dark-web/ Tue, 18 Aug 2020 20:36:00 +0000 https://www.oneneck.com/blog/security-secure-data-from-dark-web/ We’ve all heard of the dark web, but most law-abiding people don’t give it much thought, as we chalk it up to the place shady people go to do shady things. But the truth is that today’s data-driven organizations can no longer ignore the dark web and the possibility that their customer and employee data […]]]>

We’ve all heard of the dark web, but most law-abiding people don’t give it much thought, as we chalk it up to the place shady people go to do shady things. But the truth is that today’s data-driven organizations can no longer ignore the dark web and the possibility that their customer and employee data could be out there with a for-sale sign.

 

As OneNeck security expert, Kevin Holestine, recently put it, “If someone wanted to buy your compromised customer or employee data, then the dark web is where they’d go. Which is what makes dark web scans a good practice for identifying if your data or accounts have been breached, for whatever reason, without your security tools alerting you.”

Compromised credentials are a hot-ticket item on the dark web, and in malicious hands, can bring devastating consequences to an organization. By adding a dark web scan to the detection toolkit, as well as stringent password policies, it’s possible to stop attacks before they happen.

As a secure managed services provider, we know that security best practices are key to ensure we don’t miss anything, one being the password guidance on digital identity set out by the National Institute of Standards and Technology (NIST). NIST is a non-regulatory federal agency that operates under the Department of Commerce, and they develop information security standards and guidelines that establish the minimum requirements for federal systems – a great set of guidelines for non-government organizations as well. And in an effort to continuously evolve as security strategies evolve, the NIST password guidelines were recently updated to be more user friendly, and by user friendly we mean less complex, easier to remember, but harder to guess.

So, what are the new NIST guidelines for passwords?

  • Passwords must contain a minimum of 8 and allow at least 64 characters in length to support the use of passphrases.
  • Do not impose other composition rules such as requiring special characters, upper- and lower-case characters, and at least one number, but allow their use.
  • When establishing or changing passwords, compare prospective passwords against a list of banned passwords that includes:
    • Passwords with sequential and repetitive characters (e.g. 12345 or aaaaaa).
    • Context-specific passwords (e.g. the name of the site, etc.).
    • Commonly used passwords (e.g. p@ssw0rd, etc.) and dictionary words.
    • Passwords obtained from previous breach corpuses.
  • No longer require periodic password changes, but force a password change if there is evidence of a compromise.

When it comes to credentials on the dark web, Kevin specifically refers to the last NIST guideline above – force a password change if there is evidence of a compromise. 

“Credentials from previous breach corpuses are obtained from the dark web and end up on banned password lists, which ostensibly triggers a password change request as per the NIST guidance. But the window of time that exists between a breach and the emergence of stolen credentials is not insignificant, nor are security tools in place to protect from and detect breaches guaranteed to be 100% effective 100% of the time. This is why dark web monitoring can be a very useful tool for security teams in that it serves as a form of out-of-band breach detection by alerting you when conventional tools may have failed or when a breach occurs via a vector out of your control, such as the compromise of an employee’s personal credentials that lead to the compromise or their corporate credentials.” 

In addition to following best practices for password security, a great place to start to ensure your credentials are safe is with a dark web scan. If you’re interested in a dark web scan, we are here to help. Find out if your information is out there before it ends up in the wrong hands.

 

]]>
Is it Time to Put Your Office 2013 Out to Pasture? https://www.oneneck.com/blog/is-it-time-to-put-your-office-2013-out-to-pasture/ Tue, 04 Aug 2020 21:46:00 +0000 https://www.oneneck.com/blog/is-it-time-to-put-your-office-2013-out-to-pasture/ If you’re one of the organizations that are still using Office 2013 with Microsoft Online Services, then you’ll want to know the changes coming this fall.  Microsoft recently announced the following updates… After Oct 13, 2020, Microsoft will not support the use of Office 2013 with Microsoft Online Services. You may experience performance and/or reliability […]]]>

If you’re one of the organizations that are still using Office 2013 with Microsoft Online Services, then you’ll want to know the changes coming this fall.  Microsoft recently announced the following updates…

  • After Oct 13, 2020, Microsoft will not support the use of Office 2013 with Microsoft Online Services. You may experience performance and/or reliability issues over time, and new tenants created after October 13 will be unable to use Basic Authentication.
  • Sometime in 2021, Microsoft will disable Basic Authentication for existing tenants to improve their overall security posture. Any applications still depending on Basic Authentication will need to be migrated to Modern Authentication before this happens. While Microsoft has yet to set a hard date for this move due to the COVID-19 crisis, it’s important to know it’s coming, as it can affect users accessing applications utilizing Azure Active Directory authentication. 

Why is Microsoft doing this?

It really comes down to modern security best practices, and that means changing from Basic Authentication to Modern Authentication. In a recent blog post, Microsoft stated that…

 

…Basic Authentication makes it easier for attackers armed with today’s tools and methods to capture users’ credentials (particularly if not TLS protected), which in turn increases the risk of credential re-use against other endpoints or services. Multi-factor authentication (MFA) isn’t easy to enable when you are using Basic Authentication and so all too often it isn’t used.

 

Simply put, there are better and more effective alternatives to authenticate users available today, and we are actively recommending to customers to adopt security strategies such as Zero Trust (i.e. Trust but Verify) or apply real time assessment policies when users and devices are accessing corporate information. This allows for intelligent decisions to be made about who is trying to access what from where on which device rather than simply trusting an authentication credential which could be a Bad Actor impersonating a user. 

 

With these threats and risks in mind, we’re taking steps to improve data security in Exchange Online.

So, what is the solution?

You will need Microsoft 365 Apps for Enterprise/Business (formally known as Office 365 ProPlus) or Office 2019 clients in mainstream support to connect to Office 365 services.

Note that for Office 2016 users, Microsoft is continuing support for Office 365 services through October 2023 to allow for more time to fully transition to the cloud.

We can help.

Whether it’s updating your Office 2013 to a newer, more-secure version, or implementing a modern multi-factor authentication solution, our experts can help. Reach out today to set up a conversation.


Keep Moving Forward. We Got Your Back.

]]>
IT Security Processes | Anatomy of Ransomware https://www.oneneck.com/blog/security/anatomy-of-ransomware-and-it-security-processes/ Tue, 28 Jul 2020 20:10:00 +0000 https://www.oneneck.com/blog/security-anatomy-of-ransomware-and-it-security-processes/ Ransomware is a type of malware that threat actors use to infect computers and encrypt computer files until a ransom is paid. After the initial infection, ransomware will attempt to spread to as many connected systems as possible, including  file systems and other accessible systems on a business’s network. To avoid becoming a Ransomware victim, […]]]>

Ransomware is a type of malware that threat actors use to infect computers and encrypt computer files until a ransom is paid. After the initial infection, ransomware will attempt to spread to as many connected systems as possible, including  file systems and other accessible systems on a business’s network.

To avoid becoming a Ransomware victim, businesses should take actions that include putting security processes in place to ensure your IT environment is fully protected. Leveraging the Center for Internet Security’s (CIS) Critical Security Controls (CSC) is a solid place to start. These same security processes will help protect your critical business environment from malware, which accounts for nearly 30% of all breaches, according to Verizon’s 2019 Data Breach Investigations Report. In addition, the evaluation portion of the CSC is included with OneNeck’s virtual CISO (vCISO) service.

Mitigating contact with malicious web sites and emails.

Typically, the initiating step of a security breach is attributed to end users, where they have visited a malicious web site or acted unknowingly on a malicious email. There are several key security processes that can mitigate this initiating event:

  • Implement a Security Awareness and Training Program (CSC Control #17). This includes training the workforce on how to identify different forms of social engineering attacks (e.g., phishing, phone scams and impersonation calls). Educate your workforce to:
    • Use caution with links and when entering website addresses.
    • Check a website’s security (look for the lock) to ensure the information you submit is encrypted before you provide it.
    • Know email senders.
    • Open email attachments with caution.
  • Continuous Vulnerability Management (CSC Control #3). Deploy automated software update tools in order to ensure the operating systems are running the most recent security updates provided by the software vendor. Typically the malware—and therefore attackers—are going to leverage a known vulnerability in an operating system to gain access or take control of a system.
  • Malware Defenses (CSC Control #8). End point protection needs to be implemented on all workstations and servers. Advanced Threat Protection can detect, stop the movement of, or control the execution of malicious software. Additionally, it is best to be centrally managed to ensure:
    • End point software is at current versions.
    • It is scanning appropriately.
    • A notification process is in place for when the Advanced Threat Protection detects and takes action.
    • Quarantined files are handled properly.

If malware takes hold, defenses that can help.

If the malware is successful in taking hold in your IT environment, there are several defenses that can help prevent the malware from evolving into a full-scale ransomware event:

  • Boundary Defense (CSC Control #12). The primary device involved is your firewall; however, critical to the firewall are features available (IDS/IPS), the architecture (configure DMZs, segmentation), the configuration you’ve implemented (put in filters for outbound traffic), and regularly scan your firewall to assure you’re only allowing what you want. When malware is installed it typically wants to talk to a bad actor outside your network; therefore, if your firewall is configured properly, it can prevent malware from being able to connect back to the bad actor.
  • Controlled Use of Administrative Privileges (CSC Control #4). Configure systems to issue a log entry and alert when an account is added to or removed from any group assigned administrative privileges. One of the primary goals of malware is to gain full access to your environment, and the best way to do that is for the bad actor to compromise a privileged account, such as Domain Admin.
  • Monitoring/Logging (CSC Control #6). Ensure appropriate logs are being aggregated to a central log management system for analysis and that they are being reviewed. Poor or nonexistent log analysis processes can allow attackers to control victim machines for months or years without anyone in the target organization knowing, even though the evidence of the attack is being recorded—in unexamined log files.

If the worst happens—and you are prepared—you still do NOT have to pay the ransom.

If the bad actor has taken hold, it’s not good—but all is NOT lost. While it’s likely the bad actor has gained access to a privileged account in the environment and your critical data is at risk, at this point, you can still minimize the impact.

  • Incident Response and Management (CSC Control #19). Quickly discovering an attack and then effectively containing the damage, eradicating the attacker’s presence and restoring the integrity of the network and systems. This is a critical step—ensuring you inspect your entire environment for any movement the bad actors might have made. Otherwise, if you just move to recovering your environment, the bad actor will return quickly.
  • Data Recovery Capabilities (CSC Control #10). Ensure each of the organization’s key systems are backed up as a complete system to enable the quick recovery of an entire system. The challenge with ransomware is that if the initiating event took place weeks/months earlier, your backup data may already be suspect. This is precisely why, when implementing your backup systems, you have to ensure all backups have at least one backup destination that is not continuously addressable through operating system calls, so that the ransomware can’t directly encrypt files.

Typically, there are several events that happen over the course of days, weeks or months that ultimately result in a ransomware attack. While there are a wide number of variants for ransomware, most events follow the path laid out above. Every step in the process could be identified and addressed. It can be a long journey, but you don’t have to go it alone. Through partnership with OneNeck’s vCISO service, the CSC will be leveraged to help assure your IT environment is protected.

]]>
Your Remote Workplace is More of an Activity than a Place https://www.oneneck.com/blog/security/work-is-an-activity-not-a-place/ Wed, 08 Jul 2020 19:00:00 +0000 https://www.oneneck.com/blog/security-work-is-an-activity-not-a-place/ Recent months have seen a massive shift towards supporting remote workers, which in turn has created a series of security challenges. IT teams are now not only tasked with quickly providing support for a never-before-seen number of offsite workers and their devices, but they must do it without compromising security – no small task. Secure […]]]>

Recent months have seen a massive shift towards supporting remote workers, which in turn has created a series of security challenges. IT teams are now not only tasked with quickly providing support for a never-before-seen number of offsite workers and their devices, but they must do it without compromising security – no small task.

Secure Your Remote Workers with OneNeck + Cisco

Taking into account this new reality, you need a straight-forward way to secure remote workers at the speed and the scale of your business. The Cisco Secure Remote Worker solution unifies user and device protection at scale, making it easy to verify, enable secure access and defend remote workers at anytime from anywhere. This integrated solution helps accelerate your business success with security that works together, delivering the power of Cisco Duo, AnyConnect, Umbrella and AMP for Endpoints.

  • Cisco Duo verifies the identity of all users before granting access to corporate applications.
  • Cisco AnyConnect enables secure access to the enterprise network for any user, from any device, at any time, in any location.
  • Cisco Umbrella provides the first line of defense against threats on the Internet wherever users go.
  • Cisco AMP for Endpoints provides the last line of defense, enabling protection, detection and response on the endpoint against known and unknown threats.

Just how do all of these pieces work together? Check out this quick video.

 

If you’re looking to increase productivity and protection for your remote employees, we can help with a scalable and integrated security solution that delivers the strength and breadth of Cisco’s security approach with the power of Cisco Duo, AnyConnect, Umbrella and AMP for Endpoints.

 

]]>
Now’s the Time to Put DX Initiatives into Hyperdrive https://www.oneneck.com/blog/digital-transformation/nows-the-time-to-put-dx-initiatives-into-hyperdrive/ Fri, 22 May 2020 21:00:00 +0000 https://www.oneneck.com/blog/digital-transformation-nows-the-time-to-put-dx-initiatives-into-hyperdrive/ Digital transformation (DX) is not a new initiative. In fact, Forbes states that 70% of companies had a DX initiative in place at the onset of the pandemic but weren’t far enough along to make the crisis a non-issue. As a result of the past couple months where digital has become central to every interaction, […]]]>

Digital transformation (DX) is not a new initiative. In fact, Forbes states that 70% of companies had a DX initiative in place at the onset of the pandemic but weren’t far enough along to make the crisis a non-issue. As a result of the past couple months where digital has become central to every interaction, DX is back in the forefront for IT leaders.

Microsoft CEO Satya Nadella recently summed it up this way, “As COVID-19 impacts every aspect of our work in life, we have seen two years’ worth of digital transformation in two months.” And while it may be in our nature to put on the brakes and proceed with caution in fear of an uncertain future, now’s the time to speed up DX initiatives.

There are a few big drivers in the need to rapidly transform:

  • Customers still have need for responsive and always-on services.
  • Employees expect a suite of tools that enable them to be productive from anywhere.
  • IT must provide a strong foundation on which the business can thrive now (in a crisis) and into the future.

Yet driving transformative change in a time where many are seeing reduced budgets and shifting to startup mode can be challenging. A recent survey of CFOs polled by PwC reported that 67% of CFOs say they are prepared to reduce costs to counteract the financial impact of the COVID-19 pandemic. On the flip side though, 68% of these CFOs say that crisis-driven transitions to remote work will make their company better in the long run. Overall though, worldwide IT spending is now projected to decline by 2.7% in 2020 as a result of the recent crisis, IDC estimates.

The analysts are telling us what we already know – times are hard, and it’s probably not going to get any better for a while. But all the more reason to speed up the pace of DX. So, given the absolute necessity for transformation at an accelerated rate, what should you be prioritizing?

  • Modernize the infrastructure: With remote work forcing all digital interactions, many organizations have quickly realized that their infrastructure was not built to support it, forcing them to fast-track plans to modernize legacy tech stacks to sustain business and scale to meet the demands of a remote workforce. Now is the time to assess where your infrastructure fell short and prioritize upgrades that provide automation and efficiency to do more in less time.
  • Embrace the cloud: No other technology has streamlined transformation and accelerated time to value like the cloud. Moving workloads to the cloud improves the time to provision, often from weeks to seconds, and enables rapid response to market demands. Now is the time to take a data-driven, application-centric approach to identify the right mix of public and private cloud for each workload and systematically migrate those ideally suited for the cloud.
  • Enable the digital workforce: Work has been evolving for some time, but the shift to primarily remote work in recent months has been a challenge for businesses that weren’t already embracing a remote-first approach. Now is the time to examine your remote-first strategy and invest in digital workspace technology to ensure you’re providing employees with a positive digital experience outside the office.
  • Reexamine your BCDR strategies: Business continuity (BC) and disaster recovery (DR) are critical in supporting an organization’s ability to remain operational during and after a crisis, which has brought them to the forefront in recent weeks. Now is the time to take a holistic approach to BCDR and create a strategy that includes a DR plan that outlines specific steps to resume operations following an incident and a BC plan that focuses on the mission-critical functions needed to continue during and after a disaster.
  • Ensure security best practices: No matter where you are on in your DX roadmap, security must be an integral part of every step, as not even a crisis can slow the ever-growing onslaught of cyber criminals. Now is the time to understand your risk profile, create a plan to mitigate those risks and align with security best practices.

DX is a journey comprised of incremental projects, both big and small, and with many team members. For success, you need to rely on the insights, opinions, requests and recommendations of in-house IT professionals, trusted external advisors and people in the organization who the project will directly affect. As you assemble your team, know you have a partner in OneNeck who can help. Whether it’s a large cloud migration project or just a simple rack and stack, our team of experts is ready and willing to help.

Keep Moving Forward. We Got Your Back.

 

Interested in learning more? Check out these DIGITAL TRANSFORMATION RESOURCES, including a free DX presentation template.

]]>
Hug Your Cloud. On-prem Cloud Has its Place https://www.oneneck.com/blog/cloud/reasons-for-workloads-on-premise-private-cloud/ Wed, 06 May 2020 21:00:00 +0000 https://www.oneneck.com/blog/cloud-reasons-for-workloads-on-premise-private-cloud/ Many enterprises are amid a digital transformation, seeking to engage with customers and satisfy their needs through digital technologies.  Many are looking up to the clouds to enable this agility, scalability, and simplicity—but no two models are created equal. And because businesses cannot afford to sacrifice control and security, going all-in on a public cloud […]]]>

Many enterprises are amid a digital transformation, seeking to engage with customers and satisfy their needs through digital technologies.  Many are looking up to the clouds to enable this agility, scalability, and simplicity—but no two models are created equal. And because businesses cannot afford to sacrifice control and security, going all-in on a public cloud only approach isn’t always feasible. To deliver on the promise of digital transformation, you need a unified infrastructure that fuses both public and private cloud.

Reasons to Consider Workloads On-Premise

According to Nutanix, there are several key considerations to consider when determining where your workloads should live including:

  • Data Gravity – Applications must go to where the data is generated. To move data from where its generated whether it’s from applications, machines or employees and customers is incredibly expensive and time consuming.  Next it’s very hard to move legacy applications to the public cloud and there’s big costs associated with it.   
  • Compliance– Regulatory concerns such as GDPR and others can severely limit the ability to even use the public cloud and place data there.
  • IT Control– Loss of control that IT feels that it gets to do such things as the inability to deploy custom applications, to protect those applications and the data.
  • Unpredictable Cost– Egress charges and getting data out cannot be overlooked and costs can be quite high.

On-Premise, You’ve Got Options

There are many routes to deploying an on-premise private cloud. To be successful, enterprises must first map out their goals and expectations, define their cloud requirements and then build on that model leveraging the technologies that best suit their needs.

Traditional Systems

Traditional data center infrastructure includes high -performing, enterprise data center storage, network and compute systems.

Converged Infrastructure (CI)

CI tightly integrates compute, storage, networking, virtualization and automation resources into a proven private-cloud architecture.  It scales to the largest environments with a lot of flexibility in components.  

Hyperconverged Infrastructure (HCI)

HCI adds additional elements like backup software, snapshot capability, data deduplication, inline compression and WAN optimization into one appliance using inexpensive commodity hardware – all managed under a single management interface. Now IT can simplify their infrastructure and take advantage of global, unified management. Now any size business has access to CI without the complexity.c

OneNeck, We’ve Got Your Back

At OneNeck, we understand there are many routes to on-premise private cloud, and it can be overwhelming in a market that is becoming more crowded daily. We’re here to help. We can assess your goals, whether it be reducing cost and complexity, increasing performance and efficiency, or merely trying to simplify your infrastructure. We will look across our numerous vendors to make recommendations that fit your business.

So you think you’re ready to build a cloud inside your data center – but do you know the technology inside and out? It’s imperative to get all your cloud questions answered before you make the move. Find the top 20 cloud questions answered in this ebook.

]]>
Do You Know Who’s Responsible for Your Office 365 Data? https://www.oneneck.com/blog/managed-services/do-you-know-whos-responsible-for-your-office-365-data/ Fri, 24 Apr 2020 19:00:00 +0000 https://www.oneneck.com/blog/managed-services-do-you-know-whos-responsible-for-your-office-365-data/ No doubt about it, for Microsoft Office 365 (O365), business is booming. At their Q3 FY19 earnings call, Microsoft CEO Satya Nadella said that Office 365 is now used by 180 million monthly active users and growing at more than 4 million users per month – and that was before the recent surge in the […]]]>

No doubt about it, for Microsoft Office 365 (O365), business is booming. At their Q3 FY19 earnings call, Microsoft CEO Satya Nadella said that Office 365 is now used by 180 million monthly active users and growing at more than 4 million users per month – and that was before the recent surge in the demand in collaboration tools!

But, for many organizations utilizing O365, there is gray area on whether or not Microsoft’s native tools support backup and recovery, and if so, to what extent. The confusion boils down to the backup that Microsoft provides and what the customer assumes they’re getting are often different.

So, what does Microsoft cover? Microsoft O365 comes with what’s known as geo redundancy, which is not the same thing as backup. Backup is when a historical copy of data is made and then stored in another location. But a critical component of backup is having direct access to and control over that backup so if data is lost, accidentally deleted or maliciously attacked, you can quickly access and recover it. But with geo redundancy, it protects against site or hardware failure, so if there is an infrastructure crash or outage, users remain productive and rarely aware there’s been a problem.

The bottom line and key takeaway here:

  • MICROSOFT is responsible for the uptime of O365.
  • The CUSTOMER is responsible for the protection and long-term retention of their O365 data.

The Shared Responsibility Model is further detailed in this Veeam graphic…

MS_office 365 Shared Responsibility Model

Clearly, it’s important to recognize that in the case of O365, you need a backup plan. While Microsoft has a solid reputation for high availability of O365 infrastructure and applications, there are numerous things that can happen, and likely will happen, that can open your organization to risk:

  • Data loss and security breaches: Data can be lost from internal and external sources, ranging from accidental deletion, ex-employee actions or even external breaches (e.g., malware and ransomware).
  • Retention and compliance: While Microsoft offers retention policies to hold your O365 data for a longer period of time, these are not available to all licensing types, and preserving your data for a longer time is different than backups. A third-party backup strategy is a must to meet an offsite (outside of the O365 ecosystem) copy and maintain the control you would expect in a restore situation.
  • Lack of control in a hybrid world: With today’s SaaS-driven environment, visibility and data control is a challenge that backup can help address.

Icon_BlogThere’s no doubt that Microsoft O365 is a great solution that brings increased productivity to the modern workforce. But ensuring the access and control of your O365 data is imperative in avoiding risk. If you’d like to learn more about why you need a backup solution for O365, check out this informative eBook from our partner Veeam: 6 Critical Reasons for Office 365 Backup.

And if you’d like to talk with one of our backup and recovery experts, we’re here to help.

]]>
Microsoft Renames the Office 365 SKUs https://www.oneneck.com/blog/microsoft-renames-the-office-365-skus/ Tue, 21 Apr 2020 23:57:00 +0000 https://www.oneneck.com/blog/microsoft-renames-the-office-365-skus/ As Esther Dyson so eloquently put it, “Change means that what was before wasn’t perfect.” And as we all know in technology, change is a given. Today brings more change. As of today, Microsoft is changing the names of Office 365 SMB SKUs and making way for Microsoft 365. Their reasoning was that customers have had […]]]>

As Esther Dyson so eloquently put it, “Change means that what was before wasn’t perfect.” And as we all know in technology, change is a given.

Today brings more change. As of today, Microsoft is changing the names of Office 365 SMB SKUs and making way for Microsoft 365.

Their reasoning was that customers have had difficulty deciding which SKU is right for them. Their SKUs were:

  • Mid-priced SKU is called Office 365 Business Premium.
  • The premium SKU is called Microsoft 365 Business.
  • The Office 365 Business Essentials SKU has more cloud services value than the Office 365 Business

We get it. That’s confusing. So, here’s a quick glance at what’s changing.

2020-04-21_MS Graphic

Note that there are no naming changes for the Office 365 Enterprise or Microsoft 365 Enterprise SKUs. It is also important to note that subscription prices, product features, offer IDs and SKUs, and Office 365 Enterprise SKU names are not changing.

If you’d like to learn more about these changes, check out the Microsoft Office 365 SMB Naming Update Page. And as always, if you have any questions regarding Microsoft’s solutions, we are here to help.

Keep Moving Forward. We Got Your Back.

]]>
Considerations When Securing a Remote Workforce https://www.oneneck.com/blog/security/it-considerations-when-securing-a-remote-workforce-coworkers-data/ Wed, 01 Apr 2020 00:00:00 +0000 https://www.oneneck.com/blog/security-it-considerations-when-securing-a-remote-workforce-coworkers-data/ As today’s IT teams are scrambling to figure out the logistics of helping their coworkers be productive from their home offices, it’s important to remember that security can’t be an afterthought. Enabling employees to work remote has only broadened the landscape for attackers, giving them even more opportunity to find a way into your organization. […]]]>

As today’s IT teams are scrambling to figure out the logistics of helping their coworkers be productive from their home offices, it’s important to remember that security can’t be an afterthought. Enabling employees to work remote has only broadened the landscape for attackers, giving them even more opportunity to find a way into your organization.

As OneNeck CISO, Katie McCullough put it, “Cybercriminals are opportunists, and they know it’s a confusing time for everybody, that people are looking for information through all means possible. They also know companies are having to react quickly and may have unintended consequences for the configurations they put in place. Our boundaries to our corporate networks are expanding with so much work from home. Now more than ever security must be front and center.”

So, what is an IT leader to do to keep your workforce safe, no matter where they might be sitting? I sat down Katie last week as she sat in her own home to get her perspective on some basic steps that will help keep the attackers at bay.

The impact the pandemic is having on IT security…

Question 1: In light of the current pandemic, what are you seeing as the impact it’s having on the security environment, and how is this being exploited by attackers?

{% video_player “embed_player” overrideable=False, type=’scriptV4′, hide_playlist=True, viral_sharing=False, embed_button=False, width=’1280′, height=’720′, player_id=’27791348218′, style=” %}

 

How to keep your workers and data safe during a time of crisis…

Question 2: They say many devices, many risks, and we’ve got a lot of people in the remote workforce these days. What recommendations would you have for IT leaders to keep their teams safe as they’re remote?

{% video_player “embed_player” overrideable=False, type=’scriptV4′, hide_playlist=True, viral_sharing=False, embed_button=False, width=’1280′, height=’720′, player_id=’27791348206′, style=” %}

 

Question 3: It’s a known fact that end users pose the greatest risk to today’s organization. What recommendations do you have to mitigate this risk with a remote workforce?

{% video_player “embed_player” overrideable=False, type=’scriptV4′, hide_playlist=True, viral_sharing=False, embed_button=False, width=’1280′, height=’720′, player_id=’27791348139′, style=” %}

 

Question 4: I’ve heard you say many times over the past several years that one of the most critical aspects of data security is a simple one – regular patching. How are customers dealing with patching during this time?

{% video_player “embed_player” overrideable=False, type=’scriptV4′, hide_playlist=True, viral_sharing=False, embed_button=False, width=’1280′, height=’720′, player_id=’27791230724′, style=” %}

 

Question 5: One of the Critical Security Controls we often reference is around privileged account access. I’d imagine this is a key consideration during this time?

{% video_player “embed_player” overrideable=False, type=’scriptV4′, hide_playlist=True, viral_sharing=False, embed_button=False, width=’1280′, height=’720′, player_id=’27791294908′, style=” %}

 

Question 6: The OneNeck workforce is no exception during this time, as we’re all working remote right now. However, we still have a lot of engineers out there in the field working around the clock to help customers adapt to a remote workforce. What kinds of security services can we currently offer our customers to help them with these remote workforce challenges?

{% video_player “embed_player” overrideable=False, type=’scriptV4′, hide_playlist=True, viral_sharing=False, embed_button=False, width=’1280′, height=’720′, player_id=’27791230695′, style=” %}

 

In Summary

Now more than ever, we want our customers to know we’re here to help. Whether you need help implementing multi-factor authentication (MFA), encrypted connections, help ensuring proper email configurations or web safeguards, or if the worst happens and you need help with incident response – we are here to help.

We may be working in isolation, but it’s people and interaction that powers business. And we’re here to help keep your remote workforce interactions safe.

Keep moving forward. We got your back.

]]>
A Remote Workforce Powered by Partners Who Care https://www.oneneck.com/blog/a-remote-workforce-powered-by-partners-who-care/ Sat, 21 Mar 2020 02:58:00 +0000 https://www.oneneck.com/blog/a-remote-workforce-powered-by-partners-who-care/ We’re living in a very strange and uncertain time – uncharted waters one could say. Sequestered in the relative safety of our homes, unsure of what next week or even tomorrow might bring, business must still go on. But while we may be working in isolation, it’s still people that power the modern business. And […]]]>

We’re living in a very strange and uncertain time – uncharted waters one could say. Sequestered in the relative safety of our homes, unsure of what next week or even tomorrow might bring, business must still go on. But while we may be working in isolation, it’s still people that power the modern business. And in any business, the team is paramount. It’s where creativity, collaboration, and solutions all come together within a group to exceed the sum of its parts.

Now, rather than a bustling office, it’s the remote team that is the hub and the critical component of many a company’s success. So, ensuring that workforce is equipped to do their job and effectively collaborate has become the number one priority for many organizations.

A positive in all of the uncertainty has been that we’ve seen an overwhelming response from people and businesses offering to help. And at OneNeck, we’re fortunate to work in an industry and with partners that are equipped to help make an effective remote workforce a reality. Numerous offers have been extended from our manufacturer partners that give IT teams the tools to enable their remote workers to continue to securely collaborate with each other and drive their business forward, even from outside the office.

Whether it’s collaboration tools, security best practices, softphones, virtual desktops or even VPNs you need to enable your remote workforce, our partners have stepped up and are offering some great deals to help make it happen. In an effort to make them easier to find, we’ve assembled a list of these timely offers for you.

CHECK OUT THESE PARTNER OFFERS

And should you need any help understanding what your options are or how to scale your current technology to support your remote employees, we are here to help. Our engineers have, and continue to, work around the clock, helping our customers adapt to doing business from anywhere.

Keep moving forward. We got your back.

]]>
What are the Benefits of Hybrid Cloud for Businesses? https://www.oneneck.com/blog/cloud/what-are-the-top-hybrid-cloud-advantages-for-business/ Fri, 14 Feb 2020 18:00:00 +0000 https://www.oneneck.com/blog/cloud-what-are-the-top-hybrid-cloud-advantages-for-business/ There’s no doubt that everyone is full-on in love with the cloud these days, and for many good reasons. The cloud has treated us well and continues to give us many reasons to continue to embrace it. However, there still a common misconception due to the nebulous nature of it, especially when it comes to […]]]>

There’s no doubt that everyone is full-on in love with the cloud these days, and for many good reasons. The cloud has treated us well and continues to give us many reasons to continue to embrace it. However, there still a common misconception due to the nebulous nature of it, especially when it comes to hybrid cloud architectures and the advantages they have over public or private clouds.

There’s a good reason for this lack of clear understanding, and it stems from the fact that hybrid cloud is not a technology, but more of an approach to how we use cloud, especially when compared to public and private clouds. If you look for a cut-and-dried hybrid cloud solution that cookie-cutter fits in your organization, you’ll find yourself forlorn.  Benefits of hybrid cloud are really more about how you manage and orchestrate your public and private cloud resources into one, cohesive hybrid cloud solution, and in this solution, your applications and data live in one or both clouds.

There are many factors that go into deciding on where your workloads best fit: the critical nature of the data, latency, redundancy, required implementation speed, etc. But the beauty of the hybrid cloud solution (and why we love it so) is that your end-users have no idea where their application or data lives, because to them, the experience is the same. With careful upfront planning on where each workload should reside, it will be placed where it will serve the business best, making it a win-win for both IT and the end user.

So, if you are considering hybrid cloud, what are some top hybrid cloud benefits you might enjoy?

  • Secure data and applications: As businesses grow and change, IT constantly struggles to stay ahead of security and compliance issues. Hybrid clouds enable IT to leverage cloud provider expertise, infrastructure and processes to ensure critical applications and services remain patched, secure and compliant.
  • Manage Shadow IT: Going the hybrid cloud route ensures IT can quickly and efficiently address the needs of business units. Many IT departments have a broker of services that users access dynamically on demand using a self-service model to minimize Shadow IT. Consequently, business units consider IT a partner, not a hurdle to bypass it to get work done.
  • Achieve scalability: Hybrid clouds allow IT to scale to capacity as needed and handle peak loads and seasonal variations, and just as easily decrease capacity (and costs) when demand is lower.
  • Cut costs: IT is often tasked with competing mandates to provide more, better, faster service at reduced costs. Moving to hybrid cloud helps both shorten time to market and reduce expenses by offloading new, expensive workloads to the cloud.
  • Maintain control: With hybrid cloud, IT can manage and maintain sensitive workloads on-premises, while offloading less-critical applications and services to the cloud. Such flexibility means IT can apply processing power and capacity where needed to deliver consistent security and performance, across even the most distributed organizations.
  • Ensure performance, reliability and availability: By offloading workloads to the cloud as needed, IT is freed up to focus on more value-added tasks like application development and operational improvement. This ensures IT applications and services maintain the highest performance, reliability and availability, even as the business grows.
  • Implement new capabilities and innovative technology: Instead of investing in expensive software and infrastructure as technology evolves, hybrid clouds ensure IT can always access the latest technologies and releases in the cloud. In addition, IT can always match the right workload to the right infrastructure, be it on-premises, in the cloud or both.

These are just some of the hybrid cloud benefits you can bring to your organization, but if you want to see even more specifically the impact it might have for your unique environment, consider one of our Hybrid Cloud Assessments. Hybrid cloud has an obvious potential to benefit many organizations; however, it is dependent on each distinctive situation and the desired outcome. There is rarely a one solution fits all scenario when it comes to complex IT infrastructure, so a hybrid cloud solution needs to be approached as customized as your needs are. But don’t be afraid of it – take the leap, and you just might fall in love.

Want to discover more benefits of hybrid cloud?  Read our Buyers Guide to Hybrid Cloud.

]]>
3 Benefits of Multi-Cloud Adoption https://www.oneneck.com/blog/cloud/3-benefits-to-adopting-a-multi-cloud-strategy/ Thu, 13 Feb 2020 18:00:00 +0000 https://www.oneneck.com/blog/cloud-3-benefits-to-adopting-a-multi-cloud-strategy/ You want performance, you want reliability, you want flexibility, and you want it all tied together with your organization’s unique needs in mind. You know that a multi-cloud strategy is essential to your organization’s digital transformation, but where do you start? Let’s begin by digging into some of the reasons why more businesses are adopting […]]]>

You want performance, you want reliability, you want flexibility, and you want it all tied together with your organization’s unique needs in mind. You know that a multi-cloud strategy is essential to your organization’s digital transformation, but where do you start?

Let’s begin by digging into some of the reasons why more businesses are adopting a multi-cloud strategy vs hybrid cloud for more control over their workloads and data.

Multi-Cloud Benefits

As the cloud has come into its own and been widely adopted at enterprises around the globe, many organizations have started seeking services from a multitude of cloud providers to meet diverse application requirements and data needs across different business units. Multi-cloud has become incredibly popular in recent years and many point to it as the future of cloud computing.

There are a variety of factors fueling the drive to seek out multiple cloud solutions. These include everything from geographical concerns to outage worries. All are good reasons for pursuing a multi-cloud environment, which offers the following benefits:

1. Multi-cloud adoption eliminates single points of failure

Using cloud services from multiple providers with different offerings means you eliminate the risk of a single point of failure. Using multi-cloud is your insurance policy against anything from a weather-related natural disaster that disrupts business operations to a major loss of data. If one cloud point goes down, you can rely on another cloud as your backup while you attend to the outage.

2. Multi-cloud adoption enables you to match services and apps, while also meeting diverse workload requirements

A multi-cloud strategy gives you more choices when you’re matching specific apps and workloads among a mix of cloud providers. Using services from different providers enables you to more effectively address the diverse performance, privacy, security and geographic needs of various business units, departments and teams in your organization. It also goes beyond just fulfilling internal IT needs to better meet the external demands of partners and customers.

3. Multi-cloud adoption frees you from vendor lock-in

A multi-cloud strategy helps to prevent vendor lock-in, which means you also avoid possible widespread outages if one provider’s services are down. It also means you get to sample the offerings and ideas of many providers as technology evolves and grows. Relying on a single cloud vendor puts you at risk in the event the promulti-cloud-toolkitvider comes up short in areas of security or continuous innovation. Diversifying your portfolio of cloud providers is a much smarter strategy and protects you from those risks.

What’s Next?

The benefits of a multi-cloud approach are clear, but knowing where to start can be challenging. Download our Multi-cloud toolkit to get you started on the path to multi-cloud adoption.

 

]]>
A Brand that Goes Beyond Technology | OneNeck IT Solutions https://www.oneneck.com/blog/managed-services/a-brand-that-goes-beyond-technology/ Fri, 17 Jan 2020 20:30:00 +0000 https://www.oneneck.com/blog/managed-services-a-brand-that-goes-beyond-technology/ By now, you’ve heard them all… “We have the brightest minds in the business.” “You need our expertise.” “Our bench has the most certifications in the industry.” …none of which mean anything in the context of the day-to-day to-do list that any given IT department faces. Which is why, in an attempt to get real, […]]]>

By now, you’ve heard them all… “We have the brightest minds in the business.” “You need our expertise.” “Our bench has the most certifications in the industry.”

…none of which mean anything in the context of the day-to-day to-do list that any given IT department faces.

Which is why, in an attempt to get real, we’ve launched a different approach to the OneNeck brand.

Like any organization seeking to better define their messaging, we reviewed what our competitors are saying, so we could get a big-picture understanding of the market. And what we found was a lot of the same – a lot of messaging that focused inward (“our expertise”) and started with the technology (“buy X for the fastest speeds around”).

We then went to our employees, to understand how they work day-to-day with our customers and how they perceived OneNeck’s value. This entailed hours of listening, striving to understand where they interact with our customers and the challenges that our customers are seeking to solve with our help.

And finally, we went straight to the source – the most important source for realistic feedback – our customers. And what we found was actually quite simple.

Today’s IT leaders are struggling with…

  • Balancing long-term strategy vs. day-to-day
  • Hiring and retaining talent
  • Prioritizing budget
  • Constantly changing technology

These are their persistent challenges, and if OneNeck can help with any one of these, we can be a partner that brings real value. Hence our new tagline.

We Got Your BackKeep Moving Forward. We Got Your Back.

It’s not about us, but you, our customer. And if we can help as your trusted partner to enable you to focus on the innovation that you’re driving, we’ve done our job.

Want to learn more about how the OneNeck brand is evolving beyond technology? Check out this recent article from 451 Research.

]]>
Developing a Hybrid Cloud Strategy https://www.oneneck.com/blog/cloud/planning-developing-a-hybrid-cloud-strategy/ Mon, 30 Dec 2019 18:00:00 +0000 https://www.oneneck.com/blog/cloud-planning-developing-a-hybrid-cloud-strategy/ Hybrid Cloud solutions have proven to be a highly effective, flexible and scalable hybrid IT strategy for businesses of all sizes across a wide variety of industries.  But an expert strategy is needed to ensure the safety of mission-critical data. Partner with OneNeck to launch your business higher. Developing a Hybrid Cloud Strategy Deploying your […]]]>

Hybrid Cloud solutions have proven to be a highly effective, flexible and scalable hybrid IT strategy for businesses of all sizes across a wide variety of industries.  But an expert strategy is needed to ensure the safety of mission-critical data. Partner with OneNeck to launch your business higher.

Developing a Hybrid Cloud Strategy

Deploying your businesses sensitive data and mission critical applications to a cloud platform feels a bit like launching astronauts into deep space. Although you know they’ll do their best work out there, you can’t be certain of what they’ll encounter along the way. You need a rock solid strategy in place to ensure their safety.  Not only do you need to send the appropriate resources into the clouds, but you have to have the proper resources on the ground to support their mission.

Not unlike Mission Control, businesses need a hybrid cloud strategy that best balances the physical security of keeping mission critical assets on-premises with the nearly unlimited opportunity of the cloud.  Hybrid Cloud allows firms to access the economies of scale associated with a public cloud solution and still provides scalability and security for their most mission-critical data and applications.  By delegating distinct functions to the public and private clouds, many businesses have been able to build an IT solution that brings them the best of both worlds, and helps to drive business growth while keeping costs down.  But how do they do it?

A Capable Strategic Partner is Key

The downside of the Hybrid Cloud is the high level of complexity involved with migrating and deploying different functions to different parts of your IT infrastructure, and maintaining their interoperability once they are deployed.  Beyond that, businesses often need help understanding what resources need to go into the cloud, and what resources need to stay private.  It can be difficult for a firm to determine the capabilities of their own staff and infrastructure versus what is available in the cloud.

This is precisely why the experts agree how important it is for organizations to partner with a capable cloud IT provider and consultant.  They need a partner with expertise to provide a holistic view of their requirements, recommend a hybrid cloud solution specifically tailored to their needs and back it up with the people and equipment to do the job right.

OneNeck Delivers World-Class Infrastructure

Whether you’re sending your data to the cloud to grow your business or sending astronauts to deep space to advance mankind, you need a solid hybrid cloud strategy.  OneNeck IT Solutions offers the ultimate in security, accessibility, compliance and customization for your database and applications management, which allows your business to be more responsive, more flexible and smarter.

Learn more about developing your hybrid cloud strategy in our Buyers Guide to Hybrid Cloud.

]]>
Time for a next-gen firewall? https://www.oneneck.com/blog/time-for-a-next-gen-firewall/ Mon, 23 Dec 2019 21:00:00 +0000 https://www.oneneck.com/blog/time-for-a-next-gen-firewall/ Long ago, in a land far away, there used to be a network perimeter. Those were the good old days where the network perimeter was the all-encompassing traffic control point, and where traffic was all funneled through a single point, no matter where it came from. But the cloud changed everything by decentralizing the network, […]]]>

Long ago, in a land far away, there used to be a network perimeter. Those were the good old days where the network perimeter was the all-encompassing traffic control point, and where traffic was all funneled through a single point, no matter where it came from. But the cloud changed everything by decentralizing the network, making the perimeter vaporize, and giving IT many a sleepless night.

OneNeck Security Practice Director, Nick Santilli, describes the situation like this. “The largest cybersecurity threat still revolves around end users. As technology has evolved, we now have our phones, our tablets – we can work from anywhere on just about any device. And so, the security perimeter has expanded from being just at an office or company location to Starbucks or the movie theater, or even a beach – it’s wherever I am with my device.”

So, with the lack of one point of protection, today’s security teams are having to adapt to protecting multiple points (aka micro-perimeters) across a complex and dispersed environment. And just as IT is evolving their approach, traditional firewalls are evolving too and being replaced by a mixture of physical and virtual appliances, some embedded into the network while others are delivered as a service, are host-based or included with public cloud environments.

What Should I Look for in a Next-gen Firewall?

While threats continue to get more complex, many organizations are still using yesterday’s firewall. So, what should you consider when updating your firewall technology? Cisco lays out these five tips when choosing your next-gen firewall

  • Does it deliver breach prevention and advanced security? Clearly, breach prevention is a firewall’s primary job, but it also should quickly detect a breach should malware make its way inside.
  • Does it give you visibility across the network? The first rule of detection is being able to see what’s out there. So your firewall should give you a holistic view and contextual awareness.
  • Does it come with flexible management and deployment options? A firewall does no good if it’s too complex to deploy, not easily managed, and cannot be customized to meet your environment’s unique needs, making this a critical consideration.
  • Does it detect threats fast enough to mitigate risk? With many of today’s high-profile breaches, it’s discovered later that they’ve been in their network for 100+ days, which is truly terrifying to any security professional. Speed to detection is a must in a modern firewall.
  • Does it play well with others? Like any component of a solid security strategy, it has to be integrated with other security components to truly be effective. The automated sharing of threat information, event data, policy and contextual information is what leads to a solution that can secure an environment across multiple points.

The Network Security Game is Changing

12-23-2019_NGFW-Blog_ESG-download-IconNetwork security in general is becoming more complex on a daily basis, and this requires new strategies to keep the network safe from attack. Point tools, manual processes and lack of qualified staff are only making it harder on today’s CISO to stay ahead of threats. But with integrated technology, consistent network security policies automation, there is hope. Interested in learning more? Check out this informative ESG research report, Navigating Network Security Complexity.

You’re Not Alone.

Still not sure where to start? At OneNeck, we recognize that organizations often need support evolving their security programs, but they don’t have unlimited resources — or in many cases, a chief information security officer (CISO) — to accomplish this important goal. To address this gap, we offer our Virtual CISO service to provide you with on-demand strategic and operational support to meet your unique security needs, without the time delays and high cost of hiring a full-time security expert.

“We stay up to date on the latest security threats, so you don’t have to,” says OneNeck’s CISO, Katie McCullough. “If cybersecurity strategy and risk assessments are a core competency of yours, that’s great. But if not, we can stand in the gap and help you create a security program that accomplishes what you need, without over-engineering systems or processes.”

So, hang in there. You’re not alone. We’re here to help, wherever you are in your security journey.

]]>
Azure Reserved Instances – Are They Being Utilized Correctly https://www.oneneck.com/blog/cloud/azure-reserved-instances/ Tue, 12 Nov 2019 21:00:00 +0000 https://www.oneneck.com/blog/cloud-azure-reserved-instances/ If it’s been a while since you have looked at Azure Reserved instances, now is a great time to revisit them. Not sure what Reserved Instances are for? Read on, you may just save some money. With the number of services Azure has available, it is easy to get lost in the new shiny and […]]]>

If it’s been a while since you have looked at Azure Reserved instances, now is a great time to revisit them. Not sure what Reserved Instances are for? Read on, you may just save some money.

With the number of services Azure has available, it is easy to get lost in the new shiny and forget about the things already deployed. Consequently, when Microsoft updates services we rarely go back and see what we could be taking advantage of. Reserved Instances (RIs) sure seem to have followed that MO.

Released more than a year ago, RIs have seen very little adoption. At the time the RI pricing model went against the grain of the Cloud Pay-As-You-Go (PAYG) model. You had to pick a machine type and then pay for that machine for a year – or three. It also felt like vendor lock in. If I pay for 3 years now, what happens a year from now when there is a better machine?

Microsoft has all of this figured out.

To be clear Reservations are currently available on VMs and the compute component of Azure SQL and Cosmos DB. For the sake of this article, we will only be discussing VMs, however the same principles apply to all Reservations.

Azure Reserve Instances Pricing

In a recent announcement, Microsoft made it possible to spread the RI purchase out monthly over the term of the RI. This returns the spend back to the PAYG model making the finance part a simple comparison between VMs associated with an RI and those that are not. The original pay up front model is still available if that is more enticing.

The lock-in for pricing is also extremely flexible. It is still true that RIs are associated to a specific machine type (like an F8s for example). However, an RI is not (and cannot be) linked to a specific machine. If you buy an RI for an F8s, that RI can apply to any F8s in the selected scope. The scope can be a single resource group, a subscription or any subscription associated with the tenant. If, at some point in the future, you decide the F8s is not where you need the RI, you can roll it over to a new machine type (like an N-series) and Microsoft will roll over any money spent on the existing RI to the new one. In the event you decide that the RI is simply not working, maybe because the dev/test servers don’t really need to be running 24/7, you can cancel them and get some credit back. It won’t be a full credit, after all you did commit to a term for a cost savings. However, depending on the term you have left, you may still end up ahead.

If a single VM type (like the F8s) is too restrictive, there is an option to purchase instance size flexibility. This type of RI will look for machines associated with a specific family type. For example, the DSv2 family. With a flexible RI, any VM that belongs to the VM family will be considered for a discount. The calculation involved in applying the credit across the VM family is more involved than a standard RI and will not be covered here. If you would like more details, the Microsoft doc can be found at https://docs.microsoft.com/en-us/azure/virtual-machines/windows/reserved-vm-instance-size-flexibility

Hopefully with the costing and lock-in issues aside you are now thinking about the implementation of it.

Implementing Azure Reserve Instances

RIs are shockingly simple to implement. The choices that need to be made are: machine type, quantity, term and the scope of the RI. That’s it. The scope can even be changed at a later time.

Ensuring the Reserve Instances are being utilized correctly

When we think of our Azure bill, we generally think in terms of monthly buckets. On the surface RIs appear to work the same way, giving you a monthly credit for your VMs. That’s not quite accurate. An RI provides an hourly credit for the VM type specified. That means to take advantage of the credit you have to a have a VM of that type running every hour. If you don’t, you lose that credit. It doesn’t cost you anything for that hour, except you have already paid for it through the RI purchase.

That does not mean you must have the same machine running every hour. If you have 2 machines of the same type you could run each one of them staggered for 12 hours a day and you would be covered. The trick is to make sure they do not overlap. If they did, for every hour of overlap you would accumulate 2 VM hours and be granted only 1 credit hour, so you would pay for 1 VM hour.

Where Azure Reserve Instances Make Sense

RIs make the most sense for production workloads, ones you know will be running 24/7. You have already committed to run your business in Azure, you should seriously consider adding savings to that commitment.

However, production is not the only application that makes sense. Any machine, or series of machines, that will be running a combined 24/7 can take advantage of RIs. If you are a DevOps shop and have your build machine running continuously, that would apply. Have a development shop or support service that follows the sun? Spinning up dev or QA machines for the teams that start and shutting down the ones for the teams ending their shift would also qualify.

One thing to keep in mind that RIs are strictly applied to the compute cost associated with the VM. If you are paying for Windows or SQL licensing, you will still be billed separately for that.

It’s clear that RIs are not a good fit for every type of workload, but if you can find a workload that does apply you should investigate the savings they can bring. You might even be able to convince the powers that be to use some of that saving to get the PowerApps license you’ve had your eye on.

]]>
How Much Risk is Too Much? https://www.oneneck.com/blog/how-much-risk-is-too-much/ Wed, 06 Nov 2019 21:00:00 +0000 https://www.oneneck.com/blog/how-much-risk-is-too-much/ For a long time, security initiatives have been driven by compliance mandates and a healthy dose of fear. But as threats continue to become more sophisticated, so must our efforts in thwarting them. This is why aligning with best practices is a great place to start, specifically the Center for Internet Security (CIS) Top 20 […]]]>

For a long time, security initiatives have been driven by compliance mandates and a healthy dose of fear. But as threats continue to become more sophisticated, so must our efforts in thwarting them. This is why aligning with best practices is a great place to start, specifically the Center for Internet Security (CIS) Top 20 Critical Security Controls which was developed by a global group of security experts who continue to finetune them every year.

The 20 critical controls are divided into three categories: Basic, Foundational, and Organizational.

  • Basic controls (1–6) are the must-have measures for the most basic defense readiness.
  • Foundational controls (7–16) are a level beyond the basic controls.
  • Organizational controls (17–20) focus more on people and processes.

CIS-Controls-IG-061719

The CIS further outlines in the CIS Controls v7.1 that an effective approach to cybersecurity can be approached with these steps:

  • Offense informs defense: Use knowledge of actual attacks that have compromised systems to provide the foundation to continually learn from these events to build effective, practical defenses. Include only those controls that can be shown to stop known real-world attacks.
  • Prioritization: Invest first in Controls that will provide the greatest risk reduction and protection against the most dangerous threat actors and that can be feasibly implemented in your computing environment.
  • Measurements and Metrics: Establish common metrics to provide a shared language for executives, IT specialists, auditors, and security officials to measure the effectiveness of security measures within an organization so that required adjustments can be identified and implemented quickly.
  • Continuous diagnostics and mitigation: Carry out continuous measurement to test and validate the effectiveness of current security measures and to help drive the priority of next steps.
  • Automation: Automate defenses so that organizations can achieve reliable, scalable, and continuous measurements of their adherence to the Controls and related metrics.

It’s Time to Move to a Risk Management Approach to Security

At OneNeck, we believe that no matter where you are in your security strategy execution, the CIS controls provide prioritized, actionable steps to define and implement a security strategy. While there’s no one-size-fits-all approach to security, today’s organizations can lower the risk of a breach by changing their approach from strictly meeting compliance mandates to a risk management approach that uses practical and proven best practices.

Katie-McCulloughOneNeck CISO, Katie McCullough, puts it like this… “Customers don’t have unlimited spend to go after security. So, at OneNeck, we work with our customers from a risk management perspective. What are their biggest risks? How do we leverage the investments they’ve already made? And how do we maximize their budget? Because the answer isn’t always buying a new security product. It might be microsegmentation of your applications. So, we’re not here to sell them a security product. We are here to help them define and implement risk management for their particular needs.”

In addition to guiding our customers with CSC best practices, internally at OneNeck, we establish practices in alignment with the critical security controls. We follow the advice and recommendations we give our customers, and as an experienced Managed Services Provider (MSP), we’ve seen firsthand how alignment with proven best practices is key in preventing attacks.

If you’re still not sure where to start when assessing your risk, we’d be happy to discuss your options. With the help of our security team, you don’t have to go it alone. Using the CIS 20 Controls as a benchmark, we can help identify the security risks unique to your business, develop a prioritized plan to mitigate risk and assist you in implementing a plan that keeps you safe from current and future attacks.

]]>
Choose an IT Vendor | Review Managed Services & Colocation https://www.oneneck.com/blog/managed-services/how-to-choose-an-it-vendor/ Tue, 29 Oct 2019 18:00:00 +0000 https://www.oneneck.com/blog/managed-services-how-to-choose-an-it-vendor/ Does selecting an IT vendor and deciding on the right direction for your company seem to get more complex with every conversation? Without a crystal ball to reveal precisely which vendor is a perfect fit, knowing you’re making the right decision is virtually impossible—but it doesn’t have to be. There are many directions you can […]]]>

Does selecting an IT vendor and deciding on the right direction for your company seem to get more complex with every conversation? Without a crystal ball to reveal precisely which vendor is a perfect fit, knowing you’re making the right decision is virtually impossible—but it doesn’t have to be.

There are many directions you can turn for insights. 360Quadrants, for instance, combines expert analysis with crowdsourced insights on technology vendors to provide a bias-free comparison. Powered by Markets and Markets, 360Quadrants strives to help businesses simplify their IT buying decision while managing the risk involved in such a complex decision. Specifically, 360Quadrants’ analysis provides businesses with critical insights that can help remove some of the complex decision-making risk involved in selecting a vendor partner. Quarterly, 360Quadrants produces the Top Vendors by Category report, which analyzes more than 2,500 vendors in over 500 markets.

Recently, the Top Vendor reports focused on three categories, in which OneNeck was proudly named a top vendor:

“It’s extremely rewarding to be named a top choice, in multiple categories, by a resource that was created to empower businesses to make better decisions,” says Corey Livingston, VP of Marketing at OneNeck. “With the abundance of IT services and solutions choices available, your business needs a partner that truly has your back.”

In addition to 360Quadrants, G2 Crowd and FeaturedCustomers offer insights and neutral reviews, along with customer reviews, to help you assess what’s best for your business.

]]>
When it comes to avoiding risk, what is OneNeck doing? https://www.oneneck.com/blog/when-it-comes-to-avoiding-risk-what-is-oneneck-doing/ Wed, 23 Oct 2019 19:00:00 +0000 https://www.oneneck.com/blog/when-it-comes-to-avoiding-risk-what-is-oneneck-doing/ Security is intrinsic to our services (for all customers) and organization (all the way to the president and CEO of our parent company TDS Inc.). It’s part of every service we develop—from start to finish. Additionally, we leverage the Critical Security Controls (CSC), outlined by the Center for Internet Security (CIS), to complete our annual […]]]>

Security is intrinsic to our services (for all customers) and organization (all the way to the president and CEO of our parent company TDS Inc.). It’s part of every service we develop—from start to finish. Additionally, we leverage the Critical Security Controls (CSC), outlined by the Center for Internet Security (CIS), to complete our annual security assessments and third party audits.

The Critical Security Controls provide a series of cybersecurity actions prioritized by their criticality in preventing cyberattacks. In particular, the first six controls (referred to as the Basic Control set, see below) focus on cybersecurity “hygiene.” Studies show that implementation of these first six CIS Controls provides an effective defense against about 85 percent of the most common cyberattacks.

CIS_Controls

The OneNeck Security team focuses on providing timely input into developing new services, securing current IT infrastructure and systems so customers can rest assured we are ready and able to meet demands for secure services.

Internally, we establish practices in alignment with the critical security controls. It’s important we follow the advice and recommendations we give customers in order to demonstrate quick and effective ways we’re prepared to address aspects of the Critical Security Controls.

Customers count on us to have a rigorous security framework in place and to submit to outside resources to audit our work. Having third-party vendors perform internal audits (just like we do for SSAE, HIPPA, etc.), provides verification we have the evidence in place we claim to, therefore, avoiding potential bias.

To begin assessing the broad scope of security and compliance needs your business faces, our virtual Chief Information Security Officer (vCISO) service can help. With the help of our have team, comprised of security experts who stay current on emerging threats, you can bypass the hassle of hiring an in-house CISO and immediately bring in the security leadership you need to assess and improve your overall security posture.

]]>
Avoid Issues with Window/SQL Server 2008 https://www.oneneck.com/blog/managed-services/avoid-issues-with-microsoft-windows-sql-server-2008-migration-to-the-cloud/ Wed, 16 Oct 2019 18:00:00 +0000 https://www.oneneck.com/blog/managed-services-avoid-issues-with-microsoft-windows-sql-server-2008-migration-to-the-cloud/ Have you upgraded or migrated your server to the cloud yet? With SQL Server 2008 support having ended in July 2019 and Windows Server 2008/R2 support ending in January 2020, if you haven’t, now is the time to upgrade or migrate your workloads to the cloud. What does end of support mean? Basically, there are […]]]>

Have you upgraded or migrated your server to the cloud yet?

With SQL Server 2008 support having ended in July 2019 and Windows Server 2008/R2 support ending in January 2020, if you haven’t, now is the time to upgrade or migrate your workloads to the cloud.

What does end of support mean?

Basically, there are no more security updates, which is bad news for any IT professional. Not only could compliance become an issue, with cyberattacks becoming more sophisticated and frequent, you’ll want to protect your server in ways that 2008 products (Windows/SQL) just aren’t capable of. That’s what makes an upgrade or migration so important.

Should you upgrade or migrate?

If you’re using Windows Server 2008, Windows Server 2008 R2 or SQL Server 2008, you should consider either upgrading your server to the latest version or migrating to the cloud with Microsoft Azure.

If you need to keep your Windows Server 2008/R2 on-premise, you will need to upgrade to Windows Server 2012/2012 R2 before you can upgrade to the more recent Windows Server 2016 or 2019. However, not every older operating system has a pathway to every newer version. Ultimately, migration might be the best solution. Since every workload is different, having your architecture and machine properly evaluated by OneNeck IT Solutions can help avoid any potential issues.

If you’d prefer to migrate your Windows Server 2008 or SQL Server 2008 off-premise to the cloud, Azure is an optimal solution for migration because it has familiar features, lowers your TCO and is fully managed. It enables you to seamlessly lift and shift server applications to Azure without making changes to your code. And, it provides a portfolio of migration tools that can help you choose the right mix of cloud and on-premises solutions for your business. Other benefits include:

  • Increased business innovation with Azure SQL Database, Azure App Service and Azure laaS
  • Reduce infrastructure costs
  • Free security updates
  • Meet compliance with the most certificates of any cloud provider
  • Protection against sophisticated cyberthreats with secure cloud foundation

While you could likely handle a migration on your own, without a deeper knowledge of Azure and a thorough analysis of your systems, things can go wrong. OneNeck IT Solutions can help make migrations efficient and stress-free. The important first step of your migration is a thorough evaluation, understanding the architecture and any interdependencies that exist.

scott-morely“Many organizations don’t have the skills, expertise or time to drive a successful cloud migration all on their own. Working with partners that specialize in cloud migration can make the difference in ensuring that your migration is successful. Cloud migration specialists can help you identify opportunities, create a detailed plan and choose the right cloud solution providers.”

Scott Morley, Principal Application Architect, OneNeck IT Solutions

Leveraging OneNeck IT Solutions Azure Cloud Services  will give you proactive, enhanced 24/7 monitoring, internal staff flexibility to focus on important projects and hybrid capabilities that optimize workloads across a variety of locations.

Our Managed Azure solutions include:

  • Azure Compute—Virtual Machine (VM) and Operating System Management
  • Azure Network Management—Networking and Connectivity
  • Azure Backup and Restore Management
  • Managed Database for SQL database installed on a VM
  • Managed Storage
  • OneNeck Monitoring and Management—OneNeck 24/7 operations, Service Level Agreements (SLAs) and IT Infrastructure Library (ITIL) best practices

With OneNeck IT Solutions, the process you may have been putting off will be easier than you think.
Start now with these eBooks!

]]>
OneNeck an Environmental Leader in Colorado https://www.oneneck.com/blog/oneneck-an-environmental-leader-in-colorado/ Tue, 15 Oct 2019 19:30:00 +0000 https://www.oneneck.com/blog/oneneck-an-environmental-leader-in-colorado/ In a recent statement, the Colorado Department of Public Health & Environment recognized OneNeck IT Solutions, and its data center in Denver, Colorado, as an environmental leader in the state. On October 1, the Colorado Department of Public Health and Environment’s Environmental Leadership Program recognized more than 170 businesses—including OneNeck—for their the voluntary and significant […]]]>

In a recent statement, the Colorado Department of Public Health & Environment recognized OneNeck IT Solutions, and its data center in Denver, Colorado, as an environmental leader in the state. On October 1, the Colorado Department of Public Health and Environment’s Environmental Leadership Program recognized more than 170 businesses—including OneNeck—for their the voluntary and significant environmental achievements.

“Having our data center named an environmental leader is an important first step for our company,” said Michael Brunson, manager of Data Center Facilities for OneNeck in Denver, Colorado. “It’s an achievement we are very proud of, yet, we know there’s more we can do.”

How did OneNeck achieve status as an environmental leader?
The process began with determining areas of environmental achievement/improvement and completing the ELP application. OneNeck identified the following:

  • Reducing energy use by reclaiming the heat exhaust from our cabinets and using that reclaimed hot air to heat our building.
  • Solid and/or hazardous waste reductions involved changing the way our cabinets were delivered. In the beginning, each cabinet was packaged in lots of cardboard and layered on pallets. In order to dispose of the waste, a dumpster was rented, loaded up and then trucked away to be emptied in a landfill.

    Brunson asked for details on different cabinet packaging materials and learned the cabinets could be wrapped in two new packing blankets, without any cardboard. Today, that’s how all new cabinets are delivered. The best part, the packing blankets are donated to homeless and animal shelters, including Saint Francis Center and the Denver Animal Shelter.

    palletAs for the pallets, after each cabinet delivery, they are listed on Craig’s List as free. Within a couple days all the pallets were usually gone and re-purposed [see sidebar].

  • Land use improvements or protection improvement involved eliminating soil erosion. Following construction of the data center in 2015, the west field was bare soil. To prevent future soil erosion, OneNeck invested in planting, watering and growing vegetation. Now, there lies a beautiful field—and no more erosion.

“This is an outstanding achievement, and one that our team is very proud of,” said Hank Koch, SVP of Data Centers and Managed Services at OneNeck. “Ensuring that our environment is healthy and protected matters greatly to us all! We only have one Earth and it must sustain healthy life and growth. Making small changes really matters and we must all do our part.”

]]>
How to Choose the Best Venue for Workloads | IT Strategy https://www.oneneck.com/blog/cloud/how-to-choose-the-best-platform-and-it-strategy-for-workloads/ Thu, 10 Oct 2019 19:30:00 +0000 https://www.oneneck.com/blog/cloud-how-to-choose-the-best-platform-and-it-strategy-for-workloads/ If there’s anything that can be said about today’s IT environment, it’s that choice abounds, which is why we find ourselves smack dab in the middle of this hybrid reality in which we now exist. In a recent 451 Research study, they asked respondents how they would best describe their overall organization’s IT strategy, and […]]]>

If there’s anything that can be said about today’s IT environment, it’s that choice abounds, which is why we find ourselves smack dab in the middle of this hybrid reality in which we now exist.

In a recent 451 Research study, they asked respondents how they would best describe their overall organization’s IT strategy, and 57% said hybrid IT environments, where there’s an integrated environment of on-premises and off-premises resources. And for all of the buzz about going all-in to the public cloud a few years ago, they found that only 19% of organizations have taken a completely off-premises approach.

 

451_Hybrid-Environment

 

But why has hybrid become the primary approach for today’s IT organizations? It really comes down to flexibility – flexible workload migration and placement options that enables each workload to live on its best execution venue (as 451 likes to call it).

451_Hybrid-Use-Cases

 

But alas, with hybrid comes complexity, often making it difficult to determine exactly which platform aligns best with each workload. So, with so many options out there – on-prem, on-prem private cloud, hosted private cloud, IaaS, PaaS and SaaS – how does one determine the best execution venue (BEV) for each workload? 451 breaks the BEV considerations down (in order of importance) as:

  • Cost (55%)
  • Security (53%)
  • Application performance (32%)
  • Platform reliability (31%)
  • Government regulation/data sovereignty (22%)
  • Regulation/compliance (18%)
  • Governance/company policy (17%)
  • Latency considerations (13%)
  • Software vendor requirement (9%)

There’s a lot there to be considered when making the BEV decision. So, at OneNeck, we follow a wheel of fortune of sorts when we’re working with our customers in determining their BEV across their portfolio of applications. OneNeck’s VP of Advisory Consulting, Jeff Budge, describes our wheel like this…

“A lot of what we’re trying to do with our customers involves identifying needs, setting the governance, understanding their application portfolio, looking at business value and technical fit, and that very important task of assessing TCO at a detailed and comprehensive layer. Then we come up with a scoring methodology to let us figure out not just what applications are the most important for them to make business decisions, but then can those priorities indicate which venues they need to gain better skills in sooner rather than later. From there, we can determine placement of the workload in the venue.”

But even when you find the perfect-fit venue for a workload, it may not be permanent. Melanie Posey, 451 Research VP stated in a recent conversation with Jeff Budge, “One of the key things about best execution venue is that it’s not a static, permanent kind of thing. At one point in time, a workload might be best suited to run in, say, an on-premises private cloud environment, but then at another time, it might make sense to run it in a public cloud. But overall, what we tell our clients at 451 Research is that it’s a multi-faceted equation figuring out where the application should go, but top of mind for this decision should always be cost, security and application performance.”

When it comes down to making the BEV decision, there are always going to be multiple factors to consider that ensure the right decision is made, which is why in a recent 451 Research and OneNeck webinar, Jeff and Melanie explored this topic in depth. If you’d like to hear their advice, you can listen to the webinar below.

 


2019-10_webinar-icon

WATCH THE WEBINAR NOW

 

]]>
Containers 101: Benefits of Containers vs VMs https://www.oneneck.com/blog/security/containers-101-benefits-features/ Tue, 01 Oct 2019 19:00:00 +0000 https://www.oneneck.com/blog/security-containers-101-benefits-features/ Although containers aren’t new (been built into Linux for 10+ years and been available in FreeBSD, AIX and Solaris), containers seem to be all the rage, and for good reason. The agility containers can bring to an IT team alone make them appealing, but add in the security benefits that the self-contained nature of containers […]]]>

Although containers aren’t new (been built into Linux for 10+ years and been available in FreeBSD, AIX and Solaris), containers seem to be all the rage, and for good reason. The agility containers can bring to an IT team alone make them appealing, but add in the security benefits that the self-contained nature of containers brings, they seem like a no brainer. But even with numerous benefits, there is also a lot of confusion about what they really are and what is the best-fit scenario. So, we thought we’d break it down…

First and foremost, are containers and VMs the same thing?

Quite simply, no. It is a very common misconception that containers and virtual machines (VMs) are interchangeable, or at least similar, but they are not. So, let’s start by defining each…

containers-vs-vmsVMs are:

  • As server processing power and capacity has increased, applications could not take advantage of this, so virtualization technology was created to allow for multiple “virtual computers” to be run on a single piece of bare metal hardware.
  • A “hypervisor” (or a VM) manager creates and runs VMs and sits between the hardware and the VM.
  • A single server can host multiple VMs. A Windows Server VM and a Linux VM can run side by side on the same physical machine.
  • Each VM has its own operating system, libraries and applications.
  • VMs can be gigabytes in size.
  • VMs can consolidate multiple applications onto a single system with heterogeneous operating systems.
  • VMs primary goal is to increase the utilization of the underlying physical machine.

containers-vs-virtual-machinesContainers are:

  • Containers are pieces of software that sit on top of the physical server AND its host OS (Linux or Windows). The OS kernel is shared across containers. Containers may also share common frameworks and libraries (e.g. .NET, JVM). In other words, the container has the entire runtime environment, minus the host OS.
  • Containers are light, usually megabytes in size, where VMs are often gigabytes in size.
  • Containers are good for taking a monolithic application that would require purchase of new hardware or configuration of a new VM and allowing it to scale on existing deployed VMs.
  • Containers allow software to run reliably with minimal changes when moved from one computing environment to another, such as moving a container from an on-premises environment into a public cloud.
  • In this figure, App1, App2, App3 could be monolithic applications, 3-tier applications or microservices. Notice a single OS which is then shared across the containers. Containers primary goal is consistency of the software environment regardless of where it is physically residing.

What are the benefits of containers?

There are very clear benefits that come with the adoption of containers:

  • Containers are only tens of megabytes in size verses a VM that would be gigabytes in size.
  • VMs take minutes to boot up the operating system and then start an application, while containerized applications start almost instantly. At scale, this allows for “just-in-time” creation of multiple instances of an application.
  • Containers are more modular. Applications can be split into modules and deployed as microservices (e.g. front end, business layer and data layer would each be their own modules)
  • Containers allow enterprises to deploy and scale existing monolithic applications without the need to procure new hardware and/or new VMs. In many organizations, it takes weeks/months to purchase new hardware or deploy a new VM into their environment, where containers allow for a much shorter deployment/update cycle.
  • Containers and Container Orchestrators allow for a smoother and more efficient DevOps Practice by helping to enforce consistent environments.
  • Containers allow for less effort to break apart monolithic applications and convert them to a microservices architecture.
  • Overall, containers enable a much more agile software development lifecycle.

So, what are my options in containers and orchestrators?

Container Orchestrators (aka container management) provide tools to allow for deployment, scaling, availability and management of containers, both on-premises and in public/private clouds. They’re essentially a manager of your containers across multiple physical environments. The current most popular ones are:

  • Docker – Open Source, most popular
  • Apache Mesos – Open Source, includes orchestration
  • Kubernetes – Open Source, most popular container orchestrator
  • Red Hat Open Shift – On-premises private platform as a service for RHEL

All support the Open Container Initiative (OCI) under the Linux Foundation. This is important because all major providers are members of OCI/Linux Foundation.

In addition, Microsoft Azure has some excellent container service offerings:

  • Azure Container Instances – Create a container instance by pointing to your Docker Image in Docker Container Registry. Essentially, containers on-demand.
  • Azure Web App for Containers – Like Azure App Services, but instead of publishing your code directly into Azure you point the App Service to your Container in the Docker Container Registry
  • Azure Kubernetes Service (AKS) – Fully managed service for deploying and managing container applications. Provides a “serverless” experience, integrated CI/CD and enterprise grade security.
  • Azure Service Fabric – Native Azure Microservices using container images for both Windows and Linux
  • Azure Batch – High Performance/High Scale computing with containers including job scheduling
  • Azure Container Registry – Store and manage container images across all types of Azure deployments

So, why don’t we move everything into containers?

Containers can run all sorts of applications, but because they are so different from VMs, a lot of the older software that many enterprises are still running won’t translate to this model. However, VMs can be used to move older applications into a cloud service. So even though containers have their benefits, VMs still do too. It really boils down to… it depends

————

Thumbnail_Containers for DummiesWant to learn more? Download this informative eBook from our partner, HPE, and learn why container technology is a critical piece of IT modernization solutions that will drive digital transformation, hybrid environment adoption and hyper-convergence.


DOWNLOAD NOW

Topic: Containers vs vms

]]>
IT Partner Bringing Value through Optimization Services https://www.oneneck.com/blog/managed-services/bringing-value-through-optimization-services/ Tue, 24 Sep 2019 19:00:00 +0000 https://www.oneneck.com/blog/managed-services-bringing-value-through-optimization-services/ Is your business racing to keep up and redefine yourself? It’s a situation most businesses face as they strive to remain relevant in today’s digital economy. And, they count on their IT provider to do the same. At OneNeck, we are steadfast in our commitment to evolving our delivery capabilities and solutions to align with […]]]>

Is your business racing to keep up and redefine yourself? It’s a situation most businesses face as they strive to remain relevant in today’s digital economy. And, they count on their IT provider to do the same. At OneNeck, we are steadfast in our commitment to evolving our delivery capabilities and solutions to align with customers’ growing demands.

Gone are the days of adding the latest and greatest product into customer’s infrastructure—we concentrate on offering customers business-focused services on application alignment in multi-cloud architectures. We do this this while optimizing legacy infrastructure that must integrate with modern cloud-based workloads. This is why we are so focused on not only delivering hybrid IT and multi-cloud deployments, but also helping customers get the most out of those environments with continual fine-tuning and optimization.

According to a recent 451 Research survey, over half of the surveyed organizations’ existing or planned IT environment was comprised of a hybrid approach that leverages both on-prem and off-prem cloud/hosted resources.

080719-06_451-Research

But with a diverse and hybrid approach comes complexity, and often underutilized resources, making optimization of those services a critical step in today’s IT environment.

Recently 451 Research reported on OneNeck’s strategy to optimize—from infrastructure to application. In fact, OneNeck was featured as a key player in delivering value-added applications to customers. What does that mean? It means we’re evolving with you into the next phase of IT services, a phase that goes beyond implementation to optimization. Check out the report here.

]]>
HCI – Driving Real Business Results https://www.oneneck.com/blog/hci-driving-real-business-results/ Thu, 19 Sep 2019 23:25:00 +0000 https://www.oneneck.com/blog/hci-driving-real-business-results/ All businesses have to transform and adapt to do business in an increasingly digital world. But to transform, they must first address the foundation that their business sits on, making converged infrastructure (CI) and hyperconverged infrastructure (HCI) a great fit that enables efficiency and scalability on validated infrastructure.  Since 2012, HCI technology has offered even […]]]>

All businesses have to transform and adapt to do business in an increasingly digital world. But to transform, they must first address the foundation that their business sits on, making converged infrastructure (CI) and hyperconverged infrastructure (HCI) a great fit that enables efficiency and scalability on validated infrastructure. 

Since 2012, HCI technology has offered even greater hardware and workload consolidation than its predecessor, CI. HCI has accelerated IT transformation through its software-defined infrastructure approach that does not require the level of storage and server management expertise needed to utilize CI.

Where is HCI now?

Over the last nine years, HCI has been leveraged by a number of large organizations looking to modernize their data centers and to build out public and private and cloud infrastructure.

In a recent survey conducted by ESG, more than 98% of transformed companies said they are using either converged infrastructure (CI) or HCI, and are running 35% of their applications on either platform. Moreover, the global HCI market size is expected to grow from USD 4.1 billion in 2018 to USD 17.1 billion by 2023, at a Compound Annual Growth Rate (CAGR) of 32.9% during the forecast period. (Source)

These growth projections likely come as no surprise to organizations already using HCI. That is because most are seeing firsthand how HCI is supporting transformation and driving meaningful business value for their organizations.

Time is Money
Unlike the legacy approach, HCI is already engineered and validated prior to installation, so teams do not have to worry about spending time integrating components. This saves a significant amount of effort from IT management and staff, and frees up their time to work on more strategic and higher value projects.

Similarly, thanks to HCI’s consolidated interface that provides a comprehensive look at all IT components and significantly smaller hardware footprint, IT staff spend much less time monitoring components and allow for more reliable and consistent operations overall. 

In fact, according to the ESG survey, organizations utilizing CI/HCI spent 31% less time on routine system management.

Not only is time saved, many of these organizations have seen significant cost savings. A smaller hardware footprint requires less levels of management thus translating into decreased operational costs like labor, power and cooling, and more. IT management in HCI/CI organizations reported a 21% to 30% reduction in operational expenditures.

Agility and speed lead to better service and competitive advantage
HCI technology accelerates IT transformation through faster application deployment and completion of integration tasks in a greater speed than ever before. This also increases the chances of getting to market faster than the competition. 

Organizations using HCI/CI reported they were seven and half times more likely to complete most app deployments ahead of schedule, and were two and a half times as likely to be significant ahead of their competitors in time to market.

Through allowing for greater IT agility, HCI also creates a more cloud-like environment, enabling teams to provide IT as a service (ITaaS) experience to its users. This opens the door to even greater flexibility and faster response to business priorities, helping the organization work toward their digital transformation objectives. (Source)

These are just a few of the many benefits of large organizations have experienced integrating HCI technology into their businesses. The significant impact it has on saving time and costs are allowing IT to focus more resources and efforts into digitally transforming their organizations, and to contribute to greater strategic imperatives to the business.

———

Interested in learning more? Check out this informative report from ESG on the role of CI and HCI in IT transformation.


DOWNLOAD THE REPORT

]]>
NAS vs Cloud Backup https://www.oneneck.com/blog/cloud-backup-vs-nas/ Tue, 17 Sep 2019 18:30:00 +0000 https://www.oneneck.com/blog/cloud-backup-vs-nas/ When it comes to selecting the best backup— NAS (network-attached storage) or cloud-based—there are a multitude of factors IT leaders must consider. To break it down, a recent TechTarget article written by John Edwards highlights the pros and cons of the two approaches, and includes insights on which backup, NAS vs Cloud, might be the […]]]>

When it comes to selecting the best backup— NAS (network-attached storage) or cloud-based—there are a multitude of factors IT leaders must consider. To break it down, a recent TechTarget article written by John Edwards highlights the pros and cons of the two approaches, and includes insights on which backup, NAS vs Cloud, might be the best choice.

In the article, Scott Morley, Principal Application Architect at OneNeck, told Edwards, “Both have a place in a comprehensive backup approach, and the business requirements around recovery time objective [RTO], recovery point objective [RPO] and long-term retention should drive the decision on when to use which.”

With more than 20 years of IT and business experience, Morley has expertise working with Microsoft Dynamics AX and Azure solutions in the areas of architecture, performance engineering, application integration and leveraging hybrid cloud solutions. When it comes to NAS vs. cloud-based back-up, Morley suggests NAS allows for a much shorter backup window because the data copy will be local.

John Hein, Product Director added, “Even if a cloud-based solution is selected exclusively, some amount of local storage needs to be planned for, to keep backup windows small and allow for a trickle copy to the cloud. The same is true for a restore. Copying hundreds of Gigs across a WAN or internet connection will not meet most company’s RTO. An improved or dedicated network connection may be required for cloud-based solutions.”

NAS vs Cloud backup- 5 factors to consider:

  1. Security: Both can be made equally secure; maintaining native encryption is the key.
  2. Cost: Cloud storage is among the cheapest components in the cloud, so cloud generally wins here. It also offers near infinite capacity without need for additional hardware.
  3. Reliability: Storage reliability is typically much greater with a cloud backup solution since it can be configured for geo-redundancy; most major cloud providers also offer a 5+ 9s SLA on storage.
  4. Accessibility: Because they are local, NAS solutions are generally more accessible; however, in the case of a local disaster, a cloud solution will be available almost immediately, at any location, with an internet connection.
  5. Control/ownership: A NAS solution comes with a guarantee of control and ownership, though version upgrades can make existing backups unusable or in need of conversion. On the other hand, cloud backup solutions are generally provided by companies that guarantee access and ownership of data; they are also generally simpler to use, which reduces the need for specialized management knowledge.

As IT leaders review the options, Morley points out, “NAS and cloud-based backups have complementary strengths and weaknesses and a hybrid solution will provide the best overall backup strategy. The speed and availability of a NAS solution teamed with the cheap and easily expandable storage of a cloud solution for long-term retention can allow a company to meet most RTO/RPO objectives while keeping storage costs under control.”

]]>
Components of Successful IT Security | OneNeck Solutions https://www.oneneck.com/blog/security/components-of-successful-it-security-practices/ Tue, 27 Aug 2019 18:30:00 +0000 https://www.oneneck.com/blog/security-components-of-successful-it-security-practices/ In its simplest form, compliance is about setting rules and following them, every time. No wavering, no audible—everyone simply follows the rules—every time. Seems easy, but it’s not always. There are many reasons rules are broken (e.g., not paying attention, not listening, forgetting there were rules, etc.). The reason isn’t really that important. What matters […]]]>

In its simplest form, compliance is about setting rules and following them, every time. No wavering, no audible—everyone simply follows the rules—every time. Seems easy, but it’s not always.

There are many reasons rules are broken (e.g., not paying attention, not listening, forgetting there were rules, etc.). The reason isn’t really that important. What matters is what transpires when the rules aren’t followed—compliance is directly impacted. After all, compliance is all about executing on processes, training, documenting and continuous inspection/improvement–every single touch or transaction!

To verify our company is following the rules, we invite third-party vendors to audit our processes annually.

These audits* include HIPAA and HITECH examinations; ISO/IEC 27001:2013 certification; SSAE 18 examinations; and PCI DSS validation. In addition, the Security and Compliance team continuously monitors for new regulations and creates process to comply with them (e.g., GDPR, California Privacy Act, etc.) and performs client-specific audits, such as the NIST SP 800-171.

Every audit is critical and serves a specific niche or need. They include a breadth of frameworks and wide-range of industries and geography. And, there’s often a great degree of overlap with industry-specific audits that our clients must demonstrate compliance with. Therefore, once we scrutinize the scope of the third-party audits we submit to and the scope of the client’s audit requirements, we often find our audits completely fulfill the industry-specific obligations.

quote about SOC2 feedbackFor example, in a recent conversation, a potential client in the mortgage/banking industry referenced needing a partner that could demonstrate FDIC compliance. While OneNeck doesn’t specifically undertake FDIC compliance auditing, while reviewing the FDIC requirements, we demonstrated how our SOC1 and SOC2 attestations (available with an NDA) and ISO/IEC 27001:2013 certification fully meet—and in some cases, exceeded—controls outlined by the FDIC adherence guidelines.

In other situations, clients need audit-verification of technical, physical management, administrative controls, including background checks and annual training. We’re able to validate we meet these requirements based on the annual audits we already participate in

In addition, for clients that leverage us for hosted and managed services or colocation, the compliance and audits directly apply to their IT environment. With these solutions, our experienced professionals will also help address all the technical measures our clients must comply with.

*Upon request, OneNeck can provide these with NDA

Topic: NIST framework cybersecurity

]]>
6 Ways to Relieve “Security Fatigue” https://www.oneneck.com/blog/security/relieve-security-fatigue/ Thu, 15 Aug 2019 00:37:00 +0000 https://www.oneneck.com/blog/security-relieve-security-fatigue/ Do you ever feel that your non-IT co-workers are trying to thwart your security protocols – ignoring software update alerts, opening suspicious emails or not following password best practices? If it seems that way, it might be “security fatigue.” A study from the National Institute of Standards and Technology (NIST) found that 63 percent of […]]]>

Do you ever feel that your non-IT co-workers are trying to thwart your security protocols – ignoring software update alerts, opening suspicious emails or not following password best practices? If it seems that way, it might be “security fatigue.”

A study from the National Institute of Standards and Technology (NIST) found that 63 percent of participants have experienced “security fatigue,” defined as “a weariness or reluctance to deal with computer security.” It’s not that hard to understand.

Technology users get tired and stressed out from the efforts of remembering multiple login credentials, PIN numbers and ever-changing security protocols. The result? Making poor decisions that could result in an intrusion, exposure of sensitive data, loss of reputation or even huge financial losses.

5 “Security Fatigue” Symptoms and Tips to Relieve Them

  1. Reusing passwords. According to a BBC report, people need to remember an average of 22 separate passwords and change them periodically. Yet, 81% of users reuse the same password for different accounts and 36% reuse the password in more than 25% of their online accounts.
    Suggestion: Install a password manager that generates strong passwords, remembers them and stores them in a safe location. The user only needs to remember one set of master credentials, rather than dozens.
  2. Falling prey to phishing. According to Dark Reading, 91% of cyberattacks start with a phishing email. Employees may not know the damage they can cause just by opening an email, downloading an attachment or clicking on a link.
    Suggestion: Proactive companies build a “cybersecurity culture,” in which every single technology user takes personal responsibility for his or her role in guarding against cyber intruders. The necessary ingredients – clear rules and expectations, regular training (and testing) and solid leadership from the C-suite.  
  3. Not using secure connections. It happens all the time. More and more, people work from home or from a coffee shop, maybe using a personal laptop or another device. Unfortunately, they think it’s a nuisance to log into the VPN and connect over unsecured Wi-Fi (on an unsecured device).
    Suggestion: The fix may be as simple as putting a reminder on the device’s startup screen or setting electronic reminders, or possibly simplifying the procedure for users.
  4. Not updating devices and software. Pop-ups about updating software are annoying, disturb workflow and can create anxiety. Time-crunched employees may also put off what they see as a “mundane” task (while you think of WannaCry).
    Suggestion: Security and IT staff should take control of updating as many devices and software as possible, including implementing patches, downloading malware databases and other risk-reducing tasks. 
  5. Not reporting suspicious activities. What if an employee realizes that they have just been tricked by a phishing scam? They may fail to report the incident for fear they will be blamed or be disciplined.
    Suggestion: Employees should be encouraged to flag behaviors immediately, without fear of a punitive response. The organization should view human-error incidents as learning opportunities to educate users and to point IT toward potential procedural improvements.
  6. Outsourcing cybersecurity functions. Given today’s increasingly complex and perilous threat landscape, limited resources and shortage of expertise, keeping up with cybersecurity needs can overwhelm the IT group.
    Suggestion: Consider partnering with a managed services providers (MSP) that specializes in cybersecurity. A security-focused MSP can successfully reduce security fatigue so that both IT and business employees will make better decisions when cybercriminals come to call.

Want to learn more about building a cybersecurity framework that will keep your business safe?

2017-01-25_SecurityFatigue_WP-Icon.pngDownload our white paper: A Framework for Cybersecurity and Compliance: What You Can Learn from NIST SP-800-171.

]]>
3 Components of Hyperscale Cloud Environment https://www.oneneck.com/blog/cloud/hyperscale-cloud-environment-different-for-small-mid-size-business/ Tue, 06 Aug 2019 19:15:00 +0000 https://www.oneneck.com/blog/cloud-hyperscale-cloud-environment-different-for-small-mid-size-business/ When it comes to setting up and running a cloud-based IT environment, businesses of all sizes (including small and mid-sized companies) can benefit from leveraging a hyperscale cloud.  While the hyperscale cloud environment does not differ based on company size, the speed of change, availability and connectivity requirements delivered in this environment can make it […]]]>

When it comes to setting up and running a cloud-based IT environment, businesses of all sizes (including small and mid-sized companies) can benefit from leveraging a hyperscale cloud

While the hyperscale cloud environment does not differ based on company size, the speed of change, availability and connectivity requirements delivered in this environment can make it more difficult for smaller companies, with already lean IT resources, to maintain the required specialized knowledge.

To prevent the lean IT resources from wasting time with hyperscale cloud issues, there are three components that must be put in place: governance, automation and log analytics.

  • Governance is the number one limiter in unexpected cloud cost growth. The ease of cloud deployments is enticing to mid-sized companies as they can distribute some work to power users. With the right discipline and monitoring around new and unused resources, this is a great benefit. Without it, costs will continually grow.
  • Automation will allow admins to focus on business initiatives instead of infrastructure. Auto scaling, spin up/down of intermittent workloads and even security automation, such as conditional access, can make an environment extremely robust while limiting admin interaction.
  • Analytics is the glue that will enable admins to quickly react to changes in their environment. Without it, maintenance of a cloud environment is cumbersome and will lead to wasted time and money.

The above requirements are true for any size company; however larger companies can employ dedicated resources to manage them, and mid-market companies often must rely on their current resources. For smaller companies, working with a knowledgeable partner is crucial to fully understanding the capabilities, implementation, and then keeping pace with new features that can improve overall management.

——–

Want to learn more about success in a multi-cloud world? Check out these resources from leading cloud experts.

]]>
Reasons to Backup Office 365 | Cloud-Based Data Backup https://www.oneneck.com/blog/managed-services/reasons-to-backup-office-365-cloud-based-data/ Tue, 30 Jul 2019 19:00:00 +0000 https://www.oneneck.com/blog/managed-services-reasons-to-backup-office-365-cloud-based-data/ I need backup for Office 365? Isn’t it already included?  In short, no. The misconception that Microsoft fully backs up your data on your behalf is all too common.  To the contrary, Microsoft is primarily focused on managing the infrastructure and ensuring uptime; you are responsible for your data. According to 451 Research, data backup […]]]>

I need backup for Office 365? Isn’t it already included?  In short, no. The misconception that Microsoft fully backs up your data on your behalf is all too common.  To the contrary, Microsoft is primarily focused on managing the infrastructure and ensuring uptime; you are responsible for your data.

According to 451 Research, data backup remains one of the key principles in data protection for several reasons, and while SaaS vendors focus on providing infrastructure resiliency and application availability for their own platform, the traditional 3-2-1 backup rule still applies as a best practice for ensuring data protection and resilience.

Bottom line, businesses using Office 365 need to backup their data and here’s why:

Critical Reasons to Backup Office 365

Veeam, a data backup and recovery, data protection and data security company and OneNeck partner, surveyed hundreds of IT professionals across the globe who have migrated to Office 365, six vulnerabilities in data protection rose to the top in their findings:

  1. Accidental Deletion- If you delete a user, whether you meant to or not, that deletion is replicated across the network, along with the deletion of their personal SharePoint site and their OneDrive data.
  2. Retention Policy- Gaps & Confusion- Office 365 has limited backup and retention policies that can only fend off situational data loss and is not intended to be an all-encompassing backup solution.
  3. Internal Security Threats- Businesses experience threats from the inside, and they are happening more often than you think. Organizations fall victim to threats posed by their very own employees, both intentionally and unintentionally.
  4. External Security Threats- Malware and viruses, like ransomware, have done serious damage to organizations across the globe. Not only is company reputation at risk, but the privacy and security of internal and customer data as well.
  5. Legal and Compliance Requirements- Legal requirements, compliance requirements and access regulations vary between industries and countries, but fines, penalties and legal disputes are three things you don’t have room for on your to-do list.
  6. Managing Hybrid Deployments & Migrations to Office 365 – Organizations that adopt Office 365 typically need a window of time to serve as a transition window between on-premises Exchange and Office 365 Exchange Online. Some even leave a small portion of their legacy system in place to have added flexibility and additional control. These hybrid email deployments are common yet pose additional management challenges.

Comprehensive Backup from A Trusted Partner

We’ve worked with many organizations to safeguard their data with a flexible, secure and efficient cloud-based backup and recovery service your business can rely on.

OneNeck can enable and support your Office 365 backups helping to eliminate the risk of losing access and control over your Office 365 data.  Our backup solution give you the power to securely backup Office 365 and:

  • Protect your Office 365 data from accidental deletion, security threats and retention policy gaps
  • Quickly restore individual Office 365 email, files and sites with industry-leading recovery flexibility
  • Meet legal and compliance requirements with efficient eDiscovery of Office 365 items

Let us help you gain complete access and control of your Office 365 data and avoid the unnecessary risks of data loss. Contact us today!

Topic: Microsoft Office 365

]]>
Understanding Software-Defined WAN https://www.oneneck.com/blog/datacenter-colocation/understanding-software-defined-wan/ Tue, 18 Jun 2019 16:00:00 +0000 https://www.oneneck.com/blog/datacenter-colocation-understanding-software-defined-wan/ Bandwidth needs are skyrocketing. To meet the growing demand, there is a transition underfoot to move away from traditional the wide area network (WAN) to the software-defined wide area network (SD-WAN). According to IDC, SD-WAN technology is projected to exceed $6 billion in revenue by 2020. SD-WAN promises great change, and adoption is gaining traction, […]]]>

Bandwidth needs are skyrocketing. To meet the growing demand, there is a transition underfoot to move away from traditional the wide area network (WAN) to the software-defined wide area network (SD-WAN). According to IDC, SD-WAN technology is projected to exceed $6 billion in revenue by 2020. SD-WAN promises great change, and adoption is gaining traction, but understanding how you can deploy it to benefit your organization is still evolving for many organizations.

Software-Defined WAN Explained

Using virtualization and network overlays to deliver better connectivity, reduce complexity and lower overall costs, SD-WAN is an alternative approach to designing and deploying enterprise WANs. In a traditional WAN, local and corporate networks are connected via proprietary hardware or fixed circuits. SD-WAN moves that network into the cloud, using a software approach, adopting a more application-centric model rather than relying on the traditional hop-by-hop routing.

The goal is to simplify the WAN setup so that an administrator only needs to plug in a cable for the appliance to contact the central controller and receive the configuration. The aim is to eliminate dependency on private WAN technologies like MPLS, which are notorious for long provisioning times and expensive contracts.

There is a growing interest in SD-WAN as users increasingly access applications via the cloud, diminishing reliance of dedicated pipes to on-premises data centers. Even with its rising popularity, many larger enterprises are still reluctant to fully adopt the solution and are expected to deploy a hybrid WAN architecture.

While SD-WAN is still evolving, it is gaining traction in the marketplace because of these emerging advantages:

  • Improved Performance
    The latest SD-WAN technologies leverage end-to-end network visibility and feedback to improve transmission efficiency with minimal lag time. SD-WANs can identify the quickest path from source to destination in real time and re-route packets accordingly. Routing decisions are made based on data, such as latency and applied QoS policies.
  • Hard and Soft Cost Savings
    In a traditional WAN, hard costs often include the hardware, such as the routers. SD-WAN runs in the cloud and relies significantly less on physical hardware. SD-WAN also reduces soft costs by cutting down on the number of engineer hours required by easing WAN management.
  • Increased WAN Resilience
    SD-WAN increases WAN resilience; it proportionately aggregates capacity, making the bandwidth available to all applications. It’s also able to split traffic for a single application across multiple paths for improved throughput. This assures optimal packet delivery with multipathing and error correction.

Is SD-WAN Right for You?

SD-WAN’s most vital benefit is that its architecture is better suited for the demands of mobile and real-time applications, and most importantly, it’s often better at meeting the demands of the cloud. However, while SD-WAN can reduce the cost and complexity associated with the traditional WAN, enterprise IT departments will need to decide whether SD-WAN is an investment worth pursuing based on a variety of factors including:

  • Is your organization spending increasingly more time and overhead on connectivity on a consistent basis?
  • Is your WAN providing the desired resilience for anytime, anyplace computing?
  • Are you experiencing difficulty getting good performance on demanding applications with your existing WAN?
  • Is your WAN able to serve the needs of divergent applications from a performance, compliance and security standpoint?

If you answered in the affirmative to most or all of the above questions, then maybe it’s time to consider SD-WAN. If you are unsure if SD-WAN is the right fit for your organization, read our SD-WAN hype or reality eBook to gain more information.


SD-WAN - Hype or Reality?

]]>
Enhance IT Security with Analytics-Driven SIEM https://www.oneneck.com/blog/security/enhance-it-security-with-an-analytics-driven-siem/ Thu, 06 Jun 2019 19:00:00 +0000 https://www.oneneck.com/blog/security-enhance-it-security-with-an-analytics-driven-siem/  Finding a mechanism to collect, store and analyze security only data is relatively simple. There is no shortage of options for storing data. Collecting all security relevant data and turning all that data into actionable intelligence, however, is a whole other matter. According to splunk, an analytics-driven security solution provider, many enterprise IT organizations that […]]]>

 Finding a mechanism to collect, store and analyze security only data is relatively simple. There is no shortage of options for storing data. Collecting all security relevant data and turning all that data into actionable intelligence, however, is a whole other matter.

According to splunk, an analytics-driven security solution provider, many enterprise IT organizations that invested in security event information management (SIEM) platforms have discovered this fundamental truth the hard way. The data available to analyze is based only on security events. That makes it difficult to correlate security events against what’s occurring across the rest of an IT environment. When there’s an issue, investigating a security event takes precious time most IT organizations can’t afford. In addition, the SIEM system can’t keep pace with the rate at which security events need to be investigated.

Not All SIEMS Are Created Equal

As noted above,  a legacy SIEM solution can’t keep pace with the rate at which security events need to be investigated.

splunk outlines some of the known issues with legacy SIEM solutions which include:

  • Limited data ingestion capabilities
  • Complex deployment and maintenance

  • Inflexible search, correlation and visualization capabilities

  • Lack of scalability

  • Limited analytics capabilities

Enterprise IT requires wider and deeper insights to identify emerging threats and attacks to help eliminate so many of the manually-driven tasks that are weighing IT security pros down.  Enter an analytics-driven SIEM solution

Analytics-Driven SIEM

An analytics-driven SIEM will connect the dots faster to help predict patterns, identify suspicious behavior, and automate corrective actions in real time so that IT can respond quickly to incidents and damage can be avoided or limited. According to splunk, a modern, analytics-driven SIEM solution needs to have the following 7 capabilities:

splunk

The Advantage of a Managed SIEM

OneNeck partners with the best, like splunk, to deliver solutions that can help optimize IT and enhance security.We can help you implement, monitor and maintain your SIEM solution.

And, our managed SIEM service offers scalable, real-time security monitoring and analysis to our customers to detect threats and meet compliance requirements

Speak with a OneNeck security specialist today about how our comprehensive approach to SIEM can protect your data and your business.

 

]]>
How to Create Effective Defense Against Cybersecurity https://www.oneneck.com/blog/security/strong-external-security-for-effective-it-cybersecurity/ Tue, 04 Jun 2019 18:44:00 +0000 https://www.oneneck.com/blog/security-strong-external-security-for-effective-it-cybersecurity/ Creating a strong external security posture is critical. But what can businesses do to protect their data and environments? Concerns about security are escalating. Nearly every day, new malicious attacks, Phishing attempts and malware are identified. In addition, new vulnerabilities, such as the exploitable vulnerability recently identified by Microsoft, continue to be discovered. It all […]]]>

Creating a strong external security posture is critical. But what can businesses do to protect their data and environments?

Concerns about security are escalating. Nearly every day, new malicious attacks, Phishing attempts and malware are identified. In addition, new vulnerabilities, such as the exploitable vulnerability recently identified by Microsoft, continue to be discovered. It all leads to the same challenge: How do you create a strong security posture to protect your business?

Leveraging the Center for Internet Security’s (CIS) Critical Security Controls is a solid place to start and is part of the evaluation provided with OneNeck’s vCISO service. The controls—which OneNeck leverages to complete annual security assessments and third-party audits—are a series of cybersecurity actions prioritized by their criticality in preventing cyberattacks. In particular, the first six controls (referred to as the Basic Control set) focus on cybersecurity “hygiene.” Studies show that implementation of these first six CIS Controls can provide an effective defense against about 85 percent of the most common cyberattacks.

Basic_CIS_Controls

In addition to leveraging the CIS controls, using third-party penetration (pen) testers offers businesses a way to ensure the controls put in place are effective. OneNeck leverages third-party pen testers at least annually. A recent pen test revealed OneNeck has “Strong External Network Security Controls” in place and that our systems and services are well-patched and maintained.

In large part, this positive commentary is due to the fact that we scan our external facing services multiple times a month. We also perform detailed internal security scans, which provide a holistic understanding of the security of our environment. Don’t take our word for it though; contact your Account Executive to request a copy of our penetration test report.

Security Rating Services (SRS) reports are another tool many businesses rely on to evaluate the security practices put in place by potential IT partners. Generated by companies such as Bitsight and RiskRecon, the SRS reports are similar to a “credit score” in that the scores vary based on the data available. Instead of reporting on a provider’s full environment, SRS reports only include external facing data (e.g., web servers that face the internet). In fact, a provider’s internal practices are completely overlooked, primarily because the SRS aggregators don’t have access to a provider’s internal-facing data.

In addition, most SRS reports assess all IP addresses assigned to a company through ARIN. For a company like OneNeck, because we offer colocation services, we have IP addresses assigned to company-owned and controlled devices AND customer-owned and customer-managed devices. In these instances, where the customer owns and manages their devices, OneNeck does not have authority to access or make changes to devices. This scenario became very evident recently. An SRS report identified more than 2,000 IP addresses (affiliated with OneNeck) had been scanned; however, nearly two-thirds belonged to customers in which OneNeck did not have access or authority to make changes to their environment. Of the OneNeck controlled devices, all of the vulnerabilities had been previously discovered through our own internal scanning and being actively addressed or retired. 

The bottom-line: Creating a strong external security posture is critical. There are many tools and steps businesses can leverage to protect their data and environments. As, always, it’s important to understand the details, verify the reports, and ensure equivalent data is being compared.

——–

Want to learn more? Check out additional security resources
here
.

]]>
Cost of Public Cloud | Computing Service Provider https://www.oneneck.com/blog/cloud/how-much-does-public-cloud-cost-service-provider/ Wed, 29 May 2019 19:15:00 +0000 https://www.oneneck.com/blog/cloud-how-much-does-public-cloud-cost-service-provider/ When it comes to moving to the cloud, businesses of all sizes are feeling the pressure. On one hand, the capabilities offered by the cloud are too good to ignore. If you don’t take advantage of the cloud’s flexibility and scalability—and its ability to support artificial intelligence, automation, real-time business analytics and more—you can bet […]]]>

When it comes to moving to the cloud, businesses of all sizes are feeling the pressure. On one hand, the capabilities offered by the cloud are too good to ignore. If you don’t take advantage of the cloud’s flexibility and scalability—and its ability to support artificial intelligence, automation, real-time business analytics and more—you can bet that your competitors will. A Cloud Vision 2020 survey estimates that by the year 2020, 83% of the enterprise workload will be in the cloud—with almost half of that (41%) in the public cloud.

On the other hand, a move to the cloud is not to be taken lightly. The time, cost and potential risks involved in a change of this magnitude can be significant—and there are no guarantees. Many companies are hesitating, knowing they must make the jump at some point, but needing assurance that their approach will propel them into a brighter future rather than miring them in unexpected expenses and delays.

The most common question asked by potential cloud customers is, “How much does the public cloud cost?” The answer is…it depends. You’ll need to ask yourself a few other questions before you can get an answer that you can take to the bank—or to the board. Several important factors influence the cost of migration. Companies that overlook these factors can seriously sabotage their cloud migration and waste a lot of money in the process. In fact, according to the RightScale 2019 State of the Cloud Report from Flexera, cloud users today are wasting a whopping 35% of their investment.

Here are the four important questions you’ll need to answer before you’ll be able to get a solid estimate of your costs:

1. How much connectivity will you need?

Connectivity is the biggest unknown in moving to the cloud, and it can have the biggest impact on cost—potentially up to 20% of your entire monthly bill. Yet when estimating cloud workload, many companies overlook the cost of connectivity. For example, if your current workloads are in your on-premises data centers, close to your users, you don’t incur any provider connectivity fees in most cases. But if you move those applications and workloads to the cloud, those same users will now have to connect to the cloud to do their jobs, which involves connectivity fees you didn’t have to account for before. Not only that, cost estimates from public cloud vendors don’t include those fees. To really know what connectivity will cost you, you’ll need to know as accurately as possible the amount of traffic that will be going to the cloud and what you’ll be charged for it. And keep in mind that unlimited connectivity can be very expensive unless you maintain continuous utilization over about 60% of the bandwidth.

2. What’s your governance model?

After your company has completed its cloud migration, if you’ve done a good job of evangelizing the new cloud strategy and trained your workforce, you may find that everyone is pretty excited about it. Although that’s a good thing, you can end up with too much of that good thing—and it can cost you. If you’re not careful, before you know it, lots of users are spinning up virtual machine (VM) instances, and things are out of control. Without governance―those important, clearly defined, well-communicated and tightly controlled cloud usage parameters―unbridled usage could amplify your costs by two or three times your original projections. Don’t let “cloud sprawl” break your budget. Check out these helpful hints for good data governance.

3. What type of software platform are you using?

Take a close look at the current makeup of your environment. Workloads that are currently running on legacy software could be exponentially more expensive to support in the cloud when compared to cloud-ready workloads. Also take into consideration the interdependencies among your applications and processes—you’ll need to decide how to split up or containerize your workloads. If you only want to move some of your workloads, be aware that you’ll incur additional connectivity fees to keep your on-premises data connected to your cloud assets. And before you make any decisions on splitting up workloads like this, be sure to test the latency between these workloads to ensure you maintain the proper user experience and connectivity of all components.

4. How certain are you about the cloud user experience?

When moving to the cloud, you’ll want your user experience to be the same as or better than it is on-premises, for the same or a lower cost. Focusing on the user experience will help ensure that your cloud migration will be a success. For example, delivering a consistent user experience across cloud and on-premises environments can streamline training and interdepartmental processes. Rather than making a massive (and expensive) cloud migration all at once, it’s better to start small with a pilot or proof of concept so you know what the experience will be.

A pilot can also help you avoid a very expensive mistake. For example, some companies have moved their workloads to the cloud, only to discover that having those workloads in the cloud was too expensive. Unfortunately, it’s even more expensive to get those workloads back out of the cloud in some cases. If your business can’t easily absorb the costs of the downtime required to shift workloads back on-premises or to another provider, you need to make sure that you not only choose the right workloads to go to the cloud, but also make sure you have identified your exit strategy from the cloud before entering it―should you need to invoke it.

The Cost of Failing to Do Your Due Diligence

Here’s a true story about one company that entered into its cloud migration without considering these factors. The company didn’t have any rules around cloud usage, its server allocation wasn’t designed to meet its needs, and connectivity costs weren’t even on its radar. Within one month, the company’s anticipated monthly cost projection skyrocketed from $60,000 to $150,000. The company wanted to pull its data back out of the cloud but learned it would cost another $180,000 to $200,000 to do that. Luckily, OneNeck was  able to help the company optimize its cloud usage and brought its costs down to around $75,000 monthly. That was a painful and roundabout way to get to cloud optimization.

How do you make sure you have the right answers to these four questions before you move to the cloud? As part of our discovery and design sessions, we do very thorough due diligence based on these four factors, to make sure that you have the best estimate of your ongoing public cloud costs.

Moving to the cloud can be a great thing for your business, and it doesn’t have to break the bank. Just make sure you’ve asked all the right questions ahead of time.

]]>
Evolving Expectations for NMS https://www.oneneck.com/blog/evolving-expectations-for-nms/ Tue, 21 May 2019 01:23:00 +0000 https://www.oneneck.com/blog/evolving-expectations-for-nms/ The landscape for Network Managed Services (NMS) providers continues to become more challenging, especially as application, management and compliance requirements keep evolving. Proactive support is a core component. At the same time, IT budgets for small- and medium-sized businesses keep shrinking while there is heightened focus on finding ways to squeeze more productivity out of […]]]>

The landscape for Network Managed Services (NMS) providers continues to become more challenging, especially as application, management and compliance requirements keep evolving. Proactive support is a core component. At the same time, IT budgets for small- and medium-sized businesses keep shrinking while there is heightened focus on finding ways to squeeze more productivity out of limited resources.

NMS can provide a path for existing staff to spend more time in proactive, business-oriented pursuits vs. mundane, reactive tasks. In this CIOReview article, Brian Clarke, Solutions Architect—Networking and Collaboration, describes the Application Landscape, Network Management and Visibility, and Compliance Requirements. He also details how much of it should be the responsibility of an NMS provider.

—————————

Brian Clarke is a Solutions Architect of Networking and Collaboration at OneNeck® IT Solutions. In this role, Brian works with customers to clarify needs, identify potential solutions and provide ongoing support to ensure their continued trust and confidence in the OneNeck partnership. Brian is primarily responsible for designing Cisco-based network-related solutions, including Enterprise Networking, Data Center and Collaboration services. Brian joined OneNeck in 2010 with more than 20 years of experience in the IT industry.

]]>
Older Windows Systems Beware of CVE-2019-0708 https://www.oneneck.com/blog/older-windows-systems-beware-of-cve-2019-0708/ Thu, 16 May 2019 21:27:00 +0000 https://www.oneneck.com/blog/older-windows-systems-beware-of-cve-2019-0708/ Are you running an older version of Windows and not current with your patch management? If so, you need to be aware of a recent exploitable vulnerability that just hit the news this week. Here’s what you need to know… Microsoft released fixes for a critical Remote Code Execution vulnerability, CVE-2019-0708, in Remote Desktop Services – formerly known […]]]>

Are you running an older version of Windows and not current with your patch management? If so, you need to be aware of a recent exploitable vulnerability that just hit the news this week. Here’s what you need to know…

Microsoft released fixes for a critical Remote Code Execution vulnerability, CVE-2019-0708, in Remote Desktop Services – formerly known as Terminal Services – that affects some older versions of Windows. The Remote Desktop Protocol (RDP) itself is not vulnerable. This vulnerability is pre-authentication and requires no user interaction.

Simon Pope, director of incident response for the Microsoft Security Response Center wrote, ” In other words, the vulnerability is ‘wormable’ – meaning that any future malware that exploits this vulnerability could propagate from vulnerable computer to vulnerable computer.”  He also stated, “While we have observed no exploitation of this vulnerability, it is highly likely that malicious actors will write an exploit for this vulnerability and incorporate it into their malware,”

Because of the severity of the vulnerability Microsoft is providing a patch for out of support systems, such as Windows XP and Windows 2003.

Customers running Windows 8 and Windows 10 are not affected by this vulnerability.

Vulnerable systems include:

  • Windows XP
  • Windows 2003
  • Windows 7
  • Windows 2008 R2 and Windows 2008

If you’re still unsure that you’re protected, OneNeck’s security experts are here to help.

 

References

]]>
Security vs Compliance | IT Security Services https://www.oneneck.com/blog/security/security-vs-compliance-it-services/ Thu, 16 May 2019 19:00:00 +0000 https://www.oneneck.com/blog/security-security-vs-compliance-it-services/ It’s no secret… security attacks are the rise: Within the past year, leading global companies have seen sales and revenue impacts as high as $300 million due to malware-based cyberattacks. By 2021, at least one company will publicly acknowledge a $1 billion revenue impact from a business outage resulting from a malware/ransomware attack. Mobile malware […]]]>

It’s no secret… security attacks are the rise:

  • Within the past year, leading global companies have seen sales and revenue impacts as high as $300 million due to malware-based cyberattacks.
  • By 2021, at least one company will publicly acknowledge a $1 billion revenue impact from a business outage resulting from a malware/ransomware attack.
  • Mobile malware is more than doubling each year, reaching levels where it can no longer be ignored. By 2019, mobile malware will amount to one-third of total malware reported in standard tests, up from 7.5% today.

To combat cybercrime, the Federal Government has released numerous compliance regulations designed to protect data and systems including Federal Information Security Modernization Act (FISMA) and Health Insurance Portability and Accountability Act (HIPAA).

Further, many industries also define requirements. Adherence to these regulations and industry standards such as Payment Card Industry compliance (PCI), is a requirement for doing business in a global market.

The result, blurred lines between security vs compliance.  This article aims to clear up the misconceptions between the two and provide tips to help your organization strike a balance between being compliant and being secure.

Clearing Up the Misconceptions

Security Compliance

Many organizations have the mindset that being compliant makes them fundamentally secure. Unfortunately, that is not the case. Compliance regulations are not security programs. Compliance demonstrates how well your organization meets security-related requirements of specific regulatory standards like PCI or HIPAA.  Security on the other hand, is a collection of controls designed to mitigate risk and protect your data and applications from threats.

You can be compliant, but that doesn’t mean you’re secure.

“Checkbox Mentality”

Relying on merely checking the box and being compliant will not keep you secure and puts your business at serious risk. Why? Compliance mandates are general guidelines, but do not reflect what individual companies need in terms of security.

In addition, compliance requirements are mostly reactive versus proactive in nature, often changing slowly and predictably. The security/threat landscape however, is constantly evolving. As a result, many compliance mandates are a few steps behind the most current threats.

Compliance is a blueprint for my security strategy

Your security strategy should be built from the ground up, based on your unique needs and centered around security principles, rather than regulatory mandates. In addition, it should include considerations in regard to how your overall business views risk.

According to Jim Kennedy, contributing author at CSO magazine, many organizations are opting to define security policies based on regulatory requirements, however the result is that their security postures become very quickly out of date. Not only are regulations typically at least 24 months old by the time they are implemented, but a compliance-only approach provides hackers with an ‘access blueprint’ – as weaknesses in the security model that are not covered by regulation are clearly visible.

Finding Alignment

Addressing security vulnerabilities and the demands of regulatory compliance isn’t an easy feat. To truly protect sensitive data, both security and compliance are critical. Without a smart, thorough and active security program, coupled with a solid compliance plan, you’re at significant risk of being breached. And, while seemingly very different, security and compliance can work in harmony to achieve a common goal- ensuring the privacy and protection of your sensitive data.

A structured approach to security and compliance starts with understanding security, risk  and  requirements unique to your business and your industry, measured against defined areas for assessment

Katie McCullough, Chief Information Security Officer here at One Neck, outlined the following basic principles:

Document Your Processes

Documentation is a key element of compliance and security. If it’s not documented, then it’s not really happening. Neglecting to document guarantees that the security and compliance programs will never function in unison as one.

Train

Training your user base to adhere to security and compliance best practices is a must. Develop an awareness training program that provides users with education on policies and procedures.

Measure Effectiveness

Make sure you are measuring effectiveness of your security and compliance initiatives. Measure process performance and controls against your established guidelines.

Improve Processes

Implement a continuous improvement process. By leveraging the metrics obtained when measuring your performance, you can facilitate continuous improvement by applying corrective actions based on your observed measurements.

OneNeck Has You Covered

Clearly understanding where you are and what vulnerabilities exist can save significant time, money and distress down the road when under attack or trying to achieve compliance. Don’t go it alone. We’re here to help you stay safe from emerging risks that leave you exposed, while allowing you to maintain a balance of productivity and operational effectiveness.

For more information, read our Framework for Cybersecurity and Compliance white paper.

]]>
SDN Re-emergence for Network Efficiency https://www.oneneck.com/blog/managed-services/the-re-emergence-of-sdn/ Tue, 14 May 2019 18:16:00 +0000 https://www.oneneck.com/blog/managed-services-the-re-emergence-of-sdn/ Software Defined Networking (SDN) has been around for almost two decades. The concept was extraordinary and innovative then, but could be considered less-so in 2018. While the excitement surrounding this concept has aged a bit, real-world benefits and outcomes are emerging and bringing renewed interest.  Find out how Adam describes the re-emergence of SDN benefits […]]]>

Software Defined Networking (SDN) has been around for almost two decades. The concept was extraordinary and innovative then, but could be considered less-so in 2018. While the excitement surrounding this concept has aged a bit, real-world benefits and outcomes are emerging and bringing renewed interest.

 Find out how Adam describes the re-emergence of SDN benefits and outcomes in this CIOReview article

_____________________________________________________________

 

Adam Gray is a Solutions Architect – Enterprise Networking at OneNeck® IT Solutions. He is a Cisco Certified Internetwork Expert (CCIE) with nearly a decade of experience working in many facets of the IT infrastructure industry including deployment and managed services, and most recently, infrastructure design and architecture. He spent several years working within the data center infrastructure world including servers, storage and virtualization. More recently, Adam has focused on advanced routing and switching design, SD-WAN and data center networking solutions. He joined OneNeck in 2011 and currently spends his time helping customers navigate the ever-changing landscape of network infrastructure.

]]>
How MFA Adds IT Security | Multi-Factor Authentication https://www.oneneck.com/blog/security/multi-factor-authentication-explained/ Thu, 09 May 2019 20:00:00 +0000 https://www.oneneck.com/blog/security-multi-factor-authentication-explained/ TeleSign research indicates that the majority of users use five or fewer passwords for all of their accounts. While it may seem efficient for password memory on your end, you could actually create a “domino effect” that allows hackers to take down multiple accounts by cracking one password. There’s and easy more powerful defense out […]]]>

TeleSign research indicates that the majority of users use five or fewer passwords for all of their accounts. While it may seem efficient for password memory on your end, you could actually create a “domino effect” that allows hackers to take down multiple accounts by cracking one password.

There’s and easy more powerful defense out there… enter Multi-Factor Authentication (MFA)

What is MFA?

Multi-factor authentication is based on the concept of requiring multiple forms of identification. It stops easy access with stolen credentials by requiring a second level of authentication after the user enters their username and password.

You’ve probably used MFA before, even if you weren’t aware of it. If a website has ever sent a numeric code to your phone for you to enter to gain access, for instance, you’ve completed a multi-factor transaction.

How Does MFA Work?

According to Duo, typically MFA transaction happens like this:

  1. The user logs in to the website or service with their username and password.
  2. The password is validated by an authentication server, and if correct, the user becomes eligible for the second factor.
  3. The authentication server sends a unique code to the user’s second-factor device.
  4. The user confirms their identity by approving the additional authentication from their second-factor device. 

While the basic processes behind multi-factor authentication are generally the same across providers, there are many different ways to implement it, and not all methods are created equal.

Benefits of MFA

MFA can:

  • Mitigate threats by providing an additional layer of protection
  • Decrease the chance of end user identities (and, subsequently, their IT resources) becoming compromised
  • Enable compliance with industry regulations such as PCI and HIPPA for privileged access to sensitive data

 A Trusted Partner 

 With more and more users accessing their sensitive corporate accounts online, organizations are struggling to keep their sensitive information safe. Multi-factor authentication provides proven protection in a world of increasing threats.  As a managed IT security services provider, OneNeck® IT Solutions is here to guide you, using a multi-layered approach, providing protection at every layer: from the DNS layer, to the network, to the endpoint. Contact us today to learn how to better safeguard your company’s valuable data.  

Topic: NIST Framework Cybersecurity

]]>
Tips for a Well-Architected Cloud | IT Solutions https://www.oneneck.com/blog/cloud/ingredients-of-a-well-architected-cloud/ Tue, 30 Apr 2019 20:00:00 +0000 https://www.oneneck.com/blog/cloud-ingredients-of-a-well-architected-cloud/ There are a lot of opinions to be had about what goes into a solidly-architected cloud. But with so many considerations around reliability, performance and security, too many options can get overwhelming. So, I thought I’d ask one of our resident cloud experts, Derek DeHaan, and get his thoughts on the matter… How would you […]]]>

There are a lot of opinions to be had about what goes into a solidly-architected cloud. But with so many considerations around reliability, performance and security, too many options can get overwhelming. So, I thought I’d ask one of our resident cloud experts, Derek DeHaan, and get his thoughts on the matter…

How would you define a well-architected cloud?

A well-architected cloud optimizes workload performance, reduces overall cost to operate and provides the best user experience possible. This can ultimately be achieved through the correct workload placement (public, private, etc.) and the continued perseverance to achieve cloud optimization through the use of a cloud management platform.

What are the elements that go into a well-architected cloud?

The elements of a well-architected cloud include:

  • automation to optimize cost by only running workloads when they are needed;
  • resiliency at all levels of the architecture—specifically including the infrastructure and application layers;
  • a cloud management platform to view and optimize consumption and thereby reduce expense/cost;
  • governance and security measures to ensure a rock solid perimeter; and
  • access/authentication methods to protect the data.

What’s the best way to achieve a well-architected cloud?

Engaging a service provider or partner who has experience and expertise in providing a well-architected cloud has many benefits…

  • First, they are able to hone in on and define existing application dependencies. They will also perform a thorough inventory of your current infrastructure in order to establish a baseline.
  • Next, they will help analyze where your workloads should go, based on the workload’s characteristics.
  • Then, as you embark on your cloud strategy, they will help migrate your workloads to the best possible platform and can also help manage your cloud.
  • Finally, through optimization and fine-tuning, they will help you put the final touches on a well-executed cloud architecture.

What should IT never do when constructing a cloud architecture?

  • Never assume all workloads are the same.
  • Never forget the business criticality of the application. This drives workload placement and architecture redundancy decisions – and also directly affects cost.
  • Never assume the cost will always be lower in the cloud.
  • Never forget about the network connectivity component of the architecture. User experience is driven by latency to each workload/application.

What are the cloud architecture pitfalls that IT might fall into?

A few common pitfalls, when it comes to cloud architecture include:

  • It is always thought to be cheaper to do it in house.
  • Start down a path and never complete the project due to lack of understanding the end state.
  • No testing ahead of production migration.

_____________________________________________________________

Derek DeHaanDerek DeHaan leads the Hosting Architecture team at OneNeck IT Solutions. He has more than 15 years of experience in IT architecture, data center design and strategy, and data center migration services. Derek has also spent significant time in the software development space while working to develop a thermal and capacity management software platform. His career spans a variety of technical and leadership positions, and includes providing guidance, recommendations and strategic visions for many of the Fortune 500 companies based in the Twin Cities area. Derek has multiple certifications and specializations across a breadth of hardware, software and business application areas.

]]>
What is APM and how is it different from NPM? https://www.oneneck.com/blog/cloud/differences-between-apm-and-npm/ Wed, 24 Apr 2019 20:00:00 +0000 https://www.oneneck.com/blog/cloud-differences-between-apm-and-npm/ Two terms that get thrown around a lot in our industry are APM and NPM, and it seems they are often interchanged (or confused). So, what is APM (Application Performance Monitoring) and how does it differ from NPM (Network Performance Monitoring)? What is APM? APM tools are inherently software-based and usually use agents that monitor […]]]>

Two terms that get thrown around a lot in our industry are APM and NPM, and it seems they are often interchanged (or confused). So, what is APM (Application Performance Monitoring) and how does it differ from NPM (Network Performance Monitoring)?

What is APM?

APM tools are inherently software-based and usually use agents that monitor the application run-time to track performance and connectivity details around application transactions. These details can be used for alerting on slow transactions, troubleshooting and user experience optimization.

What is NPM?

NPM tools on the other hand are agent-less appliances that live on the network, capturing packets and analyzing them as they’re sent over the network. NPM gathers metrics like response times, server and port protocols and route analytics, with the goal of monitoring the health of the network infrastructure.

APM vs NPM or Both?

With the rapid explosion of cloud-based applications and mounting data congestion, there are going to be performance issues which cause slowing on both the applications and the network. This is where network and application visibility can play a critical role in the customer experience (aka, today’s new currency).

With today’s application-centric world, organizations need deeper visibility at the application layer regardless how fast packets are traveling through the network, and NPM can’t necessarily provide the real-time detail your application and DevOps teams need to diagnose, troubleshoot and identify problem root causes. Even though it’s possible to achieve some level of performance monitoring with NPM, you’ll find yourself running into limitations in application visibility pretty fast.

OneNeck’s VP of Advisory Consulting, Jeff Budge sums it up like this… “Overall, the broad advantage of APM is the ability to shift the focus of service delivery measurement by centering it on the user and application. This model differs from traditional bottom-up approaches which focus on disconnected server, network, database, etc. metrics and then attempt to piece meal these and interpret the user experience. In the APM context, IT and the Business initiate conversations on similar footing – the user perspective; and by seeing a common view, become more aligned by allowing this to drive action into the technology stack.”

Who Rules the World? Apps do!

It’s an application-run world we live in today. And your customers aren’t going to settle for less than stellar engagements – and more importantly, they’re loyal to the brands that deliver them. That’s the new reality. An effective APM strategy helps businesses deliver consistently flawless digital experiences by connecting end-user experience and application performance to business outcomes in the most complex, distributed, multi-cloud environments.

]]>
IT Solutions for Disaster Recovery | A Guide for CIOs https://www.oneneck.com/blog/managed-services/disaster-recovery-guide-primer-for-cio/ Thu, 18 Apr 2019 20:00:00 +0000 https://www.oneneck.com/blog/managed-services-disaster-recovery-guide-primer-for-cio/ How can a CIO be confident that IT will perform 24/7/365?  According to Zerto, in today’s always-on, information-driven organizations, IT resilience depends completely on IT infrastructures that are up and running 24/7. The costs of downtime are huge and data loss can put a company out of business. Data loss is not only caused by […]]]>

How can a CIO be confident that IT will perform 24/7/365?

 According to Zerto, in today’s always-on, information-driven organizations, IT resilience depends completely on IT infrastructures that are up and running 24/7. The costs of downtime are huge and data loss can put a company out of business. Data loss is not only caused by natural disasters, power outages, hardware failure and user errors, but more and more by software problems and cybersecurity related disasters.

Therefore, thorough security and business continuity strategies are crucial for modern businesses, minimizing data loss and downtime. Especially now, as data centers become more and more software defined, these private, hybrid and public clouds become more vulnerable to these kinds of threats.

Download Zerto’s Disaster Recovery Guide: Primer for CIOs for insights into the challenges, needs, strategies, and available solutions for disaster recovery, especially in modern, virtualized environments and the public cloud.

A Strategic, Trusted Partner

OneNeck is here to help you maximize uptime, become more efficient and be able to adopt and accelerate with new technologies such as hybrid clouds, while running at the speed of business. We start by conducting a disaster recovery assessment to ensure a planned approach to Disaster Recovery (DR). Taking the time upfront, before implementation, to determine what’s critical to your business and your customers, ensures that you deliver on your commitments no matter what. Then, we tailor our solutions to your situation.  So, breathe easy – we got this. Execute your disaster recovery strategy with OneNeck today.

 

]]>
Multi Cloud vs Hybrid Cloud. What’s the difference? https://www.oneneck.com/blog/cloud/understanding-hybrid-cloud-and-multicloud/ Tue, 16 Apr 2019 23:17:00 +0000 https://www.oneneck.com/blog/cloud-understanding-hybrid-cloud-and-multicloud/ In today’s digital world, terms like hybrid cloud and multi-cloud are thrown around interchangeably.  But there is a difference, and understanding it is key to getting the most out of your cloud strategy. Both hybrid cloud and multi-cloud solutions have their use cases, but a new breed of applications and services is driving the need […]]]>

In today’s digital world, terms like hybrid cloud and multi-cloud are thrown around interchangeably.  But there is a difference, and understanding it is key to getting the most out of your cloud strategy.

Both hybrid cloud and multi-cloud solutions have their use cases, but a new breed of applications and services is driving the need for highly flexible service delivery, pushing multi-cloud to the forefront of today’s cloud conversations. But which approach is most appropriate for your unique needs?

Multi-Cloud vs. Hybrid Cloud: What’s the Difference?

TechTarget defines Hybrid cloud as a cloud computing environment that uses a mix of an on-premises, private cloud and a third-party, public cloud, with orchestration between the two. The intent is to enable the flexible deployment of workloads, applications and data across private and public clouds.

On the other hand, Multi-Cloud refers to a combination of multiple public cloud services and providers.  These aren’t necessarily managed through orchestration software and could very well be separate deployments where never the twain shall meet. 

When Does a Hybrid Approach Make Sense?

While there are still many misconceptions around hybrid cloud, hybrid cloud deployments are frequently found in large enterprises with significant investments in IT infrastructure and large, skilled IT teams. This approach provides the flexibility to leverage the existing IT infrastructure to test a cloud deployment without the risk of making a full switch.

The approach is ideal for organizations that already have a virtualized environment. It allows for a slow migration to the cloud by retiring old equipment as it reaches end-of-life and using an orchestration solution to switch virtualized workloads.

But… Multi-Cloud Sounds Good Too.

It’s hard to argue with one of the big benefits of mult-cloud – CHOICE. The ability to operate from anywhere and move and deploy workloads to any cloud brings a plethora of options to a cloud strategy. You don’t have to change your business requirements to fit a specific provider’s processes, but multi-cloud allows you to shop around and find a provider that matches each part of your business.

One of the big benefits of a multi-cloud approach is the risk of being locked into a single cloud provider can be avoided. If you’re not housing all your data, apps and workloads with a single cloud vendor, you’re not at the mercy of that provider’s pricing and exit fees, or should you outgrow them, you’re not locked into just their cloud.

Additionally, we all acknowledge the reduced capital expenses that cloud offers, but downtime can be extremely costly to the bottom line. This is where finding the right cloud provider for specific areas of your business can help alleviate costly downtime – cloud provider services can vary, so the right combination of providers can be the ideal mix for your business needs, not to mention that in the case a provider fails, you’re not locked into just one cloud.

Businesses that are less locked down in terms of technology have more freedom to rapidly grow (and shrink) technology services in alignment with business need. Those businesses will have a lot more options and flexibility. This is perhaps the most compelling business case for a multi-cloud environment which incorporates multiple cloud vendors.

Is Hybrid Cloud or Multi-Cloud Right for You?

Ultimately, for most organizations it’s a combination of hybrid and multi-cloud that offers true flexibility in terms of cost, resilience and elasticity – especially for enterprises with existing on-premise data centers or private-cloud deployments. There is no “one size fits all” in a multi-cloud world, so no need to force-fit your workloads into one cloud. After all, your cloud starts with YOU.

Ready to look for a multi-cloud provider?  Get practical advice from this eBook.


Selecting a Best-In-Class Multi-Cloud Provider

]]>
How to Protect the Enterprise from Credential Stuffing https://www.oneneck.com/blog/security/what-is-credential-stuffing-how-to-protect-the-enterprise/ Tue, 26 Mar 2019 19:00:00 +0000 https://www.oneneck.com/blog/security-what-is-credential-stuffing-how-to-protect-the-enterprise/ Credential stuffing is a type of cyber-attack where hackers take combinations of usernames and passwords leaked from other sites and use them to gain access to accounts on another site.  F5 states that there’s typically a 1 to 2 percent success rate, which means that if a cybercriminal purchases 1 million stolen credential records (for sale […]]]>

Credential stuffing is a type of cyber-attack where hackers take combinations of usernames and passwords leaked from other sites and use them to gain access to accounts on another site.  F5 states that there’s typically a 1 to 2 percent success rate, which means that if a cybercriminal purchases 1 million stolen credential records (for sale on the dark web for fractions of a cent each), they can generally gain access to 10,000 to 20,000 accounts.

Costly Ramifications

In a recent Ponemon Institute survey, respondents cited that these attacks cause costly application downtime, loss of customers and involvement of IT security that can result in an average cost of $1.7 million, $2.7 million and $1.6 million annually, respectively.

In addition, the companies represented in this research estimate that the monetary cost of fraud due to credential stuffing attacks can range from an average of more than $500,000 if 1 percent of all compromised accounts result in monetary loss to more than $54 million if 100 percent of all compromised accounts result in monetary loss.

Main Culprits

Password reuse.  According to Keeper Security, as many as 87 percent of people reuse the same password across multiple accounts. And while they may not share passwords with others, they use them across multiple websites, making it easy for cyber-criminals to break into the various accounts with the same password.  In addition, Ponemon also states that companies are vulnerable to credential stuffing attacks because:

  • It’s difficult to differentiate the criminal from the real customers, employees and users who have access to the companies’ websites.
  • Migration to the cloud is an important IT strategy, but it increases the risk of credential stuffing attacks.
  • Companies do not have sufficient solutions or technologies today for preventing and/or containing credential stuffing attacks.

How Can Companies Prevent/Mitigate Credential Stuffing Attacks?

Companies who wish to prevent credential stuffing attack must take a layered security approach.

  1. Web Application Firewall – Your First Line of Defense

A robust web application firewall (WAF) is the first line of defense against credential stuffing attacks. A WAF can provide advanced bot detection and prevention. By analyzing behavior, such as IP location, time of day, and connection attempts per second, a WAF can help you identify non-browser login attempts.

  1. Embrace Multi-Factor Authentication

Multi-Factor Authentication works to thwart credential stuffing by requiring additional information or credentials from the user to gain access to corporate data.  MFA doesn’t stop all types of attacks, and it doesn’t guarantee security, but it does add additional layers of authentication that make cyberattacks more difficult.

  1. Educate Your Employees

Empower your users with some password management best practices. According to F5, the most significant takeaway for your employees is that no one should ever use network login credentials on any third-party site, because if that site is compromised, then cybercriminals will have access to your corporate network and any applications within.

Don’t Go At It Alone

OneNeck’s offers extensive cybersecurity expertise. We identify the gaps and provide remediation guidance, and a roadmap to face the future with confidence. In today’s accelerated world, you need a partner that helps keep you safe — so you can stop wondering if everything’s alright.

]]> The Data Onslaught with Digital Transformation https://www.oneneck.com/blog/managed-services/digital-transformation-of-data-to-thrive-vs-survive/ Tue, 19 Mar 2019 19:00:00 +0000 https://www.oneneck.com/blog/managed-services-digital-transformation-of-data-to-thrive-vs-survive/ The importance of data in not only business but our day-to-day lives continues to grow – no one is arguing that. But the pace at which it’s growing is mind-blowing. In a recent study sponsored by Seagate Technology, IDC forecasted that the global data sphere will grow to 163ZB by 2025. Considering that today it’s […]]]>

The importance of data in not only business but our day-to-day lives continues to grow – no one is arguing that. But the pace at which it’s growing is mind-blowing. In a recent study sponsored by Seagate Technology, IDC forecasted that the global data sphere will grow to 163ZB by 2025. Considering that today it’s 16.3ZB, that’s almost tenfold what it is today, making this prediction significant.

As a consumer, data continues to bring huge benefits to our lives, from more personalized experiences with businesses, smart devices that deliver real-time stats or even in the prevention of crime, just to name a few. Data is making our lives easier. But what about in business?

In recent IDC white paper sponsored by Dell EMC and Intel (Emerging Technology and Modern IT: The Key to Unlocking Your Data Capital), they stated that, “The influx of data presents both a challenge and an opportunity for organizations. Some organizations will flourish and turn the influx of data into competitive differentiation. Others will be overwhelmed in a struggle to collect, cleanse, and protect data and will miss out on opportunities to innovate and improve.”

So, how can you ensure that your organization thrives and doesn’t merely survive the explosion of data?

In this report, IDC studied the behaviors, strategies and outcomes of organizations that they called the “Thrivers.” These companies experienced incredible results by embracing automation and shifting to data-driven decisions. Here were some of the results…

Thrivers vs Survivors

Turning Data into Insight is Hard

But, in an effort to keep it real, they do acknowledge in the report that taking data and turning it into actionable insight is complex. But it’s organizations that prioritize operationalizing data, accelerating innovation and focusing on customer engagement that glean the most from their data. And the focus on these priorities is leading to a new vision for data center resources, where “the data center is not a single building where IT infrastructure lives,” but these Thrivers recognize “the need to embrace multiple IT service delivery models and diverse data center resources to meet the need for IT service delivery and data aggregation across core and edge spaces.”

The report goes on to outline that this new way of seeing modern IT service delivery means that IT must…

  • Put hyper-focus on security
  • Reduce management complexity
  • Prepare the infrastructure for the data deluge
  • Utilize both on-prem and cloud infrastructure

IDC points out though that the number one characteristic of the Thrivers is that “they understand the interconnected nature of emerging technologies and are developing expertise that complements their broad efforts to implement them.”

At OneNeck, we see this more and more with our customers, where no one IT initiative should stand alone. Gone are the days that a business owner solves one problem at a time, choosing the individual product or service for the specific task or need, without considering how it relates to a complex ecosystem of technologies across the business. Complexity and incompatibility are the result of siloed projects, breaking down processes and decreasing productivity. It’s critical that a big-picture approach is used to ensure long-term success.

It’s an exciting time for businesses. Never before have we had the opportunities to embrace data, adapt in real-time to the insights it brings and reap huge rewards. But it requires an open mind and willingness to recognize the opportunities and alter course if need be. But with the right plan and corresponding technology, you can thrive in a sea of data.

]]>
Understanding Data Center Sustainability https://www.oneneck.com/blog/datacenter-colocation/understanding-data-center-sustainability/ Thu, 07 Mar 2019 19:00:00 +0000 https://www.oneneck.com/blog/datacenter-colocation-understanding-data-center-sustainability/ The explosion of data and digital consumption in the last decade has dramatically increased the number of data centers, which have been described as the factories of the digital age. And just like traditional factories in their early days, data centers take their toll on the environment. Environmental organizations and the media have been raising […]]]>

The explosion of data and digital consumption in the last decade has dramatically increased the number of data centers, which have been described as the factories of the digital age. And just like traditional factories in their early days, data centers take their toll on the environment.

Environmental organizations and the media have been raising awareness of the problem. As a result, major industry players are taking steps toward better sustainability. Their customers —organizations like yours — need to become part of the solution. As you continue to rely more on data, you need to consider the sustainability of your data centers.

 Environmental Impacts of Data Centers

Based on current trend estimates, U.S. data centers are projected to consume approximately 73 billion kWh in 2020.

But while many data centers are becoming more energy efficient by switching to clean and renewable energy to lower their carbon footprint, they still take huge amounts of water to run.

 The Business Case for Data Center Sustainability

A sustainable data center is not just good for the planet. Businesses receive benefits as well, including:

  • Reduced costs: A company that is environmentally responsible runs more efficiently. A lower use of resources such as water and electricity results in direct cost savings for capital expenditures and operations. Often times, there are also tax incentives for green initiatives.
  • Improved brand reputation: Consumers are savvier about the companies they patronize. Social responsibility now ranks high among their priorities. And the increased scrutiny from regulators and media serve to enhance customers’ awareness even more. Sustainability is a matter of business competitiveness.

 Sustainable Data Center Practices

PUE, or power usage effectiveness, has been a focus metric in the industry for many years. Many companies see third-party certification such as LEED or ENERGY STAR as a starting point to help them implement green practices at their facilities.

But sustainability is not an all-or-nothing proposition, and there are a number of steps that can lead to a long-term goal of sustainability. These steps may include:

  1. Committing to sustainable practices and determining the long-term objectives.
  2. Striving to eliminate reliability on fossil fuels and supporting the local utilities’ efforts to switch to renewable energy.
  3. Choosing colocation (multi-tenant) facilities that have the lowest PUE in the region.
  4. Taking advantage of new cooling technology and utilizing “air-side” or “water-side” “free cooling” when available.

OneNeck is committed to operating efficiently and seeking innovative ways to reduce our environmental footprint. Sustainability is one of our key objectives when meeting the needs of our customers.

Our data center in Bend, Oregon; for example, has LEED Gold and ENERGY STAR certifications. We strive for all of our data centers to run as efficiently as possible and we’re continuously seeking new ways to reduce our environmental impact.

Interested in data center colocation?  Check out Colocation: An Ultimate Buyers’ Guide.

]]>
Blockchain: A Revolution in the Cloud https://www.oneneck.com/blog/security/blockchain-revolution-cloud-computing-security/ Tue, 26 Feb 2019 23:00:00 +0000 https://www.oneneck.com/blog/security-blockchain-revolution-cloud-computing-security/ Antiquated is not a word commonly associated with the advanced worldwide network of client-server configurations that make up modern data transmission. However, advances in data storage, file sharing and security protocols have struggled to keep pace with demands on infrastructure, cybersecurity threats and the ever-evolving competition that drives the industry. Fortunately, decentralized computing – a […]]]>

Antiquated is not a word commonly associated with the advanced worldwide network of client-server configurations that make up modern data transmission. However, advances in data storage, file sharing and security protocols have struggled to keep pace with demands on infrastructure, cybersecurity threats and the ever-evolving competition that drives the industry.

Fortunately, decentralized computing – a shared ledger system that eliminates server-side shortcomings entirely –  stands ready to completely overhaul the way modern businesses access and transact across their networks.

The Case for Cloud Computing on the Blockchain

Blockchain technology introduces a new paradigm in the world of security and data management. With the introduction of a decentralized network come the benefits of a virtually impenetrable infrastructure, free from the threat of DDoS attacks, data interception and localized disruptions. Blockchain systems greatly reduce the cost and vulnerabilities of previous systems. When combined with cloud computing, this new era is heading toward a truly secure and global marketplace for all businesses.

In addition to creating a more secure environment, blockchain-based cloud computing means companies can trust their valuable data in offsite scenarios without the need for costly intermediaries. The self-managed network is free from the constraints of expensive, single-point-of-failure systems. As a distributed ledger, information maintained across a blockchain network is copied and verified at every node, so that each office and user will know they are receiving the most accurate and current information. The kind of assurance provided by this self-reliant technology increases opportunities for multiple project leads to co-exist in the same space so that they can communicate and innovate with mutual cooperation.

Increased File Security

File security is another hazard of modern technology that is greatly improved via blockchain and cloud computing. Until now, no one has managed to develop a system in which sensitive data can be stored in a secure offsite environment, while also remaining freely accessible to those with proper credentials without exposing companies to external risks. Blockchain solves that problem by distributing data evenly across every node in the network.

Using advanced cryptography, all users within a blockchain network are granted immediate access to every iteration of data since the beginning of that ledger’s creation, while would be hackers are presented with the most secure integrity algorithm ever available to corporations.

However, beyond this, the basic structure of a blockchain system also has multiple additional benefits, including greater internal oversight. While blockchain’s security features were originally designed to prevent snooping from the governments of the world, they have since been adapted to the needs of modern business systems and are now virtually impenetrable from the outside. The sophisticated ledger process prevents tampering from the inside as well.

Since blockchain is based on a trustless system, users get the most accurate information as confirmed by other nodes on the network. This comparison ensures that no one can alter information for personal gain without controlling at least 51 percent of the active nodes, which in multinational scenarios would be incredibly difficult to accomplish. Data theft and corruption become a much less appealing option when faced with the digital footprints that are now impossible to erase without raising even more red flags.

Server hosting technology has grown by leaps and bounds over its short history, but newer technologies are pushing innovations that test the limits of hardware capabilities. With this research comes larger expenses and newer hardware that can become unfeasible for businesses working on a budget.

While cloud computing eases these issues by moving data off site and freeing up resources, it also introduces some security issues and can still present specific hurdles to integration when competing systems don’t communicate as desired. Blockchain cloud computing potentially eliminates the bulk of these issues while introducing an unprecedented level of interchangeability and accountability amongst nodes.

Distributed Apps

Perhaps one of the most interesting developments of blockchain adoption is the ability to construct and utilize distributed applications across the network that can streamline and unify business systems accessing the ledger. These apps integrate with the cloud to bring new levels of cooperation between the business processes already in place and the decentralized network connecting them.

From healthcare systems in which file management involves millions of individual records across countless data systems, to financial corporations operating in dozens of currencies on unique exchange protocols, to a manufacturers supply chain where precise tracking needs to be measured down to the second, distributed apps ensure a brand new level of accountability in data management.

Blockchain and the Future of Business

It’s quite clear that blockchain represents much more than cryptocurrency, but the story of how innovative organization will make use of it is still being written.

One area in which blockchain is already playing a significant role is the so-called Fourth Industrial Revolution or Industry 4.0. Combining blockchain technology with the industrial internet of things (IIot) will improve traceability and efficiency for the repair and maintenance of connected systems and equipment in smart factories. According to a 2018 Gartner report, nearly one-third of large manufacturers will have implemented Industry 4.0 projects involving blockchain by 2023.

Does your organization have a plan for the changes coming with next industrial revolution? View our interactive Industry 4.0 experience to find out about the opportunities, challenges, and IT solutions you should be considering as you develop a strategy to adapt and move forward.

While it is uncertain how much of our daily interactions will ultimately be controlled via the blockchain revolution, what is clear is that the underlying technology holds massive potential for modern interactions. When combined with the convenience of cloud computing, blockchain is an asset that further secures and enhances the promises of the decentralized world. It stands to reason that continuing this evolution will unveil even greater innovations as the process matures.

OneNeck takes pride in offering IT solutions for companies moving to the cloud. From hosted private cloud and on-premise private cloud to public cloud solutions, we can customize a design and migration plan for businesses in a variety of industries.

]]>
Show Your Applications Some Love https://www.oneneck.com/blog/managed-services/time-to-show-your-application-some-love-with-apm/ Thu, 14 Feb 2019 20:30:00 +0000 https://www.oneneck.com/blog/managed-services-time-to-show-your-application-some-love-with-apm/ As a consumer, we utilize applications on a daily basis. How many times have you found yourself asking, “There’s got to be an app for that?” It’s quite simply the expectation in today’s app-centric world. And when an app doesn’t function the way it’s supposed to? Well, no one has time for that, and we […]]]>

As a consumer, we utilize applications on a daily basis. How many times have you found yourself asking, “There’s got to be an app for that?” It’s quite simply the expectation in today’s app-centric world. And when an app doesn’t function the way it’s supposed to? Well, no one has time for that, and we simply move on…

But with the increased demands of today’s consumer, the complexity of modern applications is also growing. Software can now be deployed on-prem, in the cloud or utilizing both in a hybrid model; however, the shift to using microservice architectures has led to highly-distributed, multi-tier applications that are made up of millions of lines of code, which in turn require multiple teams to develop and manage them. This in turn makes troubleshooting issues an often tedious and complex process, which then ultimately impacts the business bottom line when an app has performance issues or is completely offline.

So, how can a business give their applications the love and attention they deserve to ensure they’re up and running, meeting the demands of their customers? The first step is understanding why applications fail to start with.

Why Applications Fail

Applications fail for many numerous reasons, but here are some of the big ones:

  • Human Error: The majority of application failures can be attributed to human error. These errors can be simple mistakes with big impact, such as rebooting the wrong database or systemic errors in the overarching architecture design. While this can be mitigated by using a test/dev environment before pushing to production, the human factor will always remain a factor to consider.
  • Coding Mistakes: Untested libraries, frequent changes and poor exception handling (just to name a few) can wreak havoc on an application’s ability to function correctly.
  • Not Enough Capacity: Just because an application worked in development and testing doesn’t mean it always will when it goes live and is put to the test by real users. And while testing an application against the expected load and beyond would be ideal, it doesn’t always happen, often due to time and budget constraints. So, it can be tricky knowing exactly what capacity will be needed.
  • Hardware Failure: Sometimes it’s as simple as a hardware device crashes. And while this might seem simple to resolve, in more complex environments, it can be challenging to pinpoint in a timely manner.
  • Network Issues: Beyond congestion, a bad switch port, incorrect configurations or even link failures can lead to network issues that affect the application performance or even access.

At the end of the day, there are multitudes of other reasons an application could fail, making it critical to embrace an application performance management (APM) strategy. And just like applications themselves have evolved, the meaning of what it means to monitor applications has evolved as well.

APM a Must in Today’s App-Driven World

In order to ensure that every critical swipe, tap and click are monitored and then correlated to business outcomes, it requires an end-to-end approach that ensures that every part of even the most complex environments—from software to infrastructure to business outcomes—is highly visible, optimized and driving the growth of the business.

At OneNeck, we’ve partnered with Cisco AppDynamics and can offer our customers an APM solution that tracks the behavior of components, such as physical hardware, virtual machines where applications reside, JVM executing the application environment, web containers, associated databases, caches, external web services and the code running the application itself.

In addition to the technical aspects of the application, it also provides detailed insight into the end-user experience, giving visibility into the quality of service you’re providing to your customers.

By monitoring applications and tracking customer behavior, AppDynamics APM can alert stakeholders of any issues related to key business transactions — like a broken checkout link that could impact revenue or a slow login page that’s hurting customer experience. The power of being alerted to application performance issues in real time allows business owners to fix the problem before it hurts the company’s bottom line.

So, is it time to show your apps some love and in turn, earn the love and devotion of your customers? Then let’s talk APM.

]]>
Do You Have a Digital Mindset? https://www.oneneck.com/blog/managed-services/do-you-have-a-digital-mindset-for-transformation/ Thu, 07 Feb 2019 22:00:00 +0000 https://www.oneneck.com/blog/managed-services-do-you-have-a-digital-mindset-for-transformation/ It’s no secret… when you increase collaboration, you improve productivity and employee engagement. But how you do enable a digital workplace? Define the digital workplace For starters, what is a digital workplace?  According to Deloitte, the digital workplace can best be considered the natural evolution of the workplace. Comprised of your employees’ technology working environment. […]]]>

It’s no secret… when you increase collaboration, you improve productivity and employee engagement. But how you do enable a digital workplace?

Define the digital workplace

For starters, what is a digital workplace?  According to Deloitte, the digital workplace can best be considered the natural evolution of the workplace. Comprised of your employees’ technology working environment. The digital workplace encompasses all the technologies people use to get work done in today’s workplace,

Embrace the evolution

In the modern workplace, traditional boardrooms are being replaced by more flexible, dynamic workspaces as corporations recognize that the speed and complexity at which business is conducted is increasing. A new generation of employees, working in dispersed locations and already digitally sophisticated, are in need of the right tools in which to engage with essential information, in a newly energized way, enabling them to get work done better and faster.

The time is now!

Consider the benefits of a digital workplace – according to Deloitte:

  1. Attracting talent. 64% of employees would choose a lower paying job if they could work away from the office
  2. Employee productivity. Organizations with strong online social networks are 7% more productive compared to organizations without
  3. Employee satisfaction. Organizations that rolled out and installed social media tools internally found that there was a 20% increase in employee satisfaction.
  4. Retention of employees. When employee engagement goes up, there is a corresponding increase in employee retention of up to 78%.
  5. Communication and collaboration tools. Present day workers prefer newer communication and collaboration tools specifically instant messaging as compared to “traditional” tools like e-mail.

Where to Begin with Digital Transformation

Set Realistic Expectations. Right up front, there are some important expectations to set: Digital transformation isn’t easy. While it would be nice to flip a switch and magically transform into a digitally-driven organization, the reality is it’s not simple. Innovation requires a range of projects, projects that include optimizing core business operations, bringing on new technologies and creating new customer experiences. To accomplish these monumental tasks requires an overarching strategy comprised of many prioritized projects, and loads of patience.

IT and business alignment is a must. The impact of digital disruption is driving significant IT and business-level changes. This includes platforms and architectures, as well as budget and development priorities. As a result, it’s imperative that the business and IT be tightly aligned in this journey, and from this alignment will come the strategy required for real success.

Don’t forget the people at the center of digital transformation.Digital transformation is more than a technology initiative. You can’t forget about the roles that company culture and processes play. This will need to be addressed with clear communication of the vision, collaborative planning, change management, process development and adoption strategy.

Develop a digital workplace strategy. Align your digital workplace strategy with clearly-defined business objectives and technology priorities. Seek to understand what you want to accomplish with your digital workplace initiative and how it will deliver business values

Select your tools and technologies.Choose the right technologies to deliver a cohesive digital workplace that meets your specific business needs. Pick the tools that drive collaboration and employee engagement.

Keep security front and center. As critical systems and business processes become modernized, it also opens the door to risk. The same power that enables these technologies to radically transform business processes also brings the potential to cause gaps in security and loss of information if not properly secured. Security posture assessments should be a critical part of any digital workplace initiative.

The business case for a digital workplace is clearer than ever –. The OneNeck IT Solutions team of experts can provide real value on projects ranging from technology deployments to full ecosystem design, implementation and management. We will provide you with independent, unbiased evaluations and recommendations with an eye toward future-proofing to ensure the technology you implement today doesn’t limit your organization tomorrow. Contact us today!

]]>
Advances in Cybercrime Demand Greater IT Security https://www.oneneck.com/blog/security/advances-in-cybercrime-demand-greater-it-security/ Tue, 29 Jan 2019 22:48:00 +0000 https://www.oneneck.com/blog/security-advances-in-cybercrime-demand-greater-it-security/ A look at retrospective security versus point-in-time solutions With cybercrime predicted to reach $6 trillion annually by 2021 and to be more profitable—and therefore, more attractive to criminal organizations—than the global combined trade of all major illegal drugs, businesses can no longer rely on traditional network security tools and expect to achieve protection. More than […]]]>

A look at retrospective security versus point-in-time solutions

With cybercrime predicted to reach $6 trillion annually by 2021 and to be more profitable—and therefore, more attractive to criminal organizations—than the global combined trade of all major illegal drugs, businesses can no longer rely on traditional network security tools and expect to achieve protection.


More than 75% of all current antivirus engines can’t detect advanced malware

The hackers of yesterday knew only as much as they needed. Brute force was often their tactic of choice, requiring only minimal coding skills, an Internet connection and a criminal mindset. The Industry responded by developing Antivirus (AV) and Intrusion Prevention System (IPS) solutions that were adept at detecting and responding to these primitive though damaging cyberattacks. However, over time, hackers grew more sophisticated and began to employ new techniques to create advanced malware.

These unconventional hackers learned to exploit flaws in traditional AV and IPS solutions, tricking them into making inaccurate assumptions about the safety of file attachments. And, once inside the network, traditional tools did not continue to monitor the files to ensure that they are truly benign. That’s when the balance of power changed between hackers and the rest of the world.

Point-in-Time vs. Retrospective Security

Traditional security tools that employ Point-in-Time Security Systems examine files attached to email and text messages only once, at the point of entry. The tool uses a preconceived set of rules. If the attachment meets those conditions and appears to be safe, the email or text and its attachment are allowed into the network. This method of security eliminates the majority of potential threats, but fails to protect against advanced malware techniques, including polymorphic and environmentally aware viruses that can dupe point-in-time security tools into assuming the malware is safe.

Advanced malware protection solutions use Retrospective Security Tools. These solutions examine files and attachments not only at the point of entry, but also monitor them for as long as they are within the network. This approach allows IT to gain visibility into the entire attack continuum by continually logging information. This establishes a record of the file and its effect on the network before, during and after an attack, empowering IT to analyze the event and formulate a course of action.

Retrospective security protects against modern cyber threats

As hackers change their tactics by using encryption, sleep techniques as well as polymorphic and environmentally aware viruses, IT needs security tools that offer visibility into their systems at any past point in time. The retrospective security solution toolbox also includes attack chain correlation, behavioral indications of compromise (IOCs), trajectory and breach hunting in addition to retrospection. This enables IT to see exactly how their network has changed, providing the context that point-in-time security systems cannot deliver, while also showing the malware’s trajectory as it had spread through the network.

The increased visibility from retrospective security enables IT to:

  1. Methodically analyze what events transpired during a breach
  2. Learn how their system was entered and what data hackers had accessed
  3. Prevent similar future attacks

Retrospective security can also reduce remediation spending

In the event of a breach, an organization using a point-in-time security solution must engage a security consulting firm to perform forensics. However, if the company had instead used retrospective security tools, their IT managers would have access to all of the information necessary to investigate the breech and devise a strategy to tackle the security issue.

Defend against malware by increasing visibility into your network

While no network security tool can prevent 100 percent of malware from entering the network, an advanced malware protection solution using retrospective security tools can enable your organization to better secure itself against current and future advanced cyberattacks.

2019-01-29_AMP-Infographic-IconTo learn more about how we’re working with Cisco to provide our customers enterprise-grade AMP retrospective security solutions, download:


INFOGRAPHIC: Real Threats Call for Advanced Malware Protection (AMP)

]]>
Windows Server 2008 & 2008 R2 End of Support https://www.oneneck.com/blog/security/it-security-planning-for-windows-server-2008-2008-r2-end-of-support/ Tue, 22 Jan 2019 22:00:00 +0000 https://www.oneneck.com/blog/security-it-security-planning-for-windows-server-2008-2008-r2-end-of-support/ Extended support for Windows Server 2008 and 2008 R2 is coming to an end respectively on January 14, 2020 What does end of support mean for Windows Server 2008 & 2008 R2? No Security Updates Without security updates you may fail to comply with standards and regulations that can seriously hamper your ability to: Protect […]]]>

Extended support for Windows Server 2008 and 2008 R2 is coming to an end respectively on January 14, 2020 What does end of support mean for Windows Server 2008 & 2008 R2?

No Security Updates

Without security updates you may fail to comply with standards and regulations that can seriously hamper your ability to:

  • Protect against hackers, malware with root access to machines, man in the middle scenarios, and government subpoenas
  • Securely purge for customer data, leaving it vulnerable to access by outside parties

Compliance Concerns

At the end of support for Windows Server 2008 and 2008 R2, your system may cease to be compliant with regulatory standards, such as:

  • PCI-DSS for credit card transactions
  • HIPAA for medical patient privacy
  • GLBA for financial institutions
  • GDPR for companies who do business in the EU

Maintenance Costs

Staying put will cost more in the end. Maintenance costs for aging hardware will also increase, and customers will face added costs for intrusion detection systems, more advanced firewalls, network segmentation, and other security measures—all simply to isolate Windows Server 2008 and 2008 R2 servers.

Prepare For the Future Today

Don’t let the end of support for Windows Server and SQL Server 2008 sneak up on you—the impacts to security and costs are too important. Avoid business disruptions and use this as an opportunity to adopt the most current security and innovation technologies.

OneNeck help you prepare for Windows Server 2008 and 2008 R2 End of Support and take advantage of your current Microsoft investments and skills by running your workloads in Microsoft Azure.  Contact us today.

]]>
Can Virtual CISO Services Help Your Business? https://www.oneneck.com/blog/security/how-vciso-can-help-with-it-security/ Tue, 15 Jan 2019 20:15:00 +0000 https://www.oneneck.com/blog/security-how-vciso-can-help-with-it-security/ Organizations, big or small, are all grappling with combating the onslaught of security attacks, making security a top priority for today’s IT teams in every vertical. As Forbes so broadly states, “Cybersecurity is applicable to every business operation, whether it’s in the military, corporations or entrepreneurs.” And while cybersecurity decisions used to be contained to […]]]>

Organizations, big or small, are all grappling with combating the onslaught of security attacks, making security a top priority for today’s IT teams in every vertical. As Forbes so broadly states, “Cybersecurity is applicable to every business operation, whether it’s in the military, corporations or entrepreneurs.” And while cybersecurity decisions used to be contained to the boardroom or high-level government agencies, now the average employee is hyper aware of the potential risks a breach can bring.

Yet, despite the rising awareness, many organizations are still woefully unprepared to detect or mitigate an attack before it wreaks havoc on their business. While the entire workforce plays a critical role in a successful security strategy, ultimately responsibility falls on IT security leadership to ensure the confidentiality, integrity and accessibility of the company’s data.

This is a daunting scenario for security leaders who are overwhelmed by their list of to-dos. They can’t do it all and are struggling to narrow down the never-ending list of potential security projects. So, where should they start? “Focus on projects that reduce the most amount of risk and have the largest business impact,” said Gartner vice president and analyst Neil MacDonald.

But what if you don’t even know where you have the greatest risk and what the potential business impact could be? The answer could lie in having the right security expertise and leadership on your team. However according to salary.com, as of December 2018, the average Chief Information Security Officer (CISO) in the US is making $220,114, a salary that may not be feasible in most mid-market organizations. This is where teaming up with a virtual CISO (vCISO) may be a practical option.

How do you know if you could reap the benefits of a  vCISO? Here’s a basic checklist that can help…

  • No Security Strategy – Are you lacking a defined security strategy? Or maybe you don’t even have a clear view of what risks you have and could use an outside perspective? If you are in need of a security architecture to use as a foundation to your security program and future roadmap, an up-front assessment is a great place to start.
  • Too Many Tools – Is your organization protected by numerous, disparate (and often not integrated) security tools? For full protection in the cloud, thousands of end points and numerous entry points in an infrastructure’s perimeter, all too often tool after tool is deployed in hopes of fortifying against attack, only to lead to tool sprawl and unidentified gaps.
  • Too Busy to Properly Execute – Do you have a defined security strategy, but can’t execute as well as you should due to constrained resources? According to recent estimates, there will be as many as 3.5 million unfilled cybersecurity positions by 2021, so you’re not alone.
  • Great at Execution, but Lacking Documentation – Is your IT security team top notch at keeping your data safe, but less focused on the documentation? Information security management system documentation often gets back-burnered when pressing security fires arise, leading to audit-trail black holes when it’s time to meet compliance mandates or inventory information assets.
  • Struggling to Meet Compliance Mandates – Are you struggling to meet your industry’s compliance mandates – ISO, CIS, NIST, PCI, etc.? With GDPR in May of 2018, compliance jumped to the security project forefront for many organizations, adding on to an already mounting list of requirements.

These are just some of the common challenges we’re seeing our customers struggle to address which has led OneNeck to offer our Virtual CISO services. While no two engagements are identical, the general purpose of the OneNeck vCISO service is to work with you to run a security control framework assessment and produce a gap analysis, then provide a remediation plan that addresses the vulnerabilities in your environment. We can also help with the remediation, so that depending on the agreed-to level of engagement, we’re there to help throughout.

Security can be overwhelming, and we want you to know you’re not alone. Interested in hearing how OneNeck’s vCISO service helped a customer improved their existing information security program and boost their overall security posture? Check out this customer story from Gila River Casinos.

]]>
Budget for Digital Transformation & IT Security in 2019 https://www.oneneck.com/blog/digital-transformation/it-security-budgets-2019/ Thu, 10 Jan 2019 22:00:00 +0000 https://www.oneneck.com/blog/digital-transformation-it-security-budgets-2019/ Many IT leaders expect to see their budgets to increase or remain unchanged.  This is driven largely by the need to upgrade aging infrastructure, accelerate digital transformation via a shift to the cloud and enhance their overall IT security posture. According to Spiceworks’ annual State of IT report on IT budgets and tech trends: Most […]]]>

Many IT leaders expect to see their budgets to increase or remain unchanged.  This is driven largely by the need to upgrade aging infrastructure, accelerate digital transformation via a shift to the cloud and enhance their overall IT security posture.

According to Spiceworks’ annual State of IT report on IT budgets and tech trends:

  • Most companies (89%) expect their IT budgets to grow or stay steady in 2019.
  • The need to upgrade outdated IT infrastructure is the biggest driver of IT budget increases in 2019.
  • More than one-third of midsize companies (500 to 999 employees) saw IT budget increases due to corporate tax cuts.
  • Small businesses are making significant increases to their hardware budgets while large enterprises are increasing their cloud budgets in 2019.

 Transform and Secure

“Most organizations are increasing IT budgets in 2019 to upgrade aging IT infrastructure and support digital transformation initiatives,” says Peter Tsai, senior technology analyst at Spiceworks. “However, large enterprises, typically with more data and devices to lock down, are primarily increasing budgets due to growing security concerns.”

Digital transformation was one of the biggest trends in 2018, and it looks like that will continue in 2019.  Businesses will continue to allocate IT budget towards technology that enables them to deliver on customer needs and improve security and impact.

With so many different technologies hitting the market, it’s incredibly difficult for any organization to truly know that one versus another is the best fit for their environment. your decision. In addition, they know that making the right choice of technology is only part of the challenge, as integrating it into your current applications and workloads without creating new complexities and risk is critical.

In addition, according to Spiceworks’ research, 88 percent of large enterprises are increasing IT budgets to tackle security concerns.

Why? Security is no longer “nice to have.” It’s an imperative. As critical systems and business processes become modernized, it also opens the door to risk. The same power that enables these technologies to radically transform business processes also brings the potential to cause gaps in security and loss of information if not properly secured.

 As with most major IT initiatives, digital transformation and security is an evolving journey. A seasoned partner can be an invaluable asset in guiding you on your path.  If your organization thinking about undertaking a digital transformation or security initiative? We can help, tell us about your challenge.

]]>
How to Master Multi-Cloud Management https://www.oneneck.com/blog/cloud/how-to-master-multi-cloud-management/ Mon, 07 Jan 2019 18:00:00 +0000 https://www.oneneck.com/blog/cloud-how-to-master-multi-cloud-management/ Multi-cloud environments are on the rise thanks to benefits that include easier disaster recovery, the flexibility to spin up and offload resources on demand, and freedom from vendor lock-in.    Multi-cloud strategy vs hybrid cloud Multi-cloud strategy isn’t the same as a hybrid cloud strategy, which mixes private on-premises cloud and a third-party online cloud […]]]>

Multi-cloud environments are on the rise thanks to benefits that include easier disaster recovery, the flexibility to spin up and offload resources on demand, and freedom from vendor lock-in.   

Multi-cloud strategy vs hybrid cloud

Multi-cloud strategy isn’t the same as a hybrid cloud strategy, which mixes private on-premises cloud and a third-party online cloud from a single provider. A multi-cloud environment may include a hybrid cloud. But with servers spread across multiple vendors, there is no orchestration to unify the entire environment. When you consider the de facto use of cloud services by employees and business units outside of IT, many companies are already multi-cloud, whether they call it that or not.

Multi-Cloud Management

With no one cloud model being the best for every workload, there’s growing consensus that multi-cloud environments will be mainstream within a few years. Requirements between business functions and departments can vary significantly.

A multi-cloud architecture gives organizations more flexibility to address different requirements. But without orchestration or connections between the servers run by multiple vendors, it also gives companies more to manage. This creates a number of multi-cloud challenges, including:

  • Tracking what’s stored on each server and their uses
  • Securing data spread across multiple clouds and providers
  • Managing performance — The more cloud environments in use, the harder it is to track latency issues and maximize uptime

To make the most of their multi-cloud environment, companies need to leverage a multi-cloud management platform (CMP).

Why Use a Multi-Cloud Management Platform?

An effective cloud management platform simplifies the deployment and operation of apps and databases across several different cloud providers. It does so by acting as a broker between providers and cloud users to improve enterprise visibility of cloud resources, reduce administrative headaches and optimize resources. With a CMP, organizations enjoy the benefits of multi-cloud without the complexity by:

  • Optimizing costs. A CMP provides insight and visibility into cloud spend and can help with budgeting, allowing companies to stretch IT budgets across multiple cloud providers while minimizing costs.
  • Improve efficiency. Managing individual clouds is heavily time- and resource-intense. A CMP automates and streamlines many tasks, and improves efficiency by enabling administration from one dashboard.
  • Ensure security and compliance. Security isn’t just hard to manage with multiple vendors, silos can become so opaque that it’s hard to spot risks. By providing a top-level view of security and allowing IT to drill down into the security of each cloud, a CMP ensures that cloud environments are as secure and compliant as possible.

Right Application, Right Cloud, Right Management Platform

Managing your multi-cloud environment doesn’t have to be complex, and neither does selecting the right CMP.  OneNeck’s ReliaCloud CMP will unify your on-premises, public, private or hybrid clouds together via a single platform, providing you with a “single pane of glass” to automate, manage, monitor, secure and govern your clouds, from a consolidated view.  Contact us today to discuss your cloud management needs or to schedule a demo of ReliaCloud CMP.

For more valuable reading, download our multi-cloud toolkit.

 

]]>
Securing Your Azure Deployment https://www.oneneck.com/blog/security/securing-your-azure-deployment/ Thu, 03 Jan 2019 18:00:00 +0000 https://www.oneneck.com/blog/security-securing-your-azure-deployment/ As organizations embrace the cloud’s flexibility and agility, Microsoft’s cloud platform, Azure, has become a top choice as a cost-effective solution that scales for any organization, no matter the size, to meet agility and flexibility needs. In today’s sophisticated threat environment, security is a major concern consideration for anyone adopting the cloud. Organizations hold the ultimate […]]]>

As organizations embrace the cloud’s flexibility and agility, Microsoft’s cloud platform, Azure, has become a top choice as a cost-effective solution that scales for any organization, no matter the size, to meet agility and flexibility needs.

In today’s sophisticated threat environment, security is a major concern consideration for anyone adopting the cloud. Organizations hold the ultimate responsibility for securing the cloud and need to adopt security solutions, enact best practices and set policies that will keep their data safe. Microsoft also understands the part they play in security and has powerful built-in features such as encryption and access management tools. Before deploying Azure in the cloud, organizations need to audit their security strategies to ensure they extend to the cloud environment.

Azure’s Security Features

Even before their 2015 $1 billion investment in security, Microsoft’s design of the Azure platform was guided by a revolutionary “security first” approach. Azure’s defense-in-depth strategy assumes that security breaches will occur and uses multiple, overlapping controls to prevent damage. In addition, Azure is back by Microsoft’s global incident response team to mitigate the effects of any attack.

Azure integrates a wide range of encryption for data in motion and at rest. Customers moving large data stores can also ship data to an Azure data center by hard disks encrypted using BitLocker technology.

For secure access to cloud applications, Azure Active Directory provides enterprises with a comprehensive cloud-based identity and access management solution and provides easy integrations between cloud and on-premise authentication infrastructures. IT managers can use the Azure Active Directory to simplify user and group management, integrated with security controls.

Incorporating Azure into Your Security Environment

Security in the cloud is a shared responsibility, and while Azure has strong security features, organizations need to understand how their data will be properly secured, whether in the cloud or on-premise — which requires advanced planning before an Azure deployment.

Key Steps to a Secure Azure Deployment

  • Azure Account setup and management: Using Azure Active Directory for user accounts will provide centralized account management infrastructure to enhance security. Role-based access control (RBAC) limits access based on user’s job responsibilities and more granular access controls are available to create custom roles that will further limit access privileges.

    Added steps to secure privileged accounts such as multifactor authentication, using tokens or biometrics in addition to passwords, as well as restricting access based on network location prevents an attacker from gaining access to an account by stealing a password.

  • Network security: In a cloud environment you don’t have direct physical access to the network but you can implement controls using virtualized technologies. With the Windows Azure Virtual Network, IT administrators can create separate tiers on virtual machines based on the sensitivity of the information that’s being processed, stored and transmitted.

    This essentially means you can build your own, virtual data center in the cloud and create secure and encrypted links, via virtual private networks, between the cloud and on-premise data centers.

  • Other security tools: It’s important to extend your security practices to the cloud by implementing intrusion prevention technology, system configuration procedures, patch management policies, malware protection and so on. For the tightest protection, implement new tools that are designed to work specifically with Azure.

As a Microsoft Gold Certified and Microsoft Cloud Solution Provider partner, OneNeck can help you architect, deploy and manage your Azure cloud solution. Our team will support your environments 24/7, from initial design to ongoing management of your Azure infrastructure, allowing your organization to focus the right people and resources on your strategic business initiatives — all while increasing efficiency and overall productivity.

Download our eGuide Move Your Business Forward with Azure.

]]>
Is SD-WAN Hype or Reality? https://www.oneneck.com/blog/managed-services/sd-wan-enterprise-network-solutions/ Tue, 18 Dec 2018 21:00:00 +0000 https://www.oneneck.com/blog/managed-services-sd-wan-enterprise-network-solutions/ Traditional wide area networks (WANs) bring numerous challenges to the enterprise, ranging from increasing cost, performance issues and flexibility challenges. And with the onset of the cloud, today’s IT teams are searching for solutions that meet the data accessibility demands from inside the organization to the edges of the earth. In an effort to address […]]]>

Traditional wide area networks (WANs) bring numerous challenges to the enterprise, ranging from increasing cost, performance issues and flexibility challenges. And with the onset of the cloud, today’s IT teams are searching for solutions that meet the data accessibility demands from inside the organization to the edges of the earth.

In an effort to address these challenges, Software-Defined WAN (SD-WAN) has emerged. It’s a whole new approach to distributed networks that offers better performance, agility, operational flexibility and potentially huge cost savings.

IDC states that, “The most significant driver of SD-WAN growth over the next five years will be digital transformation (DX) in which enterprises deploy 3rd Platform technologies, including cloud, big data and analytics, mobility, and social business, to unlock new sources of innovation and creativity that enhance customer experiences and improve financial performance.”

This all sounds amazing, but like any new technology, there are always things to consider before adopting it. I recently worked with one of our SD-WAN architects, Adam Gray, on an eBook that dives into some of the SD-WAN questions that are floating around out there right now, like…

  • What actually is SD-WAN, and how is it different from SDN?
  • What does SD-WAN accomplish?
  • How does an organization know if they’re a right fit?
  • And if you are a right fit, where do you start?

If like me, you’re not quite sure about the ins and outs of SD-WAN, stop back in the coming months as we explore some of our learnings with our experts around SD-WAN in our blog.  And in the meantime, check out the eBook: SD-WAN – Hype or Reality?


SD-WAN - Hype or Reality?

]]>
Who Owns Cloud Security? | Cloud Security Solutions https://www.oneneck.com/blog/security/who-owns-cloud-security/ Tue, 11 Dec 2018 23:00:00 +0000 https://www.oneneck.com/blog/security-who-owns-cloud-security/  Organizations are rapidly embracing cloud services to gain agility and thrive in today’s digital economy. This has created a strategic imperative to better manage cybersecurity risk while keeping pace at scale as firms move critical apps to the cloud. Cloud security is a shared responsibility, where the cloud provider and the tenant each have a […]]]>

 Organizations are rapidly embracing cloud services to gain agility and thrive in today’s digital economy. This has created a strategic imperative to better manage cybersecurity risk while keeping pace at scale as firms move critical apps to the cloud.

Cloud security is a shared responsibility, where the cloud provider and the tenant each have a role to play. Although it sounds relatively simple, customers are often not clear where their provider’s role ends and their obligations start, creating gaps.

Download our Who Owns Cloud Security eBook, for valuable insights on what measures you and your provider should take to protect your cloud deployments.

]]>
Food Manufacturers Embrace Digital Transformation https://www.oneneck.com/blog/food-manufacturers-embrace-digital-transformation/ Fri, 30 Nov 2018 20:27:00 +0000 https://www.oneneck.com/blog/food-manufacturers-embrace-digital-transformation/ At this point, nearly every modern manufacturer has some reliance on the cloud. But in this new age of digital transformation in manufacturing, the cloud might not be the answer for everything. In a recent Food Manufacturing article, Jeff Budge, OneNeck’s VP of Advisory Services, offers insights for food manufacturers and the best way to […]]]>

At this point, nearly every modern manufacturer has some reliance on the cloud. But in this new age of digital transformation in manufacturing, the cloud might not be the answer for everything. In a recent Food Manufacturing article, Jeff Budge, OneNeck’s VP of Advisory Services, offers insights for food manufacturers and the best way to utilize the cloud.


In this article, Budge focuses on three key areas:

  1. Embracing the multi-cloud environment
  2. Integrating platforms
  3. Leveraging data to support informed decision-making

Read the article for details on each level and insights on building your Digital Transformation Strategy.  And remember, digital transformation in manufacturing doesn’t happen all at once.  The right technology partners can help you decide where to start. Contact OneNeck today for a free consultation.

Topic: IT Services for Manufacturing

]]>
Interoperability in Multi-Cloud Considerations https://www.oneneck.com/blog/cloud/interoperability-in-multi-cloud-considerations/ Tue, 20 Nov 2018 20:30:00 +0000 https://www.oneneck.com/blog/cloud-interoperability-in-multi-cloud-considerations/ What we’re seeing in the industry today is that most of our customers aren’t adopting a single platform for all of their workloads. Depending on a plethora of factors (RTO/RPO, application requirements, latency requirements, etc.), it truly is becoming a multi-cloud world. But with lots of options comes complexity. In this blog series, we attempt […]]]>

What we’re seeing in the industry today is that most of our customers aren’t adopting a single platform for all of their workloads. Depending on a plethora of factors (RTO/RPO, application requirements, latency requirements, etc.), it truly is becoming a multi-cloud world.

But with lots of options comes complexity.

In this blog series, we attempt to tackle some of the key considerations you should consider when making workload placement decisions. This month, we’re talking with Derek DeHaan on interoperability in multi-cloud when deciding the best execution venue for your workloads.

Derek DeHaanYou spend a lot of time with OneNeck’s customers, helping them weigh their options when deciding what platform best suits their workload. When it comes to interoperability, what should they absolutely consider?

So, when we talk about interoperability in multi-cloud, the most important consideration we hear from our customers is around multi-cloud security. When tying workloads together across multiple platforms, it is critical to understand how the workloads and data can interact and traverse between those platforms in a secure manner. This includes the data and user/administrator access to ensure your data is protected.

Another key consideration with interoperability is what sort of bare metal compute requirements does your organization have today and can those be fulfilled by the new platform of choice. What I mean by that is that customers today currently have legacy applications and hardware they’ve invested in, either in their own data center or in a colocation provider, and maybe those things are a year or so into a 3-year lifecycle. With a hosted private cloud option, if required (especially at OneNeck – I can’t speak for other providers), if you have those investments in hardware, we can bring that into our data centers and attach it directly to our private cloud while still giving you access over our backbone to the hyperscaler’s as well.

What that gives you is the flexibility to go ahead and finish the usable life on that equipment before you make the full migration to a public cloud. Some of the hyperscale providers do not offer this as an option. So, if you have an appliance or a network device – something that cannot be virtualized or is not end of life – it’s important to know that you do have options to bring that equipment with you in some of the hosted private cloud scenarios and still connect it and use it for the rest of its usable life.

Are platform requirements still a big interoperability consideration?

I would have said they were even more of a concern probably about a year ago, before Azure started supporting Linux and other operating systems that are outside the Microsoft stack. So today it’s probably a little bit less of a consideration, because the hyperscale public cloud providers and the hosted private cloud providers have realized the need to go across the gamut on platforms.  And what I mean by that is X86, Solaris, Linux, Unix – they’ve all implemented solutions to allow many if not all of those operating systems on their platforms.

The same thing used to be an issue around hypervisor choice, but the hyperscale providers are going down the path of offering different hypervisors now too, so it’s not as big of a concern as it used to be either.

As a cloud and data center provider, we often help our customers understand the importance of carrier connectivity in their overall cloud strategy. What connectivity advice would you have for organizations looking at moving to a cloud provider?

Carrier connectivity is all about understanding how you’re going to connect to your applications and how are your users going to connect to those applications. The big keys here are connectivity options can vary greatly and depending on your choice of dedicated circuits or over VPNs on the internet the costs and user experience associated with connectivity can vary greatly.

Hosted private cloud options with private carrier circuits are usually more cost effective than connecting to a large pubic cloud where you’re going to be bringing a ton of data in and out, as you’re going to get hit with those ingress and egress charges. So, something to consider ahead of making the decision, hyperscale public cloud may look a lot cheaper up front, but I’m going to have to take all of this data out of the database servers, access more data for reports, and now the cost of pulling that data out becomes a measure that you really didn’t calculate up front. Maybe it looked cheaper up front, but now that you see all your data transfer costs, it really isn’t as cheap as you thought initially.

Obviously, having a plan B is critical in any IT strategy these days, so what should one consider around replication in the cloud?

Bottom line: replication technology is incredibly important. And there are many different offerings out there today that are leaps and bounds ahead of what used to be just hardware replication or vendor-specific replication – we’re now in the software-replication space. So, software utilities that can go across platforms, irrelevant of vendors, and can replicate from on premise, hosted private cloud or into the hyperscale private clouds are always the best option. Some examples are Zerto or Azure Site Recovery, but there are many others.

But it’s important to define your replication strategy if you’re going to do DR, if you’re going to have multiple environments like dev/test or any other environments that might reside in a disparate place from production. This just makes sense in today’s world, as you can take advantage of a multi-cloud approach and get economies of scale and cost optimization. So, it’s important to understand how you’re going to replicate and get that data between those sites most effectively and for the lowest cost.

Any final thoughts on interoperability considerations for our readers?

The final thought I would leave you with is there are many considerations as I mentioned above and the importance of each is different for every organization – so I would say test a small amount of workloads in the decided platforms if possible. This will allow you to test the interoperability, security, connectivity, etc. to make sure it is as you expect and you don’t negatively affect the end user experience.

Want to read some more of Derek’s multi-cloud tips? Check out our conversation on critical security considerations as you build your multi-cloud strategy.

Download our Multi-Cloud Toolkit

]]>
Future of Database Administrators in the Cloud Era https://www.oneneck.com/blog/future-of-dbas-in-the-cloud-era/ Thu, 15 Nov 2018 21:00:00 +0000 https://www.oneneck.com/blog/future-of-dbas-in-the-cloud-era/ A database management transformation is underway. Some say it threatens the long-term future of database administrators (DBAs). As more enterprises shift to multi-cloud and hybrid cloud solutions, automating their products with self-driving, self-patching and self-healing features, it has some in management thinking they don’t need managed DBA services anymore. While the role of the DBA […]]]>

A database management transformation is underway. Some say it threatens the long-term future of database administrators (DBAs). As more enterprises shift to multi-cloud and hybrid cloud solutions, automating their products with self-driving, self-patching and self-healing features, it has some in management thinking they don’t need managed DBA services anymore.

While the role of the DBA may change, this transformation does not mean the DBA will disappear. According to Biju Thomas, Principal Solutions Architect at OneNeck, “Data is—and will remain—the lifeblood of business. DBAs will continue to play a central role, providing valuable insights into how organizations will best harness their data to produce business value.”

In a recent CIOReview article, Thomas discusses the six traits you should expect from the future DBA and the ways in which they will add value to the business in the cloud era.

 



Biju_Thomas_POV_Paper

]]>
Digitally Transforming Business Intelligence with AI https://www.oneneck.com/blog/managed-services/digitally-transforming-business-intelligence-with-ai/ Tue, 13 Nov 2018 19:30:00 +0000 https://www.oneneck.com/blog/managed-services-digitally-transforming-business-intelligence-with-ai/ It’s an exciting time we are living in, where what seemed like science fiction just a few years ago is becoming reality. From chess-playing computers to driverless cars, artificial intelligence (AI) is changing the way we live and work. The term artificial intelligence was coined in 1956, but has increased in popularity due to increased […]]]>

It’s an exciting time we are living in, where what seemed like science fiction just a few years ago is becoming reality. From chess-playing computers to driverless cars, artificial intelligence (AI) is changing the way we live and work.

The term artificial intelligence was coined in 1956, but has increased in popularity due to increased data volumes, advanced algorithms, and improvements in computing power and storage. And now, with the proliferation of data, AI is making its way even deeper into the workplace.

The arrival of AI in the workplace is exciting. It gives companies the opportunity to work better and smarter, as well as to improve the customer experience. It offers the possibility of doing more meaningful and creative work and freeing the workforce from the mundane and routine tasks – the “busy work.”

There are several key benefits AI can bring to an organization. In a recent Cisco eBook, Transforming Businesses with Artificial Intelligence, it outlines these key benefits:

  • Make the Infrastructure Intelligent: By utilizing AI to analyze the data in an organization and look for patterns, you can start identifying customer needs, uncover trends and innovate faster. With AI’s assistance, we can analyze and respond in real time in ways we never could before.
  • Improve Security Posture: With security so top of mind in every organization, it’s keeping a lot of IT professionals up at night. It’s a moving target that’s constantly changing, and with so many endpoints and threats growing in complexity, it only makes sense to incorporate AI into security strategies. By automating complex processes for detecting and defending against attacks, the chance for success grows exponentially.
  • Improve Customer Experience: In an always-on world, today’s customers demand an always-on experience with digital services that quickly meet their needs. With the advent of chatbots and more accurate voice systems, businesses can now deliver a more personalized and responsive experience.
  • Transform Processes and Business Models: With AI comes more accuracy in machine vision applications, as well as increased effectiveness in predictive maintenance for equipment, allowing for preemptive actions that prevent costly breakdowns.
  • Empower Talent Hiring and Retention: Not only can AI help HR in the finding and hiring the right talent, it can also help improve the employee experience with more customized engagement and timely delivery of information.

2018-11-13_IconAs the new era of intelligence takes shape all around us, the possibilities are endless for organizations to apply AI and take their business processes to the next level. Learn more by downloading this informative eBook: Transforming Businesses with Artificial Intelligence.


DOWNLOAD THE EBOOK NOW

 

]]>
Everyone’s Role in Cloud Security https://www.oneneck.com/blog/cloud/everyone-has-a-role-in-cloud-security/ Wed, 07 Nov 2018 21:00:00 +0000 https://www.oneneck.com/blog/cloud-everyone-has-a-role-in-cloud-security/ Outsourcing is becoming an increasingly popular business strategy. By carving off business processes and giving them to outside vendors companies save money and resources. Outsourcing enterprise computing processes using cloud services, for example, allows you to hand off the cost and responsibility of maintaining on-premise hardware and software. However, just because you outsource your enterprise […]]]>

Outsourcing is becoming an increasingly popular business strategy. By carving off business processes and giving them to outside vendors companies save money and resources. Outsourcing enterprise computing processes using cloud services, for example, allows you to hand off the cost and responsibility of maintaining on-premise hardware and software. However, just because you outsource your enterprise infrastructure does that mean your cloud service provider assumes total responsibility for your network? What about issues such as cloud security, which is a major concern for every IT manager and CIO? Can you hold your cloud service provider accountable for providing watertight data security?

As the use of cloud continues to grow, concern for data security grows with it. When data is an important business asset, management is hesitant to surrender control. However, it has been demonstrated over and over that cloud-based services tend to be more secure than on-premises systems. Most cloud services providers maintain rigorous security protocols for disaster recovery and protection from cyber-attack. Since providing secure and stable computing services is their primary business, cloud service companies use sophisticated tools to continuously monitor systems, identify vulnerabilities, and plug holes in cloud security. They also have service-level agreements (SLAs) to assure customers that security problems are remediated quickly.

So when you engage a cloud services provider you no longer have to worry about data security, right? Wrong!

Enterprise computing is more than just hosted enterprise hardware and services. Your cloud service provider is responsible for securing the foundation of your enterprise infrastructure; the computing systems, power, data storage, database, and networking. As the customer, you are still responsible for securing applications and related services.

Your cloud provider is generally responsible for cloud security at the network layer, including network segmentation, perimeter services, DDOS spoofing, and so forth. As the cloud customer, you are responsible for threat detection, security monitoring, and incident reporting. In other words, your provider offers cloud security for hosted switches and networks, but your responsibility is to secure the network applications and data traffic. Most SLAs are structured to make it clear that the customer is responsible for host layer data traffic, such as access management, patch management, security monitoring, and log analysis, i.e. any application security elements.

Finger Pointing Doesn’t Stop Attacks

Assuming that your cloud service provider will include comprehensive cybersecurity as part of their contract is a mistake. There are areas where they have control over the infrastructure and therefore can take responsibility for data security, but there are other areas that have to be the enterprise customer’s responsibility. Developing a collaborative cloud security strategy is the best approach to address risk management and deal with security threats.

Let’s consider some of the most prevalent security threats and where they tend to compromise enterprise networks. According to the 2018 Verizon Data Breach Report security issues affect both enterprise network owners and cloud service providers:

  • 73 percent of attacks were perpetrated by outsiders but 28 percent were by insiders, usually employees. Maintaining internal security is largely the responsibility of the cloud customer, since attacks tend to be mounted against corporate targets and not cloud providers.
  • 17 percent or one in five data breaches were from phishing attacks, which includes employees being spoofed into surrendering sensitive information such as passwords – again, the responsibility of the network owners, not the cloud service provider.
  • Malware, especially ransomware, is one of the most insidious types of cyberattack. Ransomware attacks have grown 56 percent in one year, and many of these attacks are targeting file servers and databases, locking them until a ransom is paid. These types of attacks tend to target end users, but MIT experts predict that more ransomware is targeting the cloud.
  • Inadequate identity and credential management is a universal threat. Stealing the right credentials is like having the keys to the kingdom for both corporate computers and hosted resources.
  • Account service hijacking has become commonplace and affects cloud services and in-house systems. With the right account credentials, cybercriminals can eavesdrop on activities and transactions, return falsified data, and send users to bogus web sites.
  • Infiltrating cloud services directly is also becoming more common. Bad actors are increasingly leveraging cloud resources to target end users or other cloud providers.

No matter what the nature of the threat, everyone has a role in protecting data assets. A data breach can originate from anywhere, and once the infrastructure is compromised the damage can spread to infect applications, hosts, and network systems. That’s why it’s vital that corporate customers and cloud service providers understand their areas of responsibility when it comes to cyber security.

 Develop Collaborative Cloud Security Strategies

To appreciate the respective responsibilities for cloud security, it’s best to start by understanding the cloud service model. Cyber-attacks will happen, so you need to know where your cloud service provider has responsibility and where you need to take charge of enterprise security.

For example, applications are completely your responsibility so it’s vital to secure your code. Whether you are supporting a DevOps coding environment or simply maintaining a basic website, you need to have security in place for the entire development lifecycle. Code that has not been thoroughly tested before it’s deployed could contain vulnerabilities. Use code encryption, testing libraries, and software to scan for bugs to make sure your code is secure.

Patch management is important, both for enterprise customers and cloud service providers. It’s the best way to address known vulnerabilities in software and production systems Cloud service providers will maintain patches for their systems, but you also need to have your own patch management protocols. Automated patch management and security scanning will help, but you need to have an established protocol to update systems software regularly.

Access management is another essential part of systems security. In addition to managing passwords and data access, you need to define roles and responsibilities to control sensitive data and systems. Defining roles and limiting access reduces the risk if someone’s credentials are stolen. Integrating your active directory (AD) and your lightweight directory access protocol (LDAP) authentication model into your cloud infrastructure will help contain data access. Also consider using two-factor authentication.

Ongoing monitoring and log management are important for regulatory compliance as well as for security. Reviewing logs provides an overview of data access and traffic patterns that could highlight suspicious activities. Logs also are useful for conducting forensic investigations.

 Matching Security to Different Cloud Services

When working with cloud service providers, you need to match your security protocols to the types of cloud services provided. Public cloud services, for example, are offered over the Internet and tend to be less secure, since resources such as computing time and data storage are shared. A private cloud offers dedicated connectivity and resources and is completely customizable, making it easier to manage systems security. Private clouds tend to be more secure but they also require the corporate IT department to manage more aspects of cloud services, which means more staff, more management, more maintenance, and more accountability for data security.

Depending on your cloud service needs, consider developing a cloud vendor checklist.

For Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service, cloud vendors are responsible for securing the infrastructure and customers secure the applications. With Software-as-a-Service (SaaS) and Applications-as-a-Service (AaaS) the cloud provider is responsible for securing the applications as well as the infrastructure. However, SaaS and AaaS vendors often use third-party IaaS cloud services, which makes security more complicated. Be sure that your security policies and procedures (e.g. authentication, inspection, and monitoring) can be integrated with SaaS and AaaS services.

Hybrid cloud strategies that combine on-premise, private, and public cloud services are becoming more popular which means standardizing security across environments can be an issue. Security protocols will have to vary to accommodate each environment. Ideally, end users should be able to view and manage security across the entire infrastructure using a common set of tools, i.e., a single pane of glass. Unfortunately, that kind of security transparency isn’t always available.

When considering cloud service providers, be sure you are working with vendors that understand cloud security. That means they have cloud-based versions of security solutions, centralized security management, centralized event management, etc. Also look for vendors who work with leading cloud service vendors such as Amazon Web Services (AWS), Microsoft Azure, IBM Cloud, Oracle Cloud, and others. Cloud service contracts change and you want to make sure your security procedures follow you wherever your data resides.

Achieving security in the cloud is possible, but it isn’t guaranteed. Organizations need to implement their security policies and procedures in conjunction with their cloud provider to provide the highest levels of protection against cloud security risks.

Not sure where to start? Contact OneNeck IT Solutions to speak with our cloud security experts.

]]>
Making the Most of Oracle Cloud Certifications https://www.oneneck.com/blog/making-the-most-of-oracle-cloud-certifications/ Thu, 25 Oct 2018 20:00:00 +0000 https://www.oneneck.com/blog/making-the-most-of-oracle-cloud-certifications/ When it comes to Oracle cloud certifications, there are three broad categories says Oracle ACE Director Biju Thomas, who is also a Principal Solutions Architect at OneNeck. He recently discussed the categories and his insights on Oracle cloud certifications with Alan Earls of TechTarget noting that, “Within each category, you’ll find a variety of choices […]]]>

When it comes to Oracle cloud certifications, there are three broad categories says Oracle ACE Director Biju Thomas, who is also a Principal Solutions Architect at OneNeck. He recently discussed the categories and his insights on Oracle cloud certifications with Alan Earls of TechTarget noting that, “Within each category, you’ll find a variety of choices requiring an array of skill sets.”

Thomas, an author for several Oracle Database & SQL Certification Study Guides (published by Sybex & Wiley), believes in taking certification exams to learn new technologies. It is possible to upgrade your existing certifications to cloud certifications. In fact, when it comes to Oracle database certification levels, Thomas says Oracle Database OCA or OCP are required to earn the “Oracle Database Cloud Administrator Certified Associate” or “Oracle Database Cloud Certified Administrator” certifications. He adds, “There are also a few SaaS certifications, especially Enterprise Resource Planning, which helps one achieve the equivalent cloud certification.”

When it comes to navigating your options and selecting the Oracle certification best-suited for your interest and skillsets, Thomas recommends newbies take time to review the cloud tracks and tests. He says, “There are a ton of choices, so pay attention to the area of expertise you are interested in.”


Biju_Thomas_POV_Paper

]]>
Matching Applications to the Cloud | Managed Cloud Services https://www.oneneck.com/blog/cloud/matching-applications-to-the-cloud/ Tue, 16 Oct 2018 18:30:00 +0000 https://www.oneneck.com/blog/cloud-matching-applications-to-the-cloud/ As the cloud has come into its own and been widely adopted at enterprises around the globe, many organizations have started seeking services from a multitude of cloud providers to meet diverse application requirements and data needs across different business units. Multi-cloud approaches have become incredibly popular in recent years and many point to it […]]]>

As the cloud has come into its own and been widely adopted at enterprises around the globe, many organizations have started seeking services from a multitude of cloud providers to meet diverse application requirements and data needs across different business units. Multi-cloud approaches have become incredibly popular in recent years and many point to it as the future of cloud computing.

But simply deciding on a multi-cloud deployment model doesn’t achieve a stable, tranquil IT operation; organizations need to effectively allocate their application workloads to the proper platform to achieve that nirvana.

The first step in choosing the right cloud and/or provider is to match each application’s technical requirements to the cloud features and service offerings of the specified platform. This blog will highlight key considerations when identifying the best cloud for your applications.

Contract and SLA’s Considerations

  • SLA Alignment with platform choice– What is driving your business uptime SLA?  Do your applications have specific availability requirements? If so, understanding the uptime SLA’s provided by the various providers will help you determine which cloud is best to meet your uptime needs.
  • Platform Choice – It’s important to consider how you plan to manage several platforms/ providers and aggregate the right data to understand what is going on in your environment. How do those workloads work together or specifically stay segregated?
  • Data Privacy– Understanding who owns your data can help you to better understand and manage cloud costs more efficiently. Be sure you identify any application dependencies and data flows among servers and the users. By understanding user access patterns and dependencies you can help determine the amount of data that may be leaving a cloud provider. This will help you estimate the amount you may be billed for egress charges. 
  • Compartmentalization– Identify whether your application is dependent on other workloads?  Is it tied to anything else in terms of dependencies? If not, it’s much easier to move those workloads to a hyperscale cloud as the application doesn’t have any interdependencies that would require additional resources to be moved as well.


Cloud Risks Considerations

VM Sprawl, Ease of Use & User Experience–   Nowadays, the ease of provisioning resources with the swipe of a credit card can cause your environment to grow 2x to 3x overnight.  It’s critical to understand who has access to what resources and how they can spin things up. In addition, with hyperscale cloud, your IT staff will be most likely be forced to learn a new way of managing your servers via the hyperscale cloud providers portal.  Take into consideration time spent learning this new way of doing business.

Connectivity & Latency-  Prior to selecting a cloud for your workloads, it’s important to determine how much it will cost you to connect and how any latency will affect your overall user experience. It’s recommended to test a workload, preferably a dev/test environment that’s not production impacting to start with to determine what affect it has on user experience, if any at all.

Governance and Application Security–  When you move to the cloud, it’s important to consider, upfront, how you plan to govern who can add/remove, migrate or turn your workloads up/down, to ensure your bill isn’t 3x what you expected it to be. This can also help optimize your environment to minimize operating expense while still providing the right user experience.

Total Cost of Ownership Considerations  

It’s imperative to identify and weigh the value of TCO variables when considering a move to the cloud.  Analysis should include the evaluation of:

  • Total cost of hardware/ software; including contracts and licensing renewals
  • Cost of a full-time employees for management (or percentage of time of a FTE)
  • Risk
  • Downtime/ resiliency to downtime
  • Flexibility and scalability of solution
  • Vendor management
  • Data Center space
  • Connectivity 

Costs aren’t always linear, so it’s also important to understand the break points; where your infrastructure still has shelf life. This allows you to make the most of the existing infrastructure you have and migrate to the cloud over time versus all at once.

Operational Considerations

 Upgrades & Patches– Understanding who is responsible for what in the cloud is critical to success. Determine, upfront, who will execute the tasks, you or the service provider. It’s also important to note how soon to patch after it’s been released. If the provider does this for you, ensure that they have a roll back strategy in case any issues arise with the patch.

 Managed/ Unmanaged –  Understand the level of support required per workload, then determine who you want to manage these workloads. If you want an SLA and to transfer risk, a service provider can provide the audibility, change management and enterprise grade monitoring/patching tools to support your workloads, freeing your IT staff to focus on more strategic initiatives.  

 Process–  Assess the software tools, change management procedures, auditability for compliance and the integration of systems between you and your provider. It’s also important to ask if the provider provides a customer runbook, where everything is documented and issues can be remediated regardless of who would be on staff during a potential outage. This is a major benefit of a 24/7 service provider.  

Workload Mobility–  Having a clear understanding of what your workloads can run on is key for portability. In addition, network configuration considerations come into play. How do you tie your networks together? How do you get from one platform or provider to another? How do you plan to ensure they are secure and enable quick movement of workloads between them? Understanding these variables will help you to better decide where to place your workloads.

 Finding Your Cloud Guru

Deciding how to allocate workloads to the cloud is complex and what you choose will affect the benefits you get from your cloud deployment. Partnering with an experienced provider can help. OneNeck IT Solutions offers a free hybrid cloud assessment to help you understand your cloud needs and balance your workloads the right way. With our experience architecting, deploying, and managing hybrid cloud solutions based on Microsoft Azure, OneNeck is the cloud guru you need to guide you through your hybrid cloud practice.

 

]]>
Using (SIEM) Technology to Combat Alert Fatigue https://www.oneneck.com/blog/security/using-siem-to-combat-alert-fatigue/ Tue, 02 Oct 2018 19:30:00 +0000 https://www.oneneck.com/blog/security-using-siem-to-combat-alert-fatigue/ Early detection, rapid response, collaboration to mitigate advanced threats imposes significant demands on today’s enterprise security teams. According to a report from the Ponemon Institute, of the 17,000 malware alerts the average organization receives weekly, less than a fifth are reliable. They also state that false alerts cost organizations $1.27 million annually. It’s to no […]]]>

Early detection, rapid response, collaboration to mitigate advanced threats imposes significant demands on today’s enterprise security teams.

According to a report from the Ponemon Institute, of the 17,000 malware alerts the average organization receives weekly, less than a fifth are reliable. They also state that false alerts cost organizations $1.27 million annually.

It’s to no surprise that the overwhelming volume of alerts has cause IT teams in many organizations to experience “alert fatigue”

Alert fatigue is the threshold at which it becomes too difficult for IT teams to recognize the important alerts from the stream of everything that they receive, says Maxine Holt, principal analyst at the Information Security Forum (ISF).

But… threats aren’t going away anytime soon, and the number of endpoints your team manages is only going to increase, so how can you mitigate alert fatigue? Enter security information and event management (SIEM) technology.

What is SIEM?

Gartner defines SIEM as technology that supports threat detection and security incident response through the real-time collection and historical analysis of security events from a wide variety of event and contextual data source. SIEM

  • Supports threat detection and security incident response through the real-time collection and historical analysis of a wide variety of data sources
  • Supports compliance reporting and incident investigation through historical data analysis
  • Is capable of broad-scope event collection and correlating and analyzing events across disparate sources

How Does SIEM Work?

SIEM software collects and aggregates log data generated throughout the organization’s technology infrastructure.

The software then identifies and categorizes incidents and events, as well as analyzes them. The software delivers on two main objectives, which are to:

  • provide reports on security-related incidents and events, such as successful and failed logins, malware activity and other possible malicious activities and
  • send alerts if analysis shows that an activity runs against predetermined rulesets and thus indicates a potential security issue.

 Connecting the Dots with SIEM

With SIEM technology in place, organizations can centralize, index, and visualize event data from multiple sources.  From this ‘single pane of glass’, SIEM tools show you actual, potential threats that your team can then investigate and triage.

SIEM technologies are not meant for teams to “set it and forget it.” The ongoing development and management of the SIEM is key to ensuring that an organization maximizes its capabilities for use in detecting threats.

The Advantage of a Managed SIEM

Managing a SIEM can be a daunting task…tuning the alerts, optimizing the reports, triaging alerts.

That’s why OneNeck® IT Solutions offers a scalable Security Information and Event Management (SIEM) service for our customers. Our SIEM  service includes log aggregation, analysis and storage for most any type of system or device that generates log events or system log messages. In addition, we facilitate rapid incidence response, log management and compliance reporting.

Speak with a OneNeck security specialist today about how our comprehensive approach to SIEM can protect your data and your business.

]]>
Understand Data Before Migrating to the Cloud https://www.oneneck.com/blog/cloud/migrating-to-the-cloud-starts-with-understanding-data-and-strategy/ Tue, 25 Sep 2018 18:30:00 +0000 https://www.oneneck.com/blog/cloud-migrating-to-the-cloud-starts-with-understanding-data-and-strategy/ Most CIOs today are either considering moving to or are already in the process of migrating to the cloud, whether it’s public, private or a hybrid combination. But in order to strategically migrate to any cloud solution, applications and supporting data environments and services must be clearly defined. With the availability of cheap storage and […]]]>

Most CIOs today are either considering moving to or are already in the process of migrating to the cloud, whether it’s public, private or a hybrid combination. But in order to strategically migrate to any cloud solution, applications and supporting data environments and services must be clearly defined.

With the availability of cheap storage and the explosion of new data being created every day, companies are struggling with truly understanding their data environments. It’s not that they can’t find the right data, but they often THINK they have the right data when they actually don’t, as the real data may exist in multiple systems and only partially accurate as it relates to some other data or process. This is why the popularity of Information Lifecycle Management (ILM) practices has grown so dramatically, as the need to manage the flow of information system’s data across an organization is mounting in importance.

Up until a few years ago, most CIOs were content to let the data keep growing and buy more storage if necessary. But now with the push towards the cloud, CIOs are forced to bundle applications, data and services, as well as plan migrations. But in order to accomplish this, an organization’s data environment must be clearly defined, so that applications and services don’t break when the migrations occur.

While CIOs today are all in with the cloud, most do not know where to start or what to consider when defining their data environments.

In our experience in working with our customers here at OneNeck, there are at least five areas to consider.

  1. What are the characteristics of the data?
    Data typically has some relational correlation to other data. What are these relationships?  How do these data pieces interact with each other? Is the data time-sensitive? After a certain time-period, is the data no longer relevant? Is the data context sensitive? What is the size of the data? How fast is it growing? How fast can it be retired and/or deleted?
  1. What are the data entities?
    By entities, we mean groups of data and how they relate to other entities and applications. This is the big picture of data and how it relates and flows thru systems.
  1. Who owns the data, and who is the steward?
    A business person (outside of IT) typically owns the data, and the IT person who helps take care of the data is known as the data steward. Who are these people, and what are their responsibilities to the data? Who decides what data is needed? Who decides the processes that flow and interact with the data? Who maintains the systems that the data runs on? Who is responsible if the data is inaccurate, or unavailable?
  1. What is the data lifetime and criticality?
    How important is this data? How long is the data valid? How fast do we need it?
  1. What’s important to YOUR business?
    What are the critical pieces of data or systems that are important for your day-to-day business operations?

BobH-1In Summary…

At OneNeck, we get it. We see organizations struggling with these issues as they attempt to manage their data and consider migration paths to various cloud platforms. That’s where we come in and help. As part of our Advanced Services group, we can help you define YOUR data, giving you the starting point in a step-by-step approach to the cloud. Rome wasn’t built in a day, and neither is your cloud strategy. So, slow down and start with a clear view of your data, and you won’t regret it…

Interested in hearing about how my team has helped some of our clients get control of their data? Check out this eBook with real-world case studies.

2018-09-25_ebook-download


DOWNLOAD NOW

]]>
Reasons to Outsource Database Management https://www.oneneck.com/blog/5-key-reasons-to-outsource-your-application-database-management/ Fri, 21 Sep 2018 17:00:00 +0000 https://www.oneneck.com/blog/5-key-reasons-to-outsource-your-application-database-management/ To be competitive, enterprises need to deliver new products, update processes and improve services that will drive new business, increase profits, and cut costs – all while asking IT to do more with less. As the pace of innovation increases, many IT organizations find themselves stretched impossibly thin and struggling to keep pace. Where is […]]]>

To be competitive, enterprises need to deliver new products, update processes and improve services that will drive new business, increase profits, and cut costs – all while asking IT to do more with less. As the pace of innovation increases, many IT organizations find themselves stretched impossibly thin and struggling to keep pace.

Where is IT struggling to keep up?

When being asked to do more with fewer resources and limited budgets, critical projects take a back burner — for example, monitoring and maintaining systems become a low priority, cloud migration projects are delayed and proactive security measures may suffer.  End users become frustrated by the lack of IT support, and business units adopt solutions that are not sanctioned by IT, creating Shadow IT. The results are application conflicts, duplication of services between departments and new vulnerabilities in the network. 

Outsourcing application and database management can ease the burden on your IT department, tap into the resources you are lacking, improve efficiencies, free up your in-house IT staff to focus on those projects that make a positive impact on your growth, and even improve your overall security posture.

Benefits of outsourcing application and database management include:

  1. 24/7 support: Today’s businesses are always-on, and lean IT staffing makes it difficult to provide true 24/7 support, especially for global organizations. Pushing current staff to handle after-hours support cannot only get expensive, but it often results in reduced team engagement and job satisfaction. Outsourcing some support functions means that your staff is freed up to focus on core projects that can improve overall support.
  2. IT agility: When IT organizations are stretched thin, the can only do the minimum to maintain application and database servers. This means that they don’t have time to focus on more strategic tasks, like developing new applications or improving operational efficiencies.
  3. Ease the talent crunch: Good IT talent is hard to find and comes with a premium. With limited qualified candidates, it can be difficult to construct an IT team that delivers the breadth and depth of the expertise that is needed. Outsourcing provides you with a pool of available experts to help you meet your goals.
  4. Free up resources: When working with a quality IT service provider, you gain access to top-quality talent, on-demand, freeing your internal team to focus on other IT initiatives, like cloud migration, virtualization or other mission critical projects to bolster the business’ bottom line.
  5. Save money: There are economies of scale to be gained when outsourcing application and database management tasks. Access to a larger variety of resources ultimately saves you the budget and burden of hiring a consultant or another full-time employee.  Outsourcing services can also provide you with access to innovative technologies that you would otherwise have to budget for.

Read more in our eGuide: IT Outsourcing Pros and Cons.


IT Outsourcing Pros and Cons

]]>
Digital Transformation Needs for Your Business https://www.oneneck.com/blog/managed-services/digital-transformation-needs/ Thu, 20 Sep 2018 19:00:00 +0000 https://www.oneneck.com/blog/managed-services-digital-transformation-needs/ You can’t focus on self-actualization before meeting basic needs such as hunger and shelter. And, you shouldn’t pursue transformative IT modernization until your current workload environments are stable and secure. Just as renowned psychologist Abraham Maslow noticed an order humans follow in terms of motivation and development, so too do organizations have a hierarchy connected […]]]>

You can’t focus on self-actualization before meeting basic needs such as hunger and shelter. And, you shouldn’t pursue transformative IT modernization until your current workload environments are stable and secure.

Just as renowned psychologist Abraham Maslow noticed an order humans follow in terms of motivation and development, so too do organizations have a hierarchy connected to IT needs.

OneNeck Vice President of Advisory Consulting Jeff Budge explained the different phases and outcomes of digital transformation in an eye-opening webinar with 451 Research on data integration, management and governance.

Maslow’s hierarchy of human needs follows this order:

  • Physiological Needs
  • Safety Needs
  • Social Belonging
  • Esteem/Status
  • Self-actualization

OneNeck’s hierarchy of digital transformation needs follows these steps:

  • Stability and Security
  • Optimization
  • Automation
  • Leverage
  • Evolve
  • Transform

Here’s how these IT needs would appear visualized as a digital transformation pyramid.

DX Pyramid digital transformation for businesses

Level 1 | Stabilize and Protect

Budge says OneNeck has many customers starting at this point in a digital transformation journey.

“They’re working to mature their application and technology environments,” he explains. “They’re focused on workload stability, disaster recovery and multi-location resilient architecture to make sure applications are available for their users. They’re also working on security, compliance and uptime.”

Level 2 | Optimize

More and more of our customers have moved into this category as they mature and identify ways to get the most out of workloads while ensuring they are optimized for growth and an increase in volume.

“These organizations are looking to optimize application environments,” Budge says. “That could involve examining existing applications and underlying data to understand the best ways for them to operate from a performance perspective.”

We also see organizations pursuing modernization projects that optimize the cost of operations, especially with all the execution venue choices available.

“With so much cloud competition and pricing variation, cost optimization has become a hot topic for the companies we serve,” Budge adds.

Level 3 | Automate

Automation is yet another hot topic that’s driving digital transformation across industries. From an IT perspective, this phase involves taking a combination of applications and their data flows and automating how that information moves and is validated.

“Automation is beneficial for both standard business processes as well as specific IT automation needs such as ensuring backups, recoveries, clones and patches are as automated as possible,” says Budge.

Level 4 | Leverage

Budge says this is the phase that many organizations should be striving to reach. That’s because it means IT is shifting its focus to providing additional business value through application modernization. Budge reminds us that there’s been a resurgence of leverage as companies look to use advanced analytics and data visualization tools in the same way they leveraged business intelligence and decision support tools.

“The application has gathered the data, and you have multiple integrated apps that help create a complete picture of a customer, product or some other portion of the business,” he explains. “Now, you want to get better leverage out of that data using analytics to make better business decisions.”

Level 5 | Evolve

While evolving workloads, IT experts are finding ways to enhance, improve or upgrade the way things work without changing an application’s core functionality. This could include adapting or modifying applications so they can move to the cloud.

Level 6 | Transform

When an organization arrives at the top level of the hierarchy, it is often taking on the role of an innovative leader in the industry and implementing true digital transformations. It involves significant changes to or repurposing of a workload to drive business results with the potential to revolutionize the industry.

Noteworthy examples of this level of digital transformation could include disruptive innovations such as streaming media, ride-sharing and drone delivery, all of which require IT modernization solutions to completely transform.

Time to Level Up? Trust OneNeck

No matter where you may fall in this outline of digital transformation needs, OneNeck has IT solutions to support your strategy and the implementation of IT projects large and small. Whether you need Managed IT Services so your in-house talent can focus on more impactful work, or you want the expert guidance of our Advisory Consulting services, OneNeck is prepared to be a reliable partner in digital transformation. Let us help you embrace change and move your company forward. Contact OneNeck today!

]]>
Choosing a Security Framework https://www.oneneck.com/blog/security/choosing-a-security-framework-solution/ Thu, 13 Sep 2018 20:00:00 +0000 https://www.oneneck.com/blog/security-choosing-a-security-framework-solution/ Running a security program can be an overwhelming task. There are so many factors to consider including: encryption, application security, disaster recovery and let’s not forget adherence to compliance mandates such  HIPAA and PCI DSS .  How then do security professionals prioritize and maintain their efforts to build the most effective security program for their business?That’s […]]]>

Running a security program can be an overwhelming task. There are so many factors to consider including: encryption, application security, disaster recovery and let’s not forget adherence to compliance mandates such  HIPAA and PCI DSS .  How then do security professionals prioritize and maintain their efforts to build the most effective security program for their business?That’s where an IT security framework comes in.

What is an IT Security Framework?

A security framework is a comprehensive strategy for going toe-to-toe with potential threats while keeping data secure. It is a tool that provides methodology and a calculated process for assessing risk to determine where resources need to go to protect the information systems within an organization.

Examples of IT Security Frameworks

While there is a plethora of security frameworks out there, this blog aims to highlight the most common frameworks leveraged today including:

NIST Cybersecurity Framework

Created by the federal government, this voluntary Framework consists of standards, guidelines, and best practices to manage cybersecurity-related risk.  The Cybersecurity Framework’s prioritized, flexible, and cost-effective approach helps to promote the protection and resilience of critical infrastructure and other sectors important to the economy and national security.

ISO 27001 ISMS

The ISO/IEC 27000 is a key international information security standard aimed to help organizations manage the security of assets such as financial information, intellectual property, employee details or information entrusted to you by third parties.

ISO/IEC 27001 is the best-known standard in the family providing requirements for an information security management system (ISMS).

What is an ISMS?

According to ISO, An ISMS is a systematic approach to managing sensitive company information so that it remains secure. It includes people, processes and IT systems by applying a risk management process

CIS

The Center for Internet Security (CIS) Top 20 Critical Security Controls (previously known as the SANS Top 20 Critical Security Controls) are a prioritized set of actions that collectively form a defense-in-depth set of best practices that mitigate the most common attacks against systems and networks.

A principal benefit of the Controls is that they prioritize and focus a smaller number of actions with high pay-off results. The Controls are effective because they are derived from the most common attack patterns highlighted in the leading threat reports and vetted across a very broad community of government and industry practitioners. The Controls take the best-in-class threat data and transform it into actionable guidance to improve individual and collective security in cyberspace

Choosing the Right Security Framework to Fit Your Business

A structured approach to selecting a security framework starts with understanding the security requirements and risks that are unique to your business and your industry. Many industries including healthcare, government, education and financial have industry specific security compliance regulations they must adhere to.

If your organization is not bound by any industry specific mandates pick a framework and ride it. Ensure you educate yourself on the entire framework, but don’t overwhelm your organization and try to tackle every control at once.  Pick the pieces that you will have quick wins… in other words pick a control in which you can obtain quickly and start there.

Katie McCullough, Former Chief Information Security Officer at OneNeck, suggests that CIS top 20 is a great place to start.  “As noted by the CIS, its top 20 is relatively small number of prioritized, well-vetted, and supported security actions that organizations can take to assess and improve their current security state.” McCullough. “CIS Controls 1 through 6 are essential to success and should be considered among the very first things to be done. We refer to these as “Cyber Hygiene” – the basic things that you must do to create a strong foundation for your defense.”

Don’t go at it alone

OneNeck, is here to help you address the broad scope of security and compliance needs that today’s businesses face. We have a depth of experience in assisting our customers with their security needs, and our team is made up of security experts who stay current on the emerging threats so you don’t have to.

Understanding your security gaps is key to addressing regulatory obligations and protecting your organization from breach. We can help by conducting assessments designed to identify vulnerabilities in your IT systems and gaps in your security program, followed by a thorough gap analysis that will leave you with a roadmap to remediation and compliance.

OneNeck Security Assessment and Strategy services include:

  • Cybersecurity Assessment
  • Framework assessment & implementation
  • Policies & Standards„
  • Penetration Testing
  • Vulnerability Management

Contact us to learn more .

]]>
Ask the Expert – Multi-Cloud: Keep Security Front and Center https://www.oneneck.com/blog/multi-cloud-considerations-security-solutions/ Tue, 11 Sep 2018 19:00:00 +0000 https://www.oneneck.com/blog/multi-cloud-considerations-security-solutions/ What we’re seeing in the industry today is that most of our customers aren’t adopting a single platform for all of their workloads. Depending on a plethora of factors (RTO/RPO, application requirements, latency requirements, etc.), it truly is becoming a multi-cloud world. But with lots of options comes complexity. In this blog series, we attempt […]]]>

What we’re seeing in the industry today is that most of our customers aren’t adopting a single platform for all of their workloads. Depending on a plethora of factors (RTO/RPO, application requirements, latency requirements, etc.), it truly is becoming a multi-cloud world.

But with lots of options comes complexity.

In this blog series, we attempt to tackle some of the key considerations when making workload placement decisions. This month, we’re talking with Derek DeHaan about multi-cloud security considerations when deciding the best execution venue for your workloads.

 


2018-09-11_Ask-the-Expert-Series-DEREK

You spend a lot of time with OneNeck’s customers, helping them understand their options for their workloads, as well as the potential risks and rewards. Based on your unique perspective, what do you see as the most important consideration when looking at security’s impact on a workload platform choice?

The most important consideration we’re seeing with our customers today is understanding what security framework you need to comply with. And what I mean by that is, for instance, the NIST framework has a definition of cloud computing and how cloud security should be applied in cloud-like workloads. If that’s what you’re going to conform to, we can absolutely help you with that. Azure and AWS both conform to that, and we at OneNeck are going down that same path. Big key here is that you need to understand first what you are trying to achieve, and then identify what platforms will help you achieve that security framework.

What about regulatory compliance?

If you have PCI, or HIPAA or SOC compliance mandates, it’s important to understand those workloads that are subject to those compliance needs. If those workloads are subject to say SOC 2 or PCI level 1, some of the platforms may not be a good fit for those workloads. It will help you determine which workloads can reside where and help you setup the appropriate connectivity between platforms to ensure a successful multi-cloud strategy.

We hear a lot these days about endpoint protection. Why is it such a critical part of an organization’s multi-cloud security strategy?

Endpoint protection can really be divided into two areas: servers and end-user devices. End-user devices are a little bit different, but always need to be a consideration. The servers however are extremely important. Some of the private cloud managed service providers will provide antivirus and some of those end-point server protections as part of their managed services offering. It’s key to understand if that’s a necessity for your company, and who will be providing the necessary licensing – the MSP or your organization. But this needs to be part of the upfront conversation with any service provider you’re considering partnering with to ensure you have it covered when you go to implement your chosen solution.

With today’s threat landscape continually becoming more sophisticated, we all know a layered approach of defense is critical, so that if an attacker is able to bypass one layer, another layer stands in the way to protect the organization. Two of the more common tools used to secure networks are firewalls and intrusion prevention systems. What should be considered here?

With all the security threats out there today, this is becoming much more of a hard-fast requirement for many of our customers. Some companies already have this implemented in their own hosted data center or hosted virtualized infrastructure, but service providers are moving towards making this a requirement.

You can sign up for this on the hyperscale, public cloud provider side as a virtual machine or appliance that runs in your environment. At OneNeck, we go ahead and provide that as dedicated firewalls to ensure that you’re getting those services. So, it comes back to understanding those workloads, and do we need to have intrusion prevention? What type of firewall services are going to be important? Do we want packet inspection or layer 4-7 detailed packet analysis to understand what our internal employees or customers are doing with transmitted data? All important questions to ask.

Does segmentation of the business applications impact platform choice?

This takes us back to the security frameworks and regulatory compliance discussion. First off, it’s important to understand your application dependencies, and then how you can segment out chunks of the business.

Maybe a simple example is your web servers. There may be a web server connected to a database server, and those two don’t connect to anything else in the business – they serve up your web page and can be a standalone group of servers. That would then be considered a segment that would be an ideal candidate for a hyperscale public cloud, because it can easily and automatically scale for seasonality, and it doesn’t need to be connected to any of the other infrastructure. This can be very cost effective, and you can go ahead and let it do its thing in the public cloud.

As any provider like OneNeck sees on a regular basis, one of the biggest multi-cloud security challenges is around management. What would you recommend as a solution to an IT team looking at centralizing their security management?

When you start looking at all of the different platforms that you can put your workloads on, centralized security management becomes key. You have to understand how you’re going to bring back security data that’s going to be overarching on your public cloud, your hosted private cloud and your on-premise workloads – all of them might have different security software that is analyzing and watching for intrusion and things like that. So, you need to know what’s going to sit at the top and give you that single pane of glass that allows you to look at or tap into all areas and provide appropriate correlation of the events to ensure best response possible should a breach occur.

What’s an example of a common solution you’re seeing our customers use today?

OpenDNS is one that many of our customers are adopting. It allows them to go out and basically make their domain name available in multiple places for redundancy reasons, as opposed to going to a single DNS registrar. So, as you look at security for DDoS attacks and other things that are happening to websites and customer’s environments, OpenDNS is one of those solutions that’s a consideration to prevent that from causing your organization an unwanted outage/down time.

Any final thoughts for our readers?

Remember this is just one small area that needs to be considered in the overall picture, but when you break it down like this, it makes it much easier to tackle. It is always important to do the best you can to define your requirements up front to ensure you get the correct solution and platform for your workloads. Be sure to also vet out the providers and platforms you choose ahead of the final move, as you want to do the best you can to reduce any unwanted surprises around capabilities after a decision has been made. This due diligence will help guide you to the most appropriate solution and will help your organization succeed when it comes to your overall cloud strategy.

Want to learn more? Download our Multi-Cloud Toolkit.

]]>
Uptime Institute Case Study Features OneNeck Data Centers https://www.oneneck.com/blog/uptime-institute-features-oneneck-data-centers/ Thu, 06 Sep 2018 18:30:00 +0000 https://www.oneneck.com/blog/uptime-institute-features-oneneck-data-centers/ When it comes to our OneNeck data centers, they are extremely secure, symmetrical, automated, responsive and awesome, but practical for all use cases. They are purpose-built and designed for mission-critical IT operations and hosting. Optimized for performance and dependability, our data centers also deliver uninterrupted uptime along with security, physical asset protection and workflow separation […]]]>

When it comes to our OneNeck data centers, they are extremely secure, symmetrical, automated, responsive and awesome, but practical for all use cases. They are purpose-built and designed for mission-critical IT operations and hosting. Optimized for performance and dependability, our data centers also deliver uninterrupted uptime along with security, physical asset protection and workflow separation — backed by clear and thorough 100% SLAs.

In addition, there is no better team of professionals than the employees in place at OneNeck’s data centers.

Of course it’s easy for me to tell our customers and prospects all of this! However, the best way to illustrate our commitment is to back it with a certification and a stamp of approval from the Uptime Institute. That’s precisely what we did at our facilities in Denver, Colorado and Bend, Oregon. Our efforts — and importance of these efforts — were highlighted in a new Uptime Institute Case Study.


READ THE CASE STUDY NOW

]]>
4 Successful Digital Transformation Case Studies https://www.oneneck.com/blog/digital-transformation/forward-to-the-future-four-digital-transformation-success-stories/ Tue, 04 Sep 2018 19:00:00 +0000 https://www.oneneck.com/blog/digital-transformation-forward-to-the-future-four-digital-transformation-success-stories/ Whether you’re in the C-Suite or the IT department, digital transformation is a topic no company can ignore. However, finding the best way to implement change within your organization can be daunting, and garnering support at all levels is no small task. To help, we’ve compiled four IT success stories from across a variety of […]]]>

Whether you’re in the C-Suite or the IT department, digital transformation is a topic no company can ignore. However, finding the best way to implement change within your organization can be daunting, and garnering support at all levels is no small task.

To help, we’ve compiled four IT success stories from across a variety of industries. The one thing these case studies have in common? The organizations understood the importance of digital transformation and the need for an experienced IT solutions provider.

City of Minneapolis

1. IT Transformation Driving Real Results for a Booming City

The Challenge:

The City of Minneapolis was in need of a new IT partner and a wide variety of services. Because of its aging infrastructure, the city was looking for a provider offering cloud and managed services that included server, storage, network, security, database, OS and data protection services. With such a long list, sensitive data and only 10 months to do it, they knew they needed someone with experience that they could trust.

Our Solution:

The City of Minneapolis partnered with OneNeck because of the flexible support they knew they would receive from start to finish. This massive project was completed within the tight timeframe despite a few hiccups along the way. For example, OneNeck quickly learned that to implement the Criminal Justice Information System, the entire Operational Support team of more than 100 professionals would have to undergo the city’s security clearance screenings. While this would take additional time and resources, both teams knew it was an imperative step in completing the full transformation. Challenges aside, both the City of Minneapolis and OneNeck actively engaged with open lines of communication as they updated the IT environment and migrated data and workloads to the cloud. The city expects to save more than $3 million annually with OneNeck’s support and has plans to implement new upgrades in the future.

famous-daves-logo

2. Legacy Hardware Ate Up Data and Dollars

The Challenge:

Famous Dave’s was in need of an upgrade. The restaurant, which includes more than 150 locations nationwide, still relied on a legacy system that was draining both time and financial resources. As the hardware was reaching end of life, Famous Dave’s decided they weren’t interested in a tune up; they needed a fresh start with a third-party IT vendor.

Our Solution:

After reviewing several vendor options, Famous Dave’s selected OneNeck and our hosted private cloud solution, ReliaCloud® FLEX. The customized solution featured a fully-hosted and managed Infrastructure as a Service (IaaS) platform housed in a OneNeck data center. By partnering with OneNeck, Famous Dave’s was able to eliminate the requirements of day-to-day IT maintenance. Not only did this help reduce the restaurant’s IT spend, it also ensured high availability of applications and data.

“OneNeck took a consultative approach, providing us with options around public and private cloud as well as colocation. They walked us through each solution and helped us determine what the best fit was to help meet our business needs.” – Matt Ambuehl, Director of Information Services at Famous Dave’s

Sunny-delight-logo

3. Lack of IT Talent with Little Time to Spare

The Challenge:

Sunny Delight Beverages was ready to upgrade and advance into the future with Microsoft Dynamics AX2012 on Azure. However, they were in a bind with only three weeks to make the transformation and little to no in-house experience with the warehouse management system. It quickly became obvious they were running out of time and in need of help.

Our Solution:

Because of our deep knowledge and understanding of the upgrade at hand, Sunny Delight trusted OneNeck’s ability to not only implement the new solution but also simultaneously run the older version. This prevented any valuable time from being lost during the introduction of the hybrid cloud solution. Despite not having the in-house expertise, Sunny Delight was able to utilize end-to-end management of the AX environment on Azure and simplified deployment and LCS integration through OneNeck’s services. This allowed them to not only successfully transition to the new platform but also complete the project within three weeks.

targus-logo

4. A Global Company Needed to Go Modern

The Challenge:

Targus, the leading global supplier of mobile computing cases and accessories, needed to make critical decisions about the future of the business. The lists of tasks ranged from eliminating paper and manual processing systems to increasing supply visibility and centralizing applications. The company realized they needed to not only implement an ERP solution but also centralize IT without creating a traditional department. Looking to truly realize their potential as a global player, Targus turned to OneNeck.

Our Solution:

After traveling to sites around the world with Targus executives, OneNeck was ready to complete a situational assessment that included existing infrastructure, user requirements and business objectives, and then went to work. Based on our feedback, Targus was ready to establish a centralized technical environment featuring a global network, which helped facilitate improved communications company-wide. Next, we worked with the brand to implement Baan Finance and Baan Distribution/Logistics to better streamline supply chain management. Finally, OneNeck configured and implemented the automation of the package rating and shipping process and a freight management solution. Within 20 months, Targus’ transformed IT environment was both centralized and globalized all with the help and support of OneNeck.

“Targus had no organized IT infrastructure — even at the regional level. We were challenged with creating a scalable IT environment that could be centrally managed and supported in order to serve as the foundation for globalizing our communications, supply chain and financial systems. We wanted to do all of this without creating a significant in-house IT department. We reviewed all the big players and decided a middle-market specialist with deep ERP expertise and global experience would be the best fit for us. We chose OneNeck, and we’re very glad we did.” – Mark See CIO, Targus Group International

Digital transformation isn’t a one-size-fits-all solution and doesn’t happen overnight. OneNeck provides services that come as part of a partnership, which means we are with you every step of the way. Contact us to learn more.

]]>
Future of Industrial Wireless Networks on the Factory Floor https://www.oneneck.com/blog/managed-services/future-wireless-factory-floor-network-solutions/ Tue, 28 Aug 2018 19:00:00 +0000 https://www.oneneck.com/blog/managed-services-future-wireless-factory-floor-network-solutions/ The challenges faced by today’s manufacturer are in many ways the same as they’ve been in the past: maintain the right amount of inventory, optimize production efficiency and never lose sight of quality. Yet addressing these challenges has become more tied to the underlying technology than ever before. Innovation and digital manufacturing are now made […]]]>

The challenges faced by today’s manufacturer are in many ways the same as they’ve been in the past: maintain the right amount of inventory, optimize production efficiency and never lose sight of quality. Yet addressing these challenges has become more tied to the underlying technology than ever before.

Innovation and digital manufacturing are now made possible with the infrastructure, which brings full network capability and wireless-enabled applications and systems that cuts costs while increasing productivity and output.

To keep up, manufacturers are updating their facilities and network infrastructure to take advantage of today’s industrial wireless network capabilities, and experiencing significant business benefits:

  • Uptime and productivity: In manufacturing, time is most definitely money, and when production is halted, thousands of dollars can be lost in a matter of minutes. By connecting the people running the line with the machines right on the floor, today’s wireless technologies can accelerate decision making and keep the workforce close to where the production is happening.
  • Cost reduction: Aside from the obvious cost savings of wireless over wired, there are other reasons a modern wireless network can impact the bottom line. Wireless enables faster time to market with increased communication efficiencies and reduced complexities.
  • Real-time decision making: Like any modern business, the faster decisions can be made in response to market shifts, the more quickly those decision impact the business. Wireless collaboration in a manufacturing facility not only increases collaboration, but drives a whole new level of visibility across the factory floor, giving employees the power to resolve issues faster. In addition, the impact that mobile devices can have, empowering employees throughout the plant to work where they’re needed most is changing the game for today’s manufacturer.

It’d be hard to dispute the impact that industrial wireless networking has had in manufacturing, but there are often still misconceptions around its reliability, security, bandwidth and latency. In this informative Cisco eBook, they explore some of these misconceptions and offer some tips for getting wireless right in today’s modern manufacturing.

]]>
Slow Cloud Adoption | OneNeck Managed Cloud Service Provider https://www.oneneck.com/blog/cloud/slow-and-steady-wins-the-race-to-cloud-services/ Tue, 14 Aug 2018 19:00:00 +0000 https://www.oneneck.com/blog/cloud-slow-and-steady-wins-the-race-to-cloud-services/ If there’s one thing that large enterprises all the way down to mom-and-pop shops have in common, it’s the lure of the quick win. Every business is hyper focused on the bottom line, and what they can do to drive quick growth, which has been one of the primary drivers in the race to the […]]]>

If there’s one thing that large enterprises all the way down to mom-and-pop shops have in common, it’s the lure of the quick win. Every business is hyper focused on the bottom line, and what they can do to drive quick growth, which has been one of the primary drivers in the race to the cloud. It just makes sense. The cloud enables faster delivery of services, in turn, faster profit.

And while it seems like most organizations are sprinting at a breakneck speed to the cloud, there are many reasons it makes sense to slow down and take a more methodical and strategic pace. This means adopting the cloud on a project-by-project basis, leading to an overall cloud adoption based on many individual successes.

The benefits of this approach can lead to…

  • Cloud and People Alignment: When you think about how the average person operates, we tend to think and deliver in steps. We see an end goal, sure, but then chunk out the tasks that get us to that goal. It also gives us small accomplishments along the way, which goes a long way to building and keeping us positive as we strive toward a larger goal. Similarly, by tackling the move to the cloud in incremental projects, it gives IT teams, LOB stakeholders, and even leadership quick wins with faster return.
  • Leadership Support: By tackling the move to the cloud in smaller increments, it is easier to demonstrate ROI on a more-regular basis, building the necessary trust and buy-in that leads to increased funding for future cloud projects.
  • Upfront Planning Pays Off: Like any major initiative, the more time to plan, the better the outcome. Choosing the right cloud is only one part of the equation. The applications and workloads going into the cloud can add huge complexity. And then beyond that, how will they integrate with existing platforms, and where will the data intersect and reside? These are only a few of the factors that must be part of a comprehensive plan.
  • Clearly Articulated Migration Path: In a recent study conducted by 451 Research on behalf of OneNeck, they found that the biggest challenge for IT is the migration to off-premises cloud/hosted IT environments. This comes as no surprise as we continue to see our customers struggle with this very challenge on a daily basis. A fail-proof migration plan needs to include extensive upfront analysis to help identify the gaps between where the workload currently resides and what it will take to move it to the cloud. Then the actual migration must be mapped out, including connecting the cloud-based workload to on-premises applications, data migration and then testing to ensure it is optimized and meeting the needs of the business. And don’t forget to include the management of the workload once it is in the cloud.
  • Upfront Security Focus: In today’s landscape of increasing cyberthreats, no organization can afford to lose sight of security. Yet often with numerous and disparate cloud migrations in process, things slip through the cracks. Security should be a top priority at all times, but it’s critical to make an evaluation of your security needs in the early stages of cloud migration planning. Do you have visibility across your cloud platforms from a single pane of glass? What security frameworks are your cloud providers utilizing? Are there compliance mandates, like HIPAA or FedRAMP you need to consider? And one of the biggest challenges, what are the dependencies among your workloads in various platforms? A tactical and step-by-step approach to cloud adoption can help ensure that gaps in security aren’t missed, keeping you safe in the long run.

While a sweeping, let’s-go-for-it approach to cloud adoption can work, the short-sprint approach will most-often be a safer one that allows for demonstrated ROI throughout the process. And who doesn’t love a quick win?


pop-up-ad-jeff-budge-451-research-webinar-1

 

]]>
Cloud Saves Money… Myth or Reality? https://www.oneneck.com/blog/cloud-saves-money-myth-or-reality/ Thu, 02 Aug 2018 22:47:00 +0000 https://www.oneneck.com/blog/cloud-saves-money-myth-or-reality/  As you look at moving your IT infrastructure to the cloud, be aware of the myths especially around statements such as “With cloud, businesses can save money.” It’s reality, but can also lead to misunderstanding because true ROI is difficult to calculate. To better understand myth vs. reality, author Kevin Casey asked several cloud experts for […]]]>

 As you look at moving your IT infrastructure to the cloud, be aware of the myths especially around statements such as “With cloud, businesses can save money.” It’s reality, but can also lead to misunderstanding because true ROI is difficult to calculate. To better understand myth vs. reality, author Kevin Casey asked several cloud experts for their insights on common myths. He shares their responses in a recent The Enterprisers Project article.

scott morleyIn Myth 2, Scott Morley, Principal Application Architect at OneNeck IT Solutions, sheds light on why ROI can be tough to calculate and offers ways to better measure business value. Click to Morley’s insights.

 

 

 

 

 

 

                                                   

 

]]>
Back to the IT Security Basics | IT Security Services https://www.oneneck.com/blog/security/back-to-security-basics/ Tue, 31 Jul 2018 19:00:00 +0000 https://www.oneneck.com/blog/security-back-to-security-basics/ If there’s any constant in today’s technology landscape, it’s change. And when it comes to security, there’s no rest for the weary. Advancing technology, savvier-than-ever users and the onslaught of attacks are making today’s IT teams scramble to keep up. Now more than ever, it’s critical to make sure the basics are covered so that […]]]>

If there’s any constant in today’s technology landscape, it’s change. And when it comes to security, there’s no rest for the weary. Advancing technology, savvier-than-ever users and the onslaught of attacks are making today’s IT teams scramble to keep up. Now more than ever, it’s critical to make sure the basics are covered so that you have the ability to respond and keep your business safe.

Katie_McCullough oneneck it solutionsI recently sat down with OneNeck’s CISO, Katie McCullough, to discuss some of the key fundamentals organizations must keep in mind when developing a security strategy.

A few of Katie’s pointers were:

  1. Keep your software up to date. This may seem like a given, but many organizations struggle to make patching a priority when they’re busy just trying to grow the bottom line. But much like the Equifax breach, many attacks are avoidable with routine and timely patching.
  2. Educate and train your employees. The bad guys aren’t getting any dumber, and they know that phishing is still a great way to get inside your organization. No matter how many tools you have, if your employees aren’t trained to recognize phishing schemes, then no tool can keep you safe.
  3. Compliance measures aren’t just an operational burden. It’s critical to document your processes, train your teams on those processes and monitor their adherence to build the solid foundation to keep your organization safe.
  4. Develop and incident response plan. In the event that you do experience a breach, an incident response plan will help you know exactly what steps to follow so that you can respond quickly and mitigate the attack before it does even more damage.

These are just some of the tips Katie discusses in her Point of View Paper on security and compliance. If you’d like to read this insightful paper, download it now…


KatieM-POV-Digital-Ad

]]>
Avoid Cloud Sticker Shock | Complete Cloud Services https://www.oneneck.com/blog/avoid-cloud-sticker-shock/ Thu, 26 Jul 2018 19:00:00 +0000 https://www.oneneck.com/blog/avoid-cloud-sticker-shock/ As a business, moving your IT to the cloud is a major decision involving hours and hours of time, review, scrutiny and conversation. The last thing you want is sticker shock following your move to the cloud. Surprise fees are certainly a close second. To help you evade both, author Kevin Casey recently highlighted five […]]]>

As a business, moving your IT to the cloud is a major decision involving hours and hours of time, review, scrutiny and conversation. The last thing you want is sticker shock following your move to the cloud. Surprise fees are certainly a close second. To help you evade both, author Kevin Casey recently highlighted five tips for avoiding sticker shock and surprise bills in a just published The Enterprisers Project article.

scott morleyAccording to Scott Morley, principal application architect at OneNeck, “The cloud is deceptively easy to scale and there needs to be governance set up around it before deployments start. Locking down the environment, so only specific users can add resources, is critical.”

Scott goes on to talk about the number one way to prevent sticker shock and advises on the best means to avoid it, while others discuss the need to automate and implement cloud governance.
Click to read the article
.

To best optimize cloud spend, especially in a multi-cloud or hybrid cloud environment, Scott suggests it starts with understanding the demand an application will place on a server. He says, “There are many options cloud providers are giving to help reduce costs, such as reserved instances and burstable CPUs.”

Are you tracking how your server is being used? If not, it will be nearly impossible to judge cost savings because a misconfigured burstable server can actually end up costing more than a standard server. There are a number of tools that now offer this analysis.

“It’s really is just a numbers game,” concludes Scott. And OneNeck is ready to help you assess your needs and prepare for a move to the cloud, without sticker shock or surprise fees.

]]>
Consistent Disk Sizes +ASM Diskgroup | ERP Managed Services https://www.oneneck.com/blog/managed-services/consistent-disk-sizes-per-asm-diskgroup-is-best-practice/ Tue, 24 Jul 2018 19:00:00 +0000 https://www.oneneck.com/blog/managed-services-consistent-disk-sizes-per-asm-diskgroup-is-best-practice/ A recent MI and RCA brought this to light, and I thought it important enough to share with all of you.  This blog should provide detail, not just as to the best practice of having consistent disk sizes per +ASM diskgroup, but why it’s a best practice and  the impact of not following such best […]]]>

A recent MI and RCA brought this to light, and I thought it important enough to share with all of you.  This blog should provide detail, not just as to the best practice of having consistent disk sizes per +ASM diskgroup, but why it’s a best practice and  the impact of not following such best practice.

 When Oracle +ASM writes data to a diskgroup, it attempts to stripe that data across all disks in the group.  It will do so proportionally on a per disk basis.  So if you have 4 by 100Gb disks in DATA diskgroup, and you create a new tablespace with the SQL command CREATE TABLESPACE NEW_TS;  the database will create a tablespace of default size of 100M in the DATA diskgroup (provided of course, the parameter DB_CREATE_FILE_DEST is set to +DATA in the init or spfile.)  So the database will send the call to +ASM to create that new datafile, and +ASM will stripe that datafile proportionally, to all disks in the diskgroup, ultimately placing 25mb on each disk.  Great!

 But consider a DATA diskgroup with varying sizes – for instance 4 disks, with sizes 25Gb, 50Gb, 75Gb, and 250Gb.  When creating that same 100M tablespace, Oracle will attempt to create that datafile proportionally, attempting to write around 6mb to the first disk, 12mb to the second disk, 24mb to the third disk, and 58mb to the fourth disk.  Later, a decision is made to standardize on 100G lun sizes, so in a single operation the DBA issues an ‘Alter diskgroup DATA add disk DISK4, DISK5, DISK6, DISK7 drop disk DATA000, DATA001, DAT002, DATA003  [rebalance power x ] ;’   The database migrates the data from the old disks to the new disks, without interrupting the database operation.

 Unfortunately, the diskgroup is now in an ‘IMBALANCED’ state.  The imbalance, will may cause misinformation or at least implied misinformation to be presented.  This recently occurred in a production environment for one of our customer’s most important databases. The +ASM diskgroup via sqlplus and asmcmd showed more than 140Gb of free space, in a 4Tb DATA diskgroup.  However, when attempting to extend an existing table or create a new tablespace, the following errors were returned:

ORA-17502: ksfdcre:4 Failed to create file +DATA

ORA-15041: diskgroup “DATA” space exhausted

 So how could this be?  Both the +ASM instance and asmcmd clearly showed plenty of free space!  Here’s an excerpt from the Oracle documentation, (I added formatting for emphasis):

  • TOTAL_MB is the total usable capacity of a disk group in megabytes. The calculations for data in this column take the disk header overhead into consideration. The disk header overhead depends on the number of ASM disks and ASM files. This value is typically about 1% of the total raw storage capacity. For example, if the total LUN capacity provisioned for ASM is 100 GB, then the value in the TOTAL_MB column would be about 99 GB.
  • FREE_MB is the unused capacity of the disk group in megabytes, without considering any data imbalance. Therefore, there may be situations where the value in the FREE_MB column shows unused capacity but because one of the ASM disks is full, database writes fail because of the imbalance in the disk group. Make sure that you initiate a manual rebalance to force even data distribution which results in an accurate presentation of the values in the FREE_MB column.

How can we tell if we have disk imbalance in a +ASM diskgroup, as this is not something we monitor for?  The attached sql file asm_imbalance.sql will report imbalance.  Simply supply the diskgroup name when prompted.  Below is sample out from the script:

 SYS@+ASM>select max(free_mb) biggest, min(free_mb) lowest, avg(free_mb) AVG,

  2  trunc(GREATEST ((avg(free_mb)*100/max(free_mb)),(min(free_mb)*100/avg(free_mb))),2)||’%’ as balanced,

  3  trunc(100-(GREATEST ((avg(free_mb)*100/max(free_mb)),(min(free_mb)*100/avg(free_mb)))),2)||’%’ as imbalanced

  4  from v$asm_disk

  5  where group_number in

  6  (select group_number from v$asm_diskgroup where name = upper(‘&DG’));

Enter value for dg: DATA

 

   BIGGEST     LOWEST       AVG BALANC IMBALA

———- ———- ——— —— ——

     73280      54524     69863 95.33% 4.66%

 

One would think 4.66% is a tolerable amount.  However, in a 4Tb database 4.66% is 190Gb.  While the database and asmcmd reported 140Gb free space in the diskgroup, which was technically accurate, refer to the portion of FREE_MB description:  , without considering any data imbalance.  So because one of the disks was actually full, due to the data imbalance, database writes failed because of the imbalance in the disk group.

Follow up action for all DBA’s

The imbalance experienced here was extremely rare, however, it’s important to understand, this diskgroup WAS CURRENTLY using consistent sizes.  The diskgroup was made of 8 x 512Gb disks.  It was not, however, always that way.  Prior to January 2016, the diskgroup consisted of multiple different sizes.  It’s also important to mention the last sentence under FREE_MB is NOT entirely accurate:    Make sure that you initiate a manual rebalance to force even data distribution which results in an accurate presentation of the values in the FREE_MB column. 

]]>
Common Myths in the Cloud | OneNeck Cloud Services https://www.oneneck.com/blog/cloud/common-myths-in-the-cloud/ Fri, 13 Jul 2018 19:00:00 +0000 https://www.oneneck.com/blog/cloud-common-myths-in-the-cloud/ Friday the 13th – a day many dread. But what is it about the number 13? We’re afraid to have a 13th floor in buildings, airports go without a 13th terminal and prospective home owners steer clear of addresses with the number 13. How have we come to the point where the term paraskevidekatriaphobia, the […]]]>

Friday the 13th – a day many dread. But what is it about the number 13? We’re afraid to have a 13th floor in buildings, airports go without a 13th terminal and prospective home owners steer clear of addresses with the number 13.

How have we come to the point where the term paraskevidekatriaphobia, the fear of Friday the 13th, was created? Some point to biblical history, where the 13th apostle at the Last Supper, Judas, betrayed Jesus. Others reference Apollo 13, the space mission that never landed on the moon.

The list goes on and on — and the effect it has on our society is immense. According to the Phobia Institute Stress Management Center, approximately 20 million Americans suffer from this fear. An estimated $750 million is lost in business as consumers are hesitant to make purchases, travel or take any type of risk. Some do not even get out of bed for the day.

At the end of the day, the sun still rises and sets on every Friday the 13th, and people will continue to have their superstitions. So, maybe the best place to start is acknowledging and facing them.

Likewise, we see common fears in the world of technology. In recent years, there has been much fear around the advent, adoption and now management of the cloud. Is my data really secure in the cloud? Who can access it? What if the cloud fails?

But like most fears, with proper investigation, you’ll find them often unfounded. In this informative white paper, we explore some of the common “cloud myths” around cloud security, costs and loss of control, so you can make an informed decision as you move your data to the cloud.


GET THE WHITE PAPER NOW

]]>
Digital Transformation | Hybrid Cloud Solutions Provider https://www.oneneck.com/blog/cloud/digital-transformation-hybrid-cloud-solutions/ Thu, 28 Jun 2018 19:00:00 +0000 https://www.oneneck.com/blog/cloud-digital-transformation-hybrid-cloud-solutions/ Digital transformation enables IT to meet business demands but immediate transformation is not always the reality. This video demonstrates the reality of networks, customer environments and the immense gaps between the two. What’s the reality of bridging those gaps? More importantly, why bridge those gaps? How do smart networks meet business demands? And, how is […]]]>

Digital transformation enables IT to meet business demands but immediate transformation is not always the reality. This video demonstrates the reality of networks, customer environments and the immense gaps between the two. What’s the reality of bridging those gaps? More importantly, why bridge those gaps? How do smart networks meet business demands? And, how is it accomplished in a “do more with less” business landscape. What’s the true REALITY of digital transformation?

Video Transcription

Think about the reality of today’s technology environment. Think about that. Networks with true intuition. They learn, adapt, fix and secure in advance of problems or attacks, all on their own! That’s real – today!

The reality of networks is so complex – they have to manage more connected devices than people in the world. And, what about the reality of how complex those devices are? Your phone, more powerful than the combined computing power NASA had, when sending the first man to the moon. 

What’s more, traffic lights change, on their own, based on real time traffic patterns served from the network. Elevators diagnosing every critical component by leveraging data in the cloud.

What about heart monitors attached to your phone or watch – sending real-time data directly to your doctor?

So, the possibilities of a digitally-connected world are breathtaking. Your dreams made possible on the back of intuitive, smart networks.

But, the reality of a hospital, manufacturer, school, financial institution or just about any traditional business, outside of high-tech, is far different.

They are managing legacy systems, networks and applications against short budgets and increasing business demands.

So, let’s get real!

When it comes to digital transformation, whether intuitive, smart networks, application modernization, Internet of Things, security or the myriad of digital possibilities, IT departments have to strategically and efficiently address the situation.

So, complete and immediate enterprise digital transformation isn’t realistic for most. What is? 

Well, a hybrid approach.

A hybrid approach gives you the best of both worlds, where you can still maximize performance, cost and agility of applications, while matching each workload with the right IT platform, whether it’s on or off-premises. Very few businesses can instantly or all at once migrate everything to the cloud or build their on-premises modern cloud. Moreover, some applications aren’t modernized for the cloud. What businesses need, a plan. One that prioritizes the most critical business demands but accounts for everything. There’s no doubt digital transformation can help meet business goals, for example, do more with less. It’s planning priorities and getting started that can be overwhelming. Now, that’s reality.

But there’s good news.

You aren’t in it alone. There are partners out there that get digital transformation and can help you understand your current state and prioritize where to start. Digital transformation is a long-term strategy.The reality, start by developing a plan to address your business demands with a seasoned advisory professional from a true hybrid IT company and transform your business to compete in today’s digital economy!

Are you ready? Contact OneNeck to start your Digital Transformation reality today.

 



]]>
Career in Hybrid Cloud | IT Services Talent at OneNeck https://www.oneneck.com/blog/cloud/fly-high-with-a-career-in-hybrid-cloud/ Tue, 26 Jun 2018 19:15:00 +0000 https://www.oneneck.com/blog/cloud-fly-high-with-a-career-in-hybrid-cloud/ There’s no doubt, more and more businesses are looking to move to the cloud while making the most of their current IT investments, which in turn has led to the myriad of hybrid solutions that exist today. As a result, the demand for hybrid-savvy IT talent is on the rise. But what is it? How […]]]>

There’s no doubt, more and more businesses are looking to move to the cloud while making the most of their current IT investments, which in turn has led to the myriad of hybrid solutions that exist today. As a result, the demand for hybrid-savvy IT talent is on the rise.

But what is it? How do you get the experience? And, how do you develop the skills CIOs and IT leaders are looking for?

Kevin Casey recently asked experts to highlight the key skills they consider likely to have staying power or that appear on a hiring managers’ wish lists. Check out Kevin’s recent article highlighting
7 in-demand skills
.

]]>
Data in a Multi-Cloud World https://www.oneneck.com/blog/cloud/know-your-data-in-a-multi-cloud-world/ Tue, 19 Jun 2018 18:30:00 +0000 https://www.oneneck.com/blog/cloud-know-your-data-in-a-multi-cloud-world/ Utilizing multiple clouds from multiple vendors with a mix of public and private clouds is now a way of life for most enterprises today. However, operating in a multi-cloud environment is not without its challenges.  Data egress charges, incurred when data is transferred out of a cloud to another, are a particularly thorny aspect. I […]]]>

Utilizing multiple clouds from multiple vendors with a mix of public and private clouds is now a way of life for most enterprises today. However, operating in a multi-cloud environment is not without its challenges.  Data egress charges, incurred when data is transferred out of a cloud to another, are a particularly thorny aspect.

I sat down with Derek DeHaan, Former Director- Business Development, Cloud & Managed Services at OneNeck, to discuss the importance of knowing your data to better understand and manage cloud costs more efficiently.

Q: In terms of cloud, what is data ingress and data egress?

A: Data Ingress – data communications and network traffic that is originating from outside the host network and destined for a node in the host network. This includes all data transfers into a hyperscale public cloud provider form your internal data centers or users at the edge of the network accessing resources on the public cloud platform.

Data Egress – data communications and network traffic leaving the host network and traversing public internet or private connections and going to an external site/network/host. Downloading information or accessing a web page from a source/server that resides in the hyper scale public cloud platform would be classified as egress traffic.

Q: What are the different aspects of data transfer in the cloud specifically regions and zone?

A: Regions – inter and intra region transfers are charged for differently as well as data transfer among different countries. Typically providers will have multiple regions within a given country to help provide redundancy and in most cases inter region data transfers are not charged for. Intra region transfers are charged for, but usually at a much lower rate than intra-country transfers.

Availability zones – most providers have a minimum of two availability zones in a region and usually a handful of data centers in a given availability zone. This is provided to help achieve certain levels of resiliency and the specified # of 9’s you will be seeking depending on your application requirements.

Q: How are ingress and egress charges in the cloud typically billed?

A: In most cases egress traffic is billed on a utility style model, you pay for what you use or transfer from one point to another. In some cases the providers offer dedicated connections into the platforms and provide unlimited plans for transfer of data which eliminates the need for doing it based on what is actually utilized. Unless you are transferring large amounts of data continuously this is usually cost prohibitive to go the unlimited route, so most organizations end up getting billed per GB or TB of data transfer out. Ingress traffic in all providers is free as they love to have organizations put data into their platforms.

Q: What are the best practices for minimizing/ controlling data egress costs?

A: The most important thing to consider is be sure you have an understanding of your application dependencies and data flows among servers and the users. By understanding user access patterns and dependencies you can help determine the amount of data that may be leaving a hyper scale public cloud provider. This will help you estimate the amount you may be billed for egress charges. Archive type data is also a great fit for hyper scale public cloud and many companies first step into the cloud – as you don’t access the data very often, so the storage is cheap and there are usually very minimal egress fees when data retrieval is required.

]]>
Cloud Transformation & Best Execution Venue | OneNeck https://www.oneneck.com/blog/cloud/best-execution-venue-for-your-workloads/ Tue, 12 Jun 2018 19:30:00 +0000 https://www.oneneck.com/blog/cloud-best-execution-venue-for-your-workloads/ Our previous blog focused on the challenges and opportunities for businesses undergoing application modernization and cloud transformation (the latter required for the former), and the role IT services and infrastructure providers play in facilitating that journey. But that’s a high-level view, and the fact is that practical implementation is going to be unique for every […]]]>

Our previous blog focused on the challenges and opportunities for businesses undergoing application modernization and cloud transformation (the latter required for the former), and the role IT services and infrastructure providers play in facilitating that journey. But that’s a high-level view, and the fact is that practical implementation is going to be unique for every organization and require a wide range of solutions to interesting problems. Every application has a different set of requirements to perform at maximum efficiency, including requisite infrastructure. This is a concept 451 calls the best execution venue; it’s shorthand for deciding where to deploy specific workloads.

Percentage of Workloads Running in Cloud

2018-06-12_Blog_451Research_Graphic1-1

 

Source: 451 Research Voice of the Enterprise: Cloud Transformation, Workloads and Key Projects 2017

After more than a decade of rapid growth in cloud computing, some trends in workload placement are shaping up. For example, web and media applications are highly represented in the cloud, with 58% using cloud today and 72% expected to be using cloud in two years. Infrastructure as a service is the largest part of that share – it just makes sense to put online content out in the cloud. Data analytics, on the other hand, is 42% cloud and much more evenly split between software as a service (SaaS), public, hosted and private cloud. Email is heavily weighted toward SaaS.

Another consequence: finding the best execution venue for applications is why so many businesses end up with multiple service providers and cloud platforms, all of which need to be utilized and managed and require expertise.

The role of managed infrastructure and IT service providers here is twofold: first, the provider should have the requisite expertise and experience to understand the application requirements and the (often complex) business needs associated with each workload. Many providers today offer consultative services to assess and plan migrations, for example. Second, the IT service provider should have access to the best execution venue in each case and can bring them along. It can also bring new choices into the mix that a midsized business would otherwise find out of reach.

For example, customer-facing applications are being distributed onto more edge and mobile devices, capturing a growing amount of data. More and more of this data needs to link back to your centralized databases (likely running on a separate platform), so it can be analyzed and acted on. Having a service provider thread the needle from ‘Internet of Things’ platforms such as Google or AWS and edge devices to managed application resources to the business datacenter could allow a business new insights and operational efficiencies it would never get on its own. That’s what an IT service provider should offer today: new ways to think about business IT.

 

Finding the best execution venue for a legacy application is reliant on a number of factors, many of which are not technical. 451 Research outlines considerations and next steps in this Pathfinder report.



on-page-ad-451-pathfinder

]]>
Moving Databases To The Cloud https://www.oneneck.com/blog/cloud/digital-transformation-move-database-to-cloud/ Wed, 06 Jun 2018 18:30:00 +0000 https://www.oneneck.com/blog/cloud-digital-transformation-move-database-to-cloud/ Data and information has long been recognized as companies’ most valuable assets—and database administrators (DBAs) have been the key guardians of those assets. DBAs’ primary responsibilities have been aimed at ensuring that data is safely, securely, accurately, and appropriately stored, managed, and maintained. To stay competitive and get ahead in today’s marketplace, IT organizations are […]]]>

Data and information has long been recognized as companies’ most valuable assets—and database administrators (DBAs) have been the key guardians of those assets. DBAs’ primary responsibilities have been aimed at ensuring that data is safely, securely, accurately, and appropriately stored, managed, and maintained.

To stay competitive and get ahead in today’s marketplace, IT organizations are continuously looking at ways to optimize how they maintain and use the data that fuels their operations.  Modernizing to the cloud as part of a digital transformation can deliver the right mix of operational efficiencies and business enablement to drive continued growth.

Benefits of Moving to the Cloud

Migrating your databases to the cloud not only enables digital transformation, but helps you manage valuable resources in a scalable and efficient manner. Organizations that digitize and move to the cloud can experience numerous benefits, including:

  • Cost savings that result from a shift of Capex to OpEx
  • Scalability and flexibility with the ability to quickly provision resources when needed
  • Access anywhere, anytime on any device
  • Freeing internal resources to focus on strategic initiatives as a result of moving database management to a third party

Key Considerations

As with any cloud migration, there are a number key considerations that should be evaluated before deciding to move your managed database to the cloud including

  • Performance: What are your requirements? Define workload characteristics and needs upfront.
  • Security: Ensuring appropriate security of your data is vital. Develop a strategic plan that identifies where the risks lie and address how to protect sensitive data. Consider what aspects of security are the third party provider’s responsibility and which responsibilities are yours.
  • Compliance: What are your compliance requirements and does the third-party provider meet them? Compliance requirements could include PCI, HIPAA, ISO 27001 etc.
  • Migration: What is your migration strategy? How long will it take to migrate your data?
  • Licensing: Does the licensing model for your database software change when you make a move to a cloud environment?
  • Service Level Agreements (SLAs): What is the provider’s SLA, if any? Are they financially guaranteed?

OneNeck, Your Trusted Partner

OneNeck can help with your digital transformation initiative by assisting with the re-platforming of your businesses’ database infrastructure to modern data platforms like cloud. We make sure your mission-critical databases are running at peak performance and are always available to support your organization’s most critical applications. Start modernizing today, contact us to learn more!

]]>
Increase Engagement with a Digital Transformation Strategy https://www.oneneck.com/blog/managed-services/behind-every-engaged-customer-is-a-successful-dx-strategy/ Tue, 22 May 2018 18:00:00 +0000 https://www.oneneck.com/blog/managed-services-behind-every-engaged-customer-is-a-successful-dx-strategy/ It’s no longer a “drive to the store, pick up an item and pay” kind of world. Self-service phone menus, web chat, mobile apps and emerging technologies make it possible to conduct business and personal tasks however we choose. Consumers are well informed and always eager to find new ways to make their buying experience […]]]>

It’s no longer a “drive to the store, pick up an item and pay” kind of world. Self-service phone menus, web chat, mobile apps and emerging technologies make it possible to conduct business and personal tasks however we choose. Consumers are well informed and always eager to find new ways to make their buying experience more satisfying.

The real kicker though… If a potential customer is dissatisfied with any aspect of their experience, they can just as easily go somewhere else. In today’s competitive landscape, no business can expect to survive if it can’t adapt quickly to new ways of doing business and meet growing customer expectations.

Enhance Customer Experience with Digital Transformation

Experts predict that by 2020, customer experience will take over as the key brand differentiator. Forward-looking companies view digital transformation—shifting away from traditional models toward ones that leverage new and emerging technologies—as the pathway to creating new business models that will deliver what consumers value most:

  • Convenience: Customers that enjoy a simplified purchasing process are 86% more likely to purchase products and 115% more likely to recommend the brand to others.
  • Responsiveness: In a recent survey, 77% of online adults in the U.S. say that the most important thing a company can do is value their time. A poor experience can lead customers to bail on a transaction or bypass that vendor in the future.
  • Personalization: Almost three-quarters of consumers say that personalization is critical or very important to them; they expect sellers to anticipate their needs based on past interactions.
  • Consistency across channels: Most purchasing decisions are multi-channel journeys involving some combination of phone, online, in-store and mobile interactions. Customers want a seamless experience and excellent service delivery at all touch points.

Improved Customer Experience Means Everyone’s Involved

Digitally transforming a company requires full company involvement from the CEO, to business executives and employees, to operations staff and the IT team itself. Stakeholders from the c-suite, the board and investors, will examine potential ROI (return on investment) to help guide future technology decisions. A primary way for IT to build value is by replacing limited legacy systems with more dynamic technologies that enable increased agility, greater flexibility for testing and deploying new solutions and advanced tools that drive operational efficiency.

With these elements in place, the organization is in a better position to beat the competition. Business leaders and employees will make smarter, more customer-centric decisions based on technology-enhanced tools:

  • Real-time analytics tools will deliver up-to-the-minute knowledge about program effectiveness.
  • Unified data storage, formats and platforms will improve the consistency and quality of data across the organization.
  • A 360-degree view of customer interactions will provide deep understanding of customer needs.

Prepare for Your Journey to Improving Customer Experience

When done right, new and emerging technologies can make the difference between lagging behind and gaining a competitive edge. The successful companies of tomorrow are focusing on customer experience today—and new technologies, digital transformation executive leadership and IT all play a central role. With the right frameworks, methods and technologies, the customer will win—and so will you.

Not sure where to start in your digital transformation journey?  Gain real-world insights from Clint Harder, industry veteran and OneNeck CTO, who sheds light on how to make your transformation a success.

]]>
Classic and Azure Resource Manager Deployments https://www.oneneck.com/blog/cloud/opting-for-arm-or-the-classic-way-of-doing-things/ Tue, 15 May 2018 19:00:00 +0000 https://www.oneneck.com/blog/cloud-opting-for-arm-or-the-classic-way-of-doing-things/ There are currently two deployment models supported by Azure public cloud: Classic and Azure Resource Manager (ARM). How you create, configure, and manage your Azure resources is different between these two models. Understanding the differences between the two is essential to your success of your Azure deployment. Classic Deployments Azure Service Manager (ASM), aka Azure […]]]>

There are currently two deployment models supported by Azure public cloud: Classic and Azure Resource Manager (ARM). How you create, configure, and manage your Azure resources is different between these two models. Understanding the differences between the two is essential to your success of your Azure deployment.

Classic Deployments

Azure Service Manager (ASM), aka Azure Classic is the original version of Azure that was launched in 2010. In this model, each resource existed independently; there was no way to group related resources together. Instead, you had to manually track which resources made up your solution or application, and remember to manage them in a coordinated approach.

Although there are rumors that Microsoft will sunset the platform, they have made no formal announcement about a requirement to make any changes. 

Azure Resource Manager Deployments

Azure Resource Manager (ARM) is the newer version of Azure that was launched in 2014, which added the concept of a resource group. A resource group is a container for resources that share a common lifecycle.  According to Microsoft, the Resource Manager Deployment model provides several benefits:

  • You can deploy, manage, and monitor all the services for your solution as a group, rather than handling these services individually.
  • You can repeatedly deploy your solution throughout its lifecycle and have confidence your resources are deployed in a consistent state.
  • You can apply access control to all resources in your resource group, and those policies are automatically applied when new resources are added to the resource group.
  • You can apply tags to resources to logically organize all the resources in your subscription.
  • You can use JavaScript Object Notation (JSON) to define the infrastructure for your solution. The JSON file is known as a Resource Manager template.
  • You can define the dependencies between resources so they are deployed in the correct order.

So which one should you use?

Since both Azure deployment models are still viable options at this point, it is necessary to pay careful attention to the features that each offer and your specific requirements.

However, to simplify the deployment and management of resources, Microsoft does recommend that you use Azure Resource Manager for new resources, and, if possible, re-deploy existing resources through ARM.

 Don’t migrate alone

If you are ready to migrate your resources from classic deployment to Resource Manager deployment, don’t go at it alone, From resource mapping to migration, OneNeck can help with every phase of the journey from Azure ASM to Azure ARM.  Our approach is to fully understand your ASM deployment to ensure that the migration process is as seamless as possible. Contact us today to learn more.

To learn more about Microsoft Azure, Download our eGuide: Move Your Business Forward with Azure.

]]>
Digital Transformation Challenges https://www.oneneck.com/blog/cloud/headline-digital-transformation-for-midsized-enterprises-can-be-tough/ Wed, 09 May 2018 18:30:00 +0000 https://www.oneneck.com/blog/cloud-headline-digital-transformation-for-midsized-enterprises-can-be-tough/ Embrace help from service providers to deliver the benefits For many midsized enterprises, there is a significant mismatch between their goals and their ability to take advantage of all the new capabilities available to them in the ecosystem that has grown up around the cloud. Seventy-three percent of enterprises 451 Research surveys are pushing ahead […]]]>

Embrace help from service providers to deliver the benefits

For many midsized enterprises, there is a significant mismatch between their goals and their ability to take advantage of all the new capabilities available to them in the ecosystem that has grown up around the cloud.

Seventy-three percent of enterprises 451 Research surveys are pushing ahead with cloud migration and modernization, with about 29% in full production and the rest in deployment, planning or piloting.

cloud adoption models graph

It’s not a magical journey. Our research also shows that most enterprises need about four years to convert the majority of their production application to a cloud environment.

When we speak with midsized enterprises – those with 250-1,000 employees – we find that journey can be longer and more onerous because these businesses typically have less access to modern IT talent and are often further behind the curve on even the ‘legacy’ hardware and software running their businesses.

That’s why specialized third-party service providers, many of them the next generation of the businesses that set up midsized companies’ IT operations in the first place, can be valuable partners.

What to look for in a service provider

Unlike traditional outsourcing, today’s IT services are not about replacing stuff and staff (remember “your mess for less?”) and squeezing out budget year over year. IT service providers should be able to show that they can be a cost-effective way to make IT a vital investment again, and bridge the gap between a vision of better IT operations (and all that neat stuff in the cloud) and a lack of time or manpower.

The best service providers will work with you to first review your application portfolio and help you prioritize which workloads and processes to modernize based on your business priorities. Before any work begins, they should show a willingness to invest some time in this advisory role.

Other critical capabilities to look for include: experience with multiple cloud types, professional services teams that can help with application migrations, and software development teams current on the latest methodologies.

]]>
Decomposition & Microservices Make Cloud Migration Easier https://www.oneneck.com/blog/decomposition-and-microservices-make-cloud-migration-easier/ Thu, 03 May 2018 16:00:00 +0000 https://www.oneneck.com/blog/decomposition-and-microservices-make-cloud-migration-easier/ “One bite at a time.” That’s how the old saying advises you to eat an elephant. Taking on a cloud migration project can feel almost as overwhelming as grabbing a fork and attempting to consume a pachyderm-sized meal. You’re fully aware of all the potential benefits of moving to the cloud, but you’re also staring […]]]>

“One bite at a time.” That’s how the old saying advises you to eat an elephant.

Taking on a cloud migration project can feel almost as overwhelming as grabbing a fork and attempting to consume a pachyderm-sized meal. You’re fully aware of all the potential benefits of moving to the cloud, but you’re also staring at all the hills your organization will need to climb before getting to that point.

A decomposition strategy can help simplify some of the challenges involved in this process by pinpointing the most important business objectives and developing microservices around key systems and applications. Sometimes referred to as factoring, decomposition is an approach that breaks down complexities into components that are easier to comprehend, manage and maintain.

Prioritize Business Goals and Identify Value Streams

Cloud migration needs to be separated into incremental steps, but where do you start?

In larger organizations, there may be pressure from the leadership in certain business lines or departments who want to take advantage of cloud computing benefits as soon as possible.

Your team needs to ask itself what are the greatest needs and the biggest roadblocks? Sometimes it’s the squeaky wheel that gets the oil but, when determining where to focus, you must identify where cloud migration can have the biggest, most immediate impact and where your initial efforts might be wasted.

Understanding your organization’s value streams will help you and your team recognize the ways cloud migration will provide agility and efficiency. Prioritizing what to move to the cloud as well as when and how to move it will be crucial in a successful migration.

If a top business goal for cloud migration is cost-savings, what applications and workflows are directly tied to that initiative? Are there critical applications that should be migrated first? Who in the company might be affected by this change? These types of questions need to be addressed at the start.

If you’re migrating the company’s CRM to the cloud, should you avoid doing so during a certain time of year that will cause disruptions for sales or accounting? Rather than taking a lift and shift approach that duplicates an in-house application in a cloud environment, consider reworking it for the cloud and breaking it down into smaller applications dedicated to specific functions that can be moved over process by process.

While that requires some additional up-front work, it can also reduce the risks associated with an all-in-one migration. Migrating in smaller pieces will help your company’s IT staff gain experience and confidence as the overall project proceeds. It also allows employees (or specific departments) to adapt to change gradually instead of being overwhelmed with a sudden conversion.

Decompose and Deploy Microservices

The concept of breaking down complex systems and applications into independent components is where your decomposition strategy comes into play. Identifying important business capabilities and value streams helps you grasp the bigger pictures. Now, it’s time to get granular.

There will be certain applications that are outdated and won’t transfer to the cloud. So, unless you choose to keep those in-house, you may need to rewrite applications to make them cloud-native.

Adopting a microservices model will help your organization become more agile, improve resiliency and make it easier to scale your IT solutions. That’s because decomposing to microservices puts the different functionalities of an application into separate buckets. When compared to monolithic applications, which are built as a single unit, microservices offer more flexibility and are built around business-oriented APIs.

Decomposing monolith applications into microservices not only provides you with a suite of smaller services that can be moved to the cloud piece by piece, it also makes it easier to alter and update individual functionalities. Microservices remove the possibility of having to rebuild an entire monolith due to one small change in the application.

The strong modular boundaries of microservices coupled with the advantage of these smaller applications being individually deployed allows for scaling of separate elements rather than the entire application. It also allows microservices to be written in different languages and managed by different teams.

The graphic below illustrates the difference between the scalability of monolith applications compared to a microservices architecture.

2018-05-03_Graphic

Make sure to consider how possible failures of components could impact the system. Decomposed microservices make it possible to isolate things that should fail independently so that other components are unaffected. Tech blogger Matt Stine writes on Built to Adapt that this compartmentalization can be achieved with the “Bulkhead pattern,” outlined in Michael Nygard’s book, Release It! This method is named after a structural safety device used in the construction of ships and airplanes.

“Ships are divided into multiple watertight compartments. Why? If they were not, and a ship’s hull was damaged, the entire hull could become compromised and cause the ship to sink. By using bulkheads to divide the ship into multiple watertight compartments, we can limit the scope of hull compromise caused by one incident, and hopefully, save the ship!”

Get Help Eating the Elephant

Even when you’re taking one bite a time, an elephant is still a lot to eat. This wouldn’t be something you’d try to do alone. You’d probably throw a party and invite the hungriest people in the neighborhood to join you in a giant feast.

Cloud migration isn’t something you and your organization should tackle without help either. When you partner with OneNeck for Cloud Services, you’ll get access to our experience and expertise as well as help building out your cloud plan. OneNeck conducts a thorough cloud infrastructure assessment before implementing customized design and migration services to our clients.

Every organization needs to develop its own unique plan for cloud migration, and OneNeck is equipped to support you in developing a plan that produces outcomes to satisfy everyone in your company. Contact us today to learn more.

]]>
Building a Disaster Recovery Plan | Cloud Security Solutions https://www.oneneck.com/blog/cloud/building-a-disaster-recovery-plan-for-the-cloud-era/ Tue, 01 May 2018 18:05:00 +0000 https://www.oneneck.com/blog/cloud-building-a-disaster-recovery-plan-for-the-cloud-era/ Modern businesses cannot afford to lose data. Whatever the cause – natural disaster, human error, or cyber-attack – data loss is costly and extremely risky to the life of a business. The need for a disaster recovery strategy to ensure uptime, minimize data loss, and maximize productivity in the midst of any compromising situation is […]]]>

Modern businesses cannot afford to lose data. Whatever the cause – natural disaster, human error, or cyber-attack – data loss is costly and extremely risky to the life of a business.

The need for a disaster recovery strategy to ensure uptime, minimize data loss, and maximize productivity in the midst of any compromising situation is a necessary digital assurance policy for any company. The question becomes when a disaster will strike, not if it will.

The Silver Lining

Expanding your current data center operation to create a disaster recovery site is expensive, not only in the cost of hardware and software but in time and resources.  The cloud has changed the rules for backup and disaster recovery. In fact, the cloud as a DR solution is a smart choice, since the cloud is more flexible and usually less expensive than implementing a self-owned DR site.

In addition, cloud infrastructure inherently enables easy and frequent data replication between sites and systems – another key component to maintaining data integrity and reducing RTO and RPO times. Because the cloud resources are pooled, the costs to deliver cloud recovery solutions to businesses are a fraction of the cost normally associated with a DR environment.

Developing an effective DR Plan

Every business is unique and has its own needs when it comes to Disaster Recovery. There’s no such thing as a one size fits all DR plan. That’s why it’s important to determine what’s critical to your business and your customers to make sure you deliver on your commitments no matter what. Then tailor a solution to help you meet those objectives. 

At a high level, disaster recovery planning usually involves the following steps:

  • Identify the scopes and boundaries – This is typically the first step towards completing your disaster recovery plan. Identifying the scope involves prioritizing the critical systems for disaster recovery and assigning a value to the failures of those systems.
  • Establish the Budget – Budgeting for disaster recovery plans can be tricky. Often you will want to do an assessment of the costs to the business via different disaster scenarios. Comparing different options for recovery can vary the costs of the disaster recovery plan. Reducing RPO and RTO requirements can soften the financial costs of the disaster recovery plan but be realistic and ensure executive management understands the risks of data loss and system availability being stretched out. Both IT and executive management must come to an agreement on the budget and IT will work within the constraints of the budget that has been established.
  • Develop and Deploy the Plan – Developing and deploying the plan can be the most involved part of this process. Often the plan is actually a ‘script’ of activities that occur in order and are executed by a recovery team made up of resources from IT. Roles and responsibilities are assigned in the plan as well. Deploying the plan involves choosing the tools and technologies needed to meet the RTO and RPO requirements established in the first step while still working within the constraints of the budget.
  • Test – Test, test, test. Disaster recovery plans are simply not effective if they are not properly tested frequently. Test the systems you’re going to use in recovery regularly to validate that all the pieces work. Always record your test results and update the disaster recovery plan to address any shortcomings. As your business environment changes, so should your disaster recovery plan.

 A Strategic Disaster Recovery Partner

OneNeck is here to help you maximize uptime, become more efficient and be able to adopt and accelerate with new technologies such as hybrid clouds, while running at the speed of business. We start by conducting a disaster recovery assessment to ensure a planned approach to Disaster Recovery (DR). Taking the time upfront, before implementation, to determine what’s critical to your business and your customers, ensures that you deliver on your commitments no matter what. Then, we tailor our solutions to your particular situation.  So, breathe easy – we got this. Execute your disaster recovery strategy with OneNeck today. Contact us to learn more. 

]]>
Difference Between IT & Digital Transformation | OneNeck IT https://www.oneneck.com/blog/managed-services/it-transformation-vs-digital-transformation-whats-the-difference/ Tue, 24 Apr 2018 16:32:00 +0000 https://www.oneneck.com/blog/managed-services-it-transformation-vs-digital-transformation-whats-the-difference/ The terms IT transformation and digital transformation seem to be everywhere these days, and often are used interchangeably. However, while they are very connected, there is a difference. In a recent paper by the Enterprise Strategy Group and sponsored by Dell EMC, they define the two terms as such: Digital transformation emphasizes evolving to thrive […]]]>

The terms IT transformation and digital transformation seem to be everywhere these days, and often are used interchangeably. However, while they are very connected, there is a difference. In a recent paper by the Enterprise Strategy Group and sponsored by Dell EMC, they define the two terms as such:

  • Digital transformation emphasizes evolving to thrive in a digital economy—for example, using smart devices, connected sensors, and data-driven insights to out-innovate, out-think, and out-pace competitors. Digital transformation focuses on embracing change to become the disruptor, not the disrupted.
  • IT Transformation centers on modernizing the underlying technology infrastructure. The business becomes “more transformed” by growing beyond its reliance on rigid, manual, hard-to-maintain legacy technologies. IT Transformation enables speed, efficiency, scale, and cost-effectiveness—automating manual tasks and streamlining operations to free up resources and fuel digital transformation initiatives.

They maintain that this distinction is important, as focusing on IT transformation allows organizations to prioritize technology initiatives to better support the larger digital transformation journey, and the benefits are hard to dispute.

Benefits of IT transformation

The report goes on to break IT transformation into three levels, based on an organization’s maturity:

  • Modernized data center technologiesTransformed organizations take steps such as virtualizing their servers. They use all-flash storage where appropriate. They run a considerable portion of their workloads using scale-out and converged or hyper-converged infrastructure platforms. They commit to a software-defined approach for networking and storage. And they adhere to a comprehensive and well-tested data protection strategy with the best-available backup, deduplication, and archiving tools at its foundation.
  • Automated IT processes—Transformed organizations automate their environments to help them deliver IT as a service in a cloud-like model for cost transparency, efficiency, and responsiveness. They incorporate automation to support server change configuration and storage provisioning. And they offer self-service capabilities so end-users can order and manage on-premises resources as needed.
  • Transformed organizational dynamics—Transformed organizations believe in tight business and IT alignment, and business units regularly inspect IT outcomes for effectiveness. The IT organization’s executives almost always report directly to the C-suite leadership team, making it easier for IT to contribute to business strategy. Transformed organizations also often adopt DevOps principles and methodologies.

But it goes beyond just defining the levels, because only when it’s applied to a specific organization can it begin to be useful. Based on their research and data, ESG created a maturity model to be used as a guide to assess IT transformation maturity. Not surprisingly, there is a growth in maturity over last year, though still plenty of room for growth. But as businesses grapple with the need to modernize, more are realizing that it requires tight alignment with IT, and this alignment is key in competitive differentiation.

 


Download the Report Now
DOWNLOAD THE FULL REPORT NOW


ESG Research Insights Paper: Research Proves IT Transformation’s Persistent Link to Agility, Innovation, and Business Value

 



on-page-ad-jeff-budge

]]>
Modern IT Collaboration & Unified Communications Solutions https://www.oneneck.com/blog/managed-services/move-to-modern-collaboration-unified-communications-solutions/ Tue, 17 Apr 2018 18:05:00 +0000 https://www.oneneck.com/blog/managed-services-move-to-modern-collaboration-unified-communications-solutions/ According to Cisco, modernizing the workplace through digital technologies is one of the defining movements of our time. The disruptive impact of digital transformation is affecting every industry as organizations massively scale up their initiatives. Unified communications (UC) is critical to digital transformation because it provides employees, customers and partners with a wide range of […]]]>

According to Cisco, modernizing the workplace through digital technologies is one of the defining movements of our time. The disruptive impact of digital transformation is affecting every industry as organizations massively scale up their initiatives.

Unified communications (UC) is critical to digital transformation because it provides employees, customers and partners with a wide range of modern collaboration tools and technologies empowering them to message, meet, and call instantly; strengthening relationships and increasing productivity across the enterprise.

By utilizing the right UC solutions, organizations will increase productivity and improve customer service. In addition, they will be able to:

  • Modernize their workplaces to meet the needs of a changing workforce, thus helping improve employee recruitment and retention.
  • Expand their potential talent pool by supporting enhanced and secure mobility, collaboration, device ubiquity and geographic diversity.
  • Reduce total cost of ownership through lower facility and travel costs

We know that digital transformation is the future. It’s imperative that IT leaders embrace and lead the coming change. But how do you get there? How do you adapt your current UC technology to satisfy the needs of today’s more mobile and distributed workforce? Cisco recommends the following 10 considerations to keep in mind when moving to more modern collaboration and UC solutions:

  1. Take inventory of what you have: This goes beyond technology. Make sure you also understand your corporate culture and how it works. Collaboration and UC are enabling technologies; how they are used, and by whom within your workforce will determine their success.
  2. Set reasonable goals: Determine if it makes sense to work with a specific team or department and develop a proof of concept. Remember that each organization will have its own challenges and expectations, and make sure that you have the resources in place to deliver upon the expectations you set.
  3. Involve users and line-of-business managers: Collaboration and unified communications only work if they provide users with an experience that they value. Don’t just make technology available to your users. Involve them in the process from beginning to end, including providing the training needed to facilitate adoption.
  4. Focus on ease of use: This gets back to the previous point. If the user experience is compromised, or if the deployment is time consuming and difficult to manage for IT, then the technology will not be used to the extent you may desire.
  5. Quality counts: This is a new world. IT consumerization means users expect a glitch-free, high-quality experience. If you are offering collaboration tools such as VoIP and video, choose a supplier that understands these technologies and can deliver the underlying infrastructure required. Also, make sure your technology vendor has longevity in meeting the needs of the most demanding enterprise customers and service providers. In the UC market, there have been too many instances of failing providers leaving customers without future support.
  6. Ensure a great mobile experience: Mobility is one of the most important considerations in empowering today’s collaborative workplace. Your mobile connectivity and collaboration tools must assure a great mobile experience no matter which device is being used at whatever time and from whatever location. And remember, mobility is not just for your workers
  7. Modernize your infrastructure: Now is the time for all companies, large and small, to root out those last pockets of TDM and ensure a fully digital experience for the workforce. Don’t allow your organization to be stuck with an obsolete technology when there are far better and more cost-effective alternatives available.
  8. Embrace the cloud: This is not to say that you should use cloud models for all of your collaboration and UC requirements. But you should work with a technology provider that gives you flexibility to use cloud models whenever and wherever you deem them appropriate. Consider providers that offer commercial solutions that allow you the flexibility to deploy some services on premises (where it makes sense) and to consume others from the cloud. And no matter what approach you take, make sure the result is a consistent and simple-to-use experience for end users and IT.
  9. Embed collaboration into your line of business applications: To ensure that your organization maximizes the business value of collaboration, it is important to embed communication and collaboration into your applications and business practices. This can best be achieved using application program interfaces (APIs) and software development kits (SDKs).
  1. Choose an experienced technology partner: Collaboration and UC solutions together represent one of the most important investments your company will make to ensure a successful future. You can’t afford to go wrong, and you don’t want to be in a situation where you have to swap out partners or technologies down the road. It is important to choose a technology vendor that is a leader in providing all elements of your collaboration and UC solution from end to end. This way, you will ensure a successful deployment for today and a clear path for the future.

“Cisco Essential Guide to Workplace Modernization”

Ready to modernize your UC solution? OneNeck® IT Solutions, with our partner Cisco, is here to provide world-class collaborative services that bring people together and enable them to achieve extraordinary things. Contact us today to learn more.

]]>
Mastering the Cloud Cliff with Hybrid IT https://www.oneneck.com/blog/cloud/mastering-the-cloud-cliff-with-hybrid-it/ Tue, 10 Apr 2018 16:15:00 +0000 https://www.oneneck.com/blog/cloud-mastering-the-cloud-cliff-with-hybrid-it/ According to Gartner, the worldwide Infrastructure as a Service (IaaS) market is forecasted to grow to over 72 billion by 2020 – a truly staggering trajectory. But the challenge of finding the right blend of on-premises vs. cloud continues. So, how do you determine which environment is right for your workloads? As the on-prem IT […]]]>

According to Gartner, the worldwide Infrastructure as a Service (IaaS) market is forecasted to grow to over 72 billion by 2020 – a truly staggering trajectory. But the challenge of finding the right blend of on-premises vs. cloud continues. So, how do you determine which environment is right for your workloads?

As the on-prem IT experience around functionality, performance, cost and control has continually improved in recent years, all while IT has accepted that multi-cloud has its place in IT infrastructures, there will always be applications that run better on a physical platform, especially data-intensive, latency-sensitive applications. As a result, hybrid IT  is expected to remain a viable strategy when delivering services to the business.

In HPE’s Master the Cloud Cliff, they found that “while many of the companies surveyed were using managed or cloud successfully for workloads such as collaboration, legacy storage, cloud bursting, cloud-native apps, and application development and testing, there are times when certain applications, configurations, or workloads run better on a private or hybrid system.” In their interviews with executives embracing a hybrid IT strategy, they found that these were the key drivers for hybrid:

  • Performance
  • Cost/billing Issues
  • Flexibility
  • Security/compliance
  • Emerging technology
  • Customer service
  • Lower infrastructure costs

They then narrowed it further by lumping the drivers into three main categories:

  • Performance: We’ve heard it hundreds of times, but it still rings true – not all workloads are created equal. The executives interviewed said that often it came down to performance, which included “speed, scalability, functionality, customer service and stability.” And with the improvements in on-prem hardware over the past several years, specifically in virtualization and hyperconvergence, IT can now truly evaluate the workload for optimal platform placement.
  • Cost: It’s a rather common theme when it comes to cloud, the cost. While it often is the cheaper venue, it can also have hidden costs when not carefully and strategically approached. And as data loads and input/output operations (IOPS) increase, it can come with a hefty price tag if not carefully monitored. This is where a hybrid approach, especially for those data-intensive applications, may make sense.
  • Control: No IT team likes to feel like they’ve lost control, and it can be a valid concern with cloud. “These control-based issues include flexibility, customization, security, and compliance limitations, as well as cloud sprawl and vendor lock-in.” For applications that require a high level on hands on customization, an on-prem or private cloud solution may just be the best fit. Again, it comes down to really understanding your workloads to ensure the ideal platform is chosen to support them.

The report continues with lessons learned when embarking on a hybrid IT strategy:

  • Find the best Hybrid IT mix: Both cloud and on-prem have their place in supporting modern applications, but it takes careful consideration upfront to make the right decision. Choice is good, as it allows a best-of-both worlds approach.
  • Emphasize IT as a core competency: The importance of IT’s expertise can’t be minimized. Whether it’s internal IT or a qualified partner, expertise is critical when designing, implementing and managing a high-performing hybrid environment.
  • Consider data uses and growth expectations: If there’s anything the past couple years have taught us, the rapid rate of data growth isn’t slowing, but rather accelerating. And as a result, it needs to be a key consideration when assessing business applications and their right-fit platform. “By considering these factors up front, companies can plan long-term hybrid strategies and prevent costly mistakes.”
  • Hire the right experts: Technology is complex – there’s no getting around it. And it’s not getting any easier, especially as multiple environments converge. So, having the right people on staff and the right partners by your side to help navigate on-prem, cloud and a combination of both is key.

The good news is that today’s IT team is becoming savvier in their understanding of hybrid IT and its place in supporting the demands of the business.  It’s all about the right mix. The report concludes that, “As familiarity with cloud architectures increases, so does the awareness that Hybrid IT is an optimal solution for many IT functions, particularly when it comes to high-volume, low-latency applications such as big data and rich media processing. And by using a hybrid approach, companies are less likely to hit cloud cliff problems related to performance, cost, and control.”

 


Download the HPE Report
DOWNLOAD the full Master the Cloud Cliff Report
, which also includes real-world use cases for hybrid IT in healthcare, social media, public sector, retail and finance.

]]>
Is Intent-Based Networking the Next Big Thing? https://www.oneneck.com/blog/datacenter-colocation/intent-based-networking-the-next-big-thing/ Wed, 04 Apr 2018 20:43:00 +0000 https://www.oneneck.com/blog/datacenter-colocation-intent-based-networking-the-next-big-thing/ Intent-based networking is being called the “next big thing” in networking. Building on the power of machine learning, software-defined networking (SDN) and advanced automation, intent-based networking systems (IBNS) have the potential to improve the way administrators monitor and respond to network events and conditions. “Traditionally, network administrators manually translate business policies into network device configurations, […]]]>

Intent-based networking is being called the “next big thing” in networking. Building on the power of machine learning, software-defined networking (SDN) and advanced automation, intent-based networking systems (IBNS) have the potential to improve the way administrators monitor and respond to network events and conditions.

“Traditionally, network administrators manually translate business policies into network device configurations, a time-intensive and error-prone activity,” Patrick Hubbard wrote in Cloud Expo Journal. With IBNS, Hubbard added, there are still all of the vital tenants of traditional systems, but now you have “the addition of observability, autonomous execution access, control policy, and a critical layer of machine-learning capabilities that allow automatic decision-making based on the analysis of observed network behavior.”

With the rise of the Internet of Things (IoT) and an array of mobile devices with access to enterprise networks, the ability to have the full visibility and accountability of connected devices is a must to ensure the security of both the network and data.

Let’s Dig a Little Deeper into IBNS…

In a blog authored by Gartner analyst Andrew Lerner, IBNS is described as a “lifecycle management software” that “can improve network availability and agility.” Specifically, it allows administrators to design networks to behave in a prescribed way — including dictating what is and isn’t monitored.

With an IBNS platform, for example, administrators can see in real-time what devices are connected to the network and evaluate them for security — driving faster decisions about which devices should stay or go. In addition to improving security, IBNS also has the potential to increase efficiency by reducing time spent on tedious administrative tasks — freeing IT to focus on more innovative, business-impacting initiatives, while providing a more accurate view of network activity.

IBNS is Gaining Traction

While IBNS in concept has been part of the networking management discussion for a few years, big players like Cisco are now taking more proactive steps to lead the IBNS transformation with their intent-based networking strategy, which they’ve dubbed “The Network. Intuitive.”

“All IT administrators want better access control, massive scalability, security and multi-vendor device management,” Will Townsend writes in Forbes. With IBNS, administrators will be able to manage networks more efficiently, especially at a time when hundreds of new devices are requesting access. Through artificial intelligence and machine learning capabilities, the job of the administrator will become faster and easier, even as networks and devices grow more complex.”

While the technology surrounding IBNS is still in its infancy, Cisco’s leadership in this space will have an impact in moving it in a forward direction. Andrew Lerner carefully asserts that it won’t be mainstream before 2020.

But if it is coming, the question becomes, should I be preparing for it?

IBNS builds on advantages driven by automation, SDN and orchestration. So, you can start by integrating more machine learning and data analytics into your network. Equally important is a commitment to focus on learning and understanding the intricacies of the approach, to ensure it can work reliably in your environment.

In addition, remember that you’re not in it alone. Partners like OneNeck are here to help guide you through these major technology transitions. Much like converged systems, next-gen security, cloud or even SDN have been evolving the way we operate and protect our infrastructures, so intent-based networking has the potential to be that next big disruptor. So, stay tuned, and we promise that when the time comes, our experts will be here to walk alongside you, guiding you through the “next big thing”…

 

]]>
A Multi-Vendor Security Environment Could Put You at Risk https://www.oneneck.com/blog/security/is-your-multi-vendor-security-environment-putting-you-at-risk/ Thu, 29 Mar 2018 16:18:00 +0000 https://www.oneneck.com/blog/security-is-your-multi-vendor-security-environment-putting-you-at-risk/ One of the big challenges organizations face today is complexity, and security is no exception. According to the 2018 Cisco Annual Cybersecurity Report, in 2017, 25% of security professionals said they used products from 11 to 20 vendors, compared with 18% of security professionals in 2016. Also, in 2017, 16% said they use anywhere from […]]]>

One of the big challenges organizations face today is complexity, and security is no exception. According to the 2018 Cisco Annual Cybersecurity Report, in 2017, 25% of security professionals said they used products from 11 to 20 vendors, compared with 18% of security professionals in 2016. Also, in 2017, 16% said they use anywhere from 21 to 50 vendors, compared to 7% of respondents in 2016 (refer to figure below).

more security vendors

As the number of vendors increases, so does the challenge of orchestrating alerts from these many vendor solutions. The report continues to state that 54% of security professionals said that managing multiple vendor alerts is somewhat challenging, while 20% said it is very challenging.

So, what is the result of this complexity in vendors and point solutions? The report finds that:

  • Nearly half of the security risk organizations face stems from having multiple security vendors and products.
  • 80% of organizations using more than 50 vendors had to manage scrutiny from public breaches.
  • In organizations with more than 50 security vendors, 81% experienced losses of at least US$1 million—with 29% seeing losses of US$10 million or more.

And in a security vendor landscape that looks a lot like this…

Cybersecurity landscape is complex.

What’s an organization to do?

Simply eliminating vendors is not the only solution to reducing risk. Choosing vendors strategically—and with an eye toward integration rather than simply appending boxes to endpoints—can help defenders to focus on the risks that matter most.

This might just be the perfect time for you to start addressing the need to simplify your network security and invest in more proactive, intelligent solutions that take a more immersive and comprehensive approach. At OneNeck, we’re here to help. Our security assessments, built on industry-based frameworks, can help you assess your gaps and ensure those disparate point solutions aren’t leaving you vulnerable.

]]>
Ransomware…it’s Big Business https://www.oneneck.com/blog/security/ransomware/ Thu, 22 Mar 2018 16:00:00 +0000 https://www.oneneck.com/blog/security-ransomware/ Ransomware has quickly become the most profitable form malware ever seen, on its way to becoming a $1 billion annual market. Last year, the FBI reported more than 4,000 ransomware attacks occurred daily between January and June of 2016 — a 300% increase from 2015. In 2017, nearly 10% of organizations worldwide recorded some sort […]]]>

Ransomware has quickly become the most profitable form malware ever seen, on its way to becoming a $1 billion annual market. Last year, the FBI reported more than 4,000 ransomware attacks occurred daily between January and June of 2016 — a 300% increase from 2015. In 2017, nearly 10% of organizations worldwide recorded some sort of ransomware activity during Q1. 

 An example of ransomware is malicious software or malware that encrypts the information on a person’s computer, such as documents, photos, and music. It will not release the files until the user pays a fee – or ransom – to unlock the files and get them back. The attacks vectors are various and wide in context. Delivered by infected ads that contain malware, by phishing messages, or by exploit kits, this malware is quickly evolving in sophistication. These infections can be catastrophic to businesses over a short or long period of time. Hospitals, public safety organizations, financial banking institutions, and retail establishments have been targeted the most.

Why it’s Surging?

 Ransomware isn’t new, in facts it’s been around for over a decade. But its recent spike is due to a few primary drivers.

  1. Attack surface expansion: The proliferation of mobile devices, cloud, digitization efforts and IoT, gives cyber criminals more space to operate.
  1. Better targets: Organizations are more lucrative targets for cyber criminals. They house highly sensitive data, often have thinly stretched IT departments and a high incentive to quickly settle the matter.
  2. Ransomware as a Service: Just about everything is available as a service these days, including ransomware. RaaS is designed to make cybercrime accessible to anyone. Cybercriminals will author the malicious code, then make it available for others to download and use.
  1. Alternative currency: Payment made in bitcoin, a cryptocurrency and a digital payment system, can’t be traced back to sender or recipient, providing an anonymous, friction-free way to collect ransoms. The risk of being caught is greatly reduced.With the rate of sophisticated ransomware attacks increasing at an alarming rate, it’s important for organizations to have a multi-layer defense strategy in place.  

With the rate of sophisticated ransomware attacks increasing at an alarming rate, it’s important for organizations to have a multi-layer defense strategy in place.  

OneNeck IT Solutions, Your Trusted Ransomware Defense Partner

At OneNeck, we recognize threats can enter the network in a variety of ways. We understand that having comprehensive protection requires a multi-tiered and pervasive approach to keep threats out as well as detect and isolate any breaches quickly. We can assess your infrastructure for its strengths and weaknesses, then recommend and implement a solution that will keep your critical data safe.

Looking for more than just ransomware defense and cybersecurity? OneNeck provides an end-to-end, technology-independent approach that includes a complete suite of hybrid IT offerings across infrastructure, applications and managed services.

 

 

]]>
What Are The Risks of Shadow IT? https://www.oneneck.com/blog/cloud/is-shadow-it-putting-you-at-risk/ Tue, 20 Mar 2018 17:00:00 +0000 https://www.oneneck.com/blog/cloud-is-shadow-it-putting-you-at-risk/ How many cloud applications and services do your employees use every day? How much of it does your IT department actually know about? Chances are, IT is unaware of more than you think. Research from Cisco finds that, on average, CIOs estimate their organization is using only 51 cloud services, while the actual number is […]]]>

How many cloud applications and services do your employees use every day? How much of it does your IT department actually know about? Chances are, IT is unaware of more than you think.

Research from Cisco finds that, on average, CIOs estimate their organization is using only 51 cloud services, while the actual number is closer to 730. That means your IT department – the people who plan your technology roadmap and manage your data, technology and applications to ensure optimal uptime, performance, security and compliance – is managing less than 10 percent of your cloud footprint. The remaining 90 percent runs under-the-radar. Known as “Shadow IT,” it’s creating big risks for enterprises.

What is Shadow IT?

Shadow IT is more broadly defined as any technology used inside an organization without IT’s approval or even knowledge. Often, it’s the result of business units looking to adopt new cloud services but unwilling to wait for IT to completely vet, test, approve and implement them. These business units set aside budget for the (usually) reasonable monthly subscription rate, scan the corporate credit card and get to work.

What are the Risks of Shadow IT?

Unfortunately, while employees are quickly up and running, they may be exposing your organization to:

  • Data loss: Shadow IT means there could be corporate data residing outside typical controls designed to ensure security and compliance. While public cloud providers talk a good security game, they still have a ways to go when it comes to providing visibility and transparency into their controls. In fact, fewer than 13 percent of IT decision-makers say they trust the public cloud to secure highly-sensitive data.
  • Increased costs: With no centralized control or management over which cloud applications are used, or when, many organizations find employees using (and paying for) competing and sometimes overlapping services. Why pay multiple subscriptions for services like Dropbox and Box when a managed corporate subscription provides the same functionality for far less?

How to Mitigate the Risks of Shadow IT

With the risks mounting, organizations can no longer ignore Shadow IT, but neither can they simply forbid it. To embrace Shadow IT, a subtler, service-oriented approach is required in order to:

  • Know your usage: The first step is to discover and identify unknown cloud services so you can better plan usage and control data loss. Tools like cloud access security brokers (CASBs), web application firewalls, or data loss prevention (DLP) can help. Another option that can help you really understand the cloud usage at your business is to perform a Cloud Consumption Assessment.
  • Streamline IT processes: Does every request need to go through a 40-point vetting process? Find ways to fast-track cloud applications/services so your users will want to start with IT first and not as a last resort.
  • Become pro-cloud: Instead of avoiding the cloud, become the cloud expert and start helping users find the best options for their particular business needs. A good strategy here is to develop a list of sanctioned cloud services designed to address common use cases. For instance, some organizations have set up their own app store to help ensure cloud choices are secure and don’t conflict with business/IT strategy as a whole.

Managing Shadow IT is a balancing act, but by embracing change and moving toward a service-oriented approach, you can reduce its risks while protecting your core business assets — no matter where they live.

 

]]>
Real Digital Transformation Begins with Strategy – NOT Luck https://www.oneneck.com/blog/digital-transformation/digital-transformation-begins-with-strategy-not-luck/ Thu, 15 Mar 2018 16:10:00 +0000 https://www.oneneck.com/blog/digital-transformation-digital-transformation-begins-with-strategy-not-luck/ Business leaders worldwide are putting big bucks into digital transformation. A report by IDC predicts that by the end of 2019, spending for digital transformation will reach $1.7 trillion worldwide—up 42% from 2017. But many organizations struggle to find their way. One of the biggest problems is many companies take a “luck of the Irish” […]]]>

Business leaders worldwide are putting big bucks into digital transformation. A report by IDC predicts that by the end of 2019, spending for digital transformation will reach $1.7 trillion worldwide—up 42% from 2017. But many organizations struggle to find their way.

One of the biggest problems is many companies take a “luck of the Irish” approach, throwing gobs of money and technology at digital transformation and hoping they’ll get lucky. However, without a sound strategy, they probably won’t find a pot of gold at the end of the rainbow.

The tips below will help you understand what to do—and what not to do—to transform your organization into one that embraces new technologies as a way to work better and deliver maximum value to customers.

When Digital Transformation Fails to Transform

According to research by Couchbase, 80% of IT leaders are under pressure to constantly improve digital transformation through technical innovation, yet 90% of digital projects fail to meet expectations and deliver only incremental improvements. Why?

  • Leaders lack strategy and vision. Without insight into and consensus about why digital transformation is important, it’s impossible to develop a consistent, well-informed strategy. A lack of active support and leadership from the board and C-Suite also is a harbinger of failure.
  • Employees aren’t prepared. Forty-three percent of 4,500 CIOs surveyed for the 2017 Harvey Nash/KPMG CIO surveycited resistance to change as the biggest stumbling block. Failure to provide support (such as training) for key stakeholders will prevent a digital transformation culture shift.
  • Planning is inadequate. Ill-defined plans result in indecision, which slows down the pace of progress and impedes the ability to meet short- and long-term financial goals. The resulting delays in achieving ROI can derail the entire process.
  • Under-resourced digital transformation teams are rushed. A shortage of expert IT staff can lead to risky shortcuts, such as adding new technologies piecemeal rather than sticking to a comprehensive approach, or becoming an IT silo, speeding up development but failing to engage non-IT stakeholders.

5 Essential Steps for Digital Transformation Success

Now that we know what causes failure, here are some key strategies for successfully transforming your company into a digitally-driven organization:

  1. Establish a customer-centric strategy. Ask what’s important to your external and internal customers. The answers will generate a cohesive vision, guide strategic planning and set priorities.  
  2. Get active top-down support. Transformation starts at the very top, with the entire C-suite communicating the vision and modeling a transformative mindset throughout the organization.  
  3. Reduce internal resistance. Acknowledge employee concerns about change. Introduce new digital procedures and technologies with care, integrating them with existing operations. Provide the tangible support needed to achieve employee buy-in and readiness.
  4. Monitor and measure. Involve employees early on, setting guidelines, communicating clear expectations and providing ongoing feedback. Establish and monitor metrics that align with customer-centric objectives.
  5. Establish your digital transformation team and budget. Provide or hire a dedicated, expert team using internal and/or external resources. Also, give digital transformation a dedicated budget to get efforts off the ground and provide funding for ongoing planning and development.

For organizations to thrive in an evolving digital environment, digital transformation must occur sooner rather than later. Luck won’t get you there, but with the right strategy and people, you’ll be off to a great start.

 

Download the Report

Want to learn more? Download this informative white paper from Cisco and ZK Research: Digital Transformation Services Are Critical To Business Success

 



on-page-ad-jeff-budge

]]>
5 Reasons Smart Companies Outsource Cybersecurity https://www.oneneck.com/blog/security/5-reasons-smart-companies-outsource-cybersecurity/ Tue, 13 Mar 2018 16:00:00 +0000 https://www.oneneck.com/blog/security-5-reasons-smart-companies-outsource-cybersecurity/ Today’s consumers demand their private information remains secure. But as we learned from the 2017 breach at Equifax that exposed the personal information of 145 million, even what should be the most secure companies fall under attack. Fearing the loss of consumer trust and revenue, senior executives demand protection against attacks like last year’s infamous […]]]>

Today’s consumers demand their private information remains secure. But as we learned from the 2017 breach at Equifax that exposed the personal information of 145 million, even what should be the most secure companies fall under attack.

Fearing the loss of consumer trust and revenue, senior executives demand protection against attacks like last year’s infamous WannaCry ransomware that impacted over 300,000 machines in 150 countries running outdated Windows software.

These fears and expectations are heavy burdens for IT teams that may lack the training, skills or tools to respond effectively to security breaches or prevent them from happening in the first place.

Business Security Challenges

The growing complexity and frequency of cybercrime make cybersecurity a full-time job. But at smaller companies, security is often spread among members of an over-taxed IT team or put squarely on a CIO’s desk along with hundreds of other responsibilities.

The widening IT talent gap just exacerbates the problem, with CSO reporting cybercrime will more than triple the number of unfilled cybersecurity jobs, predicted to reach 3.5 million by 2021. With cybersecurity spending expected to exceed $1 trillion from 2017 to 2021, managing costs can also be a struggle.

Benefits of Outsourcing Cybersecurity

For many overwhelmed companies, a viable solution for addressing the costs and complexity of cybersecurity is outsourcing it to a managed security service provider (MSSP). They find relief with these benefits:

1) Improved protection at less cost.

Outsourcing shifts increasing costs to providers better suited to meet them. MSSPs can spread costs across a wide client base. By scaling solutions that meet varied needs,  businesses get security protection without the attendant costs.

2) Improved efficiencies with less cost.

Outsourcing significantly expands your access to security experts while saving hiring costs. It also frees IT to work on initiatives focused on increasing your bottom line.

3) The latest developments at your doorstep.

MSSPs can bring beneficial advancements to your door. Artificial intelligence and blockchain technology show real promise in the future of security, and MSSPs are at the forefront of integrating these and other technologies into top-notch security solutions.

4) Protection around the clock.

MSSPs are incessantly vigilant in protecting all systems and access points — a nebulous undertaking as businesses maximize efficiencies in the Internet of Things (IoT).

Round-the-clock protection greatly improves threat prevention. Monitoring security across a variety of clients and industries also helps MSSPs detect new threats and risks before they develop into catastrophes.

5) Layered protection against human error.

Security providers can offer layered protection with extensive security checks and procedures that are far more likely to prevent the types of internal employee mistakes that cause massive data breaches.

Selecting the Right Security Partner

Your MSSP is a partner who helps grow your business securely. When evaluating providers, consider these recommendations:

  • Make sure you feel confident in the provider’s ability to understand your business, anticipate your needs and align solutions to your goals.
  • Look for a provider committed to investing in the ongoing skills and education of its employees.
  • Look for expertise in transformative solutions such as cloud, big data management and analytics.
  • To optimize your partnership, make sure the provider you choose can meet your expectations for communication, teamwork, transparency and leadership.

OneNeck® IT Solutions is a trusted business partner for developing customized solutions to protect against cybercrimes. Learn more about our Virtual CISO Services.

]]>
5 Factors to Consider When Thinking About Colocation https://www.oneneck.com/blog/datacenter-colocation/5-factors-to-consider-when-thinking-about-colocation/ Tue, 06 Mar 2018 19:00:00 +0000 https://www.oneneck.com/blog/datacenter-colocation-5-factors-to-consider-when-thinking-about-colocation/ Thanks to cloud computing, the Internet of Things (IoT) and the vast amounts of data being produced, backed up and stored, organizations are finding they need to rethink their data center strategies. The solution for many is outsourcing these operations to a colocation provider. Trends Behind the Move Colocation, the practice of renting or outsourcing […]]]>

Thanks to cloud computing, the Internet of Things (IoT) and the vast amounts of data being produced, backed up and stored, organizations are finding they need to rethink their data center strategies. The solution for many is outsourcing these operations to a colocation provider.

Trends Behind the Move

Colocation, the practice of renting or outsourcing space for servers and other hardware, has been used for years primarily as an approach to managing backup and data recovery. While colocation continues to serve these purposes, the addition of hundreds if not thousands of endpoints connecting to networks is making it more difficult to meet the peaks and valleys of access demand. In response, organizations are also adopting colocation as a means to scale to dynamic data needs.

Colocation also adds a level of security against outages or specific attacks like Distributed Denial of Service (DDoS). By spreading data across colocation centers in different parts of the country or world decreases the risk of downtime.

Finally, growth in technologies like artificial intelligence and machine learning require increased computing power. Colocation allows companies to gain that power at a more manageable cost.

Key Considerations

Before taking the jump into colocation, there are five important factors to consider. They include:

  1. Management. What types of management services will the data center provide? How much technical and onsite support will your organization need? How does the experience of your internal IT staff mesh with the management offerings from the data center?
  2. Location. How often will you need to visit the colocation site? What in-person tasks will be required? Do you want a site that is within easy distance or do you prefer sites in different regions?
  3. Space. Do you know how much data center real estate you’ll need immediately? Will you be able to expand in that same location or are you locked into a specific amount of space? Will the amount of space available meet your computing needs?
  4. Cost. Everything comes down to money, and your colocation site budget should include the number of server cabinets you’ll need, bandwidth, power usage charges, and IP addresses, as well as technical support charges.
  5. Security. This includes both cybersecurity and physical security. Who has access to the servers outside of your organization? What does the building security look like and is the building open for staff and visitors around the clock? Is there security personnel on site at all times and what type of authentication methods are used to vet anyone with access to the facility? Who is responsible for securing the data itself and what happens if there is a breach?

Finding the Right Solution

As more data is collected and more devices connect to networks behind the firewall, having a colocation solution with purpose-built, concurrently maintainable data center facilities is a necessity. The right solution will be fortified for maximum performance, offer a single point of accountability and be tailored for individual companies.

The future of the data center is changing as organizations require more powerful computing and more modern data infrastructures. Far from a one-size-fits-all solution, colocation needs to be approached as a strategy aligned with your budget and security priorities.

Download our Ultimate Colocation Buyer’s Guide for additional guidance on key colocation decision considerations.

]]>
Roll Out the Red Carpet for IT Transformation https://www.oneneck.com/blog/digital-transformation/it-as-a-star/ Thu, 01 Mar 2018 18:00:00 +0000 https://www.oneneck.com/blog/digital-transformation-it-as-a-star/ The digital economy is in high gear, so IT can’t just stick to the same old script. As competition heats up in today’s fast-paced digital environment, business stakeholders are demanding that IT accelerate processes, better support the enterprise and play a starring role in digital transformation. You may have already made some headway, but it’s […]]]>

The digital economy is in high gear, so IT can’t just stick to the same old script. As competition heats up in today’s fast-paced digital environment, business stakeholders are demanding that IT accelerate processes, better support the enterprise and play a starring role in digital transformation. You may have already made some headway, but it’s not exactly clear what will generate a real transformation in how IT does business. 

One thing’s for sure – it’s time to rewrite the IT script. Make significant improvements and you just might get a standing ovation from the senior leaders, employees and customers.  Stay in place and you’re likely to struggle to compete with those that are charging ahead and embracing digital transformation. So, while Hollywood rolls out the red carpet to celebrate the year’s best movies this weekend, maybe it’s time to roll out the red carpet for a future-ready IT organization as well…

Is IT Transformation Worth the Journey?

While IT strives to improve agility, innovation and leadership in identifying and leading new initiatives, many top executives perceive as IT holding them back. CIO Magazine’s 2015 study, “State of the CIO,” found that 33% of CIOs and 54% of non-IT executives believe that IT groups are “obstacles to non-IT groups’ missions.” This also implies that IT is perceived as neither optimizing value nor increasing ROI of technology investments. 

According to a recent study by IDC, the most future-ready organizations increased revenue over the past three years by 37% compared to 18% at traditional organizations. They also found that employee productivity gains showed a wide gap with a 39% improvement rate for transformation-ready organizations compared to 20% at traditional companies. So how can you enable this type of growth?

2018-03-01_Oscars_Icon-Download.jpg
Want to learn more about starting your transformative journey?

Download this Dell EMC sponsored IDC report: IT Organization Imperatives: Key Behaviors to Drive IT Transformation

 

IT Transformation Requires a New Approach

Transforming IT requires building a culture that is comfortable with experimentation and open to new and evolving processes. One overarching approach is to get rid of the isolation that is found in many IT groups—a counter-productive situation that prevents IT from moving in a positive direction to support the larger enterprise as it strives to reach its objectives. Transformation has invigorated some IT organizations and thwarted others. So, how can IT star in driving transformation? Here are some tips to consider:

  1. Forge strong Line of Business (LOB) relationships. Form and maintain strong ties to all lines of the business so you can more quickly anticipate and respond to changing requirements. You’ll see increases in both LOB performance and technology Return on Investment (ROI).
  2. Develop a strong service orientation. The customer is #1. Work with LOBs to identify and prioritize effective, empowering technology solutions that make the biggest impact on customer interaction and satisfaction.
  3. Support smart financial management. Align new technologies and IT infrastructure with financial management and operational procedures, such as supply chain and resource allocation.
  4. Leverage forward-looking technology. Business-aligned IT processes and infrastructure will result in agility and a greater competitive edge. The enterprise will more quickly adapt to marketplace conditions, IT will better anticipate and respond to business demands and you’ll enable better decision-making.

IT Must Play a Leading Role Driving Successful Transformation

Is it time for IT transformation to make its debut at your organization? Play a central role driving agility and accelerating growth by working closely with LOBs, aligning IT with business goals and focusing on your customers’ evolving needs.

 



on-page-ad-jeff-budge

]]>
Advantages of IT Consolidation in State and Local Government https://www.oneneck.com/blog/cloud/it-consolidation-in-state-and-local-government/ Tue, 27 Feb 2018 19:00:00 +0000 https://www.oneneck.com/blog/cloud-it-consolidation-in-state-and-local-government/ Tight budgets and efficiency challenges are par for the course in state and local government. To keep pace with rising taxpayer demands for richer, more reliable online services and stay compliant with ever-growing regulatory requirements, government IT teams are increasingly moving away from legacy technology and undergoing IT consolidation. The good news: Public sector CIOs […]]]>

Tight budgets and efficiency challenges are par for the course in state and local government. To keep pace with rising taxpayer demands for richer, more reliable online services and stay compliant with ever-growing regulatory requirements, government IT teams are increasingly moving away from legacy technology and undergoing IT consolidation.

The good news: Public sector CIOs are making progress, at least at the state level, according to the 2017 NASCIO report, Shrinking Data Centers: A Playbook for Enterprise Data Center Consolidation. Of the CIOs surveyed, 42% reported they had completed data center consolidations in 2016, with 47% percent saying consolidation was ongoing and 11% percent planning to consolidate.

Data center IT consolidation offers several advantages

Let’s break them down.

  • Cost efficiency. Consolidating your environment and reducing your infrastructure enables you to limit expenditures on equipment and maintenance to lower your overall operations costs.
  • Better visibility. With consolidation, architecture is easier to monitor, and traffic and volume are more visible.
  • Tighter security. With less to manage, there is less risk exposure and fewer targets for exploitation.
  • Enhanced disaster recovery. Consolidated infrastructure means it is easier to get back up and running and keep business going in the event an incident impacts data and mission-critical applications.

Because of the benefits, many state and local governments are looking to reduce spending and streamline operations through consolidation. According to the National Association of State Chief Information Officers, state CIOs are increasingly looking to consolidation, with 42 percent reporting that they had completed data center consolidations in 2016, up over just 14 percent a decade earlier in 2007. Another 1 percent said they were planning to consolidate.

Challenges and Factors to Consider When Approaching Data Center IT Consolidation

While the benefits are clear, the process is not without challenges. What do you need to consider first when approaching a data center consolidation strategy to improve security, reduce operational costs and increase efficiency at your public sector organization? Consider the following steps for undertaking a consolidation strategy.

Paint the big picture.

Sit down with all stakeholders so that all concerns are vetted and all needs met in undertaking the consolidation. As the NASCIO report advises, “A state should understand needs, requirements and potential issues before setting a target date or launching any initiatives.”

Set a timeline.

A clear timeline of goals will offer the organization and idea of expectations so that personnel and process will know when and how to expect potential changes and disruptions.

Create inventory.

A detailed list of assets impacted ensures all bases are covered when it comes to considering systems impacted and possible outcomes.

Conduct a cost analysis.

With budgets always a concern in government, a thorough cost analysis will be key in anticipating additional funding necessary, as well as proving ROI for the project.

Keep lines of communication open throughout the process.

Keep stakeholders constantly apprised of any developments, surprises, adherence to the timeline and other relevant information as the consolidation is underway.

Are you ready to undertake a data center consolidation to enjoy the benefits and advantages it offers long term? OneNeck specializes in assisting government agencies with a tailored approach that is mindful of both your organization and individual technology needs. OneNeck can help consolidate your existing environments with cost-effective, scalable, secure and flexible infrastructure solutions necessary to make a difference. Contact OneNeck IT Solutions to find out more about how they can help you get started today.

]]>
Is your data living on the edge? Let’s talk Edge Computing. https://www.oneneck.com/blog/security/lets-talk-edge-computing/ Thu, 22 Feb 2018 18:00:00 +0000 https://www.oneneck.com/blog/security-lets-talk-edge-computing/ There’s a new buzzword making the rounds (like we needed another one). Move over Digital Transformation, and welcome Edge Computing. While it’s being credited with the power to deliver speed, security and cost-savings to organizations, is it really all that? Let’s break it down… What Is Edge Computing? Research firm IDC defines edge computing as […]]]>

There’s a new buzzword making the rounds (like we needed another one). Move over Digital Transformation, and welcome Edge Computing. While it’s being credited with the power to deliver speed, security and cost-savings to organizations, is it really all that? Let’s break it down…

What Is Edge Computing?

Research firm IDC defines edge computing as a “mesh network of microdata centers that process or store critical data locally and push all received data to a central data center or cloud storage repository, in a footprint of less than 100 square feet.” In other words, it involves processing data at the edge of the network where it is created, instead of routing it through data centers or clouds.

Fog Computing vs. Edge Computing

Another term related to edge computing is fog computing. It’s important to understand the distinction.

“Fog” refers to the network of connections between edge devices and the cloud, while “edge” represents what happens near or on the edge devices (the endpoints). Fog computing includes edge but uses the network to get edge data where it’s going.

What’s Driving Edge Computing?

More organizations are adopting large-scale IoT deployments with Gartner estimating enterprise use of IoT devices will grow to 7.5 billion by 2020. Transporting data to the cloud from IoT devices for management and analysis is costly, inefficient and can impact latency.

Many organizations simply don’t have the connectivity to support sending large amounts of data to and from the cloud. With its on-device approach, edge computing addresses these limitations by performing the computing and analytics on the device itself — eliminating the need for data transport.

Edge Computing Advantages and Challenges

Edge computing gives applications that rely on machine learning an advantage by increasing data process efficiencies. By doing away with the need for device-to-cloud data trips, on-device machine learning makes applications more responsive and robust. Machine-learning-driven capabilities like facial profile recognition or voice recognition is quicker and more efficient when done on-device.

By maintaining sensitive data at the source rather than sending it to the cloud, edge computing also offers security advantages. The less data in various locations, the fewer the opportunities for cybercriminals to access it and compromise it. Countering this is the argument that the vulnerability of edge devices to compromise is a risk to data kept at the edge.

The takeaway here is that mitigating IoT security risks requires work, planning and vigilance. A good IoT strategy includes a robust plan for keeping your system secure.

According to the Hewlett Packard Enterprise study, The Internet of Things: Today and Tomorrow, eighty-four percent of IoT adopters say they have experienced at least one IoT security breach with malware, spyware and human error the most common culprits. Ninety-three percent of executives expect IoT security breaches to occur in the future.

How do you build an IoT strategy that drives the speed to market you desire but simultaneously keeps your data safe? Simple – an upfront strategy that takes into considerations the inherent risks is a must. At OneNeck, our security team is ready to help you assess your security risk and work with you to develop a realistic strategy to keep you secure and get the most from your data on the edge.

]]>
OneNeck Receives Patent https://www.oneneck.com/blog/oneneck-receives-patent/ Tue, 20 Feb 2018 18:00:00 +0000 https://www.oneneck.com/blog/oneneck-receives-patent/ Robotic sensor created to measure temperature and humidity within data center cabinets. The idea for a cabinet roaming robotic-sensor turns into an awarded US Patent for OneNeck® IT Solutions! The Lewis, U.S. Patent No. 9,843,847 was issued for a “Temperature-Humidity Monitoring Assembly for Closed Server Cabinet.” The self-contained device attaches to the inside of a […]]]>


Robotic sensor created to measure temperature and humidity within data center cabinets.

The idea for a cabinet roaming robotic-sensor turns into an awarded US Patent for OneNeck® IT Solutions! The Lewis, U.S. Patent No. 9,843,847 was issued for a “Temperature-Humidity Monitoring Assembly for Closed Server Cabinet.”

The self-contained device attaches to the inside of a client’s cabinet door in our data center — without any modification or drilling. Fully controlled from outside the cabinet, the motor and belt-driven rail assembly unit (as shown in this short video), slowly and incrementally, raises the sensor until it reaches the top of the cabinet, and then lowers it back to the base. Once complete, a heat-map (of either the incoming airstream or discharge airstream) is produced, revealing the temperature and relative humidity within all RU-levels of the cabinet (with its doors closed).

With pinpoint accuracy, the heat-map reveals any and all hot spots. It’s a game-changer. It’s innovative, non-intrusive and extremely effective. Most importantly, equipped with this information, our customers or our facilities technicians can quickly and efficiently make the necessary adjustments to improve overall air flow.

With top-tier, purpose-built data centers in Arizona, Colorado, Iowa, Minnesota, New Jersey, Oregon and Wisconsin, the sensor can be used to diagnose and better protect client’s mission critical servers and IT-equipment within the cabinets. Bottom-line, this unique monitoring device can aid our clients in managing their internal rack, cable placement and airflows, thus preventing overheating, early burn-out or, even worse, downtime.

With input and assistance from parent company Telephone and Data Systems, OneNeck was provided the resources to secure this, our first patent. Now, with patent in-hand, the device can be leveraged for internal use and/or selling or licensing the invention.


The need for a robot sensor

When it gets hot within the cabinet, it’s impossible to know exactly where the heat build-up is occurring. If you open the cabinet door to get a better look inside, it instantly and completely changes the cabinet environment. Close the door and the climate profile returns to its normal, but unobservable state. You can try to guess where. However, being able to pinpoint it precisely would save time and money.

This robotic sensor changes all that, it’s a differentiator! Essentially, OneNeck is the only company helping customers maintain climate hygiene within their cabinet. It’s a very exciting position to be in!

]]>
Digital Transformation From Concept to Reality https://www.oneneck.com/blog/digital-transformation/do-you-have-the-winning-team-that-can-take-digital-transformation-from-concept-to-reality/ Thu, 01 Feb 2018 18:00:00 +0000 https://www.oneneck.com/blog/digital-transformation-do-you-have-the-winning-team-that-can-take-digital-transformation-from-concept-to-reality/ Who doesn’t want to be part of a winning team—whether on the football field or in a business? Any company looking to stay competitive needs a strategy for digital transformation, but it’s a full-team effort. And with 80% of US businesses suffering from a lack of IT talent, every team member needs to pull their […]]]>

Who doesn’t want to be part of a winning team—whether on the football field or in a business? Any company looking to stay competitive needs a strategy for digital transformation, but it’s a full-team effort. And with 80% of US businesses suffering from a lack of IT talent, every team member needs to pull their weight.

How can you build a high-performing IT team to transform your organization into a digital leader?  Here are five tips:

1. Promote a Common Vision

A team is comprised of individuals with differing and sometimes competing goals, which means someone needs to find the common ground. For the teams competing in this weekend’s big game, this vision comes from their talented coaches.  For your organization, it most likely will come from the C-suite.

All the pieces of a successful team need to work together.  The C-Suite — including the CEO, CIO, CMO and CTO — is essential to making it happen and setting an example for the entire organization. They are vital to shaping a security culture committed to addressing customers’ privacy concerns, security transformation and adopting cybersecurity best practices when interacting with mobile devices, the cloud, IoT, etc. – as well as the hybrid IT mindset to drive real transformation in the business.

Leadership doesn’t mean dictatorship, but effective leadership encourages open communication and accountability.

2. Get People Excited to Work for You

It’s always more fun to be on a confident, winning team. You want to instill your employees with a shared sense of mission and responsibility.  Company pride can go a long way in attracting top talent.

3. Promote Innovation and Creativity

Digital innovation can come from unexpected places.  Try looking beyond the IT department. End-users in marketing, customer service and finance can provide you with helpful insights. You want the entire team to feel comfortable offering ideas—even if they end up not working.  Encourage trial and error.  Sometimes the best ideas come from mistakes, but that starts in a culture where people aren’t afraid to fail.

4. Encourage Professional Growth

Football players know the value of continuous training and practice, and effective IT professionals are no different. Technology is constantly evolving. You want to keep your employees’ skills fresh and your team engaged.

By understanding where skill gaps are, your company can identify training needs and focus on those. Having proper training in place also makes it possible to recruit capable, but less experienced talent who are motivated to learn the required skills.

Also, don’t forget that employees learn from each other.  So, get creative and encourage collaboration across teams.

5. Stay Up-to-Date

Winning football team make good use of free agency and the draft to bring new blood into the organization and fill in talent gaps where needed.  Don’t be afraid to hire younger workers with short resumes. They may infuse your IT department with new energy and ideas.

In Summary…

Digital disruption is the new norm, and ignoring it is no longer an option. But it’s the people executing the vision that really make digital transformation more than a buzzword. Building the right team is key to success.

]]>
5 Reasons Why You Need DRaaS https://www.oneneck.com/blog/cloud/draas-0/ Tue, 16 Jan 2018 22:06:00 +0000 https://www.oneneck.com/blog/cloud-draas-0/ Every business knows that time is money, and downtime can be costly. But a temporary loss of access to your critical infrastructure — whether it’s your data, your network or other operations — is unfortunately all too common. Weather events, like a hurricane or a snowstorm, and man-made events, like a cyber-attack, leave you looking […]]]>

Every business knows that time is money, and downtime can be costly. But a temporary loss of access to your critical infrastructure — whether it’s your data, your network or other operations — is unfortunately all too common. Weather events, like a hurricane or a snowstorm, and man-made events, like a cyber-attack, leave you looking for backup to get business up and running again as quickly as possible.

 It is crucial to have a disaster recovery (DR) plan in place today, and many organizations are looking to Disaster Recovery as a Service (DRaaS) as a way to cut costs and simplify DR planning. DRaaS,  a model involving a third-party managed service provider (MSP) delivering remotely hosted disaster recovery services, is increasingly being offered as a cost-effective option for protecting data and systems.

How To Benefit From DRaaS

Who should consider DRaaS and why? Let’s look at these five reasons for evaluating whether DRaas is right for you.  

1. You want to save money on disaster recovery.

Backup sites are expensive. Owning or leasing space for your secondary data center costs your organization money in payments, power, cooling, storage and travel to and from the site. These are just a few of the associated costs of a backup site.

2. You want to simplify DR planning.

Eliminating the need for a secondary DR site also means eliminating the costly administration and maintenance contracts necessary for maintaining a backup site.

3. You’re striving for interoperability.

DRaaS solutions work with dissimilar systems so that you can protect servers across different hypervisors and replicate data between dissimilar storage systems. These DRaaS solutions are hardware, hypervisor, and application- independent.

 4. You want to reduce IT resources spent on DR.

Using a third party for DRaaS means it will take less time to deploy than your own secondary site, and it also means your IT staff will have the time to tend to other business-critical responsibilities.

5. You want to know your DR covers all the bases.

Companies who implement their own disaster recovery site have to start by protecting the most critical servers first. In some cases, they are never able to protect all their servers. DRaaS enables your organization to protect all servers — physical and virtual —within a reasonable time frame and budget.

Once you’ve decided DRaaS is right for you, it’s critical to evaluate providers and make sure they offer following:

  • Multi-platform support
  • Multi-cloud support
  • Cloud failover
  • Flexible licensing
  • Real-time replication
  • Scalability

 OneNeck understands that each organization is different and there is no one-size-fits-all approach to disaster recovery planning.  With multiple deployment options like ReliaCloud, Azure or your own private on-premises data center, we have the flexibility to serve your unique needs.

OneNeck disaster recovery solutions are powered by best-in-class technologies and services including, Azure Site Recovery, VMware Site Manager and Zerto Virtual Replication to remove the burden of monitoring and managing your backup and disaster recovery infrastructure, which gives reliability, reduced risk and more time to focus on your strategic business initiatives. Visit oneneck.com to learn more.

]]>
What Is ITIL Managed Services and Why Is It Important? https://www.oneneck.com/blog/managed-services/itil/ Tue, 09 Jan 2018 19:10:00 +0000 https://www.oneneck.com/blog/managed-services-itil/ IT support teams never have enough time, enough people, enough expertise, enough resources…and so it goes. There comes a time when an IT executive has had enough of not having enough! That’s when outsourcing can be the best option to lighten the day-to-day load, improve operations, decrease costs and – most importantly – help you […]]]>

IT support teams never have enough time, enough people, enough expertise, enough resources…and so it goes. There comes a time when an IT executive has had enough of not having enough! That’s when outsourcing can be the best option to lighten the day-to-day load, improve operations, decrease costs and – most importantly – help you succeed.  When outsourcing, however, you want to make sure your provider follows ITIL (Information Technology Infrastructure Library) best practices.

What is ITIL Managed Services?

It’s easy for frequently under-resourced IT departments to spend most of their time going from incident to incident, leaving little time for other initiatives. As a result, their internal customers may not be satisfied with what they get, especially when it doesn’t quite meet their business needs.

Enter ITIL, a set of process-oriented best practices that drive efficiency, quality and better ROI. Since its beginning in the 1980s, ITIL has helped countless IT departments optimize their processes and costs, provide better service quality and improve delivery of services. Another key advantage is that ITIL provides a common language and framework for better alignment between IT and its customers.

That’s not to say ITIL doesn’t have its detractors. One critique is that ITIL’s focus on “not failing” can dampen the spirit of innovation and efforts to anticipate issues before they become problems. Another is that its complexity makes it difficult to put into practice. However, the growth of ITIL, with its millions of adherents, is the best measures of its success.

Managed Services Providers in an ITIL World

Growing pressures on IT spurred the rise of managed service providers (MSPs). Much like following ITIL best practices, outsourcing to MSPs are a good way to optimize processes, decrease overall costs and enable IT to go beyond incident response.

It’s only logical that ITIL-focused companies would want ITIL managed services providers. It’s a powerful combination that magnifies the advantages that ITIL and MSP share in common. These companies have a lot to gain by outsourcing to a service provider that thoroughly understands ITIL, speaks the same language and aligns with how they do business. Your MSPs ability to collaborate with your other ITIL vendors also brings value. Even for companies that don’t use ITIL, MSPs bring a lot to the table:

  • Greater consistency and predictability of IT operations
  • Well-defined and transparent definition of costs and assets, with granular budget control.
  • Detailed processes for creating, deploying and moving IT services, reducing total risk
  • Increased stability, with techniques for making process adjustments as needed.

 

What to Look For in an ITIL Managed Services Provider

When looking for your ITIL managed services provider, look for experts with ITIL certification who can help you put together an approach and plan for overall IT development. Learn what you can about the company’s accountability and success in staying on task. Ask about their experience adjusting to changes in clients’ businesses. And see what they provide to clients, such as a service catalog outlining its framework, or a runbook.

OneNeck leverages an ITIL-based activation and delivery methodology that assures smooth transition into the managed services model and enables a productive partnership throughout the engagement. Contact us today to learn more!

]]>
Citizen-Centric Experience Drives Government Digital Change https://www.oneneck.com/blog/digital-transformation/citizen-centric-it/ Thu, 04 Jan 2018 18:00:00 +0000 https://www.oneneck.com/blog/digital-transformation-citizen-centric-it/ Thanks to digital transformation initiatives in today’s modern organization, citizens are demanding similar efficiencies from their public-sector agencies as well. This shift is fundamentally and permanently beginning to change the way government delivers its services. Yet, there is more to it than just modernizing IT. Expectations Are on the Rise ‘Instantaneous everything’ is no longer […]]]>

Thanks to digital transformation initiatives in today’s modern organization, citizens are demanding similar efficiencies from their public-sector agencies as well. This shift is fundamentally and permanently beginning to change the way government delivers its services. Yet, there is more to it than just modernizing IT.

Expectations Are on the Rise

‘Instantaneous everything’ is no longer an unrealistic expectation – it’s the new norm. Citizens have come to expect quick resolution with minimal time and effort. At the same time, globalization is moving faster than the pace of government, and the public’s trust in government is on the decline.

According to apolitical, these are just some of the factors intensifying the tensions between conflicting priorities such as the long-term vs. short-term, privacy vs. security, local vs. global, technology vs. jobs, and limited resources vs. heightened expectations. This article from GCN highlights additional contributing factors — including the rising influence of millennials and tighter budgets.

All these forces need to be considered in any public sector digital transformation strategy. Simply updating IT systems to match the way government needs to operate isn’t quite enough.

Enabling Disruptive Delivery Models

When it comes to user expectations, “exceptional” is no longer a perk; it is part-and-parcel of a personalized, efficient customer service experience that can adapt to dynamic views of the role of government in society. This requires governments to rethink processes and redefine boundaries between citizens and public agencies.

Capturing this idea is the concept of “disruptive delivery,” introduced by apolitical: “Governments must disrupt themselves to become more agile, transparent and horizontal. In part, this will involve diversifying the providers of services through new delivery models where citizens are both producers and consumers of services, and where government departments help accelerate startups aiming to solve society’s problems.”

Modern Citizen-Centric Services Require Agility and Adaptation

Just like every business vertical, the public sector is in the midst of massive disruption. Institutions and companies alike are continuously strategizing to reach new markets and to satisfy the ever-changing demands, preferences and attitudes of their clientele.

Governments must do the same — with the added challenge of needing to accomplish more with less. This calls for initiatives aimed at increasing performance, ensuring security and providing a hybrid infrastructure that can support rapid changes in application development. Inaction in this area will lead to a further decline that will result in a longer (and more expensive) journey back.

When it comes to government services, it is time to think big. There has never been a greater need to develop big-picture strategies that balance consumer demand with efficient and consolidated technologies.

The OneNeck team understands the challenges government agencies face and offers extensive experience and real-world solutions to our public-sector customers that help them evolve to meet citizens’ growing demands. We can guide your agency to the right mix of advanced technology solutions that bring the efficiencies that enable citizen-centric services at the speed of business.

See what we’re doing for the City of Minneapolis, enabling their citizen-centric IT services.

 



on-page-ad-jeff-budge

]]>