Forbes recently outlined how an organisation’s IT department should work more effectively within an organisation. While the article focused on the internal IT department, it applies equally to IT support partners such as MTG. Read more
In a recent blog post Microsoft set out some of its initiatives that will accelerate an organisation’s compliance with GDPR. Julie White, Corporate Vice President, Microsoft Azure & Security outlined the different solutions and she reiterated how Microsoft’s Cloud services will be fully compliant come May 2018.
This is timely, Gartner estimate less than 50% of organisations will fully comply with GDPR come May 2018. Microsoft has already set out its commitment to compliance; Azure, Office 365, Dynamics 365, Windows 10 and Enterprise Mobility will all be compliant by that date. This statement is also backed by Microsoft’s own contractual commitment to its customers.
In a previous post, we discussed some of the mechanisms an organisation can leverage to become compliant. One of the more recent announcements from Microsoft is the Risk and Compliance dashboard. The dashboard will help you identify your current level of compliance in a quantitative manner and recommend suggested actions.
Julia White of Microsoft commented:
We continue to innovate in order to make GDPR compliance easier for you to achieve. For example, later this year we plan to release a new dashboard that provides a quantitative assessment to help identify where you are in your journey to GDPR compliance. This upcoming release builds on the foundation of Office 365 Secure Score, launched earlier this year, to provide you greater clarity on your path toward GDPR compliance.
Given the growth in Office 365 for e-mail and collaboration, Azure for IaaS, and the advent of Windows 10 – the Microsoft suite of products remains an optimal solution for the enterprise. Apart from the obvious productivity, cost and a collaboration gains – the solutions will aide a company with its own compliance challenges, particularly those presented by GDPR. Manx Technology work with a number of customers transitioning to Office 365, but with a firm eye on GDPR compliance and Cybersecurity.
With GDPR (General Data Protection Regulation) looming, many organisations are busy trying to assess the impact on their business, the path to compliance and in many cases, the investment required – particularly in the context of IT and data. Given the complexities of GDPR and to some extent, the uncertainties in the context of IT, many businesses are weighing up the path to compliance and the cost. Whilst many see Cloud as having a bad rep, paradoxically – the use of Cloud services can actually aide compliance and reduce the burden on your business.
In previous articles, we have explained the benefits of internal network firewalls, also known as internal segmentation firewalls. The primary purpose is to secure internal network traffic, particularly between sites, functional areas or departments. Another common use is to provide an additional level of protection for sensitive areas of your network (i.e. databases, R&D) or high-risk areas (i.e. development environments, staging areas). Read more
When an organisation is considering outsourcing or augmenting its IT support function, the management will need to consider how any arrangement could effect the business. Common considerations include the impact on business processes, response times, the user experience, privacy, security and familiarity, when it comes to the nuances of the company or industry. Outsourcing needn’t mean a loss of control or a reduction in service, in many cases – there is a considerable upturn in user satisfaction, response times and service. Read more
GDPR poses many challenges – not least because the penalties are high! In amongst all the discussion and the rush for compliance, many businesses are not really focusing on the use of Cloud Applications. Cloud apps undoubtedly deliver real benefit to business, whether that is Office 365, Dropbox, Quickbooks etc. In many cases, using trusted cloud apps can actually aide compliance.
A key challenge for many organisations is the unknown unknowns. What Cloud Apps are being used by their staff and business – that they do not know about. This type of unapproved cloud usage is often described as Shadow IT. Apps that bypass IT, bypass procurement and often bypass the business. A CRM used by a key sales guy. Someone throwing files into Box to work from home. Someone else installing an app that accesses their contacts. The challenges are endless (which is a common theme with GDPR). Read more
We have seen a significant uptake of Cisco Umbrella, primarily because businesses are recognising the risks and prevalence of malware, viruses and ransomware – the recent press is evidence to that. We wrote a brief article about how to defend against Wanna Cry – Umbrella is part of our advice. For small businesses, Cisco Umbrella is a fantastic and relatively inexpensive service that provides a great level of protection. For larger enterprises with antivirus and existing firewalls, Umbrella significantly enhances the existing defence systems. In all cases, the service is straight forward to configure and use. Read more
Ransomware is a malicious piece of software designed to cause severe disruption and loss of service in return for ransom money. Your business is then forced to pay the attackers (usually in Bitcoin) to regain access to their files. The recent attack against the NHS and businesses in 90 other countries has made Ransomware at the forefront of every IT manager’s mind. The attack itself exploits a Microsoft Windows vulnerability that has been patched for some time – which emphasises the need for a comprehensive update regime.
Here are 12 steps that can help your business defend against WannaCry and similar Ransomware: Read more
We work with a growing number of small-medium businesses (SMB) who have a need to protect their businesses from hackers, ransomware and other threats. The majority of SMBs will have a router/firewall, but the primary purpose is to secure the business network. Nowadays, with more complex threats, the functionality of firewalls and routers has evolved to now include services such as intrusion prevention (IPS), antiviruses, web filtering and anti-spam; often – all in one box. Read more
Outsourcing your IT and technical support services to an external IT provider is one of the most common forms of outsourcing. Any company who is looking to outsource their IT helpdesk or IT support needs to understand the pros and cons of outsourcing. Read more