What is the #1 cause of data loss in the cloud?

Did you know the #1 cause of data loss in the cloud is human error? While cloud-based applications like Office 365 are robust and sophisticated, they cannot protect your data from your employees.
Every day, data is lost or corrupted in the cloud due to:
  • Accidental and malicious deletion
  • Data overwriting/sync errors
  • Successful phishing scams
  • And more!
Do you need help convincing your colleagues about SaaS Protection? Check out this educational ebook, SaaS Protection for Office 365, and understand how to keep your critical business data people proof!

Find out more

You can read more about Datto SaaS data protection in this article.

As Datto Partners, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business.

To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.

Datto

Live Webinar: Top tips for using and backing up your Office 365 applications

Are Office 365 applications like Teams, Outlook and SharePoint rapidly turning into a core aspect of your users toolkits and working days? A significant part, if not all, of their productivity, critical communication and data are stored and created in this environment. Losing this data is not an option, and as Office 365 is not a back-up solution, we will help you with what you need to consider when making sure business data is safe.

Don’t miss this new webinar surrounding your productivity cloud and protecting your O365 data. Join experts from Microsoft and Barracuda for all of the latest details and best practices for using and backing up your O365 applications.

When?

Wednesday 15 July, 10am BST.

Agenda:

  • 10:00 – 10:05 Opening
    Speaker: Chris Hill, RVP Public Cloud, Barracuda Networks
  • 10:05 – 10:50 Your Microsoft 365 Productivity Cloud
    Speaker: Mike Martin, Technical Evangelist, Microsoft
  • 10:50 – 11:00 Co-Development of a Fit for Purpose Backup
    Speaker: Mike Martin
  • 11:00 – 11:30 Your Barracuda Cloud to Cloud Backup & Closing
    Speaker: Charles Smith, Consulting Solutions Engineer, Data Protection, Barracuda
    Networks

How can I find out more?

As Barracuda Partners, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business.

To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.

 

Returning to the office: Technology and security in a time of transition

Many employees have worked remotely for months as a result of the global pandemic (and many still continue to do so). During that time, businesses and public sector organisations established technical measures that enabled remote workforces to operate securely. Now, as companies begin opening their doors, and employees slowly return to their offices, business owners need to audit their tech stack and security measures once again.

Returning to the office doesn’t necessarily mean abandoning all of your Work From Home set-ups. Your workforce will likely consist of some remote workers, even after businesses reopen. Completing a technology audit and gap analysis as employees transition back to the office will ensure remote workers and those returning to the office have what they need to perform well and work securely.

“As your employees begin to return to the office, take the time to develop a repeatable data-driven process you can use to assess security as a hybrid workforce,” explains Chris Henderson, Director, Information Security at Datto. “It is likely there are populations of employees who will be remote for the foreseeable future, so be sure your planning and auditing assume a continued partial remote workforce.”

Datto have developed a series of checklists to help your businesses as you reopen your offices. The checklists cover four key imperatives for your transition: employees, office space, technology, and clients.

Below are some highlights from the “Technology” checklist. This list focuses on establishing office layouts, behaviours, and guidelines that result in a safe office environment for everyone.

  • Run an audit on any workstations in the office. This will help you determine if the workstations have the necessary patches with the latest OS and other critical updates. Leverage your RMM tool to deliver the appropriate patches.
  • Audit the technology that remote employees will use. Determine if the tech is appropriate, secure, and is sufficient to enable optimal productivity.
  • Evaluate new technology deployed during the crisis. The tools your employees used to work remotely may or may not be required when you return to the office. Create a list, including any new devices, and decide if they stay or go.
  • Create a list of employees who used personal computers to Work From Home. Develop an appropriate action plan to ensure the ongoing use of personal computers or devices complies with your company’s security standards.
  • Catalogue items removed from the office. Protect your business and intellectual property by ensuring any devices, technology, files, folders, contracts, customer lists, and documents, etc. are returned to the office.
  • Conduct a gap analysis. Document the technology gaps that were exposed during the crisis and create a plan to address them.

Find out more

You can read more about Datto SaaS data protection in this article.

As Datto Partners, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business.

To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.

Datto

This article was originally published here by our partners Datto.

Top tips for securing collaboration tools

As collaboration tools become more and more fundamental to team collaboration, and by extension, company success, alongside their benefits, cloud solutions for file storage and document or project management can cause many problems for IT departments.

Smaller businesses rarely invest in high-cost collaboration tools, opting instead for cheaper — or, better still, free — utilities. For better or worse, they have plenty of choices. However, failure to consider the security implications of using such tools can end up costing SMBs far more than they budgeted for.

In this article, we share some tips and best practices for making sure that your users can work as productively – and as securely – as possible.

Document collaboration tools

Many services allow small teams to edit documents simultaneously. They’re not just text tools, though; using them, team members can jointly develop graphical interfaces, diagrams, source code, and much more as well. It is handy, after all. However, before using such a service, it is worth understanding exactly how it works: how it stores your information, who has access to it, what security settings are available. Leaving work files publicly accessible is always a bad idea. Even if you are not concerned about information leakage, an intruder could gain access and make their own changes to your project documentation.

Google Docs or Microsoft Teams, OneDrive or Sharepoint provide the most vivid examples. People often share documents through those platforms, using a direct link without any restrictions. That means search engines can index them, and therefore pretty much anyone can see them. Complete strangers have found all sorts of confidential information in those docs: employees’ personal data, lists of customers including contact details, and even payroll records.

What to do: Use only services in which you can hide documents from prying eyes, or that at least give a clear explanation of how documents are stored. Do not forget to configure access rights — the ability to do so is a vital consideration. So, if you use Google Docs for work purposes, restrict access, granting it only to people you share documents with, and do not forget to revoke it if they no longer need it.

Cloud file storage

Another type of service that you should treat with caution is cloud file storage. Need to transfer a large amount of information? No problem — just upload it to the cloud and send the recipient a link. That neatly avoids any e-mail size limits. But many file-sharing services have no protection at all; and, again, files can pop up in the search results of random strangers.

Even if a service has protection, you need to turn security settings up to the max. People often sign up, upload data to the cloud, and forget about it. But passwords can leak. One hackers even stole passwords from Dropbox, not to mention smaller services.

What to do: Choose a reliable file-sharing service that supports two-factor authentication. Once you put data in the cloud, do not forget about it, and if you’re no longer using a file for work, delete it. Settle on one service for sharing files; using more than one invites confusion.

Project-management environments

Overall, these platforms allow workflow participants to communicate, share files, and systematize projects. If you use one to discuss business strategies or transfer files, it is important to know not only who can see them today, but also who might be able to later. Some cloud platforms make everything visible to everyone by default. Users can hide items, but odds are they won’t remember to 100% of the time; the default usually stands. What’s more, if someone gets access to a project, it is likely they will gain access to the entire project history, which is not always desirable.

Companies often grant access to such environments to contractors or freelancers, who may be working for you today and for a competitor tomorrow. Not to mention dismissed employees, who might have time to download an archive before you revoke their permissions.

What to do: Regulate project access rights, restricting those rights to work-related files only, for all parties. Use separate communication environments for employees and external people (contractors, customers). And do not forget to revoke access for former employees and freelancers promptly.

Additional tips

Remember that all services may have vulnerabilities (which might be undiscovered when you start working with them). In addition, many services have client apps with their own problems. Therefore, we recommend that you stick to the following principles:

  • Before you start working with a service, carefully study its settings and data processing rules, as well as read how people have reviewed it in the context of security.
  • Your dedicated IT expert or team, if you have one, must clearly understand what services you use, how they are configured, and who is handling their administration.
  • If you have no dedicated specialist, appoint a responsible party for each service to ensure that the client app is updated promptly any time a vulnerability is found, that passwords are changed in the event of a leak, and that access rights are issued and revoked as and when required.
  • Any service used to share a link or file can potentially be a malware distribution channel. Therefore, every device on which these tools are used needs a reliable security solution.

What’s the solution?

With Kaspersky Security for Microsoft Office 365, your company can protect Exchange Online, OneDrive files, SharePoint files, and Teams files against malware, phishing, spam, and other threats.

Click here to view the full datasheet, or watch the short video below.

Want to find out more?

As Kaspersky Gold Partners, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business.

To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.

How to secure data on Microsoft Office 365

Although it may be tempting to think that with data in the cloud your business isn’t susceptible to data loss, it’s still vital to add an additional security layer to protect email from spam, phishing, ransomware and other advanced cyber threats. In fact, nowadays malware is usually sent via email and hosted on cloud storage platforms.

Protecting even a cloud-oriented business from known and unknown threats is therefore critical in order to instantly stop the spread of malicious software, phishing, ransomware, spam and business email compromise (BEC) – and best of all requires no high-tech skills.

What’s the solution?

With Kaspersky Security for Microsoft Office 365, your company can protect Exchange Online, OneDrive files, SharePoint files, and Teams files against malware, phishing, spam, and other threats.

 

Make use of the most sophisticated technologies for your security and at the same time enjoy a quick start thanks to predefined policies and auto configuration.

Get a 6 month FREE trial!

To support remote working in this challenging time, we’re offering 6 months’ FREE protection with the very latest version of Kaspersky Security for Microsoft Office 365. This extends protection for SharePoint Online and Microsoft Teams, securing all collaboration and messaging channels within Microsoft Office 365.

Kaspersky Security for Microsoft Office 365 uses advanced heuristics, machine learning and other next-generation technologies to protect your communication and collaboration processes from ransomware, malicious attachments, spam, phishing (including Business Email Compromise) and unknown threats.

Sign up NOW for a FREE 6-month license and take protecting remote workers off your to-do list.

Click here to view the full datasheet, or watch the short video below.

Want to find out more?

As Kaspersky Gold Partners, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business.

To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.

 

90% of malware is delivered via email. Is your business email secure?

Malware and email messages are, unfortunately, the same as bread to butter or hands to gloves. The two go hand in hand. In fact, the connection is so acute that it’s been found that over 90% of all known malware is delivered into companies via email.

And there’s even worse news for IT managers and systems administrators. Here’s some of the main points from the Cofense State of Phishing Defence report:

  • The average user / employee doesn’t go two full days between receiving phishing messages
  • More than 50% of phishing messages have the word “invoice” in the subject line
  • 21% of malicious emails carry harmful attachments or phishing-related malware

Given that this data was gathered over 135 million simulations, 800,000 emails and 50,000 actual phishing campaigns targeting companies in 23 industries, the threat is obviously a real one.

Protect your business email with a 6 month FREE Kaspersky trial!

To support remote working in this challenging time, we’re offering 6 months’ FREE protection with the very latest version of Kaspersky Security for Microsoft Office 365. This extends protection for SharePoint Online and Microsoft Teams, securing all collaboration and messaging channels within Microsoft Office 365.

Kaspersky Security for Microsoft Office 365 uses advanced heuristics, machine learning and other next-generation technologies to protect your communication and collaboration processes from ransomware, malicious attachments, spam, phishing (including Business Email Compromise) and unknown threats.

Sign up NOW for a FREE 6-month license and take protecting remote workers off your to-do list.

Why Kaspersky?

  • Prevent threats and keep your business running
  • Endpoint protection from the most tested, most awarded security vendor
  • Protect Windows desktops and file servers, Mac OS workstations, iOS and Android smartphones and tablets
  • Secure Microsoft Office 365 communication and collaboration

Want to find out more?

As Kaspersky Gold Partners, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business.

To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.

 

References:

https://www.darkreading.com/attacks-breaches/most-malware-arrives-via-email/d/d-id/1333023

Reopening the workplace after COVID-19: A checklist for businesses

As the UK and other countries and cities start to ease lockdown restrictions, this handy checklist for reopening business workplaces can help you jumpstart safe and efficient returns to work, and kick-starting of business.

You and your users have been quarantined in your homes for the past few days weeks months, and now
authorities are looking to lift restrictions and open up. You may be thinking, “We’ll be back soon, and I can get out of this house!” The problem is, if you just pick up and go, and don’t prepare for having people back in the workplace, you may run into issues that could have been easily avoided. So now is the time to prepare.

This checklist is not meant to be an exhaustive list, but it can help provide guidance as you look to reopen. It’s
organised into four sections:

  • People
  • Workplace
  • Technology
  • Your Customers

Every company’s situation is of course unique, but evaluating your plan with these components in mind can help you get organised and anticipate obstacles that may stand in the way.

Extra security layers for collaboration tools

As you can read in the Technology section of the checklist, many users have been using Microsoft Teams for collaborating with colleagues during the lockdown period. Yet one in three users experience data loss in cloud applications like Microsoft Office 365 and Google G Suite.

With more and more businesses now using the Microsoft Office 365 suite of tools, it’s more and more vital to ensure that your data is adequately backed up to avoid accidental loss, or the risk of being held to ransom for your own data.

We’ve pulled together a list of 4 reasons to add an additional layer such as Datto SaaS protection to your organisation’s data, and this video outlines Datto’s SaaS protection services in a little more detail.

Find out more

You can read more about Datto SaaS data protection in this article.

As Datto Partners, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business.

To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.

Datto

Help during the COVID-19 crisis

The expert team at Complete IT Systems are publishing a series of guidance and tips to help you and your business through this situation. This covers all aspects of quickly providing safe, comfortable and efficient home offices for your users, including data security, collaboration tools, laptops, desktops, print and consumables, support for critical IT tasks, and more. Click here for our central COVID-19 resource hub.

 

 

FREE E-Signing throughout 2020!

In these trying times when the face-to-face signing of documents and contracts is no longer possible in many cases.

Nitro Sign is the smarter eSignature solution that keeps every business moving forward with 100% end-to-end digital document workflows from anywhere. Get documents signed smarter, faster and more securely – without the need for paper and pen.

FREE trial – for the whole year!

You can prepare your business now for the future of remote work with Nitro Sign Team FREE for the remainder of 2020! Get up and running quickly during these challenging times!

Here’s just some of the ways Nitro Sign can help your business!

 

What customers say

“We’ve already seen a positive impact from implementing Nitro Sign to facilitate everyday signature requests
that can now be completed much faster — and without involving paper.”

Adam Grainger
Chief Information Officer, Baker Tilly

Want to find out more?

Complete IT Systems can offer you expert advice on various homeworking and remote working solutions and how they could be effectively deployed in your business.

To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.

Help during the COVID-19 crisis

The expert team at Complete IT Systems are publishing a series of guidance and tips to help you and your business through this situation. This covers all aspects of quickly providing safe, comfortable and efficient home offices for your users, including data security, collaboration tools, laptops, desktops, print and consumables, support for critical IT tasks, and more. Click here for our central COVID-19 resource hub.

 

Back to work PPE packages

All businesses are now having to consider health and safety more than ever in order to create a safe and hygienic working environment for staff returning to work. Social distancing rules, sharing of equipment, positioning and cleanliness of desks and workstations, and educating staff about what they need to be doing are clear areas of concern.

To help with this, Complete IT Systems are offering 3 specially designed packages of workplace PPE materials:

Want to find out more?

Complete IT Systems can offer you expert advice on various PPE solutions and how they could be effectively deployed in your business.

To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.

Help during the COVID-19 crisis

The expert team at Complete IT Systems are publishing a series of guidance and tips to help you and your business through this situation. This covers all aspects of quickly providing safe, comfortable and efficient home offices for your users, including data security, collaboration tools, laptops, desktops, print and consumables, support for critical IT tasks, and more. Click here for our central COVID-19 resource hub.

 

Get back to work safely with thermal imaging smartphones

The award winning Cat S61 smartphone is a fast, smart and reliable solution to detect individuals with an elevated skin temperature.

Thermal imaging technology allows users to quickly and efficiently screen people from a safe distance as they enter anything from an office to a shop.

Those identified can then be tested medically and provided with the necessary assistance.

Want to find out more?

Complete IT Systems can offer you expert advice on various PPE solutions and how they could be effectively deployed in your business.

To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.

Help during the COVID-19 crisis

The expert team at Complete IT Systems are publishing a series of guidance and tips to help you and your business through this situation. This covers all aspects of quickly providing safe, comfortable and efficient home offices for your users, including data security, collaboration tools, laptops, desktops, print and consumables, support for critical IT tasks, and more. Click here for our central COVID-19 resource hub.