Network Forensics Can Help Your Business Correctly Identify The Source Of A Security Breach.

Enterprise security teams have historically spent most of their time, human resources and money on defenses like firewalls and Intrusion Detection Systems (IDS) to protect and monitor the security of their networks. However, a quick look at the news will tell you that these barriers are far from foolproof. With breaches becoming more common (and costly), enterprise teams are turning to tools that help them respond quickly to security incidents as soon as the attack has been discovered.

Network forensics looks at information such as log data, network flow and packet data to answer the question ‘How did the attackers get in?’. It’s similar to what you would expect a detective to do at a crime scene – look for clues to recreate the crime. The goal of network forensics is to identify the source of the breach faster in order to minimize the resulting damage, and to analyze them so that future attacks can be prevented.

The unfortunate truth is that no organization is safe from attack. With that in mind, here are some critical steps every organization should take to prepare for, and react to a security breach:

1. Preparedness

Employees are sometimes the weakest link in security. It is important that you conduct regular training with employees on basic security best practices such as using strong passwords, how to identify phishing emails, and not plugging unknown devices into work machines.

2. Identification

Automate the process of data collection so that it is easier to investigate and identify security events.

3. Containment

Once a breach has been confirmed, determine exactly how far the problem has spread within the company’s network and minimize further damage by disconnecting affected systems and devices.

4. Eradication

Resolve the root cause of the vulnerability and remove all traces of malicious code. Ensure that the flaw is completely resolved by running penetration tests and looking at server logs again to define whether other servers and devices might also be susceptible.

5. Recovery

Restore all data and software from clean backup files. Monitor systems for any sign of weakness or recurrence.

6. Lessons learned and remediation

Conduct a thorough post-mortem to analyze the incident and how it was handled. Identify prevention and response processes that can be improved.

Click here to read the full article
https://www.itproportal.com/features/are-you-ready-for-a-security-breach/

Bluetooth Vulnerabilities

Bluetooth Vulnerabilities
(from Schneier on Security)
 

bunch of Bluetooth vulnerabilities are being reported, some pretty nasty.

BlueBorne concerns us because of the medium by which it operates. Unlike the majority of attacks today, which rely on the internet, a BlueBorne attack spreads through the air. This works similarly to the two less extensive vulnerabilities discovered recently in a Broadcom Wi-Fi chip by Project Zero and Exodus. The vulnerabilities found in Wi-Fi chips affect only the peripherals of the device, and require another step to take control of the device. With BlueBorne, attackers can gain full control right from the start. Moreover, Bluetooth offers a wider attacker surface than WiFi, almost entirely unexplored by the research community and hence contains far more vulnerabilities.

Airborne attacks, unfortunately, provide a number of opportunities for the attacker. First, spreading through the air renders the attack much more contagious, and allows it to spread with minimum effort. Second, it allows the attack to bypass current security measures and remain undetected, as traditional methods do not protect from airborne threats. Airborne attacks can also allow hackers to penetrate secure internal networks which are “air gapped,” meaning they are disconnected from any other network for protection. This can endanger industrial systems, government agencies, and critical infrastructure.

Finally, unlike traditional malware or attacks, the user does not have to click on a link or download a questionable file. No action by the user is necessary to enable the attack.

Fully patched Windows and iOS systems are protected; Linux coming soon.
 

Original Article:
https://www.schneier.com/blog/archives/2017/09/bluetooth_vulne.html
 

Call Today And Schedule
Your COMPLIMENTARY Technology Checkup!

775.473.9445

Telecom Tylenol Episode 7 – One Point of Contact

Joe Jonovic talks about avoiding the headache of researching and vetting multiple vendors by taking advantage of the SOLUS single point of contact model.

Telecom Tylenol is a video blog produced by Joe Jonovic of SOLUS Network Solutions. Every episode provides valuable advice to businesses for the purpose of avoiding or relieving telecom/technology headaches. Contact Joe at 775.853.3335 or joe@solusns.com

Telecom Tylenol Episode 6 – Finger Pointing Between Vendors

Joe Jonovic talks about avoiding the headache of finger pointing between your vendors by taking advantage of the SOLUS single point of contact model.

Telecom Tylenol is a video blog produced by Joe Jonovic of SOLUS Network Solutions. Every episode provides valuable advice to businesses for the purpose of avoiding or relieving telecom/technology headaches.

Contact Joe at 775.853.3335 or joe@solusns.com

Telecom Tylenol Episode 5 – 4 Phone Calls To Solve 1 Telecom Problem

Joe Jonovic talks about avoiding the headache of having to make 4 phone calls to solve 1 telecom problem by taking advantage of the SOLUS single point of contact model.

Telecom Tylenol is a video blog produced by Joe Jonovic of SOLUS Network Solutions. Every episode provides valuable advice to businesses for the purpose of avoiding or relieving telecom/technology headaches. Contact Joe at 775.853.3335 or joe@solusns.com

Telecom Tylenol Episode 4 – Local Phone Company Customer Service Unacceptable

Joe Jonovic talks about avoiding the headache of having to deal with your local phone company’s poor customer service when you have a billing or service related issue. Telecom Tylenol is a video blog produced by Joe Jonovic of SOLUS Network Solutions. Every episode provides valuable advice to businesses for the purpose of avoiding or relieving telecom/technology headaches.

Telecom Tylenol Episode 3 – How Much Bandwidth Do I Need?

Joe Jonovic talks about avoiding the headache of committing to too much bandwidth. He describes how SOLUS takes a conservative approach to buying bandwidth for your business. Telecom Tylenol is a video blog produced by Joe Jonovic of SOLUS Network Solutions. Every episode provides valuable advice to businesses for the purpose of avoiding or relieving telecom/technology headaches.

Trusted Technology Expert Service by SOLUS Network Solutions

 

 

Video Transcription

What does an IT leader do all day anyways? Are you sure you want to know? Okay.

Meet Bob. Bob is a CTO in Chicago. So, the CEO tells Bob that they’re opening two new office locations in two months, so Bob needs to get them running in eight weeks. And of course, Bob is already drowning in a sea of other projects.

He’s already got to manage all the IT infrastructures, software applications including the patches and updates, networks, disaster recovery, servers, the PCs, the security, mobility, remote workers, as well as working through all the various contracts. Now, he’s got to duplicate all this around two new locations – fast.

Oh, yeah. The boss says he wants Bob to start looking at cloud solutions because he read something interesting about cloud on LinkedIn. Bob finds out his current vendor doesn’t provide service in one of the new locations. He doesn’t know who operates in Dallas, so Bob researches it for two weeks and finds seven potential vendors – seven potential vendors and time is running out.

Of course he already knows the carrier sales reps will make promises they can’t keep because they have targets to meet. I mean they’re salespeople, right? One sales rep tells Bob that his company can have them up and running in a week if he signs the contract that day and another tells him two months and then everything in between. Who does Bob believe? And the pricing? All over the place for really no apparent reason.

Now, it’s already five weeks later and only two of the vendors he’s talked to have a solution remotely close to what he needs. And now, what about cloud? The process starts all over again and Bob is no cloud expert, so he’s flying completely blind here. Who should he believe?

The, Bob talked to a supplier agnostic trusted technology advisor. They’re a third party neutral company that operates as a telecom and cloud solutions agency like a consultant and a broker combined, but they’re much better than that. I’ll tell you about that in a second.

You see the right trusted technology advisor already knows the strengths and weaknesses of every carrier and supplier in the country. They know which suppliers can fit the needs of Bob’s industry, his locations, and his company’s unique systems and strategies. Better yet, instead of sitting on the other side of the table during strategy discussions, this cloud and telecom technology advisor sits on the same side of the table as Bob like a true partnership should.

The advisor doesn’t have sales targets to hit with suppliers because of their affiliation with the technology servers as distributor. They can choose from dozens or even hundreds of suppliers with no obligation or incentive to choose one meaning Bob gets the best solution for his company, not for the salespersons. In short, the advisor cares less about selling Bob something and more about helping Bob find the right solution.

When there’s a problem, Bob calls his new vendor-neutral technology partner, not a customer service representative. Escalations get prioritized for Bob. Since the technology advisor is a business not a job hopping sales rep, they’re investing in Bob and his company for decades. And Bob literally has one phone to call when problems arise. That’s total accountability before, during, and after the implementation.

But that’s not even the best part. You see whatever supplier and solution that Bob and his technology advisor decide on, his advisor will negotiate raise with the supplier that are the same or better than Bob would get by going direct. And get this, Bob doesn’t have to pay the advisor anything for doing all of this work – zero. The advisor partner gets paid by the supplier as if they would pay one of their own sales reps – well, better actually.

So, Bob gets all of the service, strategy, accountability, trust, and optimal solutions at zero cost. And, because the advisor is in invested in a long term relationship with Bob, something that their own business success depends on, this means they are more accountable to Bob. So, everybody wins including the supplier who gets more business without having to manage salespeople. It’s how business is evolving in IT and telecom.

So, do you want to get all of these benefits of working with a no-cost cloud and telecom technology advisor? Call us today and let’s get started.

Telecom Tylenol Episode 1 – Avoiding Automatic Renewal Clauses

TT Thumbnail

Telecom Tylenol is a video blog produced by Joe Jonovic of SOLUS Network Solutions. Every episode provides valuable advice to businesses for the purpose of avoiding or relieving telecom/technology headaches.

Contact Joe at 775.853.3335 or joe@solusns.com

 

 

Video Transcription:

Hi. Joe Jonovic here with SOLUS Network Solutions, your trusted technology adviser.

And today, we’re kicking off Telecom Tylenol, a video blog to help IT professionals minimize the headaches that are inherent in procuring telecom services. And our hope and my goal personally is to give you some little tidbits and some nuggets on a somewhat regular basis and help you avoid getting a telecom migraine.

So, we’ll be giving you some tips and tricks and talking a little bit about the SOLUS value proposition and how we help professionals by simplifying their life.

So, Joe Jonovic, Telecom Tylenol. Hope you find this valuable. Thank you.

Hey, Joe Jonivic here with another edition of Telecom Tylenol.

Today’s headache is auto renew clauses. You know when you sign a two or three-year contract for services, sometimes the direct contracts will have an auto renew clause. And why is this problematic?

Well, you always want to be in a position to have me research current market pricing and get you the best deal and not re-contract for services at a rate from three or four years ago because the market is always declining.

And so, here’s the solution to your headache to make sure it doesn’t turn into a migraine. Call the carriers now, go through all your contracts, and you can do it or you can have me and my team do it. But, call them and tell them that you want to make sure that there’s not any auto renew clauses and you want to make sure that your contracts go month to month when they expire. That will help – that will put us in a position to go out and shop for you and get you the best deal.

We’re here to help. SOLUS Network Solutions your telecom Tylenol.

Thanks for tuning in.