Closing vulnerabilities in your apps

Web apps allow users to work faster and more flexibly. They also contain vulnerabilities hackers can – and do – exploit.

To give you some context, in 2023, web applications were the main means of breach hackers used. They featuring in 80% of incidents and 60% of breaches.

Why web applications are a top target for attack

First, many web applications carry vulnerabilities or configuration errors. Second, many contain extremely valuable information, such as personal and financial data. A successful breach will give attackers direct access to that data. Barracuda research shows that 40% of IT professionals who’ve been involved in ethical hacking believe web application attacks are among the most lucrative for cyber-attackers, and 55% say the same for APIs.

How to close vulnerabilities

This e-book takes an in-depth look at three critical attack vectors — API vulnerabilities, bot attacks, and client-side attacks — as well as how organisations can fill the gaps in their application security and protect against these evolving threats.

Want to learn more?

Complete IT Systems have a team of Barracuda specialists on hand to demo the solution, discuss business benefits and help you understand how the technology works for your organisation.

To get in touch or request a demo please contact us.

What is Zero Trust, and how to build your roadmap

Zero trust is an architectural approach where inherent trust in the network is removed. This means network is assumed hostile and each request is verified based on an access policy. It is a multi-layered approach to fending off modern cybersecurity threats. The National Cyber Security Centre provides a comprehensive Introduction to Zero Trust.

Now that remote work is the rule rather than the exception, it’s time to protect your assets and resources using modern Zero Trust protocols and solutions.

Implementing your Zero Trust strategy

Implementing a Zero Trust Network Access strategy is not overly complex or difficult. The key is to follow best practices and avoid the pitfalls that can leave digital resources exposed to threat actors.

Get the info you need to make it happen. Watch this on-demand webinar from Forrester to see what the experts from Forrester Research are saying about Zero Trust. The webinar summarises, unpacks, and presents the key findings in the report.

Click the image below to watch the webinar (you will be asked to enter your email address).

Want to learn more?

Complete IT Systems have a team of Barracuda specialists on hand. They can demo the solution, discuss business benefits and help you understand how the technology works for your organisation.

To get in touch or request a demo please contact us.

Survey results: The top endpoint security challenges for UK businesses

We recently asked around 3,000 of our customers and prospects to tell us about some of their biggest endpoint security concerns. Specifically, we wanted to know how secure these IT professionals felt about the data on their users’ endpoint devices.

Most organisations indicated they were using some kind of endpoint backup provider. However, this did not stop them from expressing concerns, and in many cases indicating their intention to look for a more complete data protection solution at the device level.

Cybersecurity and compliance

The main pain point the respondents identified was the threat of compliance issues, fines, or threats to their business’ reputation from security incidents.

Other recurring themes in respondents answers were:

  • Inability to deal with the latest evasive threats
  • Limited visibility into what’s happening on my endpoints

Most of our respondents indicated that they did not lack the specialist technical skills or capacity needed to deal with escalated threats within their teams. Instead, the concerns were focused on the ability of endpoint providers to stay ahead of threats, and having the visibility to deal with them.

The right cybersecurity tools

Our survey results indicate that SMBs and mid-size enterprises in the UK know they are at risk from new, unknown, and evasive threats such as unknown malware, ransomware, financial, and other spyware that can bypass automated security barriers. Having best-in-class tools in place to quickly identify, analyse, and respond to known, unknown, and evasive threats – all without straining your limited time and resource – is vital.

Your business can maximise its levels of cybersecurity preparedness with Kaspersky Optimum Security.

Find out more

If you would like to speak with a member of the team with further questions about user cybersecurity awareness or Kaspersky’s solutions in the meantime, please call your account manager or 01274 396 213 and we will be able to help you.

 

google-site-verification: google91fa2f9176c25281.html

Cybersecurity training: give your users the freedom to perform

 

Great technology exists in many companies. But in this new era of remote working and home working, users must be equipped with the cybersecurity skills to use it confidently. The right cybersecurity training delivers that, and also increases security awareness amongst your employees, boosts morale and contributes to a better work culture.

Just like other training, learning cybersecurity skills is less effective if courses are old-fashioned, lengthy, technical and uninspiring. Security awareness training should be continuous, with a clear programme structure, and smaller step-by-step lessons that stimulate the necessary behavior and motivate your employees to detect and report real attacks.

Giving your employees the freedom to perform will have widespread benefits for your business – well-trained employees safeguard your company by reducing security incidents, improving uptime and efficiency across your organisation. It can also serve to reduce shadow IT, and inspire efficient working practices, file sharing and collaborative methods.

How Kaspersky ASAP breaks down barriers

Unlike ‘ordinary’ training content, Kaspersky ASAP is built around over 20 years of experience and a specialist skillset in security.

Kaspersky know precisely which skills users should develop in order to behave safely and safeguard your business; and these topics are built directly into training content, divided by topics and levels. It makes training comprehensive, yet engaging for learners of all levels.

This overcomes a number of important training barriers. Read on to find out how.

Want to find out more?

As Kaspersky Gold Partners, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business.

To find out more or request a free trial, please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.

Strengthen user cybersecurity awareness to protect business finances

 

 

In a series of forthcoming articles and resources, Complete IT Systems and Kaspersky will be guiding your business through how to build your users’ cybersecurity awareness. The next article in the series focuses on how user awareness can affect business finances.

Human factors in cybersecurity

There are a lot of stats out there about cyberthreats – we recognise that. But specifically for small businesses in the UK, there are four in particular that should be noted:

  • 60% of employees have confidential data on their corporate devices (financial data, email database, etc.)
  • 30% of employees admit that they share their work PC’s login and password details with colleagues.
  • Last year, 43% of cyberattacks targeted small businesses
  • For SMBs, the average annual financial impact of data breaches caused by inappropriate IT resource usage by employees is around £75,000 ($98K). On top of this, the physical loss of company owned devices or media costs a further £80,000 ($105K).

Close to home

In other words, these aren’t random global statistics about data breaches targeting the likes of Google, Facebook or other household names. These are real data breaches happening to small and medium sized UK firms.

In fact, in the UK, the Information Commissioners’ Office reported that 88% of data breaches in the country over the past two years were caused by human error, rather than by hacker attacks*.

Take action – get your users clued up on cybersecurity

The stats show the harsh reality that, completely unwittingly, users are directly or indirectly responsible for the vast majority of company data breaches in the UK.

Read this guide from Kaspersky to start managing the human factor in your company’s cybersecurity strategy.

Want to find out more?

As Kaspersky Gold Partners, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business.

To find out more or request a free trial, please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.

References

“Sorting out a Digital Clutter”, Kaspersky, 2019.
“Measuring & Managing the Cyber Risks to Business Operations”, Ponemon Institute LLC, Dec 2018
“2019 Data Breach Investigations Report” Verizon
“On the Money: Growing IT Security Budgets to Protect Digital Transformation Initiatives”, Kaspersky, 2018

Coronavirus and cybersecurity – what’s the impact in the UK?

Arguably, the cyber security industry has never had a more important role to play than keeping mission-critical organisations and agencies safe from cyber attacks during the COVID-19 pandemic.

And this is especially true for the UK, which has by far the highest number of reported instances in the world of malicious spam emails with ‘coronavirus’ in the subject line.

This article was previously published here. On our COVID-19 resource hub, we have a range of cyber security options and services to keep your business’ valuable data safe on cloud applications, including BitDam for Microsoft Teams and Zoom, Barracuda firewalls, and Datto SaaS Protection for Office 365.

Cyber threat actors are actively attacking the World Health Organisation (WHO) and there has been a rise in scams touting fake cures for the novel coronavirus, said Paul Dwyer, CEO of Dublin-based Cyber Risk International, which specialises in developing corporate cyber defence programs. Dwyer was the guest on this week’s edition of Task Force Seven Radio, with host, George Rettas, the president and CEO of Task Force Seven Radio and Task Force Seven Technologies.

At the same time as the attacks are occurring, “we’re also seeing the ingenuity, the collaboration, the people putting egos to one side and just trying to work together to come up with solutions,’’ said Dwyer, who is also president of the International Cyber Threat Task Force.

He said cyber security professionals play an integral role in helping find a cure for the coronavirus. “At the end of the day, the solution is going to come from a line of code or some sort of system that has been supported from an IT perspective, and that means that it has to be secure,’’ Dwyer said.

There is also a realisation “that national borders don’t matter anymore,’’ he said. “It’s about humanity being connected and trying to deal with this threat, and the solution will lie in the ability to be able to communicate effectively, to be able to analyse data, to be able to distinguish between fake and real and be able to end this. I do believe it’s bringing out the best and the worst in people.”

Noting that there is a huge focus on hand washing right now, Rettas asked Dwyer to discuss the parallels that can be drawn between that and good cyber hygiene.

Just as there are contagion factors that can be caused by someone who is infected with the coronavirus, Dwyer said, a system can be infected malware when basic controls such as patching and applying updates are not practiced.

One small player can cause a widespread cyberattack, Dwyer said.

“I’m unfortunately putting out a bit of a negative message, a warning, to people saying all these bad guys … have been holding off,’’ he said. Then he issued a dire prediction.

“The big one is going to happen in relation to the financial sector in particular, because [hackers are] highly organised … The general defences of cyber hygiene stops most attacks as we all know, but the big organised guys, — we can see that they’re rubbing their hands and they’re getting ready to make moves and more sophisticated moves on the larger targets.”

But beyond the financial sector, Dwyer said he believes healthcare remains a big target too.

The Geopolitics Of Cyber Security

The conversation then turned political and after Dwyer mentioned he has interviewed National Security Agency whistleblower Edward Snowden, Rettas said he couldn’t “ squander the opportunity” and asked Dwyer for his thoughts about Snowden’s actions.

“I think he did the world a favour,’’ Dwyer replied. “I’ve interviewed him twice. Supremely nice and intelligent guy … I understand his motivations and his passion.”

Dwyer went on to say that Snowden brought “attention to the fact that things were going on that shouldn’t be going on,” and that “he’s done the world a favour and he’s given us a chance to reflect upon privacy,” which he said he advocates for.

In response to a question by Rettas about Snowden’s future, Dwyer said he believes he’s willing to come back to the US “as long as there’s a guarantee that he won’t be tortured.” He added that depending on becomes president after the 2020 election, he might even be pardoned.

Rettas then pivoted the conversation back to the fact that geopolitics plays a big role not only in issues like that, but in the country’s response to the COVID-19 virus as well. He asked whether it’s important for a CISO to understand geopolitics?

Dwyer responded that it absolutely is and noted that a lot of hackers’ actions are motivated by “national pride.”

He likened hackers to “being on the Olympic team of their country,” and said that “when we saw lots of hacking coming in from China and … still do obviously, a lot of this was about nationalistic pride. It wasn’t about making money. It wasn’t about scam artists … whether it was Russia, whether it was Nigeria, a lot of it was just about nationalistic pride.”

Dwyer also said he thinks in every crisis and every challenge, there’s an opportunity, and the COVID-19 virus presents both.

When he founded the International Cyber Threat Task Force, he said that “one of the goals was to form an organisation where all the good guys can work together” and share knowledge with “the right kinds of people” and train together with the goal of disrupting cyber attackers.

CISOs And Risk Management

Rettas noted that Dwyer advises CISOs all over the world, and that risk is a big part of their jobs, “but effective CISOs really map the residual risk of controls back to their business objectives.” This is a language that corporate boards understand, Rettas pointed out, and it also helps the CISO gain credibility. He asked Dwyer to discuss how a CISO determines what metrics should be communicated to the board and how the net message should be crafted? And, if a CISO is not a risk professional, can they even do their job?

Dwyer said that meaningful metrics are when a CISO is able to tie any residual risk identified back to the key objectives of the business. “So, if the business objective is it wants to roll out a new app or it wants to get X thousand customers onto an online system, and you’ve identified that there are cyber risks around that and you’re able to quantify those — not subjectively, but empirically actually put numbers on those and have science behind it — then the business will eat that up.”

The solution, he continued, “is to marry the principles of security risk management.” That means have security practices around confidentiality, integrity, and availability, and incorporating them into a risk management program that the business will understand, he said. To make this happen, CISOs absolutely have to understand the business they are in, Dwyer stressed. It’s not enough to say, “Oh, I’m business aligned. They don’t even know what business aligned means,” he said.

Admitting that what he was about to say makes him “lose friends,” Dwyer then posited that “cybersecurity doesn’t belong to the CISO. It belongs to the CEO … I always feel that cybersecurity should be integrated as part of the enterprise risk management program.”

And, he added that a CISO should not be working under the CIO since they’re trying to innovate and keep systems running.

A CISO should report to the enterprise risk manager, and ultimately, the executive board and the CEO, Dwyer said.

At the end of the day, the CISO “is as much a salesperson as a politician, as a subject matter expert. And it’s a business leader position,’’ he said. “That person needs to be able to sell ideas within the organisation … be able to collaborate, be able to join people together with different opinions, to be able to support and understand the business model.”

A CISO is “sometimes a person with a big personality, sometimes a person that’s good with people, a good communicator, good business [savvy],’’ he added. “They’re very important skills that a CISO should have.”

Help during the COVID-19 crisis

The expert team at Complete IT Systems are publishing a series of guidance and tips to help you and your business through this situation. This covers all aspects of quickly providing safe, comfortable and efficient home offices for your users, including data security, collaboration tools, laptops, desktops, print and consumables, support for critical IT tasks, and more. Click here for our central COVID-19 resource hub.

 

Cybersecurity in the workplace – educate & protect your users

Employees are of course your company’s most valuable asset, and grow revenue, build relationships with clients, and, make the business function. They also have an invaluable role to play in the firm’s security perimeter.

Cybercriminals, however, are more likely to view your employees as the path of least resistance into an organisation. Indeed, two of the top causes of security breaches are careless or uninformed employee actions and phishing or other social engineering. Cybercriminals know that, and they use it to their advantage.

With a robust security education programme in place, your company can protect its most sensitive information by ensuring cybercriminals cannot break through your employee firewall.

With a lot of customers and prospects asking about cybersecurity best practices for their workplaces, here’s a summary of some of the main ones.

What type of cybersecurity awareness programme would be best for our business?

Cybersecurity awareness programmes are not one-size-fits-all. Every organisation will have different needs depending on their business strategic goals, objectives, risk analysis, and even risk appetite. So, it’s useful to ask how cybersecurity helps the primary business of the organisation, and if it meets your particular requirements.

From a cybersecurity perspective, what should we think about when securing our workplace?

Organisations often overlook three areas when thinking about cybersecurity:

  1. The role of IoT: The well-being of employees should be at the forefront of every organisation’s plans for cybersecurity. This may not seem intuitive when thinking about cybersecurity, or very cyber to most. But the increasing prevalence of Internet of Things (IoT) devices has blurred the line between physical security and cybersecurity. Wireless security cameras that are managed through a Web interface or a smart lock that is opened by an employee’s smart phone — when do things stop being physical and start being cyber? Many companies have traditional physical security and environmental controls in place, but these groups are disconnected from the real problem solvers. In an IoT age, cybersecurity and IT teams are responsible for remediation efforts. In the workplace, these systems often share the same network resources as the rest of the business. Connecting IoT devices to the main network is risky because it provides an entry point for potential attackers to access corporate network resources. Vulnerable systems can also be used to access poorly secured industrial control systems (ICS). For organisations that run critical infrastructure or manufacturing on ICS, an in-depth search of all systems involved should be performed. These networks should also be included in any cybersecurity efforts going forward.
  2. Situational awareness of assets and data. Most cybersecurity frameworks rest on knowing what assets (including data) an organisation has: the systems and applications that process the data, who has access, and where it resides. A cybersecurity risk assessment based on known assets will allow for a more thorough way to determine viable threats. This enables an organisation to focus its cybersecurity resources where they matter most.
  3. Cybersecurity awareness and training: Awareness extends beyond discovering and cataloging assets. Awareness should be a continual effort to educate employees on policies, current threats, and how to deal with those threats. Special focus should be paid to social engineering, which is still the most common and successful attack vector. Organisations should offer training geared toward certain roles, not just generic awareness training. Make the training personal and fun. Tell stories and play educational games that will support awareness concepts. An awareness program should be anything but a test. A good cyber programme features a mixture of in-person/instructor-led, online/self-paced modules, scenario-based, and surveys. Always gather metrics to show successes and weaknesses in security awareness programs.

Our IT team is already well informed about cybersecurity. Why should they undergo more training?

Regular education on cybersecurity hygiene should be common practice across the organisation. Employees are often referred to as the “weakest link,” but in actuality, they are the most common attack vector and should be treated like any other attack vector in the organisation.

We have run a few training programmes already, but none seem to be effective. What should we be doing?

It’s no secret that traditional training programs typically fail to achieve the desired behavioural changes or motivation. To build an effective educational programme, there has to be an understanding of what lies behind any learning and teaching process. For a successful cybersecurity awareness program, the key is to create a culture of cybersecurity — one that motivates employees to continue secure practices in their daily lives beyond the perimeters of the office. After all, the goal of awareness training is not only to deliver knowledge but to change habits and form new behaviour patterns.

The  Kaspersky Security Awareness products are a good place to start or to fill in gaps in an existing programme. The computer-based training products draw on modern learning techniques: Gamification, learning-by-doing, and repeated reinforcement help to build strong skills retention and prevent obliteration; and emulating the employee’s workplace and behaviour draws users’ attention to their practical interests. These motivating factors guarantee that the skills will be applied.

How often should employees be reporting suspicious activity?

Cybersecurity teams would rather have employees report a false positive than wait until something “suspicious” manifests into a large threat. But before employees can report suspicious activity, they need to be able to identify what is considered suspicious.

A robust cybersecurity awareness training programme and its reinforcement materials should define suspicious incidents through examples, and how and when to make a report. Employees should then be encouraged to report any activity that may seem suspicious. Different procedures exist for incident reporting. Some organisations use the IT service desk, others have an email that generates a ticket for the security teams, and some may require employees to report the incident to their managers.

Once employees are knowledgeable in identifying and reporting suspicious activity, the next step is to establish incident response policies. Incident response policies should outline procedures and employee responsibility when dealing with an incident.

The message to emphasise is that it’s easier to nip something in the bud even if you’re not sure if it’s a cyber threat than to manage a crisis in full bloom.

How does BYOD impact cyber security policies?

Bring your own device (BYOD) has become an increasingly popular approach in UK business. Employees get to enjoy the flexibility of choosing when to work and what device to work on, and employers benefit from reduced support costs for IT assets.

However, a poorly managed BYOD policy can put company data at great risk. Allowing employees to use their own devices for work means their devices are “out of view” of traditional security controls.

And while not all businesses need end-to-end BYOD policies, it is crucial that they establish safety policies and procedures. For example, they need to segregate work and play. Company data should be processed only by applications that are vetted and secured by the organisation. This may seem challenging when users are on their own devices. Thankfully, mobile device management (MDM) tools exist. MDMs can segregate and secure company data, vet and approve applications, and track and remotely wipe devices of all company-related information.

Where can I find more resources for continued education on cyber security?

Kaspersky Lab offers various resources for maintaining ongoing awareness of threats and incidents in the world of cybersecurity. You can read about some of these, or contact Complete IT Systems using the details below to discuss your requirements and for more advice about the solutions on offer.

  • Threatpost is a leading source of information for news about IT, business security, and cybersecurity analysis.
  • Securelist provides news, reports, and fascinating research in the cybersecurity industry.
  • The Kaspersky Lab threats site is constantly updated with the ever-changing landscape of threats and vulnerabilities in cybersecurity.
  • The Cyberthreat real-time map is an interactive tool that visualizes real-time cyberthreats around the world.
  • And, of course, Kaspersky Daily, our main blog, has posts relevant for businesses and consumers.

Want to find out more?

As Kaspersky Platinum Partners, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business.

To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.

Make sure your emails don’t let you down

With cybercrime on the rise and more and more employees and contractors working “on the go”, it’s more important than ever to have the right email security in place for your business.

From your inbox to your employees, you need to know that every avenue a hacker could take is blocked. But with increasingly sophisticated attacks, that’s easier said than done.

Barracuda Total Email Protection ensures your organisation is secured against email-borne threats. Its multi-layered approach combines the most advanced protection available with the radical simplicity and ease of use that Barracuda’s known for.

How easy is it to deploy?

From the IT department’s perspective, you can also avoid the integration chores, uncertain support, and risk that come with building your own solution using point products from unproven startups. The full portfolio of data protection capabilities provides resiliency, and easy recovery from ransomware and accidental data loss, leaving your firm’s email security in the very best hands.

 

 

Want to give it a try?

If you would like to try the solution for yourself, please click here to request your free evaluation.

Further information

The below assets are available to make sure your business is well informed – and safe.

As Barracuda Diamond Partners, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business.

To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.

Why are mobile devices like a needle in a haystack for IT?

When your business depends on response speed and access to data and email, ‘on the go’ availability is a must. However, more access brings more mobile data security threats. That is why it is rational to assess risks and have a well-thought-out protection strategy before adopting mobile device usage across your business.

As part of our series of blogs highlighting the pitfalls of cyber security for business, this week we’re looking at why mobile devices with access to business data can prove to be a needle in a haystack for IT to keep track of.

Mobile devices – a needle in a haystack for IT

An employee’s mobile device is an interesting target to a broad array of cybercriminals. Some are looking for corporate intellectual property (and according to Kaspersky’s “IT Security Risks Survey 2018,” employees in 1 in 5 enterprises access corporate intellectual property using their personal mobile devices and tablets). Others think that your contact list is good loot — it can be used for spear-phishing attacks on your colleagues.

While those are rather exotic threats, don’t forget about more widely distributed malware that doesn’t target a specific business. Last year, our systems registered 42 million attempted attacks on mobile devices. They included a variety of Trojans that tried to hijack social media and bank accounts, ransomware, and more. They may not sound as scary as targeted attacks, but they can cause plenty of harm, especially if the accounts in question are corporate ones, and the situation is especially common in small and medium businesses.

Mobile specifics

The main problem with mobile devices is that they do not stay inside a company’s security perimeter, which makes pinpointing the threats akin to searching for the proverbial needle in a haystack for IT. They can be exposed to unsecured public Wi-Fi or just be lost or stolen. When employees use the same device for both work and personal activities, more problems pop up. An employee might accidentally download a compromised application preloaded with a spying module or ransomware, for example. They might try to root or jailbreak their device and expose it to even more threats.

Some of the problems with mobile data security — unfortunately, not all of them — can be solved with mobile device management and enterprise mobility management solutions. To resist sophisticated malware, companies need an additional level of protection.

How to prevent business mobile security breaches

Kaspersky’s ‘Security for Mobile’ solution was recently updated to include machine-learning-assisted technologies with cloud-based threat intelligence mechanisms to bring threat prevention, detection, and remediation to mobile platforms and thus keep your business information safe.

For example, Kaspersky Security for Mobile can detect if an employee’s smartphone or tablet is jailbroken or rooted (bad enough if the employee did it, but worse if done without their knowledge). Our solution also provides application control, Web traffic control, antiphishing, and antispam subsystems to corporate devices.

Kaspersky Security for Mobile integrates with Microsoft Exchange ActiveSync, iOS MDM, and Samsung KNOX platforms; and Kaspersky Security for Android (a part of this solution) is also compatible with VMware AirWatch and MobileIron. That compatibility allows your IT staff to configure and control security management for most widely used mobile devices.

Want to find out more?

As Kaspersky Platinum Partners, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business.

To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.

Building security awareness with your employees

We’ve all seen the news about cyber attacks costing businesses of all sizes millions of £, not to mention the reputational damage that comes with losing customers’ data. Even taking into account that some of this may be “hype”, the fact remains that the number and sophistication of cyber attacks on UK companies continues to increase.

Shortages of cybersecurity skills

Yet 82% of UK employers have reported shortages of cybersecurity skills in their companies. This can be for a number of reasons, such as adjustments to remote working, a lack of time or budget, or simply due to a lack of recognition of the importance or need. Furthermore, choosing the right security solutions can be time-consuming, and in a crowded marketplace it is not always easy to evaluate the best solution for your business.

How Caledonian Consumer Finance addressed the problem

During a recent webinar, Darryl Wiffen, IT Support Technician from Caledonian Consumer Finance, described his journey with Complete IT Systems and Kaspersky, and what they were looking for from their solution provider and security platform.·

The solution

With NEW Cloud Discovery (part of Kaspersky Endpoint Security Cloud), Caledonian Consumer Finance can:

• Know which cloud services their employees are using on their work devices
• Block prohibited cloud use automatically
• Uncover new potentially malicious cloud services

Cloud Discovery isn’t the only life-changing tool in the Kaspersky Endpoint Security Cloud arsenal. With SharePoint and Teams now in common usage, the need for a dedicated cybersecurity solution for Microsoft Office 365 has never been greater. That’s why we’ve added Kaspersky Security for Microsoft Office 365.

Watch the webinar

Watch the webinar here and see for yourself how much easier life can be with the right cybersecurity technologies in place for your users.

Want to find out more?

As Kaspersky Gold Partners, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business.

To find out more or request a free trial, please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.