What Have We Learnt Through Navigating in An Economic Downturn & Pandemic?

Between suffering from uncertainty to naturally flourishing, the ability to adapt out of dead market space will have made all the difference for your business in the past year. Whether you are in a country that is on track for normality or being hit by a new wave of infections – All businesses have needed to evolve.

For those of us operating in the tech industry, we have experienced several significant economic events – especially the .com crash of 2000 and the 2008 Global Financial Crisis. We know what happens during an economic slowdown while there are some unique factors at play in relation to COVID-19; here is what we have learned.

Innovation should not be put off

Undergoing a 3-year change progression in a mere month was and continues to be a reality for many businesses across the globe. On countless occasions funds have been pulled from investments, particularly those in technology; deemed as a costly non-essential to cut in order to keep the boat floating. However, innovation needs to be cultivated and fed, without businesses prioritising technology their future fitness will remain grim. Opmantek’s automated network management tools were built on the premise of empowering companies. These tools give users the flexibility to operate in diverse environments with speed and scale at a fraction of the cost so you can keep innovating.

Having healthy finances is necessary

In the IT industry, an error caused by a triggered event in your network could cost a wave of rippling expenses. During periods of economic uncertainty what you don’t know can hurt you. Utilising technology such as one of Opmantek’s opEvents will reduce the impact of network faults and failures using proactive event management. Adding tools such as these to your arsenal allows you to gleam intelligent insights to make educated data and cost-effective driven decisions.

Optimising your data is the way forward

Your market no matter which side of it you are on has changed, so your business needs to change with it. More data, more data, more data, let’s face it cultivating and finding quality data is a superpower. So how is it possible to see it all? How can it be automatically configured and how can you keep up with it when it changes? Most organizations cannot give accurate location data of their assets, Open-AudIT gives you this information in seconds. Reduce the degree of uncertainty and make data-driven decisions, simply by running tools such as Open-AudIT to develop meaningful reports and resources. Optimising your data is the way forward, to learn how you can audit everything on your network with Open-AudIT book a demo session with our experts here.

 

Continual agility across all facets of business will be imperative to navigate through the next phase of this economic climate. Those that are familiar with nimble project management within the software development world – use similar methods in your financials too –be very conscious that your ability to plan twelve months is now a lot lower than it used to be and you need to undertake agile planning and forecasting. This will be a time of continual change however by; continually pushing innovation and utilising tools that give you the best possible view of your data to drive decision-making process, the path forward will be a lot clearer to navigate.

Uncategorized

Business Email Compromise – 5 Ways to Prevent it!

With 4.5 Billion internet subscribers, globally leveraging the web to perform various activities/transactions, it has become more vulnerable than ever before. In fact, according to the International Monetary Fund, the number of cyberattacks has tripled over the last decade. The constantly increasing, large scale breaches confirms that not only cybersecurity attacks are going up but they are increasing in severity, as well.

A report published by McAfee, The Hidden Cost of Cybercrime stated that – “We estimated the monetary loss from cybercrime at approximately $945 billion. Added to this was global spending on cybersecurity, which was expected to exceed $145 billion in 2020. Today, this is a $1 trillion dollar drag on the global economy.” These facts clearly signify the drastic increase in cybercrime and the importance of  cybersecurity for businesses & individuals across the world. As, besides having their reputations at stake, companies are risking their crucial/sensitive data, financial information, cash flow, tech infrastructure, customer trust & much more.

Rising Business Email Compromise (BEC) Attacks
The first half of 2020 was quite challenging for many organizations, as there was a global shift to a remote working culture while making data security a critical concern. Remote working & increasing internet transactions opened up new ways for cybercriminals to target both individuals and organizations. Business Email Compromise (BEC) is amongst the most common types of data breaches that we have witnessed throughout 2020.

Outlined below are some interesting stats that echo the fact: 

  • Coronavirus-related phishing attacks and business email compromise (BEC) scams skyrocketed 3,000% from mid-March through early June, according to mid-year analysis from the Agari Cyber-intelligence Division (ACID)
  • Barracuda Networks identified 6,170 malicious accounts since January that use Gmail, AOL, and other email services that were responsible for more than 100,000 Business Email Compromise (BEC) attacks on nearly 6,600 organizations around the world.
  • According to a recent report, The Geography BEC released in 2020 by Agari Cyber-Intelligence Division (ACID) – BEC is now responsible for 40% of all cybercrime losses—more than $26 billion in losses, since June 2016—and has victimized organizations in at least 177 countries.
  • Business Email Compromise (BEC) was solely responsible for over 40% of the total cyber crime losses in 2019, at least according to the latest FBI IC3 report.

If you ignore BEC prevention now, it can cost you millions of dollars later!

Companies using cloud-based email services are lucrative targets to cybercriminals who conduct business email compromise (BEC) scams. Cybercriminals leverage technical threats & sophisticated social engineering methods to win the employee trust & conduct fraudulent activities. The need for security against such attacks is crucial as the no. of BEC scams is growing in volume and no organization is immune to the fallibility of human nature since these emails look very real & are harder for employees to identify immediately.

5 Ways Organizations Can Prevent Business Email Compromise (BEC)

  1. Email Authorization with SPF: Sender Policy Framework (SPF) is an email authentication technique used against email spoofing. Spammers can forge your domain to send fake messages that appear to come from your organization. Such spoofed messages can be used to communicate false information, send out harmful software, or trick people into giving out sensitive information. Sender Policy Framework identifies if the mail sent from your domain is actually from your organization/mail server authorized by you or it’s a BEC attack.
  2. Multi-factor Authentication: To avoid the breach of email accounts, organizations can implement measures to enhance authentication such as: encouraging a strong password set up policy, prohibiting reuse of passwords, and implementing multi-factor authentication. Multi-factor authentication allows successful access only after the user provides various kinds of information including, but not limited to, a password and a dynamic pin, code, or biometric. This method makes it more difficult for a cybercriminal to hack an employee’s email & launch a BEC attack.
  3. Establishment of an internal control system: Companies can establish an internal control system & escalation rules for responding to confirmed or suspected cases of BEC. They can establish a system for verification that facilitates collaboration between the accounting department which requests financial institutions to make money transfers, IT department which is responsible for e-mail and system operation, legal department which responds when a case involves legal issues, and the sales department which undertakes negotiations with outside business partners. In case of high valued transactions, multiple independent signatures from different departments can also be used.
  4. Implementation of security protocols & staff training: Organizations can create & roll out policies to use office devices such as laptops, protocols for email passwords, and other relevant security measures to avoid BEC attacks. To counter social engineering, awareness training programs can be organized to identify breaches that get through the layers of defense. Also, whenever new strategies or attacks come to light in other organizations, such incidents should be shared with employees to increase awareness.
  5. Implementation of Security Solutions: Email security solutions offer a pre-delivery protection mechanism by blocking various email-based threats like viruses, malware, ransomware, phishing, spoofing, etc. before they reach a mail server. FirstCloud™ Email Security solution offers a reliable, scalable, and feature-rich email security service that protects businesses against such BEC attacks.

Combat BEC Attacks with CyberCision Email Security!
Considering how vital it is for companies to protect their sensitive data and financial integrity, CyberCision Email Security offers an affordable inbound & outbound email security solution that can be customized for businesses of any size with unique layered protection, assured disaster recovery, and 32 days trace replay.

It uses innovative cloud content security and analytics capabilities to protect inbound emails from malware, ransomware, phishing, viruses & spam, and also detects advanced persistent threats such as spear phishing, whaling, typo domain, and spoofing attacks.

The technology is powered by FirstWave Cloud Technology’s ESP™ email software technology, Cisco-based ESA/IronPort, and Advanced Malware Protection (AMP) technologies.

Moving towards a more secure future!
As we move towards a technologically advanced future, cybersecurity risk is also bound to soar, since hackers are also quickly adapting to the technological changes and are becoming more skilled in finding loopholes in the security systems. According to the Cybersecurity Market Revenues Worldwide report by Statista, the global cybersecurity market size is forecasted to grow to 248.26 billion U.S. dollars by 2023. But let’s not forget that cyber-attacks are not unavoidable. Security solutions are providing effective protection against such threats and are constantly evolving with the changing global needs.

Uncategorized

¿Que Aprendizaje Tuvimos Durante Esta Ultima Pandemia?

Este ultimo par de años se ha caracterizado por ser muy caotico para algunas personas, muchas empresas estan padeciendo de incertidumbre pues inclusive se cree que la situacion podría complicarse un poco mas.

 

 

Este cambio en nuestra rutina (laboral y personal) llego de una manera muy tempesotuosa pues muy pocas entidades o ninguna etaban preparadas para este cambio y aunque así es como inician las grandes transformaciones este cambio es ha sido y seguira siendo muy complicado.

 

En algunos paises estan comenzando a volver a la normalidad sin embargo otros tantos estan empezando a ver una nueva ola de contagios sin embargo el final de esta situacion se visulmbra un poco mas cercano.

Es por eso que la adaptabilidad ha sido un requisito para navegar en esta pandemia.

¿Qué hemos aprendido de esta pandemia?

 

La innovación no debe postergarse.

En México las estimaciones afirman que empresas tuvieron que experimentar una cambio de 3 años en solo un mes y es que en muchas ocaciones las empresas dejan para despues sus inversiones en tecnologia lo cual a la larga termina siendo una necesidad para salir adelante.

Es por eso que herramientas como las de Opmantek han entrado en escena para potenciar y facilitar los cambios necesarios en las empresas.

 

Tener finanzas sanas es necesario.

Un forma segura para tener oportunidades de salir adelante durante la crisis es contar con finanzas saludables, es decir evitar caer en gastos inecesarios en tu negocio.

Por ejemplo en el area de TI, donde un error por originado por cualquier evento en tu red podría desencadenar en un serie de gastos.

El conocer bien todos los aspectos de tu empresa es importante y retomando el ejemplo de TI puedes confiar en modulos como  de Opmantek para ahorrar y evitar tiempos muertos y cuellos de botella en tu red.

 

Los datos son el mejor recurso

Aprendimos a recopilar los datos de la empresa en general, sobre su comportamiento, sobre clientes, historicos de ventas y pedidos.

Con estos recursos podemos asegurarnos de siempre tomar las mejores deciciones y reducimos considerablemente el grado de incertidumbre.

Aprende como puedes auditar todo lo que se encuentra en tu red con Open-AudIT aquí.

 

Estas lecciones nos han permitido salir adelante en tiempos dificiles y sin duda seguirlas llevando a cabo se ha vuelto una labor de día a día y para todas las epocas. Asegúrese de que su negocio siga adelante, reserve una demostración con nuestros expertos.

Uncategorized

How to Manage Complex Event Responses

Managing complex event responses can seem like an overwhelming task, but with the right automated network management software, the process is simpler than ever. Let’s take a look at how an automated system can help you manage complex event responses.

What is a Complex Adaptive System (CAS)?

Complex Adaptive Systems (CAS) are made up of components (or agents) in a dynamic network of interactions that are designed to adapt and learn according to changing events. These interactions may be affected by other changes in the system and are non-linear and able to feed back on themselves. In the Australian healthcare system, for example, complex adaptive systems have been used to analyse systematic changes.

The overall behaviour of a CAS is not predicted by the behaviours of the agents individually. The past of CAS systems is partly responsible for their present behaviour and they are designed to evolve over time.

Event automation and remediation using opEvents

opEvents is an advanced fault management and operational automation system designed to make event management easier than ever. With opEvents, you can improve your business’s operational efficiency and decrease the workload of your staff by expanding on NMIS‘s efforts and improving automated response techniques using scientific methods.

opEvents elevates NMIS’s Notification, Escalation and Thresholding systems by blacklisting and whitelisting events, handling event flap, event storms and event correlation and supporting custom email templates for each of your contacts.

Basic event automation

In order to carry out event automation successfully, there are a few simple steps that you need to take:

1. Network management – identify the top network events you respond to frequently (daily, weekly, etc.)
2. List the steps you take – troubleshooting and remediating – when the issue occurs
3. Identify how these steps can be automated
4. Create an action to respond to the event

Let’s take a look at how opEvents handles events natively:

Event action policy

Event Action policy is a flexible mechanism that dictates how opEvents reacts when an event is created. The policy outlines the order of actions as well as what actions are executed by using nested if/then statements.

Event correlation

Setting event correlation helps reduce event storms inside opEvents. opEvents will use rules that are outlined to group events together and create a synthetic event that contains event information from all events that have been correlated.

Event escalation

opEvents allows for custom event escalations for unacknowledged events. You can set custom rules based on your business or customers.

Event scripts

Events can call scripts that can be used to carry out actions such as troubleshooting, integration or remediation.

Event deduplication

All events that are related to stateful entities are automatically checked against the recent history of events and the known previous state of this entity.

Developing a CAS system

In order to develop a CAS system, it’s essential to complete the following steps:

1. Identify an individual event
2. List the steps you take – troubleshooting and remediating – when the issue occurs
3. Decide what automated action(s) can and should be carried out (data collection, remediation)
4. Identify who needs to be contacted, when (working hours, after hours, weekends) and how (Email, text, service desk)
5. Decide what should happen over time if the event is not acknowledged (remains active)

If you would like to learn more about Opmantek’s event management services, don’t hesitate to get in touch with our team or request a demo.

Uncategorized

Minimising risk of cyber-attacks to telcos & network orchestration platforms

Software-defined networking (SDN) and network functions virtualisation (NFV) may provide opportunities to overcome key networking challenges – but security remains a key concern.

“Telecommunications regulators and national security agencies worldwide are very concerned – even alarmed – about the potential risks of cyber-attacks from state-based actors against centralised telecommunications end-to-end service and network orchestration technology platforms or solutions from single vendors,” says Roger Carvosso, Chief Product Officer. “They are also concerned about the dominance or concentration of market power to one or a few NFV orchestration vendors or standards in the telecommunications, carriage service provider and digital service provider space.”

“The importance of security planning, design and controls needed for any orchestrator that has privileged access to network elements for the purpose of service and network orchestration can’t be understated.”

Security also remains a divisive issue within many telecommunications providers, with an intra-organisational divide between cybersecurity leaders such as vice-presidents of security products, professionals and operations team members and SDN/NFV networking engineers. These engineers are typically not as aware or as knowledgeable of security or cybersecurity-as-a-service, or the importance of baking security as a philosophy or discipline to be baked into SDN/NFV technologies, tools and processes.

At FirstWave, we are working to ensure our CyberCision platform security architecture, including APIs, has the highest level of security accreditation and validation – where the required components have privileged access to telecommunications network elements for service and network orchestration. Our platform effectively supports the diversification of orchestration vendors and a more competitive, secure sector.  Our products and culture can also help telecommunications providers bridge the internal security gap and capture the value possible through SDN and NFV.

For more information, contact us at: sales@firstwavecloud.com.

Uncategorized

Why We Need a Dynamic Baseline And Thresholding Tool?

With the introduction of opCharts v4.2.5 richer and and more meaningful data can be used in decision making. Forewarned is forearmed the poverb goes, a quick google tells me “prior knowledge of possible dangers or problems gives one a tactical advantage”. The reason we want to baseline and threshold our data is so that we can receive alerts forewarning us of issues in our environment, so that we can act to resolve smaller issues before they become bigger. Being proactive increases our Mean Time Between Failure. If you are interested in accessing the Dynamic Baseline and Thresholding Tool, please Contact Us.

Types of Metrics

When analysing time series data you quickly start to identify a common trend in what you are seeing, you will find some metrics you are monitoring will be “stable” that is they will have very repeated patterns and change in a similar way over time, while other metrics will be more chaotic, with a discernible pattern difficult to identify. Take for example two metrics, response time and route number (the number of routes in the routing table), you can see from the charts below that the response time is more chaotic with some pattern but really little stability in the metric, while the route number metric is solid, unwavering.

Comparing Metrics with Themselves

This router meatball is a small office router, with little variation in the routing, however a WAN distribution router would be generally stable, but it would have a little more variability. How could I get an alarm from either of these without configuring some complex static thresholds?

The answer is to baseline the metric as it is and compare your current value against the baseline, this method is very useful for values which are very different on different devices, but you want to know when the metric changes, example are route number, number of users logged in, number of processes running on Linux, response time in general, but especially response time of a service.

The opCharts Dynamic Baseline and Threshold Tool

Overall this is what opTrend does. The sophisticated statistical model it builds is very powerful and helps spots these trends with the baseline tool. We have extended opTrend with some additional functionality so that you can quickly get alerts from metrics which are important to you.

What is really key here is that the baseline tool will detect downward changes as well as upward changes, so if your traffic was reducing outside the baseline you would be alerted.

Establishing a Dynamic Baseline

Current Value

Firstly I want to calculate my current value, I could use the last value collected, but depending on the stability of the metric this might cause false positives, as NMIS has always supported, using a larger threshold period when calculating the current value can result in more relevant results.

For very stable metrics using a small threshold period is no problem, but for wilder values, a longer period is advised. For response time alerting, using a threshold period of 15 minutes or greater would be a good idea. That means that there is some sustained issue and not just a one off internet blip. However with our route number we might be very happy to use the last value and get warned sooner.

Multi-Day Baseline

Currently two types of baselines are supported by the baseline tool, the first is what I would call opTrend Lite, which is based on the work of Igor Trubin’s SEDS and SEDS lite, this methods calculates the average value for a small window of time looking back the configured number of weeks, so if my baseline was 1 hour for the last 4 weeks and the time now is 16:40 on 1 June 2020 it would look back and gather the following:

  • Week 1: 15:40 to 16:40 on 25 May 2020
  • Week 2: 15:40 to 16:40 on 18 May 2020
  • Week 3: 15:40 to 16:40 on 11 May 2020
  • Week 4: 15:40 to 16:40 on 4 May 2020

With the average of each of these windows of time calculated, I can now build my baseline and compare my current value against that baseline’s value.

Same-Day Baseline

Depending on the stability of the metric it might be preferable to use the data from that day. For example if you had a rising and falling value It might be preferable to use just the last 4 to 8 hours of the day for your baseline. Take this interface traffic as an example, the input rate while the output rate is stable with a sudden plateau and is then stable again.

asgard-bits-per-second - 750

If this was a weekly pattern the multi-day baseline would be a better option, but if this happens more randomly, using the same-day would generate an initial event on the increase, then the event would clear as the ~8Mbps became normal, and then when the value dropped again another alert would be generated.

Delta Baseline

The delta baseline is only concerned with the amount of change in the baseline, for example from a sample of data from the last 4 hours we would see that the average of a metric is 100, we then take the current value, for example, the spike of 145 below, and we calculate the change as a percentage, which would be a change of 45% resulting in a Critical event level.

amor-numproc - 750

The delta baseline configuration then allows for defining the level of the event based on the percentage of change, for the defaults, this would result in a Major, you can see the configuration in the example below, this table is how to visualize the configuration.

  • 10 – Warning
  • 20 – Minor
  • 30 – Major
  • 40 – Critical
  • 50 – Fatal

If the change is below 10% the level will be normal, between 10% and 20% Minor, and so up to over 50% it will be considered fatal.

In practicality this spike was brief and using the 15 minute threshold period (current is the average of the last 15 minutes) the value for calculating change would be 136 and the resulting change would be 36% so a Major event. The threshold period is dampening the spikes to remove brief changes and allow you to see changes which last longer.

Installing the Baseline Tool

Copy the file to the server and do the following, upgrading will be the same process.

tar xvf Baseline-X.Y.tgz
cd Baseline/
sudo ./install_baseline.sh

Working with the Dynamic Baseline and Thresholding Tool

The Dynamic Baseline and Threshold Tool includes various configuration options so that you can tune the algorithm to learn differently depending on the metric being used. The tool comes with several metrics already configured. It is a requirement of the system that the stats modeling is completed for the metric you require to be baseline, this is how the NMIS API extracts statistical information from the performance database.

Conclusion

For more information about the installation and configuration steps required to implement opCharts’ Dynamic Baseline and Thresholding tool, it is all detail in our documentation – here.

Uncategorized