• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
IT Infrastructure

4 Signs of Cloud Security Hacks and How Safe Networks Respond

Small and medium-sized businesses need well managed network security services to guard cloud-computing capabilities from security hacks.

September 28, 2016 Ed Wynn Leave a Comment

caption

Hackers are waiting to pounce when companies bring their internet and phone infrastructure to the cloud. Cloud security is a daunting concern for small- and medium-sized businesses (SMBs) and their in-house security resources, which are already stretched. SMBs are especially vulnerable to hacks that compromise the confidentiality, accuracy and availability of their information assets.

One notable 2016 threat investigation report found companies with 1,000 or fewer employees suffered more incidents of confirmed data loss than their big-business counterparts. More than half these incidents were in the retail and hospitality industries, which attract hackers with a tempting array of credit card and other account data.

Yet a breach in cloud computing security can threaten not just financial data but also the tech infrastructure itself. Once hackers gain entry to cloud storage, they can hold data for ransom or repurpose network assets to launch more attacks.

There are plenty of reasons for SMBs to use the cloud—mobile cloud apps make it practically essential. But there are cloud solutions that won’t compromise a business network, such as encrypted cloud storage that can make a network more secure.

The complexity of data security solutions can challenge onsite technology teams. But well-managed network security services will detect and track a wide range of threats. For example, Call One’s team works with customers to develop customized cloud security strategies, taking into account operational needs, budgets and more. Our experts offer solutions including identity management, protection from threats and monitoring and auditing.

Additionally, with employees using greater amounts of data to watch videos, listen to audio and more using cloud services, maximizing bandwidth in a cost-effective and secure way has become critical. Bandwidth is a growing concern in relation to data security. Unsecured systems can lead to hackers and others stealing bandwidth, which slows systems down and puts data at risk.

In response to these issues, we are one of a short list of providers nationally that have introduced a scalable solution to securely increase bandwidth using existing infrastructure instead of requiring a costly, full bandwidth upgrade. At Call One, we call this product SmartWAN.

SmartWAN is just one example of our cloud-based security initiatives.

We design systems to protect organizations, keep employees productive and prevent the many scenarios that compromise SMBs’ networks. Some telltale indicators of compromise—and what to do about them—include:

Weak seams in the patchwork.

Attackers exploit gaps in a company’s maze of firewalls, VPN gateways, web filters and other devices. An investigation by F-Secure this year found common, known software vulnerabilities were exploited in thousands of high-severity security events. Yet many organizations ignore critical updates or use software that is no longer supported.  Enterprise systems are prone to short-term fixes that fail to perform at scale.

wynnmwsize_copy_1

Ed Wynn is the executive chairman of Call One, a pioneering, next-generation communications technology company that offers businesses streamlined solutions in a complex space. A Georgetown University-trained attorney, Wynn has held a series of leadership roles in the legal industry and corporate America. He has a 30-year track record of developing and implementing proactive strategies in dynamic industries with shifting requirements and excels at finding innovative, practical and timely issue-based solutions that exceed objectives, even in adverse business and legal climates.

Well-managed desktop security services update software frequently for known vulnerabilities. Their networks restrict read access and install resilient security systems that flag spikes in application record access and file or database reads—potential probes by a hacker looking to see what’s worth stealing.

Outbound network traffic.

Unusual outbound traffic can signal a theft in progress. Well-policed wireless internet and VoIP networks send out alerts whenever they find a high volume of compressed file transmissions, database requests or SSH transfers—clues that hackers or insiders could be smuggling data across the firewall. Administrators can watch the activity and block certain file types.

Well-managed network security services look beyond the volume of traffic. They map the diversity of user devices and applications to search for strange behavior. Traffic to an external DNS server instead of the corporate DNS, or many users connecting to one external device’s user-agent string, indicate hackers at work.

Suspect administrator activity.

Senior security executives in the 2016 Vormetric Data Threat Report see privileged users and their extended network access as the biggest threat to sensitive data. National-security leaker Edward Snowden serves as a reminder of the threat posed by internal hackers.

Yet super-users more often do unintended damage as phishing victims: In some organizations, cyber con artists are constantly trying to steal or hack their skeleton-key credentials. For retail and hospitality networks, the weakest link is vendor access to payment systems. One fast-rising concern is C-suite hacks. Top executives have the power to flout security policies and to move money.

Unexpected access.

Four out of five data breaches in the threat investigation report we mentioned earlier come from outside the network. State-of-the-art networks track IP addresses, telephone SIP logs and fileMD5 attributes for potential threats, and detect the spoofed packets of a high-tech hijacking.

Network analytics software can look for patterns, such as a phone call that brings a worker into a phishing hack, and harden network defenses by setting alerts, flagging suspect files or blocking domains and phone numbers.

Why Small and Midsized Business Need Managed Network Security Services

SMBs often do not view themselves as targets. Yet Cisco’s 2016 Annual Security Reportidentifies SMB networks as the starting point for hacks aimed at their more lucrative business partners. In a troubling sign, SMBs said they used fewer threat detection processes and defense measures in 2015 than the year before, such as web security or patching and configuration tools—and security programs at every level of maturity faced budget constraints.

Most security professionals in Cisco’s survey outsourced at least some security functions; only 12 percent kept them completely in-house. Security executives have grown less confident their security infrastructures are up to date, and only 22 percent of businesses with fewer than 500 employees said they do not have an executive with direct responsibility and accountability for security.

In this dynamic environment, companies increasingly rely on outside consulting. Engineers who have worked across industries are in a good position to test a client’s security resources and suggest best practices to stay ahead of intruders.

Ultimately an organization’s leaders may need to rethink their entire security architecture.Software-defined networks in particular offer built-in protections against attack. They require less manual configuration, reducing chances for error. By consolidating multiple security layers, a single platform can save money, help security teams prioritize risks and protect mission-critical operations.

This article was originally published on Huffington Post.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Antivirus, Cloud, Corporate, Malware Protection, Networks

Related Content:

  • Rearview shot of two young designers giving each other a fist bump in an office, on display is Crestron desk scheduling device Crestron Introduces Desk Q and Desk Touch Scheduling…
  • OptixAV RMM Solution Solutionz OPTIXAV RMM Platform for AV Environments Now…
  • Mockup of Korbyt Anywhere with Zoom integration. Korbyt Anywhere Now Available on Zoom App Marketplace
  • Planar Studios Virtual Production Training Planar Studios’ Virtual Production Workshop Aims to Expand…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Download TechDecisions' Blueprint Series report on Security Awareness now!
Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared t...

Workplace Collaboration Tools for Corporate Spaces
Workplace Collaboration Tools for Corporate Spaces

From lobbies and shared spaces to conference rooms and multipurpose facilities, you need high-performing AV technology to effectively share informa...

ChatGPT, generative AI, enterprise, workplace
Blueprint Series: ChatGPT and Generative AI in the Workplace

This latest release of the TechDecisions Blueprint Series explores the new phenomenon of tools such as ChatGPT and how IT leaders should go about d...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Advertise with Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSDO NOT SELL MY PERSONAL INFORMATIONTERMS OF USEPRIVACY POLICY

© 2023 Emerald X, LLC. All rights reserved.