What is data poisoning, and how to stop it

Sounds vicious doesn’t it! But as we’ve been exploring, nothing is off limits to hackers. Here we focus on data poisoning and manipulation, and how to guard against it.

Gen AI that power AI tools, chatbots, search queries, and more, are known as large language models (LLMs). These LLMs are trained on vast volumes of data and then use that data to create more data, following the rules and patterns they’ve learned. Good quality data leads to good outcomes. Bad data to bad outcomes. It didn’t take cyberattackers long to figure out how to turn that to their advantage.

There are two broad categories of data attack: data poisoning and data manipulation. They are very different, but both undermine the reliability, accuracy, and integrity of trusted — and increasingly essential — systems.

This article from Barracuda gives you all you need to keep your critical systems safe.

Want to learn more?

Complete IT Systems have a team of Barracuda specialists on hand to demo the solution, discuss business benefits and help you understand how the technology works for your organisation.

To get in touch or request a demo please contact us.

Was your storage great in the 90s, but not so much now?

Even great things don’t last forever. So much so, an eye-opening 24% of organisations cite technology as a business inhibitor, according to research by Tintri.

Due to the need to support more remote workers, virtual environments, cloud migrations, handling larger data volumes, cybersecurity threats, and managing more endpoint devices, increasing demands are straining limited IT resources to the limit and can feel like pushing a boulder uphill.

But smart, AI-driven storage infrastructure can make a significant difference. By eliminating 95% of storage administration tasks, empowering IT generalists and freeing up storage experts, it’s possible to provide a better experience for all stakeholders.

This infographic from Tintri outlines four areas where Intelligent Infrastructure drives IT success.

Want to find out more?

As a Tintri Partner, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business. More information is available on our Tintri solutions page.
To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.

Tee off a new approach to DSARs

Data Subject Access Requests (DSARs) were first introduced in 1998, and digital technology has made requesting them easier over time. But it’s no perfect science.

In short, companies and organisations of all sizes need to know what they are, and what to do if you receive a DSAR. The problem is that incoming DSARs can become a hot potato and bounce around HR, legal, IT, data protection, compliance and even marketing departments without clear accountability or ownership.

The Information Commissioner’s Office (ICO) publishes a useful guide on preparing for subject access requests, with one of the requirements being that you carry out a “reasonable search for the requested information”. On top of that, the timeline to respond is one month.

So even if the Data Protection Officer (DPO) is ultimately accountable for the request, without the right processes or tools in place, finding the requested information can be a minefield. If you’re planning to ask IT, ask yourself how quickly they will be able to locate that information, or if they even have the tools to do so.

The risk of flying blind

According to Kingsley Napley, “technical support is frequently required to identify and review data, and legal input may be needed.” For example, if an ex-employee asks to see all emails and correspondence they were copied on over a two year period, this could be hundreds of thousands of emails, not to mention direct chats and team collaborations in platforms such as Microsoft Teams or Google Workspaces.

Data requests may not always be limited to DSAR cases. Enquiries include:

  • One employee is accused of sexually harassing another via their organisation’s Microsoft Teams chats.
  • Instances in which an organisation’s emails are being sent to an unusual address.
  • A director suddenly starts getting lots of unsolicited calls from recruiters.
  • A firm’s customers start being approached by its rival’s salespeople
  • An industry news outlet gets hold of sensitive proprietary information about a company’s new product.
  • After one company acquires another, ensure employees aren’t still using old terminology from the acquired business.

Join us in Glasgow on 2nd May to find out more

Join Complete IT Systems and experts from Cryoserver for an afternoon in the centre of Glasgow for some interesting discussions on how to get on the front foot with these kinds of issues. We’ll also play a bit of golf on the driving range and enjoy some good food and company. Find out how to quickly respond to requests and solve situations such as:

  • Searching through conversations for keywords or information, and provide for Legal teams to use as evidence in a tribunal.
  • Find out if an employee is sharing sensitive data (a breach of GDPR) with an unauthorised individual.
  • Discover if an employee has emailed the director’s number to multiple contacts.
  • See if the company’s confidential customer contact list has been attached to an employee’s email.
  • Find evidence of information being leaked by a particular employee.
  • There’s a claim of sexual harassment and you’re tasked with finding the emails in question
  • HR has to come to you to find emails from a specific employee
  • And many more cases!

Searching for and locating information might be considered IT’s responsibility, but it’s in the interest of the DPO, legal, compliance, HR, and even marketing’s interest to ensure the right processes and tools are in place as and when incidents do arise, and limit the organisation’s exposure in the process.

In a collaborative workshop environment, we’ll share some live examples, and encourage you to do the same to see how easy it can be to make a difficult task much simpler.

 

📅 Thursday 2nd May, 2024      ⏲ 3pm to 7:30pm     📍 Topgolf Glasgow

 

Lunch and refreshments will be provided, and we’ll also test our handicap at Top Golf Glasgow. See their short video below 👇

We hope you can join us for a fun and informative day! Please contact us if you have any questions about the event, or need a hand with your business case for joining,

Kind regards,

The Complete IT Systems Glasgow Team

Phone: 0141 468 8330

Inference and legacy storage – the potential pitfalls

A significant shift is underway that is changing the way applications are deployed – it’s known as inference. This article explores the concept, and how to prepare.

According to DataCamp, Machine learning inference is crucial because it allows the model to be used for real-world use cases such as predictions, classifications, or recommendations. In other words, inference is how AI models decipher information or put in even more simple terms, it makes data usable.

How is inference changing things?

The emergence of highly sophisticated inference applications is reshaping the market landscape. These advancements necessitate finely tuned platforms supported by intricate distribution systems. With careful architectural planning, businesses can achieve remarkable leaps in efficiency, yielding undeniable long-term economic advantages.

To meet the demand for these mission-critical applications, we anticipate a revolutionary evolution in application delivery platforms and innovative availability frameworks. The year 2024 is poised to experience a surge in platform demands reminiscent of the late 1990s.

Undoubtedly, our world for the most part operates under the mantra of accomplishing more with fewer resources. This principle is particularly relevant in the realm of AI. Inference applications, known for their resource demands, pose a significant challenge for businesses striving to remain competitive amidst the necessity for costly and expansive systems.

Presently, managing AI processes and applications relies on specialised operators, intricate networking setups, demanding co-computing requirements, and sophisticated storage solutions. The application and data delivery landscape is changing – are you ready for it?

So what’s not to love?

That’s the good news. Needless to say with opportunity comes threat, and cyber criminals are also getting in on the act. This year will see new and undiscovered attack vectors leveraging the intelligence and power of AI. Find out more – and how to solve it – in this article from Tintri.

Want to find out more?

As a Tintri Partner, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business.

To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.

How circular is your business?

Circularity means different things to different people. No one business is at the same stage when it comes to sustainability, and this means a range of solutions are required to embrace a circular economy.

From the desire for more efficient solutions to drive sustainability goals, implementing sustainability targets, or looking to make a start on the circular journey, adopting the philosophy of ‘reduce, reuse and recycle’ is a great start to a more sustainable future for your organisation.

This article from Lenovo discusses what circularity means for your organisation and how you can take the next step.

Want to learn more?

Complete IT Systems have a team of Barracuda specialists on hand to demo the solution, discuss business benefits and help you understand how the technology works for your organisation.

To get in touch or request a demo please contact us.

Remember AOHell? How hackers are using AI for phishing

Phishing attacks are one of the most successful and damaging types of threat activity, and they have been that way for a long time.

The first attack recognised as phishing was launched in 1995 using a Windows application called AOHell that targeted users of the America Online (AOL) service. It exploited vulnerabilities in AOL’s software to steal passwords and credit card numbers, send mass phishing emails, and creating fake accounts. Since then, nothing has been off limits to hackers.

So it’s only natural that now AI tools are here, hackers are able to exploit them for phishing and other malicious activity. This article from Barracuda looks into how phishing attacks have evolved over time, and how to combat them affecting your business through GenAI.

Want to learn more?

Complete IT Systems have a team of Barracuda specialists on hand to demo the solution, discuss business benefits and help you understand how the technology works for your organisation.

To get in touch or request a demo please contact us.

 

The good and the bad of cloud storage spending

Cloud storage remains an essential ingredient in modern IT infrastructure environments.

The data is clear. Enthusiasm for cloud storage is on the rise. Respondents overwhelmingly predict they will increase their data storage in the cloud in 2024, with a 9% increase compared to last year.

However, there’s a good and a bad of cloud storage spending.

The bad? 53% of organisations exceeded budgeted spending on public cloud storage in 2023.

The good? Excess spending isn’t always because of fee structures and billing complexity. Growing utilisation of cloud storage services and data are two of the leading reasons why organisations are exceeded budgeted spend on cloud storage in 2023 – which indicates they are getting more value out of their data and service(s).

Find out more

As Wasabi partners, Complete IT Systems have the skills and resources to help your business implement the best solutions for the modern workplace. For more information on how Complete IT Systems and Wasabi can help, call 01274 396 213 or email .

 

Storage stuck in the 90s? How VM-aware storage unlocks DevOps’ potential

Even the best things don’t last forever, and storage is no different. This week we’re talking about DevOps and your data centre.

DevOps, when implemented correctly, has a positive impact on how work gets done. A successful DevOps implementation leads to expedited workflows, quicker troubleshooting, improved communication, and better results overall. Businesses are facing rapidly changing data requirements and there are a few areas of focus that should prompt DevOps teams to consider what methodology works best to meet their business goals moving forward.

Find out more about how the real-time analytics and automation of Tintri VMstore’s VM-aware technology can unlock the full potential of your DevOps environment, providing unparalleled productivity and agility.

Want to find out more?

As a Tintri Partner, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business.

To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.

Closing vulnerabilities in your apps

Web apps allow users to work faster and more flexibly. They also contain vulnerabilities hackers can – and do – exploit.

To give you some context, in 2023, web applications were the main means of breach hackers used. They featuring in 80% of incidents and 60% of breaches.

Why web applications are a top target for attack

First, many web applications carry vulnerabilities or configuration errors. Second, many contain extremely valuable information, such as personal and financial data. A successful breach will give attackers direct access to that data. Barracuda research shows that 40% of IT professionals who’ve been involved in ethical hacking believe web application attacks are among the most lucrative for cyber-attackers, and 55% say the same for APIs.

How to close vulnerabilities

This e-book takes an in-depth look at three critical attack vectors — API vulnerabilities, bot attacks, and client-side attacks — as well as how organisations can fill the gaps in their application security and protect against these evolving threats.

Want to learn more?

Complete IT Systems have a team of Barracuda specialists on hand to demo the solution, discuss business benefits and help you understand how the technology works for your organisation.

To get in touch or request a demo please contact us.

March special £100 printer cashback – offer ends soon!

Brother are offering some great printer cashback deals on colour laser, mono laser, inkjet, scanners and labellers this March

Your business can now claim up to £100 cashback or free 3 year warranty on selected devices! This special offer is only available until 31st March, so don’t delay!

Contact us today to learn more about the promotion, what your business can earn, and how we can help you to claim your cashback.

Find out more

Get in touch to find out how Brother solutions can help you improve your business’s resilience.