How to Make Cybersecurity Part of your Business Culture

Most businesses and government organisations are now aware that cybersecurity is not merely the responsibility of IT. They recognise that everyone is accountable for protecting systems, people and information from attack. They also know that many attacks occur from within rather than from external parties. So how can they make part of their business culture?

Education is key. An education program should complement and explain robust security policies that detail the assets a business or organisation needs to protect, the threats to those assets and the rules and controls for protecting them.

An effective program makes every worker acutely aware of cyber threats, including emails or text messages designed to trick them into providing personal or financial information; entice them to click links to websites or open attachments containing malware, or deceive them into paying fake invoices that purport to be from a senior executive.

It teaches them how to recognise common threats, the actions they need to take and people they need to inform when targeted and the steps to take if they do fall victim to a malicious individual or software. In addition, the program should teach workers how to recognise and respond to poor – or suspicious – cybersecurity behaviour by a colleague.

Cybersecurity education also needs to extend to a business or government organisation’s senior leadership team, who should also visibly support its objectives and model appropriate behaviours. It should also encourage workers and managers to pass on lessons learned to friends and family to help them avoid being compromised by malicious cyber activities.

Perhaps most importantly, it is not good enough to run a cybersecurity education program once and consider it a box ticked. A business or government organisation should run programs regularly and update them as needed to account for changes in policies and the threat landscape. It should also provide ongoing information and direct people to resources such as the Australian Cyber Security Centre for assistance.

Cybersecurity policies and education programs also need to complement the effective use of proven, regularly updated security products to protect systems, people and information from cyber threats.

For more information, contact us at: sales@firstwavecloud.com

Uncategorized

Modernising security and enabling digital transformation with zero-trust network access.

​Keeping systems and information safe is an increasingly complex, high-stakes activity. Trusting individuals or systems by default may have catastrophic consequences if it leads to malicious parties gaining access to corporate networks or resources. These consequences may include service disruption and loss or theft of sensitive information – and may , in‌ ‌turn, lead to  reputational damage as customers and partners lose trust in an affected organisation. In addition, regulators may impose financial penalties if a breach results from a failure of systems or processes.

Unsurprisingly, businesses and government organisations are turning away from security models that trust individuals or systems by default. As TechTarget notes, these models are ill-equipped to handle data distributed across multiple locations, applications and cloud services. A zero-trust approach requires strict identity and device verification not just to get past the network perimeter, but to access internal systems and resources. By segmenting network components and systems and imposing access requirements for each segment – as well as using risk management analytics to identify suspicious activity – businesses and government organisations can respond effectively to modern security challenges.

Zero-trust network access is continuing to gain traction in business and government – particularly as digital transformation projects take effect. According to a Gartner report, because digital transformation projects “require services APIs, data and processes to be accessible through multiple ecosystems anywhere, anytime, from any device over the internet, [they expand] the surface area for attackers to target.”

Gartner says zero-trust network access “provides adaptive, identity-aware, precision access” and “enables digital ecosystems to work without exposing services directly to the internet.”

The analyst firm predicts that, by 2022, 80% of new digital business applications opened up to ecosystem partners will be accessed through zero-trust network access, while by 2023, 60% of enterprises will phase out most of their remote access virtual private networks in favour of network access.

Is your business or government organisation adopting zero-trust network access? What challenges and opportunities is this approach presenting? Please let us know at sales@firstwavecloud.com.

Uncategorized

Using a Commercial And Open Source Approach To Tackle Network Assurance

Join Keith Sinclair as he joins the Passionate About OSS Podcast and talks about how using open source software is a key building block to running your networks. The podcast is also available on Anchor.fm, Spotify, Google Podcasts, RSS, Pocket Casts, Breaker, RadioPublic or streamed below; 

Show Notes

Have you noticed the rise in trust, but also the rise in sophistication in Open Source OSS/BSS in recent years? There are many open-source OSS/BSS tools out there. Some have been built as side-projects by communities that have day jobs, whilst others have many employed developers / contributors. Generally speaking, the latter are able to employ developers because they have a reliable revenue stream to support the wages. Our guest on this episode, Keith Sinclair, has made the leap from side-project to thriving OSS/BSS vendor whilst retaining an open-source model. His product, NMIS, has been around since the 1990s, building on the legendary work of other open-source developers like Tobias Oetiker. NMIS has since become one of the flagship products for his company, Opmantek. Keith and the team have succeeded in creating a commercial construct around their open-source roots, offering product support and value-add products. Keith retraces those steps, from the initial discussion that triggered the creation of NMIS, its evolution whilst he simultaneously worked at organisations like Cisco, Macquarie Bank and Anixter, through to the IP buy-out and formation of Opmantek, where he’s been CTO for over 10 years. He also describes some of the core beliefs that have guided this journey, from open-source itself, to the importance of automation, scalability and refactoring. The whole conversation is underpinned by a clear passion for helping SysAdmins and Network Admins tackle network assurance challenges at service providers and enterprises alike. Having done these roles himself, he has a powerful empathy for what these people face each day and how tools can help improve their consistency and effectiveness. For any further questions you may have, Keith can be found at: https://www.linkedin.com/in/kcsinclair Disclaimer. All the views and opinions shared in this podcast, and others in the series, are solely those of our guest and do not reflect the opinions or beliefs of the organisations discussed.

Uncategorized

opEvents Prevents Event Storms During A Snowstorm

I dropped into a quarterly business review that one of the Account Managers was doing with one of our customers last week. I like to do this from time to time to hear it for myself directly from the customer. It helps me understand the customers and gives me an opportunity to discuss our platform post-sale and integration.

This particular customer is a Telecommunications Carrier out of North America that runs a lot of wireless and fibre and is rapidly expanding.

The Head of Network Operations was on the call, and for the purposes of keeping the identity private, let’s call him Joe.

Joe talked about the snowstorms and how it impacts their network and field services team. The way it works is that the NOC team gets an alert, does some diagnosis and decides what process needs to occur. To send field service staff means that the problem is something that cannot be remotely fixed. Sending the team out in bad weather to work on wireless equipment is hard on the people who do the work, but at the end of the day, to quote Joe, “we pride ourselves on great customer service.”

Before this customer had opEvents installed, they would have a high rate of field service calls that would result in no fault found during snowstorms. This means that the field services team were not being sent to fix real field-related problems. For any company with a field services team, you know how important it is to send these guys to real problems.

The impact for the customer was that to clear all the events would take days, with over 50% being false reports.

During recent snowstorms, opEvents would handle the alert and find the source problem. The NOC team then could send the field services team out in the snow to investigate and fix the problems. Joe said that the level of accuracy in the alerts was fantastic and the NOC and Field Services Team rebuilt their trust and had confidence that they were being sent to a real fault.

When Joe studied the impact that the FirstWave Platform brought to the table, opEvents reduced event storms to zero, deduplication was no longer a problem and only pushed real events to the team. Field service calls were reduced and the network was brought back to normal in half the time.

“We had a lot of competitors’ customers switch to us during the snowstorms. The amount of downtime we suffered was minimal as we were right on top of any faults, we knew where they were and their severity and deployed our field services team accurately. It puts us ahead of the market.”

Uncategorized

Multi-tenant, SaaS platforms the way of the future for security

​Delivering security solutions to customers has progressively become more complex and inefficient for service providers. Because these solutions may comprise a range of point products from different vendors, they force the service provider – and customer – to manage multiple relationships and technologies.

Combining the scalability and flexibility of Software as a Service with the economies of scale of a multi-tenant environment can resolve these problems. A multi-tenant, SaaS security platform can strip out complexity and give service providers the ability to offer white-labelled solutions comprising world-class security technologies to customers.

At FirstWave, we provide a multi-tenant, SaaS platform that service providers can use to provide solutions that protect enterprises from cyberattacks across email, web and firewall vectors. Our CyberCision Platform orchestrates and provisions cloud-based SaaS based on virtualised email and web security, as well as firewall products from leading vendors. These include Cisco, Palo Alto Networks, Fortinet and Trend Micro; we aim to add more in future.

The platform – available on Amazon Web Services – can be accessed by service providers with no upfront costs and integration. It incorporates APIs and information feeds that service providers can take into their order management, customer management, ticketing and subscription billing systems. All FirstWave infrastructure, management and security processes are certified to ISO 27001 Information Security Management System Standard and ISO 9001 Quality Management System Standard.

The platform enables users to offer solutions to customers ranging from government agencies, financial institutions and multinationals down to two- or three-person startups from a single instance.

Service providers can provision and activate solutions for customers within minutes and offer them packages of security policies. They can also manage all customers from a single pane of glass, and the customers themselves can have a single pane of glass view of their services and security policies. Our platform is carrier-grade and offers five nines service performance and strong hierarchical and role-based access controls.

Our platform is also compliant with the requirements of the General Data Protection Regulation, which protects the data and privacy of individuals in Europe.

With a world-class, multi-tenant, SaaS platform, service providers are now well positioned to help customers meet current and forthcoming security challenges.

Uncategorized

3-Steps To Increase Your Automated Event Management

Recent advances in Operational Process Automation at Opmantek means that our MSP customers can deliver exceptional value to their clients; exceeding their SLAs whilst becoming incredibly sticky.

Are you facing any of the challenges below?

  • Cost pressures as clients try to drive down prices.
  • Ability to meet your SLAs due to overworked technical teams.
  • Absolute reliance on one or two technicians to keep your clients happy.
  • Challenges in retaining level 3-4 technical resources.
  • Significant burdens in maintaining accreditation.
  • Managing increasingly complex client networks.
  • Retaining skills associated with client legacy networks.

Resolve these challenges with incredibly rapid ROI and amazingly low TCO

Opmantek has long believed that Operational Process Automation is one of the foundational pillars for a successful network management strategy. A key piece to this is ensuring that actions are undertaken in a consistent manner each time, with no variation from what is outlined as the standard protocol.

This will help you to:

  • Simplify the procedure
  • Reduce cost
  • Deliver consistent outcomes with your agreed SLAs

Through the use of “context sensitive event actions”, you may now replicate troubleshooting actions and escalation procedures, dynamically.

Example Use Case

1. Issue with Cisco Interface Identified

Here’s the event log for the entire network. Our event management system automatically parses incidents on your client’s networks into Events.

chevron_arrow_down
context_sensitive_actions_step1
2. Context sensitive action bar initiated

Once a specific event has been identified “Context Sensitive Actions” are displayed against the event either automatically or by guiding your NOC team through the steps to remediate.

chevron_arrow_down
context_sensitive_actions_step2
3. Cisco remediation commands executed

The system automatically creates a ticket in the system, pings the affected nodes and Troubleshoots (TS) the Cisco Interface. Once those actions conclude, the results are displayed on the event itself! The operator may now take further action or simply close out the Ticket.

context_sensitive_actions_step3

All of this can happen without the NOC or your client knowing there was ever an issue. Save time, save money and increase your clients’ satisfaction. If you’re interested in taking advantage of these incredible capabilities, please reach out.

Uncategorized