• Facebook
  • Twitter
  • LinkedIn
  • OUR PARTNERS
  • TESTIMONIALS
  • BLOG
Contact Us: 0207 952 8123
Cloudscape
  • Cloud
    • Hosted Email
    • Hybrid Cloud
    • Online Backup
    • Private Cloud
  • IT Support
    • Apple Mac Support
    • Managed IT Support
    • Network Support
    • Ongoing Support
    • PC’s & Servers
  • Telecoms
    • Hosted VoIP
  • IT Services
    • IT Relocation
    • IT Projects
    • IT Consultancy
    • GDPR Services
  • Cyber Security
  • Contact
  • Menu Menu

Tag Archive for: IT Project Management

Human Error Threatens Cloud Security

in Cyber Security, IT Tips

Virtually all security professionals believe that human error could put the security of cloud data at risk, according to new research published today.

A survey commissioned by Tripwire and carried out last month by Dimensional Research found that 93% of security professionals were concerned that human error could result in the accidental exposure of their cloud data.

Despite their concern over human error, 22% of those surveyed said that they assess their cloud security posture manually.

The survey evaluated the opinions of 310 security professionals on the implementation of cloud security best practices.

According to the research, a number of organizations experience difficulties in monitoring and securing their cloud environments. A majority of security professionals (76%) state they have difficulty maintaining security configurations in the cloud, and 37% said their risk management capabilities in the cloud are worse compared with other parts of their environment.

Other findings were that security professionals tend not to keep tabs on their real-time cloud security situation. Only 21% of organizations were found to assess their overall cloud security posture in real time or near real time.

While 21% said they conduct weekly cloud security evaluations, 58% said they wait until a month or more has gone by.

Maintaining security was a challenge for most organizations, with only 22% saying that they are able to maintain continuous cloud security compliance over time.

“Security teams are dealing with much more complex environments, and it can be extremely difficult to stay on top of the growing cloud footprint without having the right strategy and resources in place,” said Tim Erlin, vice president of product management and strategy at Tripwire.

“Fortunately, there are well-established frameworks, such as CIS benchmarks, which provide prioritized recommendations for securing the cloud. However, the ongoing work of maintaining proper security controls often goes undone or puts too much strain on resources, leading to human error.”

The amount of automation employed varied across cloud security best practices. While 51% use automated alerts with context for suspicious behavior, only 45% automatically assess new cloud assets as they are added to the environment.

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.infosecurity-magazine.com/

https://cloudscapeit.co.uk/wp-content/uploads/2020/08/two-young-businessman-having-a-successful-meeting-F7SRGQE.jpg 800 1200 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-08-14 14:30:222020-08-14 14:32:05Human Error Threatens Cloud Security

Tackle your business challenges head on – With Power Automation

in Cyber Security, IT Tips

“If only there was a way I could get rid of all the manual tasks in my workflow.”

If your working day is bogged down with repetitive manual tasks then Power Automate may be the tool for you!

Are mundane, repetitive manual tasks hindering your productivity?

Efficiency, good organisation and high productivity are the keys to success. For many businesses though, achieving any one of these aims can be enough of a struggle, never mind all three.

Remember, feeling like there aren’t enough hours in the day isn’t necessarily a sign you’ve been productive, it could indicate that the way you work is inefficient. Persevering with the old routine may seem like the only option, but if you feel like you’re drowning in a sea of recurring menial tasks you should be looking for solutions that can help slim down your burden of work, and give you time to focus on the more rewarding aspects of running your business. Even if you are managing currently, automating menial tasks will give you time to focus on other things and will increase your capacity to take on more work which means greater revenue potential!

Fortunately, Microsoft offers a platform to help you address these common business problems.

Introducing Microsoft Power Automate

Previously called ‘Microsoft Flow,’ Power Automate is a service that enables users to link apps, services and files and create automated workflows between them without the need for technical expertise.

Power automate will let your business ‘automate-away’ many of the annoying and tedious tasks that plague daily office life using digital and robotic process automation. Listed below are a few of the ways it could benefit your business.

Improved Productivity.  As the name suggests, Power Automate can bring the benefits of automation to your Office. Such benefits include improved organisation, time savings and increased efficiency. By automating mundane tasks your workforce will be able to focus on the things that add value, such as building relationships with clients and working on business performance outcomes.

Easier access to business data. Trawling through files and applications to bring data sources together may not seem like too much trouble, but when you’re doing this many times a day, five days a week the time spent on it soon adds up.  You can use Power Automate to establish ‘flows’ between file locations/apps allowing you to transfer files from one location to the other utilising over 100 data source connectors. For example, you can set up a connector between Outlook and SharePoint so that email attachments you receive are automatically transferred to a SharePoint site.

Fast and easy automation that requires no expert knowledge! You don’t have to be a computer genius to set up workflows in Power Automate. The whole process is guided, intuitive and doesn’t require any knowledge of coding, so you can let all your staff take advantage of the power of automation. What’s more, you can rest assured knowing that your business’ data is secure thanks to cloud-based data loss prevention and access management services.

At least 30% of activities in approximately 60% of job roles are estimated to be technically automatable. By investing a little time now automating those repetitive tasks you could save yourself and your business countless hours in the future.

 

Struggling to find a solution that fits around your business?

At Cloudscape, we use our extensive experience to deliver custom-fit technology solutions to SMEs in London and the home counties. Technology should serve your business’ aims and aspirations, it shouldn’t be something to mould your operation around. We are experts in Cloud-computing and we know how empowering Cloud Services can be when leveraged correctly, so let us help you tailor Office 365 so that it works for your business and the unique challenges you face. Call us on 0207 952 8123 or send us an email info@cloudscape.it.

https://cloudscapeit.co.uk/wp-content/uploads/2020/06/8.jpg 303 807 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-08-10 07:00:142020-06-15 12:24:09Tackle your business challenges head on – With Power Automation

Many Second Hand Phones Are Sold with Security Vulnerabilities

in Cyber Security, IT Tips

A substantial proportion of second hand mobile phones are vulnerable to being hacked due to not being supported by important security updates, an investigation by Which? has found.

The analysis centered around three popular mobile phone retailers: SmartFoneStore, Music Magpie and CeX. The worst affected was CeX, where nearly a third (31%) of phones sold are no longer supported by security updates from manufacturers. For SmartFoneStore, 17% of models sold were unsupported, while for Music Magpie it was 20%.

This is providing cyber-criminals with opportunities to target older vulnerabilities in these devices.

Which? said that it presented the three companies with the findings, and since then SmartFoneStore has issued a warning on unsupported devices so people are aware before they buy them, while Music Magpie has removed all the affected devices from sale. However, it has not yet received a response from CeX.

Which? has advised that customers check the manufacturer’s security updates page to find out this information before purchasing a used phone.

Commenting on the findings, Jake Moore, cybersecurity specialist at ESET, said: “It may sound like a great deal to purchase an older and cheaper device, but unfortunately you can’t put a price on security.

“Older phones notoriously have a use-by-date when they are no longer supported by security patches. These devices will often still work as normal on the surface, but threat actors can use older vulnerabilities under the hood to target their victims with ease, so those at risk must be reminded to check which operating system it currently supports before purchasing.”

For phones operating off an Android operating system, there will typically be two years of operating system updates and three years of security updates. For Apple iPhones, system and security updates are usually packaged together and these will continue for an average of five to six  years.

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.infosecurity-magazine.com/

https://cloudscapeit.co.uk/wp-content/uploads/2020/04/thom-holmes-J2e34-1CVVs-unsplash.jpg1fix.jpg 867 1300 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-08-06 10:47:192020-08-06 10:48:33Many Second Hand Phones Are Sold with Security Vulnerabilities

Cloud Breaches Set to Grow in “Velocity and Scale”

in Cyber Security, IT Tips

Cloud breaches are likely to increase in “velocity and scale” due to a prevalence of poor cybersecurity practices in cloud configurations that are creating exposures. This is according to the most recent The State of DevSecOps report by Accurics, which assesses cloud configuration practices that lead to breaches.

The study found that 93% of cloud deployments analyzed contained misconfigured services, while 91% of deployments have at least one network exposure where a security group is left wide open. Accurics noted that “these two practices alone have been at the center of over 200 breaches that exposed 30 billion records in the past two years.”

There were also other emerging practices that were observed to be creating exposures. This included the presence of hardcoded private keys in 72% of deployments. Additionally, half of deployments had unprotected credentials stored in container configuration files. The report added that “these keys and credentials could be used by unauthorized users to gain access to sensitive cloud resources.”

Close to a third (31%) of organizations were shown to have unused resources, with the primary cause being that resources are added to a default virtual private cloud (VPC) upon creation if a scope is not defined.

Commenting on the report, Matt Yonkovit, chief experience officer at Percona, said: “The best approach here is to have an audit to check that your best practices are in place and being followed. This can help show where security steps are missing, and you can then put them in place where needed. Over time, you can check that all your responsibilities around data backup, security and management are done correctly.

“It’s less about the department and more about the situation. Security problems can be caused by people who are underqualified, using complex and powerful tools they don’t fully understand or haven’t enough experience with. Easy access to technology can give users a false sense of security, and a misconception that because it is backed by a big name, it must be tested, trusted, and fail-safe.”

Greg Martin, general manager for security at Sumo Logic added: “Increasingly organizations are experiencing serious data breaches due to basic cloud vulnerabilities such as this study highlights. Developers and security teams need to focus on awareness and training for common cloud security issues and more importantly automation to audit and identify gaps and vulnerabilities as they arise. Cloud security is the new frontier and most organizations are significantly lagging behind.”

Last month it was revealed that 260,000 actors had their personal data exposed due to a cloud misconfiguration error on a server belonging to a New Orleans-based casting agency.

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.infosecurity-magazine.com/

https://cloudscapeit.co.uk/wp-content/uploads/2020/08/claudio-schwarz-purzlbaum-XK-m7wVUgLs-unsplash-scaled.jpg 1001 1500 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-08-06 10:46:092020-08-06 10:47:06Cloud Breaches Set to Grow in “Velocity and Scale”

Malware Attacks Exploiting Machine Identities Double

in Cyber Security, IT Tips

The number of commodity malware campaigns exploiting machine identities doubled between 2018 and 2019, according to new research.

The rapid increase in this particular type of cyber-scourge was unearthed by threat analysts at Venafi, who gathered data on the misuse of machine identities by analyzing security incidents and third-party reports in the public domain.

Among the attacks encountered by Venafi’s Threat Intelligence Team were several high-profile campaigns, including TrickBot, Skidmap, Kerberods, and CryptoSink.

Overall, malware attacks utilizing machine identities were found to have grown eightfold during the last 10 years. Within the last five years, the number of attacks was found to have increased more rapidly.

The findings are part of an ongoing threat research program focused on mapping the security risks connected with unprotected machine identities.

Campaigns exploiting machine identities were once the preserve of large-scale cyber-criminal operations but are now being used in off-the-shelf malware, according to Yana Blachman, threat intelligence researcher at Venafi.

“In the past, machine identity capabilities were reserved for high-profile and nation-state actors, but today we’re seeing a ‘trickle-down’ effect,” said Blachman. “Machine identity capabilities have become commoditized and are being added to off-the-shelf malware, making it more sophisticated and harder to detect.”

Blachman said these deceptively simple campaigns are far more dangerous than they appear.

“Massive botnet campaigns abuse machine identities to get an initial foothold into a network and then move laterally to infect further targets,” said Blachman.

“In many recorded cases, bots download crypto-mining malware that hijacks a target’s resources and shuts down services. When successful, these seemingly simple and non-advanced attacks can inflict serious damage on an organization and its reputation.”

The millions of applications and billions of devices that exist in the world use machine identities made from cryptographic keys and digital certificates to authenticate themselves to each other so they can communicate securely.

“To protect our global economy, we need to provide machine identity management at machine speed and cloud scale,” said Kevin Bocek, vice president of security strategy and threat intelligence at Venafi.

“Every organization needs to ensure they have full visibility and comprehensive intelligence over every authorized machine they are using in order to defend themselves against the rising tide of attacks.”

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.infosecurity-magazine.com/

https://cloudscapeit.co.uk/wp-content/uploads/2020/08/susanna-marsiglia-Yjr6EafseQ8-unsplash.jpg 800 1200 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-08-06 10:40:492020-08-06 10:45:47Malware Attacks Exploiting Machine Identities Double

Tackle your business challenges head on – With Power BI

in Cyber Security, IT Tips

“I wish there was an easy way to gain insights into my data.”

If making sense of masses of data is a headache for your business then ‘Power BI’ might be the perfect tool for you.

Struggling to make sense of data and share insights?

Gathering, handling and making sense of data is a fundamental part of running any business. Data insights let you identify problems, prepare for the future, make informed decisions and as a result are essential to the running of any stable, well-managed business. If you’re having trouble extracting information from and making sense of data then you may be exposing your business to risk and hindering its progress.

Is your business one of the many who hold masses of data but don’t learn anything from it? Tapping into the value of data may seem like a rather involved and time-consuming process but it’s important to view data as a potential source of revenue; data insights can help your bottom line by empowering better decision making and identifying areas that need attention.

Gathering the data is one thing but the bulk of the challenge lies in making sense of it and presenting it in a compelling way that means something to your audience. Security and compliance is another serious concern – how do you share data insights with a large audience while ensuring it remains secure and within your control?

Thankfully, there is a service that gives you the power to tackle these persistent challenges.

Introducing Microsoft Power BI

Microsoft Power BI (BI standing for ‘business intelligence’) empowers informed decision making by helping you make sense of your data and present it in a meaningful, easy-to-understand way. You can deploy it at every level of your business to allow your employees to make better decisions using relevant, up-to-the-minute data insights.

Compile data from hundreds of sources and ‘visualise’ it using attractive, customisable dashboards and reports.

Interactive Visualisations. It doesn’t matter where you hold your data, Power BI has the ability to tap into data from hundreds of supported hosts, both office and cloud-based. Highly customisable visual effects can be used to bring your data to life. Create captivating reports that capture your audience’s attention using an intuitive drag-and-drop interface and choose from a vast range of themes, layouts and formatting options.

Collaboration and sharing. Share insightful information with your team using eye-catching reports and dashboards. Presenting insights in an enticing way can increase engagement and help promote informed decision making at every level of your organisation.

A scalable analytics solution. Dispense with the security headaches, complexity and clutter of various data insight solutions and roll-out Power BI as your business’ data insight platform. Make it available on an individual basis or to your entire organisation by enjoying the flexibility of Power BI’s SaaS (software as a service) model.

Safeguarding Data. With Microsoft Cloud App protection and Microsoft Information Protection, you can help keep your data out of the wrong hands and ensure compliance.

Bring data together, analyse and extract value. Use a range of visualisation options to bring uninspiring data to life and put valuable insights into the hands of your staff and customers to promote better decision making and improved outcomes. Use Power BI to make the most of your business’ valuable data resources.

 

Struggling to find a solution that fits around your business?

At Cloudscape, we use our extensive experience to deliver custom-fit technology solutions to SMEs in London and the home counties. Technology should serve your business’ aims and aspirations, it shouldn’t be something to mould your operation around. We are experts in Cloud-computing and we know how empowering Cloud Services can be when leveraged correctly, so let us help you tailor Office 365 so that it works for your business and the unique challenges you face. Call us on 0207 952 8123 or send us an email info@cloudscape.it.

https://cloudscapeit.co.uk/wp-content/uploads/2020/06/7.jpg 303 807 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-08-03 07:00:322020-06-15 12:24:27Tackle your business challenges head on – With Power BI

Tackle your business challenges head on – With Microsoft Kaizala

in Cyber Security, IT Tips

“I wish there was a way to moderate instant messaging among my staff.”

If you’d like greater oversight and control over mobile chat in your business, then Microsoft Kaizala could be just what you’ve been looking for.

Struggling with staff coordination and communication?

The proliferation of mobile devices in today’s work environment has enabled the business to adopt more flexible working practices.  While this flexibility carries many benefits, it also presents challenges in terms of communicating with staff and coordinating workflows.

For example, it can be a challenge bringing together a group of dispersed employees for collaboration on a task or to work towards a specific outcome. Coordinating work can be challenging at the best of times without the further complication of large numbers of staff working at different locations. Without the right tools, you can be left with a timetable that lacks structure and staff find difficult to interpret, even after it’s explained to them.

When managing large groups productivity suffers when there is no unifying hub of information and collaboration. For example, repeating the same information to individuals, again and again, can be time-consuming. Security is also problematic. Distributing and storing sensitive information on a large number of mobile devices presents some security risks that you simply don’t have in your office environment. With today’s host of regulations designed to protect sensitive data, it is vital that you stay on top of security across each and every device used by your organisation – that means securing all mobile devices.

Fortunately, there is a single application that can assist with many of these challenges.

Introducing Microsoft Kaizala

Microsoft Kaizala is a mobile application that helps to facilitate the efficient and effective management of large groups. It enables you to structure workflows and features a management interface that gives you the tools to manage a large team effectively.

In recent years, the number of businesses operating with remote workforces has increased massively. Kaizala was Microsoft’s response to this. Applications to assist with remote workforce management are few and far between, but luckily Kaizala features an empowering range of tools to help business face the remote workforce challenge! A few of these are listed below.

Effective Team coordination and communication. Kaizala’s chat interface lets you get the team together and communicate via messaging, multimedia as well as live voice and video calling.  Send videos, photos and documents to large groups within and outside your business quickly and effortlessly and use surveys and polls to gather feedback.

Take advantage of action cards (effectively ‘mini-apps’) within Kaizala that help you manage tasks and compile team data and insights.

Comprehensive Data security. Enjoy enterprise-grade security, industry-leading compliance standards and the ability to enforce end-to-end data ownership. Microsoft Kaizala functions as your ‘operation command centre,’ with its extensive administrative features giving you oversight and control over how your important files are used and stored.

Gather valuable data and insights. Kaizala is as much a data insight platform as it is a communication app. Its built-in analytics features help evaluate team performance and you can have regular reports sent automatically to decision-makers in your business. This helps leaders monitor team output and flags up issues and areas of concern.

Microsoft Kaizala makes remote workforce management easier with its host of features that help improve productivity, gather insightful data and empower effective collaboration. Why not give it a try today and make your remote team more effective.

 

Struggling to find a solution that fits around your business?

At Cloudscape, we use our extensive experience to deliver custom-fit technology solutions to SMEs in London and the home counties. Technology should serve your business’ aims and aspirations, it shouldn’t be something to mould your operation around. We are experts in Cloud-computing and we know how empowering Cloud Services can be when leveraged correctly, so let us help you tailor Office 365 so that it works for your business and the unique challenges you face. Call us on 0207 952 8123 or send us an email info@cloudscape.it.

https://cloudscapeit.co.uk/wp-content/uploads/2020/06/6.jpg 303 807 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-07-27 07:00:182020-06-15 12:24:43Tackle your business challenges head on – With Microsoft Kaizala

Analysts Detect New Banking Malware

in Cyber Security, IT Tips

A new strain of banking malware dubbed BlackRock has been detected by researchers at Threat Fabric.

An investigation into its origins has revealed BlackRock to be derived from the Xerxes banking malware. Xerxes was in turn spawned out of the LokiBot Android banking Trojan, first detected around four years ago.

The source code of the Xerxes malware was made public by its author around May 2019, making it possible for any threat actor to get their hands on it. Despite the code’s availability, researchers found that the only Android banking Trojan based on Xerxes’ source code that is currently operating appears to be BlackRock.

This malevolent malware steals credentials not only from banking apps but also from other apps designed to facilitate communication, shopping and business. In total, the team found 337 Android apps were impacted, including dating, social networking and cryptocurrency apps.

By throwing their nefarious campaign net so wide, researchers believe the malware’s creators are attempting to exploit the increase in online socializing brought about by the outbreak of COVID-19.

“Technical aspects aside, one of the interesting differentiators of BlackRock is its target list; it contains an important number of social, networking, communication and dating applications,” noted researchers.

“So far, many of those applications haven’t been observed in target lists for other existing banking Trojans. It therefore seems that the actors behind BlackRock are trying to abuse the growth in online socializing that increased rapidly in the last months due to the pandemic situation.”

BlackRock was first spotted back in May 2020. When the malware is launched on a device for the first time, its icon is hidden from the app drawer, making it invisible to the end user. The malware then asks the victim for the Accessibility Service privileges, often posing as a Google update.

Once the user grants the request, BlackRock starts granting itself the additional permissions required for the bot to fully function without having to interact any further with the victim. When done, the bot is functional and ready to receive commands from the C2 server and perform the overlay attacks.

“Unfortunately, this malware is particularly sophisticated and can camouflage itself as a genuine app to do some damaging spy work in the background,” commented ESET cybersecurity specialist Jake Moore.

“It is vital that users know what apps they are downloading, or they may risk unknowingly downloading something illicit.”

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.infosecurity-magazine.com/

https://cloudscapeit.co.uk/wp-content/uploads/2020/07/sergey-zolkin-_UeY8aTI6d0-unsplash.jpg 800 1200 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-07-23 17:02:362020-07-23 17:03:14Analysts Detect New Banking Malware

Password Reuse to Blame for Fifth of Account Takeovers

in Cyber Security, IT Tips

Email account takeover (ATO) attacks often last for over a week and result from employees reusing passwords across multiple sites, according to new research from Barracuda Networks.

The security vendor teamed up with researchers at UC Berkeley to study the lifecycle of email ATO attacks, examining 159 compromised accounts across 111 organizations.

The study revealed that attacker dwell time for over a third of accounts was more than one week, emphasizing the importance of monitoring and threat removal tools to spot suspicious behavior post-compromise.

Interestingly, in a fifth (20%) of cases, compromised accounts featured in at least one previous password breach. This suggests that attackers are exploiting credential reuse to hijack accounts, either through credential stuffing or similar automated techniques, although phishing is still a popular way to obtain log-ins.

In the vast majority (93%) of ATO incidents studied, the attacker did not use the account to send out phishing emails, perhaps concerned that this would increase their chances of being exposed.

Barracuda speculated that instead, they could be using the accounts to launch conversation hijacking attacks, or that they had simply performed ATO in order to sell the account to another cyber-criminal.

Supporting the second theory is the fact that, in 31% of cases, accounts are compromised by one actor and then used by a different player to mine for information, or monetized in another way.

This again emphasizes the importance of rapid intrusion detection and response, the report claimed.

A single actor compromised and utilized accounts in 51% of cases.

Attackers are most likely to use hijacked email accounts to go after email-related Office 365 applications (78%). Of the remaining 22% cases, the majority (17%) featured attempts to access SharePoint for sensitive documents.

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.infosecurity-magazine.com/

https://cloudscapeit.co.uk/wp-content/uploads/2020/07/studio-republic-qeij_dhDhGg-unsplash.jpg 800 1200 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-07-23 17:00:462020-07-23 17:01:21Password Reuse to Blame for Fifth of Account Takeovers

Home Distractions a Major Cause of Cybersecurity Errors During Lockdown

in Cyber Security, IT Tips

Nearly half (43%) of UK and US employees have made errors leading to cybersecurity repercussions, according to a new study from Tessian. The analysis, undertaken in April during the height of the COVID-19 pandemic, suggests that the disruption and additional stress and distractions of remote working are making organizations more vulnerable to cyber-attacks facilitated by human error.

In the survey of 1000 workers in the UK and 1000 workers in the US, a quarter admitted to clicking on a link in a phishing email whilst at work. This most commonly occurred in the technology sector (47%).

Additionally, 20% of companies revealed they have lost customers due to sending an email to the wrong person. This was a mistake 58% of employees admitted to making and a further 10% said they had lost their job as a result.

Distraction was the biggest cause for these kinds of mistakes, according to the report. Nearly half (47%) highlighted being distracted as the main reason for falling for a phishing scam while 41% said this was the biggest factor in sending an email to the wrong person.

Other major reasons for clicking on phishing links were fatigue (44%) the perceived legitimacy of the email (43%) and because the emails purportedly came from a senior executive (41%) or well known brand (41%).

Over half of workers (52%) added that they make more mistakes at work when stressed, 43% when tired and 41% when distracted. Notably, 57% of workers stated they are more distracted when working from home.

With home working set to become much more common following the health crisis, the report suggests businesses need to focus on providing more extensive user awareness training.

Tim Sadler, CEO and co-founder of Tessian, commented: “To prevent simple mistakes from turning into serious security incidents, businesses must prioritize cybersecurity at the human layer. This requires understanding individual employees’ behaviors and using that insight to tailor training and policies to make safe cybersecurity practices truly resonate for each person.”

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.infosecurity-magazine.com/

https://cloudscapeit.co.uk/wp-content/uploads/2020/07/woman-working-on-a-laptop-VNQCMYN.jpg 800 1200 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-07-23 16:50:232020-07-23 17:00:03Home Distractions a Major Cause of Cybersecurity Errors During Lockdown
Page 6 of 13«‹45678›»

Recent Posts

  • What to implement to solve the problems from 2020
  • What to implement in 2021: New year, New start
  • How can the cloud industry adapt to a post-COVID world?
  • Twitter Fined Half a Million Dollars for Privacy Violation
  • Spotify Resets Passwords After Leaking User Data to Partners
  • Remote work is here to stay — but it will not be cheap or easy
  • Is remote working putting you at regulatory risk?
  • 5 Ways To Make Remote Working Your New And Better Normal
  • How hybrid work models are altering cloud strategies
  • Top metrics for effective multicloud management

Archive

Categories

Pages

  • Adapt. Evolve. Grow. Guide
  • Business Continuity Health Check
  • Cloud Services
    • Hosted Email
    • Hybrid Cloud
    • Online Backup
  • Computer Support London
  • Free IT AUDIT
  • Home
  • IT Consultant London
  • IT Services
    • Cyber Security Services London
    • IT Consultancy NEW
    • IT Projects
    • IT Relocation
    • Make Your Business GDPR Compliant
  • IT Support
    • Apple Mac Support
    • Network Support
    • Ongoing Support
    • PC & Server Support
  • Managed IT Support for London
  • Microsoft 365 Secure Landing Page
  • Network Solutions
  • Privacy
  • Private Cloud
  • Tailored for Financial Services and Accounting
  • Thank You
  • Hosted VoIP

FREE IT Technology Audit

Get the most from your technology with a
FREE IT Support Solutions Audit – worth £300.
We‘ll produce a full network report covering 30 key areas in your business. This will give you a great idea where your IT systems need the most attention and importantly where cost savings might be achieved! There is no obligation on your part – the report is completely FREE OF CHARGE

Recent Blog Posts

  • What to implement to solve the problems from 2020
  • What to implement in 2021: New year, New start
  • How can the cloud industry adapt to a post-COVID world?
  • Twitter Fined Half a Million Dollars for Privacy Violation
  • Spotify Resets Passwords After Leaking User Data to Partners

IT Support for London

Cloudscape IT
47 Oxford Drive
Magdalen Street
London
SE1 2FB

0207 952 8123
Email: info@cloudscape.it

© 2025 Cloudscape IT LTD. Registered in England & Wales No. 04565979. Registered Office - 47 Oxford Drive, Magdalen Street, London, England, SE1 2FB. All rights reserved.
  • Facebook
  • Twitter
  • LinkedIn
Scroll to top