wanda@mchargmarketing.com, Author at Infinity Network Solutions https://test.infinityns.ca We're experts at being experts. Tue, 07 Aug 2018 16:04:10 +0000 en-CA hourly 1 https://wordpress.org/?v=5.9.3 https://test.infinityns.ca/wp-content/uploads/2018/02/cropped-Infinity-symbol-32x32.png wanda@mchargmarketing.com, Author at Infinity Network Solutions https://test.infinityns.ca 32 32 SEND AND RECEIVE LARGE FILES SECURELY https://test.infinityns.ca/send-receive-large-files-securely/ Thu, 15 Mar 2018 22:03:12 +0000 https://test.infinityns.ca/?p=1653 A NEW PARTNERSHIP WITH LIQUIDFILES Infinity Network Solutions has partnered with LiquidFiles. Our partnership allows us to provide a solution to send and receive large files securely, fast, that has ease of use, manageable, flexible and is brandable. A perfect solution for any professional office that sends large, confidential files. Excellent, competitively priced alternative to [...]

The post SEND AND RECEIVE LARGE FILES SECURELY appeared first on Infinity Network Solutions.

]]>
A NEW PARTNERSHIP WITH LIQUIDFILES

LiquidFiles

Infinity Network Solutions has partnered with LiquidFiles. Our partnership allows us to provide a solution to send and receive large files securely, fast, that has ease of use, manageable, flexible and is brandable.

A perfect solution for any professional office that sends large, confidential files. Excellent, competitively priced alternative to paid programs such as Citrix, ShareFile and Dropbox.

Features and benefits of LiquidFiles:

  • Send and Receive Unlimited File Size — LiquidFiles does not have the very common 2 Gb file size limit common in competing solutions and cloud services. LiquidFiles is limited only by the disk size you assign to it, enabling you to send anything from DVDs to massive CAD drawings without having to worry about file size limitations.
  • Transfer Speeds— Running a system on your own network is always going to be faster than a cloud service. When sending multi-gigabyte files, the transfer time can easily be several hours less, being the difference of getting there before close of business today instead of first thing tomorrow morning, like an old-school courier delivery.
  • Security — When something is installed in your own network, in your security perimeter, in your control, with your security configuration. It will always match your security requirements with no questions raised of who might also get access to your secret and sensitive data. With Infinity Network Solution’s partnership with LiquidFiles you will feel safe that your data is secure.
  • Branding — You can make LiquidFiles look like a complete internal solution with your own logos, colour scheme and no LiquidFiles branding on anything that your users, customers or partner sees. Every user visible text string and all emails sent from the system is changeable to your liking. You will look like a pro.
  • Self-Managing — LiquidFiles is built to be as easy to use as it can possibly be, and as self-managing as possible. All files sent have an expiration date and will be automatically deleted at the time of expiration. You can assign roles based on LDAP/Active Directory Group belongings and almost all settings are configured on a per group basis and so on. All of this is to make ongoing maintenance a breeze with as little ongoing configuration as possible, leaving more time for you to focus on other things.

As a LiquidFiles partner, Infinity Network Solutions enjoy partner pricing and support from LiquidFiles to integrate the solution into our client’s environments to ensure happy joint customers and an overall integrated security capability.

 

The post SEND AND RECEIVE LARGE FILES SECURELY appeared first on Infinity Network Solutions.

]]>
Cisco Report: Bad Privacy, Cybersecurity Procedures Causing Companies To Lose Sales https://test.infinityns.ca/cisco-report-bad-privacy-cybersecurity-procedures-causing-companies-lose-sales/ Mon, 05 Feb 2018 21:32:34 +0000 http://sitedevo.infinityns.ca/?p=1481 A new report from Cisco showed that two-thirds of companies are currently losing sales because of their customers’ growing privacy concerns, which prolong the sales process. Similarly, bad cybersecurity practices are costing companies millions to hundreds of millions of dollars in repairing data breach damage, as well as lost revenue. 2018 – The Year Of [...]

The post Cisco Report: Bad Privacy, Cybersecurity Procedures Causing Companies To Lose Sales appeared first on Infinity Network Solutions.

]]>
A new report from Cisco showed that two-thirds of companies are currently losing sales because of their customers’ growing privacy concerns, which prolong the sales process. Similarly, bad cybersecurity practices are costing companies millions to hundreds of millions of dollars in repairing data breach damage, as well as lost revenue.

2018 – The Year Of Strong Data Protection?

Privacy is quickly becoming a bigger factor in companies’ sales, according to Cisco’s 2018 Privacy Benchmark Maturity. Privacy policies are longer just legalese meant to keep companies out of trouble, because if done wrong, many businesses risk losing sales from potential customers.

Over 65% of the companies questioned by Cisco have already admitted that data privacy concerns are delaying their sales process. Over 90% of the companies reported delays up to 20 weeks, while the average delay was 7.8 weeks.

A significant number reported delays between 50 to 100 weeks. This means the sales process can take at least 1-2 years longer simply because their customers don’t feel satisfied with the companies’ existing focus on privacy.

The delays don’t just mean that the customers will buy the products later than they would otherwise, because some of them end up either not buying the product at all or buying it from a competitor. Therefore, bad privacy policies can lead not just to lost sales but also to a loss of market share to competitors’ benefit.

The study shows that the longest sales delays happened in Latin America (an average delay of 15.4 weeks), Mexico (13 weeks), and Japan (12.1 weeks). The shortest delays were reported in China (2.8 weeks) and Russia (3.3 weeks).

In terms of industry, government and healthcare sales saw the biggest delays due to cybersecurity and privacy concerns.

Privacy-Immature Companies Most At Risk

The report also found that companies that didn’t take privacy too seriously were the most impacted by these delays. Cisco benchmarked the privacy-maturity of companies based on standards defined by the  American Institute of Certified Public Accountants (AICPA) and the Canadian Institute of Chartered Accountants (CICA). These standards are defined as follows:

  1.  Ad hoc — Privacy procedures or processes are generally informal, incomplete, and inconsistently applied.
  2. Repeatable — Privacy procedures or processes exist; however, they are not fully documented and do not cover all relevant aspects.
  3. Defined — Privacy procedures and processes are fully documented and implemented, and cover all relevant aspects.
  4. Managed — Reviews are conducted to assess the effectiveness of the privacy controls in place.
  5. Optimized — Regular review and feedback are used to ensure continuous improvement towards optimization of privacy processes

Companies that had a “defined” privacy procedures, saw a 70% improvement in sale processes compared to the companies that had “ad hoc” or informal and incomplete privacy procedures.

Privacy-Mature Companies Are More Secure

Companies that are privacy-mature are not only seeing much shorter sales processes, but are also more protected against data breaches. Only 39% of the privacy-mature companies saw losses of over $500,000 compared to the 74% of the privacy-immature companies. According to Cisco, the lower damages that privacy-mature companies see may also have something to do with them gathering less data than the immature companies.

As hackers become more sophisticated in breaking into large organizations, it may be a good idea for companies to treat customer data as more of a liability than an asset, at least data that isn’t required for the functioning of the product or service. Then, if a data breach does happen, at least the damage will be minimized and the companies won’t have to suffer as large of a hit to their public image.

Maersk Chair: Companies Need To Stop Being Naive About Cybersecurity

Recently, the giant shipping company Maersk suffered a devastating cyber attack through the NotPetya malware. After the attack, the company had to essentially replace its whole infrastructure and reinstall 45,000 PCs and 4,000 servers. This task, which the chair Jim Hagemann Snabe said would have normally taken six months, was performed in a record 10 days. However, even though getting rid of NotPetya from its large infrastructure took a relatively small amount of time, this single attack still ended-up costing the company $250-$300 million, part of which was due to losing 20% of the sales in that period.

At the World Economic Forum in Davos, Snabe said that this incident should be a significant “wake-up call” for every company out there, because it could be them next. He also talked about three important lessons that the company learned during this whole incident:

  1. Cybersecurity needs to become their competitive advantage, and being mediocre like everyone else is no longer enough. This is a lesson he argued more companies should learn sooner rather than later.
  2. Companies need to stop being naive about cybersecurity. Many companies will experience their own similar data breaches in the future if they don’t treat cybersecurity in a more proactive, rather than reactive way.
  3. There is a need for a radical new and more secure infrastructure for the internet, as everything we do becomes more digitized, and thus more at risk of suffering cyber attacks.

This year may be the year when do get this wake-up call that cyber security and data privacy and protection is important not just for the customers who give their data away to the companies, but also for the companies themselves if they don’t want to lose sales of suffer major disruptions because of poor data protection procedures.

by Lucian Armasu  – Source: Cisco

The post Cisco Report: Bad Privacy, Cybersecurity Procedures Causing Companies To Lose Sales appeared first on Infinity Network Solutions.

]]>
The device you’re using right now has a big security flaw — but you don’t have to panic https://test.infinityns.ca/device-youre-using-now-has-big-security-flaw/ Sun, 07 Jan 2018 20:53:16 +0000 http://sitedevo.infinityns.ca/?p=1158 There’s almost certainly a critical security flaw or two in the device you’re using to read this story — but you don’t have to panic. To varying degrees, the flaws affect processors found in virtually all computers and phones, and could allow an attacker to access data stored in a device’s memory that should typically [...]

The post The device you’re using right now has a big security flaw — but you don’t have to panic appeared first on Infinity Network Solutions.

]]>
There’s almost certainly a critical security flaw or two in the device you’re using to read this story — but you don’t have to panic.

To varying degrees, the flaws affect processors found in virtually all computers and phones, and could allow an attacker to access data stored in a device’s memory that should typically remain private.

The researchers announced the discovery publicly this week — calling the two bugs Meltdown and Spectre — and warned the security of everything from passwords and encryption keys to documents and photos could be at risk.

‘One of the worst CPU bugs ever found’
But while the problem is serious, and an inherent part of how most modern computer processors are designed to function, there are already efforts to minimize the impact and help you get on with your life.

What do I need to do?

For most people, the same advice as usual applies: Make sure the applications and operating systems on your phones, laptops, and other devices are up to date.

If you’re using a Mac, iPhone, iPad, or Apple TV, Apple recently rolled out an update that attempts to mitigate the problem, with more fixes on the way, according to the company.

Google says the latest version of Android already contains the necessary fixes, while Microsoft pushed out an automatic update for Windows users Wednesday night.

Computers running Microsoft’s Windows operating system should automatically receive a software update designed to mitigate the Meltdown flaw disclosed by researchers this week.

PC users will also require a separate CPU update from whoever made their device (for example, Lenovo or HP). “By the end of next week, Intel expects to have issued updates for more than 90 percent of processor products introduced within the past five years,” the chipmaker said in a press release.

You’ll also want to update apps like your web browser and anti-virus software when they become available. Developers are beginning to roll out fixes to make it more difficult for sensitive user data to be accessed.

What are these updates trying to fix?

The two flaws let attackers access parts of a computer’s memory that they shouldn’t normally have access to, by abusing the way that computer processors are designed to handle information more quickly.

One of the flaws, called Meltdown, allowed the researchers to access data stored in the kernel — the core of a computer’s operating system, which runs in a protected part of a computer’s memory, and effectively watches over everything your computer does.

By design, applications can’t access the kernel, a protection that’s built into the hardware of the CPU itself. But the researchers found a way around that, giving them access to the kernel and, from there, any data stored in a computer’s memory — which could include everything from passwords to photos. This attack has only been found to work on processors made by Intel.

“The bug basically melts security boundaries which are normally enforced by the hardware,” the researchers wrote.

HOLIDAY SHOPPING

One of the software flaws identified by researchers only affects processors made by Intel, while the other affects AMD and Intel chips as well. The processors are found in virtually all modern phones, computers, and servers.

The other flaw, called Spectre, allowed researchers to target data that applications store in a computer’s memory directly (typically, applications can’t access the memory used by other applications).

It’s related to Meltdown, but differs in a number of ways that the researchers detail in a pair of technical papers. This attack was found to work on Intel, AMD, and even ARM processors, which are commonly used in mobile devices such as smartphones and tablets.

How would someone attack?

The same way that most other types of attacks work: by gaining access to your computer.

As such, the usual advice for dealing with malicious software applies here too. Install updates when they become available, and always scrutinize the apps you install, the files you open, and the links you click.

But everything will be fine now, right?

Sort of. While Meltdown can be patched, Spectre will be much more difficult to defend against long-term because of the way that CPUs are designed — and that’s worrying, because it’s the vulnerability that affects a far wider range of chips.

The researchers say any Spectre-specific software patches for applications, operating systems or CPUs should be considered stopgaps while more research takes place.

“As it is not easy to fix, it will haunt us for quite some time,” the researchers wrote.

All of the big cloud providers — Amazon, Google and Microsoft — say their systems have been updated to help prevent Meltdown-style attacks, but customers are being advised to patch their own systems as well.

Who’s most at risk?
Home users aren’t at any more risk than usual when new bugs and flaws are discovered, as long as you install your updates.

For cloud computing providers on the other hand, this is a nightmare scenario.

In the cloud, multiple customers typically share the resources of a more powerful computer by running their applications and services in a so-called virtual machines. However, the researchers warn Meltdown can be used to access data from beyond the virtual machine — data from the host computer, or even inside other customers’ virtual machines.

All of the big cloud providers — Amazon, Google and Microsoft — say their systems have been updated to prevent Meltdown-style attacks, but customers are being advised to patch their own systems as well.

Why do these issues even exist?  The researchers sum it up pretty nicely in one of their papers: “The vulnerabilities in this paper, as well as many others, arise from a longstanding focus in the technology industry on maximizing performance” — but at the expense of security.

In fact, the flaws detailed by researchers this week are so fundamental to the design of modern processors that the only way to truly prevent any attacks is for Intel, AMD and ARM to redesign their chips. In fact, the Software Engineering Institute’s Computer Emergency Response Team (CERT) was especially blunt in its proposed solution: Get a new CPU.

Of course, that’s not going to be practical for most people and businesses, and so hardware and software companies are attempting to mitigate the two flaws’ effects with software updates the best they can.

By Matthew Braga, CBC News Posted: Jan 04, 2018 4:11 PM ET

The post The device you’re using right now has a big security flaw — but you don’t have to panic appeared first on Infinity Network Solutions.

]]>
The 3 Organizing Principles of Digital Transformation https://test.infinityns.ca/organizing/ https://test.infinityns.ca/organizing/#respond Sat, 14 Oct 2017 01:13:41 +0000 http://localhost:8888/flatsome-next/?p=5 Find out how investing in human capital, getting value from data and aligning APIs can help your business transform. Why is it important for organizations to embrace digital transformation? Ask anyone who used to make their living running a video store, selling encyclopedias or driving a taxi. Consumer demands haven’t changed much: People still watch [...]

The post The 3 Organizing Principles of Digital Transformation appeared first on Infinity Network Solutions.

]]>

Find out how investing in human capital, getting value from data and aligning APIs can help your business transform.

Why is it important for organizations to embrace digital transformation? Ask anyone who used to make their living running a video store, selling encyclopedias or driving a taxi.

Consumer demands haven’t changed much: People still watch movies at home, look up information on obscure topics and need rides around town. But the companies that identified early on how technology would change these industries (Netflix, Google and Uber, among others) are now dominating these sectors.

“The real challenge is how to help your organization align the answers between what business you’re currently in and who you want your customers to become,” says Michael Schrage, research fellow at the MIT Center for Digital Business. “That requires you to think about innovation as something beyond what will make your products or services faster and better. You also need to think about who you want your customers to become and how new technology transforms your customers, not just your business.”

With so many emerging technologies in the marketplace today — often touted as “disruptive” and “transformative” — it can be difficult for executives to discern which will have a tangible impact on the future of their organizations and which will prove to be overhyped.

Schrage offers three organizing principles to help guide organizational strategies around digital transformation: innovations to human capital investments, design of data-driven virtuous cycles and the alignment of application programming interface (API) capabilities.

1. Focus on Both Employees and Customers

“If you’re wondering how to collaborate to create more valuable innovation,” says Schrage, “you should begin by asking a new question: ‘How can innovation create more valuable people?’”

The “people” Schrage is talking about include both employees and customers. Of course, technology can dramatically increase productivity among users, allowing them to perform key aspects of their jobs more quickly while often simultaneously improving the quality of their work. But Schrage says enterprises should also try to use technology to create “better customers.”

“We want to use technology not just to help people do a better job at work, or have a better user experience,” Schrage says. “We want to enable them to do better jobs and have better user experiences in ways that make them more valuable to the business, and make the business more valuable to them.”

Schrage says examples of this approach can be found throughout history, including the first mass production of automobiles. Henry Ford didn’t just introduce affordable vehicles to America, Schrage argues; Ford also essentially taught the entire country how to drive.

“I believe the most important innovation [by Ford] was not the mass production of automobiles,” Schrage says. “It was the mass production of driving, the human capital of driving.”

For a more recent — and almost as ubiquitous — example, Schrage points to Google. “What makes Google work?” Schrage asks. “The page rank algorithm. Google doesn’t just search. It creates searchers. Google may be in the search business, but what Google has effectively done is cultivated and harvested the human capital of its users. Everybody essentially works for Google, and they like it.”

2. Squeeze Value Out of Your Data

As mobile applications, Internet of Things (IoT) technologies, wearable devices and other digital tools create exponentially more data, organizations risk becoming bogged down with data management processes that don’t create significant value.

“Don’t ask the old IT question, ‘How do we manage 100 times more data?’” Schrage says. “Instead, ask, ‘How do we get the value out of 100 times more data?’”

That value, Schrage says, is often the result of a “virtuous cycle” — the way organizations create data through customer interactions and other processes, use that data to inform and improve their operations, then collect new and better data from those improved processes, and on and on.

For example, Facebook collects and analyzes data from its hundreds of millions of users and then uses that data to fine-tune its user experience. Similarly, Uber collects data on its riders and then uses that data to attract and retain riders, which has led to its explosive growth. Amazon would be worth only a fraction of its current value if its business model were limited to selling items online and then shipping them to customers. Instead, the retailer tracks purchases and product searches, and then uses the resulting data to promote certain products, make recommendations and optimize pricing.

Don Barker, an enterprise collaboration consultant with CDW, notes that data can also help organizations optimize how they’re using their technology solutions. For example, he cites collaboration tools that enable users to meet remotely. “We use the analytic extension on the back end to measure, to ensure that people are using the tools correctly,” he says.

“It’s not just you deliver this, you deliver that,” says Schrage. “Things feed and play off of one another. I think, going forward, our challenges are going to be around what kind of virtuous cycles our technologies are creating, and how we go to our line-of-business counterparts and make the case that we in IT enable a higher return on investment.”

Technology vendors are starting to leverage this data to improve the solutions they deliver. For example, Cisco Systems integrated data analytics into its collaboration solutions to help organizations understand how these tools — and their users — work most productively.

“There’s an enormous amount of analytical data, very powerful data that you can bring to bear,” says Mark A. Nash, Cisco’s director of strategy and innovation for worldwide collaboration. “You can leverage the data to improve the way your users meet, interact with each other, and collaborate and communicate.”

3. Use APIs to Make Connections Between Your Business Systems

APIs are essential to the success of IoT technologies, enabling communication and interaction among different systems. For example, when a homeowner remotely adjusts the temperature of a room in his or her house using a mobile app, the app calls on the API controlling the air conditioning system. Or when an event attendee buys tickets online, an API verifies payment information.

Schrage says APIs are “gateways for turning silo-ized processes into interoperable platforms.” Because of this, he says, compatibility among APIs is crucial to most successful digital transformation strategies.

The more connections organizations can make between systems, the more useful these systems become. For example, Cisco has deployed APIs on its Spark collaboration platform that enable organizations to embed the solution into their own applications. Conversely, an organization’s apps can be embedded into Spark. Either approach allows organizations to create new capabilities that greatly enhance both Spark and native applications.

“You have the ability through the APIs to do anything you want with the solution, including the ability to integrate with anything else,” Nash says.

The more systems rely on these processes, the more important API alignment becomes. “Increasingly, one of the economic and financial variables you will be asked is, ‘How do we assess return on API?’” he says.

As the IoT market matures, the greatest value is likely to come from deployments that synthesize numerous systems and utilize data from each of them, multiplying the impact of the technology.

“APIs enable and facilitate interoperability,” Schrage says. “For larger organizations, most coding is stringing together APIs. That’s going to be true for Internet of Things and for a lot of the processes that businesses are managing these days and into the future.”

Biz Tech Magazine, Biz Tech Staff, www.biztechmagazine.com

The post The 3 Organizing Principles of Digital Transformation appeared first on Infinity Network Solutions.

]]>
https://test.infinityns.ca/organizing/feed/ 0
Why Phishing Attacks Persist Despite Increased Awareness https://test.infinityns.ca/phishing-attacks-persist/ https://test.infinityns.ca/phishing-attacks-persist/#respond Fri, 27 Nov 2015 15:26:13 +0000 http://flatsome.dev/?p=1 Phishing attacks are not going away. They remained a steady tactic used by cybercriminals throughout the first half of 2017, according to the Phishing Activity Trends Report recently released by the Anti-Phishing Working Group (APWG), an international coalition of industry, government, law enforcement and nongovernmental organizations. In phishing attacks, scammers use fraudulent websites and false [...]

The post Why Phishing Attacks Persist Despite Increased Awareness appeared first on Infinity Network Solutions.

]]>
Phishing attacks are not going away.

They remained a steady tactic used by cybercriminals throughout the first half of 2017, according to the Phishing Activity Trends Report recently released by the Anti-Phishing Working Group (APWG), an international coalition of industry, government, law enforcement and nongovernmental organizations.

In phishing attacks, scammers use fraudulent websites and false emails. Perpetrators attempt to steal personal data, most commonly passwords and credit card information.

The number of unique phishing email campaigns averaged around 98,000 per month in the first half of 2017, with a spike of 121,000 in March. The spike may have been tied to an upswing in the W-2 email phishing scam that the IRS warned about in February. The APWG report contained a number of interesting insights on phishing activity so far this year.

Those launching phishing attacks continued a years-long trend of focusing on only a few hundred companies at a time. This limited scope reflects the additional time and money needed to carry out a successful phishing attack.

Those organizations in the bullseye are attacked on a regular basis from every few weeks to every day, with a small group of firms being targeted more intermittently.

The Industries Targeted Most by Phishing

Among industries targeted by phishing cybercriminals, the payment industry was in the crosshairs 45 percent of the time, with the financial industry and Software as a Service/webmail industry filling out the top three at 16 percent and 15 percent, respectively.

This is a big upsurge in focus on the payment industry, which accounted for only 11 percent of phishing attacks in the fourth quarter of 2016, according to an earlier APWG report.

Attackers are increasingly using free hosting providers as one of the resources to build their campaigns, notes APWG contributor Crane Hassold, manager of threat intelligence for PhishLabs.

“These free hosts are not only easy and cheap to use, but they also allow threat actors to create subdomains spoofing a targeted brand, resulting in a more legitimate-looking phishing site,” Hassold says in the APWG report.

While the total numbers of free hosting-based attacks increased from 1,323 in January to 1,939 in June, the use of free hosting services continued to trend at about 10 percent of the total number of attacks each month.

APWG contributor Axur, a digital risk monitoring company located in Brazil, notes the heavy use of social media platforms such as Facebook, Instagram, LinkedIn and YouTube as phishing attack vectors in South America. Many of these attacks involve users being served up fake login pages that collect username and password information. These platforms accounted for about 39 percent of all phishing attacks among Latin American countries in the second quarter of 2017.

Alexander Slagg, Biz Tech, www.biztechmagazine.com

The post Why Phishing Attacks Persist Despite Increased Awareness appeared first on Infinity Network Solutions.

]]>
https://test.infinityns.ca/phishing-attacks-persist/feed/ 0