We know that the impending migration to Teams is on every IT manager’s mind. The benefits promised are great – having one centralised location where you can see, collaborate, store and engage. The end-goal is to unify your collaboration workspace and we understand it may be a step-by-step process to get there.
It’s undeniable that data security threats are on the rise. Attackers infiltrate even the most guarded organisations through their email (check out the stats on Mimecast’s 2019 State of Email Security Report), their end-points and even directly through their front door by hacking users’ passwords. And maybe you’ve got most of these bases covered. (If you haven’t, do come and talk to us about our Zero Trust Security Framework). But have you considered mobile security?
Email impersonation attacks, or email fraud, continues to grow, with Mimecast’s 2019 State of Email Security Report showing a 67% increase in attacks compared to 2018. The report finds that 73% of those organisations impacted by impersonation attacks having experienced a direct loss, specifically loss of customers (28%), financial loss (29%) and data loss (40%). Phishing attacks were the most prominent type of cyber attack, with 94% of respondents having experienced phishing and spear phishing attacks in the previous 12 months, and 55% cited seeing an increase in phishing attacks over the same time period.
Last week, Enablis team members congregated at Centennial Park in Sydney for our FY20 kick off. Themed ‘Accelerate’, we weren’t privy to much information beforehand except that there was something race-related ahead, and to dress for the part.
The recent increase in security breaches is not a hype and is a real risk to all companies of any size. Hear Enablis Managing Director, Stuart Couchman, talk about the new and evolved types of threats, as well as Enablis’ new methodology – in partnership with market leading vendors – that can help eliminate these threats.
The enterprise cloud revolution is here. IT organisations everywhere, from small and mid-sized businesses to Fortune 500 companies, are moving from on-premises software to on-demand, cloud-based services. As enterprise IT makes this transition to a new hybrid on-demand/on-premises configuration, controlling who is granted access to which applications becomes increasingly important. This presents CIOs and their teams with a whole new set of identity management challenges. In addition, users must keep track of multiple URLs, user names, and passwords to get access to their applications.
On any given night in Australia, 1 in 200 people are homeless. Despite popular belief, children are one of the largest groups of Australians experiencing homelessness. In fact, children under the age of 18 make up 27% of people experiencing homelessness.
Off the back of our security event last week, one thing is clear: we – “we” being all companies, regardless of size and industry – are all being targeted by cyber adversaries. What we’re being targeted for is fairly standard – they want to gain access to our systems, to get a hold of our data, to ultimately, extract (or extort) money. How we’re being targeted is evolving – impersonation emails are rife, perimeter control is getting out of control as our users become more mobile, and password fatigue is making it all too easy for hackers to gain access to our systems.