• Facebook
  • Twitter
  • LinkedIn
  • OUR PARTNERS
  • TESTIMONIALS
  • BLOG
Contact Us: 0207 952 8123
Cloudscape
  • Cloud
    • Hosted Email
    • Hybrid Cloud
    • Online Backup
    • Private Cloud
  • IT Support
    • Apple Mac Support
    • Managed IT Support
    • Network Support
    • Ongoing Support
    • PC’s & Servers
  • Telecoms
    • Hosted VoIP
  • IT Services
    • IT Relocation
    • IT Projects
    • IT Consultancy
    • GDPR Services
  • Cyber Security
  • Contact
  • Menu Menu

Tackle your business challenges head on – With Office 365 Compliance

in Cyber Security, IT Tips

“How can I control what happens with my data and where it ends up?”

With Office 365 this is an easy challenge to solve; ensure data compliance with the built-in Enterprise-grade security.

Struggling to maintain total data security?

A sound cybersecurity strategy is vital to any business. Where data security is concerned you should take no chances, as sensitive information in the wrong hands could prove disastrous for your business.

Cyber-attacks are opportunistic; they tend to strike when presented with signs of weakness. That’s why it’s so important to ensure that you implement the highest standards of Cyber Security procedures at all times. Sadly, however, many businesses are still not confident in ensuring that their data remains protected, with many business suffering data leaks through poorly protected servers and improper storage practices.

The introduction of GDPR has helped to refocus the issue of data compliance. While it may be EU legislation, the UK has effectively passed a near-identical version into UK law, meaning data compliance will remain an extremely important consideration for businesses of all sizes in the UK. Additionally, cyber threats have never been so common, with the rise of increasingly intelligent and harmful threats effective data security has never been so important.

Fortunately, the solution is at hand, with Office 365’s security and compliance centre.

Introducing Office 365 Security and Compliance

Microsoft Office 365 features a range of privacy and compliance tools to help your business meet its data protection obligations. Secure your data, ensure data privacy and maintain compliance with advanced protection that harnesses the elevated security inherent in cloud storage.

Enterprise-grade protection at a price SMEs can afford. Take advantage of enterprise levels of protection without having to employ an army of Cybersecurity professionals.  With Office 365 you have Microsoft’s trusted cybersecurity expertise and capabilities at your disposal, helping to keep your files and systems safe with minimal cost and maintenance implications for your business. Expose and guard against various threats such as phishing attempts, malicious links, spam, viruses and more.

Avoid accidental leaks. Control the use and storage of data at file-level to ensure files are only opened by those permitted to do so and are only stored in approved locations. Office 365 enables users to send and receive encrypted emails to ensure sensitive data in emails and attachments can’t be intercepted by cybercriminals.

Control access. Assign and withdraw access permissions as you see fit to ensure that only trusted individuals have access to your sensitive data. Implement access policies and create security groups to ensure blanket control over your data at all times.

Enjoy compliance ‘peace of mind.’ You can be confident in your ability to meet your Compliance obligations as Office 365 has been designed in accordance with industry-specific, international and regional data security legislation. Office 365 lets you simplify your data compliance and risk strategy by slimming the process down into one intuitive and easy to manage platform. Message encryption makes sensitive information unattainable to cybercriminals without affecting productivity, and a range of tools help you identify and protect particularly sensitive information such as GDPR data.

Keeping tight controls on your data might seem like an insurmountable challenge, but with the help of Office 365’s security and compliance features, it doesn’t have to be. Protect your business’ and customers’ sensitive data and ensure regulatory compliance by taking advantage of these features today.

 

Struggling to find a solution that fits around your business?

At Cloudscape, we use our extensive experience to deliver custom-fit technology solutions to SMEs in London and the home counties. Technology should serve your business’ aims and aspirations, it shouldn’t be something to mould your operation around. We are experts in Cloud-computing and we know how empowering Cloud Services can be when leveraged correctly, so let us help you tailor Office 365 so that it works for your business and the unique challenges you face. Call us on 0207 952 8123 or send us an email info@cloudscape.it.

https://cloudscapeit.co.uk/wp-content/uploads/2020/06/5.jpg 303 807 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-07-20 07:00:442020-06-15 12:24:59Tackle your business challenges head on – With Office 365 Compliance

Billions of Banking and Social Media Credentials Available Online

in Cyber Security, IT Tips

Around 15 billion credentials are in circulation in cyber-criminal marketplaces.

According to new research from Digital Shadows, a 300% increase in stolen credentials from over 100,000 data breaches in the past two years means there are more than 15 billion credentials in circulation. These include credentials for bank accounts, social media and video streaming services.

Of these, more than five billion were assessed to be ‘unique’ – i.e. they have not been advertised more than once on criminal forums.

Rick Holland, CISO and VP of strategy at Digital Shadows, said: “The sheer number of credentials available is staggering and in just over the past 1.5 years, we’ve identified and alerted our customers to some 27 million credentials – which could directly affect them.

“Some of these exposed accounts can have (or have access to) incredibly sensitive information. Details exposed from one breach could be reused to compromise accounts used elsewhere.”

Many account details are offered free of charge, but of those on sale, the average account trades for $15.43. Bank and financial accounts are the most expensive, averaging at $70.91, however they trade for upwards of $500, depending on the ‘quality’ of the account.

There was also evidence that methods to bypass 2FA were commonly discussed on cyber-criminal forums. In one example, in December 2019, a user on the Russian-language cyber-criminal forum Exploit created a thread to sell a method designed to bypass 2FA systems at a United States-based online bank. They stated that their system would allow seven to nine out of 10 accounts to be accessed without requiring SMS verification, and that they considered their offer to be worth $5000.

In an email to Infosecurity, security researcher and speaker Troy Hunt said he was not “overly surprised by the numbers” as he had noticed a lot more credential stuffing lists in circulation recently and just like the pandemic itself, they seem to be replicating at a fierce rate.

“It’s one of those things that’s very easy to propagate and I often see the same data represented in different derivatives, for example, expressed by the domain of the email account or the geographic location of the account holder.”

Asked if he felt more accounts were being created due to people working from home and getting more deliveries, Hunt said: “Personally, I think it’s too early to see an impact on credential stuffing lists due to the pandemic. Yes, there’s a lot more people working remotely, but these lists are curations of previous data breaches bundled up and passed around as sources for brute-forcing login pages.

“These lists are also dependent on having passwords accessible in either plain text or with weak cryptographic protection (i.e. MD5 or SHA-1 hashes) which fortunately is becoming increasingly uncommon.”

Digital Shadows also observed the growth of ‘account takeover as-a-service’ where, rather than buying a credential, criminals can rent an identity for a given period, often for less than $10.

For this price, the service collects fingerprint data (such as cookies, IP addresses, time zones) from an individual (the target), which makes it considerably easier to perform account takeovers and transactions that go unnoticed. Such is the popularity of these services that users on forums are desperate to acquire invite codes to this market.

Holland added: “The message is simple – consumers should use different passwords for every account and organizations should stay ahead of the criminals by tracking where the details of their employees and customers could be compromised.”

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.infosecurity-magazine.com/

https://cloudscapeit.co.uk/wp-content/uploads/2020/07/web-developer-at-agency_t20_pYGbPY.jpg 800 1200 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-07-13 10:26:492024-05-15 14:23:13Billions of Banking and Social Media Credentials Available Online

Tackle your business challenges head on – With Microsoft Bookings

in Cyber Security, IT Tips

“Is there any way I can arrange meetings without the tedious email back-and-forth?”

Ask this question no more as a solution is at hand…Microsoft Bookings.

Is meeting scheduling taking up too much of your time?

When it comes to scheduling meetings, particularly those which are face-to-face, communication is key!

It can be hard getting work done when you have to exchange countless emails over the course of an afternoon in order to organise a simple meeting. However, you may feel there is no way round the issue, that it is the necessary rigmarole you have to endure – you’ve always done it this way so why change now? Additionally, you are frequently bombarded with phone calls, and you spend precious hours repeating when you can and can’t attend meetings to various clients, associates and potential customers. Your office hours are finite, so all this emailing and chatting eats into time you might otherwise be using more productively.

Fortunately, there is a solution to the age-old challenge of arranging meetings, and it may already be at your disposal.

Introducing Microsoft Bookings

Microsoft Bookings is the solution to scheduling challenges that you’ve been looking for. It largely takes your time out of the equation, by transforming the way in which your customers and clients arrange appointments with you, letting you focus on more fruitful tasks.

Customer satisfaction guaranteed. Your customers will enjoy the control, convenience and flexibility that Microsoft Bookings gives them. Your Bookings page lets them see when you’re available at a glance, so they’re able to book an appointment with you there and then, without the endless email exchange or hassle of a phone call. They’ll then receive an automatic confirmatory email and calendar invite. The booking page also lets them reschedule or cancel as required, again without the fuss and hassle doing so might otherwise entail.

If they prefer to book over the phone then you simply enter the details of the meeting into Bookings and it handles the rest.

Your Office time is valuable, Save it! E-mail and telephone scheduling can prove time-consuming and tedious for both parties concerned. Bookings lets you dispense with the tiresome process altogether by letting your customer’s book meetings quickly and efficiently 24/7 via a highly customisable webpage.

Avoid missed appointments with reminders. When meetings are booked the traditional way you rely on attendees setting reminders and entering dates and times into their calendars and diaries. Bookings have that covered! It schedules reminders and automatically updates calendars so that all concerned know where they need to be and when.

Microsoft bookings take the hassle and stress out of booking meetings while helping to ensure your business appears organised and professional. It is featured as part of Microsoft 365 and various Office packages so why not try it out today.

 

Struggling to find a solution that fits around your business?

At Cloudscape, we use our extensive experience to deliver custom-fit technology solutions to SMEs in London and the home counties. Technology should serve your business’ aims and aspirations, it shouldn’t be something to mould your operation around. We are experts in Cloud-computing and we know how empowering Cloud Services can be when leveraged correctly, so let us help you tailor Office 365 so that it works for your business and the unique challenges you face. Call us on 0207 952 8123 or send us an email info@cloudscape.it.

https://cloudscapeit.co.uk/wp-content/uploads/2020/06/4.jpg 303 807 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-07-13 07:00:472020-06-15 12:25:13Tackle your business challenges head on – With Microsoft Bookings

HSBC SMS Phishing Scam Targets UK Victims

in Cyber Security, IT Tips

People in the UK are being targeted by a new phishing scam designed to trick victims into handing over details of their HSBC bank account.

The scam, discovered by litigation specialists Griffin Law, begins with a bogus text message that claims to be from the banking and finance giant informing the receiver that a new payment has been made through the HSBC app on their phone.

The user is then told that, if they are not responsible for the payment, they should visit the site “Security.hsbc.confirm-systems.com” to validate their bank account, before being directed to a fake landing page which asks for their username and password, followed by a series of verification steps.

The fraudulent site, which uses official HSBC branding, then asks for specific account details and personal data of the individual.

Griffin Law claimed that almost 50 people have come forward to say they have received the text message so far, with some able to identify the scam due to the fact they do not have a HSBC app installed on their phone. Thankfully, thus far, there have been no current reports of the scam being successful, according to Griffin Law.

Chris Ross, SVP, Barracuda Networks, said: “This is the latest in a long line of increasingly sophisticated phishing scams, designed to trick the victim into handing over their personal financial details.

“Increasingly, we are seeing examples of cyber-criminals using the branding of major banks to create realistic-looking fake websites, in order to extract personal financial information.”

When it comes to tackling the problem, all companies and users must remain vigilant of such scams, he added.

“SMS messages are often used by criminals to catch workers off-guard, using their personal mobile number. Ensuring security awareness within the workforce is critical, and it’s important that all employees are trained about how these schemes operate as well as how SMS messages can be exploited as part of a wider phishing scheme designed to steal company funds and data.”

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.infosecurity-magazine.com/

https://cloudscapeit.co.uk/wp-content/uploads/2020/07/working-from-home-nominated_t20_QKjyQE.jpg 800 1200 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-07-10 10:24:062024-05-15 14:24:21HSBC SMS Phishing Scam Targets UK Victims

Fraudsters Conducting Malvertising Campaign Via Inactive Domains

in Cyber Security, IT Tips

A number of inactive websites have been compromised and are redirecting visitors to unwanted URLs, many of which are malicious. This is according to a new study by Kaspersky, which uncovered over 1000 inactive domains that send users to second-hand pages as a way for fraudsters to make money or even infect their device.

Inactive domains are sometimes purchased by a service before being put up for sale on an auction site. Visitors to the inactive website should then be redirected to the auction stub; however, fraudsters are often substituting these stubs for malicious links.

Kaspersky researchers discovered that there were about 1000 websites for sale on one of the world’s biggest auction platforms, and these redirected visitors to over 2500 unwanted URLs. Many of these download the Shlayer Trojan, which installs adware on infected devices and is distributed by webpages with malicious content.

Of these websites, 89% were redirects to ad-related pages while 11% were to malicious sites, which either contained a malicious code or prompted users to install malware or download infected MS Office or PDF documents.

It is believed fraudsters are being paid to drive traffic to both the legitimate advertising pages and malicious sites, which is the motivation for the scheme.

Dmitry Kondratyev, junior malware analyst at Kaspersky, commented: “The domains that have these redirects were — at one point — legitimate resources, perhaps those the users frequently visited in the past. There is no way of knowing whether or not they are now transferring visitors to pages that download malware. Adding to the challenge is that whether or not you land on a malicious site varies: if one day, you access the site from Russia, nothing will happen. However, if you then try to access it with a VPN, you might be sent to a page that downloads Shlayer.

“In general, malvertising schemes like these are complex, making them difficult to fully uncover, so your best defense is to have a comprehensive security solution on your device.”

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.infosecurity-magazine.com/

https://cloudscapeit.co.uk/wp-content/uploads/2020/07/late-nite-software-development_t20_Zzvrkb.jpg 800 1200 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-07-09 10:19:442020-07-13 10:23:35Fraudsters Conducting Malvertising Campaign Via Inactive Domains

Tackle your business challenges head on – With Power Apps

in Cyber Security, IT Tips

“I wish I could find an app for that.”

We’ve all been there; you find yourself wishing you could automate-away menial tasks, but you can’t find solutions that do the job. Well, now thanks to Microsoft’s ‘PowerApps’ feature within Office365 you can dispense with menial tasks through the power of automation, freeing you up to focus on the stuff that matters!

Are efficient collaboration and workflow management a constant struggle in your business?

Well-honed work processes are fundamental to the smooth running of any business. Seamless, efficient and error-free work processes are the holy grail for many businesses and spending time implementing such processes will save you time and money in the long run.

Relying on a multitude of applications to achieve a simple objective is one of the common impediments to efficiency in the office. Many users of Office 365 are guilty of inflexibility when it comes to the use of the services and tools they have available to them; preferring to stick to the familiar legacy products. If this sounds like you, then you might want to invest time in exploring alternative tools that could ultimately transform the way your business operates for years to come.

Finding solutions that address seemingly complex processes may seem like a daunting task; it can be a challenge finding the tools that give the results you need and operate within your business’ specific requirements. You may want to consolidate data gathered on various platforms or improve your business’ operation by developing your own app but have no idea where to look to implement these changes… well, that’s where ‘PowerApps’ comes in.

Introducing PowerApps

In essence, PowerApps is a suite of resources that lets you and your team create applications that simplify and streamline cumbersome processes and modernise dated workflows. Increase agility, efficiency and improve productivity by building your own apps and do away with some of the inflexible, off-the-shelf applications you may currently be using.

Improve efficiency and minimise the error by letting your team construct and run an unlimited number of custom apps that simplify and speed up processes. Use visual tools to identify and tackle business-related issues, then tap into the value of your data using apps that help bring together and make sense of information stored in numerous locations.

Simplicity. ‘Developing apps’ may sound very complex and technical, but thanks to pre-made templates, the intuitive ‘drag and drop’ nature of the interface and the ability to deploy apps instantly, you don’t need a degree in Computer Science to develop your own apps with PowerApps. Instead, your team can start building almost immediately without the need for extensive training.

Innovation potential. Power Apps enable digital transformation through the implementation of apps for countless scenarios. Use both Canvas and Model-driven apps to address your business’ unique problems.

Customisation potential. The customisation potential of ‘Canvas Apps’ allows you to develop applications that are optimised for very specific tasks and job roles. You can develop apps for various platforms (mobile, desktop, tablet) and tailor every aspect to your requirements, right down to the smallest details.

Build apps that tap into your data. Create ‘Model-driven’ apps that use your current processes and data streams. Consolidate information from multiple sources and make sense of the data your business holds without having to endure the tedium of manual data entry.

Create Low-code websites. Create a visually attractive and immersive, low-code website for customers and potential customers to interact with. Utilise your data-based, model-driven apps and integrate them with Power BI reports, dashboards and charts to create impressive-looking, but ultimately simple to implement websites that are sure to impress external users.

The PowerApps suite will enable your team to streamline, innovate and improve efficiency like never before. So why not introduce it to your business and allow your team to develop simple, effective and customised solutions to your business’ unique operational challenges.

 

Struggling to find a solution that fits around your business?

At Cloudscape, we use our extensive experience to deliver custom-fit technology solutions to SMEs in London and the home counties. Technology should serve your business’ aims and aspirations, it shouldn’t be something to mould your operation around. We are experts in Cloud-computing and we know how empowering Cloud Services can be when leveraged correctly, so let us help you tailor Office 365 so that it works for your business and the unique challenges you face. Call us on 0207 952 8123 or send us an email info@cloudscape.it.

https://cloudscapeit.co.uk/wp-content/uploads/2020/06/3.jpg 303 807 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-07-06 07:00:592020-06-15 12:25:26Tackle your business challenges head on – With Power Apps

Criminals Exploit Pandemic with Brute-Force RDP Attacks

in Cyber Security, IT Tips

ESET is the latest security company to notice a sharp spike in RDP-based hacks over the last few months. The anti-malware company spotted a rise in the number of brute-force attacks using the remote access protocol, and said that cyber-criminals have been using it to distribute ransomware.

The Remote Desktop Protocol is a proprietary Microsoft protocol that allows people to access Windows from outside the network. Companies often leave their RDP ports open without taking proper security measures, ESET warned. That can lead to malware infections.

The company has tied the spike in attacks to the COVID-19 pandemic. With lots of office workers forced to log in from home, RDP has become a common way for them to access machines back at the office, it explained. It distributed a graph showing daily attacks against unique clients rising from just under 30,000 in December to over 100,000 during May.

ESET created a new detection layer that spots repeated login attempts from external environments. It adds offending IP addresses to a blacklist that it uses to protect all of its clients. For that to work, though, companies must enable the Network Level Authentication (NLA) RDP option on their servers. This is something that Microsoft has already recommended in the past as a protection against the BlueKeep worm that emerged last year, which exploited a vulnerability in RDP.

Other things you can do to protect yourself against RDP include disabling it altogether if you don’t need it, the company says, or at least creating access control lists that limit the number of users allowed to connect directly over the internet. Use strong, complex passwords for all accounts, along with multi-factor authentication, it advises. If possible, use a VPN gateway to broker all connections from outside your local network. We covered some protection techniques in April.

ESET isn’t the only company to have noticed a rise in RDP-based attacks. In March, Shodan noticed an uptick in the number of devices exposing RDP to the internet. A month later, Kaspersky reported the same thing, warning that the number of Bruteforce.Generic.RDP attacks had “rocketed across almost the entire planet” since March.

Exposed RDP problems are so bad that the FBI even warned about it in 2018, and reportedly sent out another warning this month to K–12 schools in the US about an increase in RDP-based ransomware attacks during the pandemic.

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.infosecurity-magazine.com/

https://cloudscapeit.co.uk/wp-content/uploads/2020/07/computer-programmer-using-computer-at-work-6DZFUU6.jpg 800 1200 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-07-01 11:57:482020-07-01 11:58:34Criminals Exploit Pandemic with Brute-Force RDP Attacks

Researchers Find New Calendar-Based Phishing Campaign

in Cyber Security, IT Tips

Researchers have once again spotted crooks using calendar invitations to mount phishing attacks. The Cofense Phishing Defense Center found the attack in enterprise email environments protected by Proofpoint and Microsoft, it announced last week.

The phishing scam uses iCalendar, which is a media type that lets users store and exchange calendaring and scheduling information, including events and tasks. iCalendar files are usually delivered with an .ics extension. The company found the attackers using this file with the subject “Fault Detection from Message Center,” from a sender with the display name Walker. It came from a legitimate account belonging to a school district, indicating that the attackers were using a compromised email. That enabled them to bypass email filters relying on the DKIM and SPF technologies that authenticate sending domains.

When the victim opens the .ics file, it proposes a calendar entry displaying the URL, along with a message saying that it is from a security center. The web page behind the URL is hosted on Microsoft’s SharePoint site, and displays another link to a phishing site hosted by Google that appears to show a Wells Fargo login page.

Victims gullible enough to cooperate must submit their login details, PIN and account numbers, along with their email credentials. Doing so hands the attackers the keys to the kingdom. The phishing site will then send them to the legitimate Wells Fargo website to quell any suspicion.

This may be a new campaign, but it is not a new technique. A similar attack cropped up last June, when Kaspersky found attackers using Google’s auto-add feature. In that attack, smartphone users would see the invitation as a pop-up invitation, displaying a link to a phishing URL that asked for their credit card data and personal information.

This attack shows that cyber-crooks are still using the same attack vectors to deliver their scam material. Cofense also points out that using legitimate domains designed to host user content is a common tactic, and a perennial problem for the likes of Microsoft and Google. It gives the attackers an air of legitimacy because they get to take advantage of these sites’ built-in SSL certificates, which add the reassuring green padlock icon to the side of the URL in a browser’s address bar.

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.infosecurity-magazine.com/

https://cloudscapeit.co.uk/wp-content/uploads/2020/07/computer-developer-working-with-computers-at-night-MD8HUP9.jpg 800 1200 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-07-01 11:57:002023-01-27 13:24:57Researchers Find New Calendar-Based Phishing Campaign

Online Learning Platform Exposes Data on One Million Students

in Cyber Security, IT Tips

Over one million North American students have had their data exposed after a popular online learning platform left it in a publicly accessible cloud database, according to vpnMentor.

Researchers from the firm claimed that the Elasticsearch database belonging to provider OneClass was left completely unsecured.

The trove contained over 27GB of data, amounting to 8.9 million records, including many students’ full names, email addresses, schools/universities, phone numbers, account details and school enrollment details.

Although OneClass secured the database just a few days after being notified on May 20 this year, it subsequently claimed that the exposed information was merely test data, according to vpnMentor.

“However, during our investigation, we had used publicly available information to verify a small sample of records in the database,” the researchers continued.

“Taking the PII data from numerous records, we found the social profiles of lecturers and other users on various platforms that matched the records in OneClass’s database. Based on this, we doubt the veracity of OneClass’s claim and stand by our assessment.”

It goes without saying that hackers could have conducted highly effective follow-on phishing emails with the exposed data, with a view to obtaining financial details from victims, or even spreading malware.

“Furthermore, OneClass users are very young — including minors — and will generally be unaware of most criminal schemes and frauds online. This makes them particularly vulnerable targets. It’s also likely many of them use their parent’s credit cards to sign up, exposing their whole family to risk,” vpnMentor explained.

“With so many students relying on remote learning due to coronavirus, OneClass could be experiencing a surge in new users. Hackers could quickly create fraudulent emails using the pandemic and related uncertainty as a pretext to contact potential victims, posing as OneClass and asking them to divulge sensitive information.”

That’s not to mention the reputational hit to OneClass itself and a potentially significant regulatory compliance burden. Headquartered in Toronto, the firm provides online education resources to millions of students in North America.

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.infosecurity-magazine.com/

https://cloudscapeit.co.uk/wp-content/uploads/2020/07/modern-man-working-remotely-on-a-computer-from-hom-MD83EXU.jpg 800 1200 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-07-01 11:55:212020-07-01 11:56:34Online Learning Platform Exposes Data on One Million Students

Businesses Lack a Workable Ransomware Recovery Strategy

in Cyber Security, IT Tips

More than a third of businesses do not have a ransomware emergency plan in place, or are not aware if one exists within their company.

According to research from Ontrack of 484 organizations, 39% either did not have or were not unaware of a ransomware strategy, while 26% admitted they couldn’t access any working backups after an attack.

“The threat of ransomware has never been greater” said Philip Bridge, president of Ontrack. “The fact that only 39% of respondents to our survey have an emergency plan in place for a ransomware attack is shocking. They are gambling with their and their customers’ data.

“It is imperative, now as ever, to ensure your organization has processes and procedures in place to mitigate the impact of any cyber-attack and protect sensitive data,” added Bridge.

As the third anniversary of the NotPetya attacks were marked at the weekend, David Grout, CTO of EMEA at FireEye, said NotPetya highlighted the need for resiliency, backup and preparation, as well as the importance of being able to track and identify the perpetrators and understand their motives.

“In terms of what can be done to mitigate the effects of these attacks, primarily, it is essential that patches are made available quickly and that they are widely adopted. If a discovered vulnerability can be exploited, it is highly likely that threat groups will use it, and continue to do so until it is fixed, inflicting untold damage,” he said.

“The NotPetya attack could have been mitigated by ensuring updates to software were regularly conducted, as well as thorough assessments of a given organization’s security, especially through simulated cyber-breaches.”

Speaking to Infosecurity, BH Consulting CEO Brian Honan said, with ransomware becoming an increasing concern for many organizations, he is seeing more businesses take steps to tackle the threat.

“However, many of these steps focus very much on the preventive aspect of security controls and in particular on ensuring effective anti-virus software is in place. While this is an important element in protecting against ransomware, organizations do need to take a more holistic approach to protecting their businesses and ensuring they can continue to function and recover from an attack should it happen.”

Honan recommended having robust data backup and data recovery strategies in place. “The key is to ensure business resilience in the event of a ransomware attack,” he said. “To achieve this, organizations should incorporate their incident response processes, for all cyber-attacks and not just for ransomware attacks, with their business continuity plan so they can continue to operate, while looking to recover from secure backups.

“A good backup strategy that is regularly reviewed, secured and tested to ensure the data can be recovered is one of the most effective defenses against ransomware.”

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.infosecurity-magazine.com/

https://cloudscapeit.co.uk/wp-content/uploads/2020/07/student-with-computer-studying-at-school-PM72WH3.jpg 800 1200 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-07-01 11:38:062024-05-15 14:26:06Businesses Lack a Workable Ransomware Recovery Strategy
Page 8 of 17«‹678910›»

Recent Posts

  • What to implement to solve the problems from 2020
  • What to implement in 2021: New year, New start
  • How can the cloud industry adapt to a post-COVID world?
  • Twitter Fined Half a Million Dollars for Privacy Violation
  • Spotify Resets Passwords After Leaking User Data to Partners
  • Remote work is here to stay — but it will not be cheap or easy
  • Is remote working putting you at regulatory risk?
  • 5 Ways To Make Remote Working Your New And Better Normal
  • How hybrid work models are altering cloud strategies
  • Top metrics for effective multicloud management

Archive

Categories

Pages

  • Adapt. Evolve. Grow. Guide
  • Business Continuity Health Check
  • Cloud Services
    • Hosted Email
    • Hybrid Cloud
    • Online Backup
  • Computer Support London
  • Free IT AUDIT
  • Home
  • IT Consultant London
  • IT Services
    • Cyber Security Services London
    • IT Consultancy NEW
    • IT Projects
    • IT Relocation
    • Make Your Business GDPR Compliant
  • IT Support
    • Apple Mac Support
    • Network Support
    • Ongoing Support
    • PC & Server Support
  • Managed IT Support for London
  • Microsoft 365 Secure Landing Page
  • Network Solutions
  • Privacy
  • Private Cloud
  • Tailored for Financial Services and Accounting
  • Thank You
  • Hosted VoIP

FREE IT Technology Audit

Get the most from your technology with a
FREE IT Support Solutions Audit – worth £300.
We‘ll produce a full network report covering 30 key areas in your business. This will give you a great idea where your IT systems need the most attention and importantly where cost savings might be achieved! There is no obligation on your part – the report is completely FREE OF CHARGE

Recent Blog Posts

  • What to implement to solve the problems from 2020
  • What to implement in 2021: New year, New start
  • How can the cloud industry adapt to a post-COVID world?
  • Twitter Fined Half a Million Dollars for Privacy Violation
  • Spotify Resets Passwords After Leaking User Data to Partners

IT Support for London

Cloudscape IT
47 Oxford Drive
Magdalen Street
London
SE1 2FB

0207 952 8123
Email: info@cloudscape.it

© 2025 Cloudscape IT LTD. Registered in England & Wales No. 04565979. Registered Office - 47 Oxford Drive, Magdalen Street, London, England, SE1 2FB. All rights reserved.
  • Facebook
  • Twitter
  • LinkedIn
Scroll to top