IT Security

Threatening Ransomware outbreak thrills the World, Cyber Techies alerted!

“The biggest rasomware outbreak till date” experts say and claim it as threat to big business units. However, the vulnerability in Indian market has been relatively minimal so far.

ransomware-illustration

Ransomware WannaCry is a malicious piece of software that blocks access to computers until money is being paid. Reports say it has swamped around 150 countries, including India.

Most affected are the Organizations and individuals who have not updated their system with Microsoft security and still emphasizing on using the older versions of Windows OS where India is supposed to be the one with highest number of pirated software users. After the attack came into picture all security firms have pull up their socks before the attacks gets more severe in future. Experts don’t want to reveal the affected organizations name because of some reasons.

Experts from big Four say “The worst hit organizations are the one where Security hygiene isn’t on place”. These cyber attacks have also raised a finger on those organizations who don’t investigate enough in security terms.

Public and private sectors have been warned to patch their systems as prescribed in the advisory issued by the Indian Computer Emergency Response Team (CERT-in). Internet service providers have been alerted for security of tele-communication network, also Ministry of electronics and information technology (Meity) asked Microsoft India to inform all its partners and customers to apply the relevant patches.

 

The global ransomware attack has reportedly hit the UK’s National Health Service (NHS), Spanish Telecom Company telephonic and govt. Departments in Russia, Turkey, Germany, Vietnam, Spain and the Philippines. Some Indian manufacturing and jewelry companies in Mumbai & Gujarat got affected.

 

Experts from security agencies mentioned, the risk of infection was high in India given poor individual cyber hygiene. The latest count is over 200,000 victims in more than 150 countries which include especially the large corporations. Techies are trying best to shield the world from this menacing infection.

Application · IT infrastructure

A specialist provider for outsourcing of Visa, Passport & Attestation services went live within 21 days with 24*7 managed sevices – CaseStudy

-> Owing to the Govt. regulations, European customer of the client exclusively required locally hosted business applications. This included the setting up of DR site in Europe, along with 24*7 customer support.

itmanaged

-> With the deadline of 03 weeks, the IT procurement, local governing policies on data access and privacy, Manpower management of IT, time zones variations between Customer’s HO & End client were major challenges faced by the client.

-> A 24*7 monitored & managed IBM softLayer which enabled provisioning a mix of Bare Metal/dedicated virtual servers within hours and is complaint to all data & process security control standards like ISO 27001, AICPA/SOC -2, FedRAMP, NIST, PIC, HIPAA, etc was proposed by DCM Data Systems.

-> Benefits were going live within 3 weeks, higher flexibility of application hosting, efficient management of IT infrastructure, 24*7 proactive management of customer environment from DCM Data Systems NOC.

-> DCMDS was chosen because of its strong foothold in monitoring and managing IT Infra needs for companies across the globe.

Uncategorized

WannaCry ransomware has links to North Korea, cybersecurity experts say

Two top security firms have found evidence linking the WannaCry ransomware to the prolific North Korean cybergang known as Lazarus Group.

Kaspersky and Symantec both said on Monday that technical details within an early version of the WannaCry code are similar to code used in a 2015 backdoor created by the government-linked North Korean hackers, who were implicated in the 2014 attack on Sony Pictures and an $81m heist on a Bangladeshi bank in 2016. Lazarus Group has also been known to use and target Bitcoin in its hacking operations. The similarities were first spotted by Google security researcher Neal Mehta and echoed by other researchers including Matthieu Suiche from UAE-based Comae Technologies.

Read more…

IT Security

Investigating Threats with Watson for Cyber Security

Enterprise security operations centers (SOCs) are being crushed under the burden of an estimated 200,000 events per day, according to IBM research. And while that’s a lot of events, what complicates matters even further is that only a tiny percentage of those events actually require immediate action. But because alerts lack context, security teams must treat one each equally. That means the average enterprise can waste more than 20,000 hours per year on malware containment alone.

Enter Watson for Cyber Security and IBM QRadar Advisor with Watson

IBM QRadar Advisor with Watson is the first solution to apply the power of Watson for Cyber Security. Watson for Cyber Security maintains a specialized corpus of security knowledge, which includes previously invisible unstructured data in the form of blogs, websites, threat intelligence feeds and more. Read more on Cyber Security with Watson..

Uncategorized

DCM Data Systems: Leveraging the power of tools, analytics & cloud to optimise IT infrastructure performance

With multiple vectors pulling the market in different directions, the Infrastructure Management Services ambit is in a state of tremendous flux. Most Companies possess the physical infrastructure to host their computing resources, however they lack the human and process assets to support round-the-clock SLAs and meet their long-term IT centric business-alignment strategies. IT is a tool that can give them a competitive advantage if they can ensure that it runs smoothly. DCM helps ensure uptime and focuses on continuously improving performance while reducing costs.

DCM’s IT operations started with manufacturing hardware, system software and compilers for the indigenously conceived personal computers. Later with the changing times and advent of branded computers, the company was repositioned into a pure services company. The business was realigned in 2007 with strong focus on IT infrastructure services including monitoring, management, and backup solutions administered onsite or remotely from fully equipped Network Operations Centre (NOC) at Gurgaon and Hyderabad.

With its ITIL based processes,DCM provides services in UNIX/ Linux/VMware, Database, SAP / Oracle Apps, Enterprise Asset Management, Analytics, SIEM, IDAM, MDM and End Point Security/ Compliance management. In these technologies DCM executes projects as well provides complete sustenance services.
In the Cloud, DCM provides specialized services, namely the orchestration of the Cloud using specific tools and business continuity services.

“What makes us different is our flexibility, going the extra mile to accommodate the customer, and adapting our technology capabilities to solve the customer’s business challenges. As an example – our Enterprise Asset Management solution was developed because a client was fed-up trying to respond to audit requirements of software companies” says Animesh J Mathur (V.P- Marketing). Read more @ https://goo.gl/IUyc81

IT Security · Digital Workplace,

The Battle for Cloud Supremacy: Google G Suite and Office 365

Office 365 - DCM Data Systems

Google launched its enterprise cloud app suite under the Google Apps Premier Edition brand in 2007. Later renamed Google Apps for Work, it was rebranded as G Suite in September 2016 and is the bitter and enduring competitor for Office 365. Industry pundits agree that the two companies are locked in battle to transition customers to the cloud. In a February 2016 study, Gartner noted:

Among public companies using cloud-based email, Microsoft is more popular with larger organizations and has more than an 80 percent share of companies using cloud email with revenue above $10 billion,” said Jeffrey Mann, research vice president at Gartner. “Google’s popularity is better among smaller companies, approaching a 50 percent share of companies with revenue less than $50 million.”

Check out more @ https://goo.gl/7JclL3

IT Security · Mobility Services

Majority of IT managers say they work on mobile security without EMM or MMS help

Image result for Enterprise mobility Management

More than half of respondents in a survey conducted by mobility and telecom expense management (TEM) provider Tangoe say their job to manage mobile devices ploughs a lonely furrow.

In other words, of the 100 IT managers polled, across a variety of enterprises, very few are using enterprise mobility management (EMM) or managed mobility (MMS) offerings – although many plan to over the next two years.

Given this publication has long since been advocating mobility as a department within the larger business and not tacked on alongside it – think mobility centres of excellence rather than a ‘chief mobility officer’ – this makes for an interesting finding.

Elsewhere, it will come as precisely zero surprise to find that security was still top of the agenda among survey respondents. Given 85% of those polled said they were responsible for ensuring the company’s mobile data was secure, 55% said security was the biggest mobile challenges facing their organisations, ahead of costs (43%) and managing multiple devices and platforms (42%). Read more…on Enterprise Mobility Management.