Microsoft Azure Archives - Thrive https://thrivenextgen.com/category/microsoft-azure/ NextGen Managed Services Provider Tue, 01 Aug 2023 15:02:50 +0000 en-US hourly 1 4 Steps to Improve Your IT Decisions https://thrivenextgen.com/4-steps-to-improve-your-it-decisions/ Mon, 20 Jun 2022 16:48:16 +0000 https://thrivenextgen.com/?p=22872 Businesses are rarely successful without the ones steering the ship having the ability to make great decisions. Whether it’s managing your workforce, supporting your customers, or procuring the right equipment to best facilitate productivity, good…

The post 4 Steps to Improve Your IT Decisions appeared first on Thrive.

]]>
Businesses are rarely successful without the ones steering the ship having the ability to make great decisions. Whether it’s managing your workforce, supporting your customers, or procuring the right equipment to best facilitate productivity, good decision making will be at the heart of any organization’s success. Let’s examine how you can make better decisions as they pertain to your technology solutions.

The most important part of procuring any new technology solution is how it will impact your workflow. With so many technology solutions out there, you need to implement those that make sense for your business. To ensure this happens, consider the following four suggestions.

Consider Alternative Costs

Implementing a new solution is wonderful, but only if your staff know how to use it. If you try to implement a solution to enhance productivity, you’ll need to also consider the return on investment in terms of how much time you’ll have to spend getting your team on board with it, along with the time spent training and testing your staff on its use. It might not seem like an immediately apparent cost, but we assure you it is a very real one.

Involve the Right People In the Discussion

When discussing new technology implementations, it’s important to get the perspectives of the people who will be using it. This might mean asking your staff, particularly experienced employees, or other stakeholders and management. With these valuable perspectives on your side, you’ll be able to make the most educated decisions possible about any new technology implementation project.

Choose Your Partners Carefully

When it comes time to add new solutions to your infrastructure and processes, you’ll want to work with businesses that have your company’s best interests at heart. In other words, the vendors you work with should be invested in your company’s success rather than just looking for their next big sale.

Remember to Set Achievable Goals

Without realistic and achievable goals, any new technology implementation will be doomed to failure. Big changes might be a big deal for your business, but only if they have direction. Otherwise, you could wind up being mired in the processes that drag your business down and prevent it from making any forward progress. With clear objectives and goals, you’ll be able to optimize your chances for success.

When it comes to implementing new technology, it’s best to leave this important task to professional technicians with years of experience and expertise. Thrive can consult your organization on the best path forward. Contact Thrive to learn more about what we can do for your company.

The post 4 Steps to Improve Your IT Decisions appeared first on Thrive.

]]>
Responding to Cyber Attacks Abroad https://thrivenextgen.com/responding-to-cyber-attacks-abroad/ Tue, 14 Jun 2022 15:50:29 +0000 https://thrivenextgen.com/?p=22801 Amidst Russia’s attack on Ukraine, one may find it unsurprising to hear of Russian cyberattacks targeted at weakening infrastructure in Ukraine. While some efforts have successfully infiltrated Ukrainian networks and wreaked havoc on the lives…

The post Responding to Cyber Attacks Abroad appeared first on Thrive.

]]>
Amidst Russia’s attack on Ukraine, one may find it unsurprising to hear of Russian cyberattacks targeted at weakening infrastructure in Ukraine. While some efforts have successfully infiltrated Ukrainian networks and wreaked havoc on the lives of citizens, Russia’s cyber attacks can best be described as trench cyber warfare and have most affected small business owners, localised infrastructure, and influential individuals. 

Strontium, a group known also by the names Fancy Bear or APT28, has been specifically targeting Ukrainian infrastructure entities as well as EU & US government bodies involved in foreign policy decision making. After successful breaches outside of the conflict zone were identified, governments and private companies alike have stepped up to help curb the success and influence of Russian hackers. 

NCSC Advisory

On the 11th of May, the National Cyber Security Centre (NCSC) jointly issued an advisory for service providers and their customers, outlining steps to better protect themselves in light of Russia’s attacks on Ukraine. This advisory was pushed alongside the UK’s partners in the US, Australia, Canada, and New Zealand, and urges MSPs and their clients to strongly consider implementing the following procedures:

  • Enable and contractually require MFA on all customer services and products
  • Conduct rigorous security risk assessments across all groups to identify vulnerabilities and prioritise resource allocation
  • Enable monitoring and logging 
  • Keep log records for at least 6 months, as there is often a lag between when a breach occurs and when it is detected

US Department of Justice (DOJ) Efforts

The US DOJ successfully disrupted thousands of internet-connected firewall devices that had been compromised by the alleged GRU-sponsored group, Sandworm. Following a court-authorised procedure, the National Security Division of the DOJ targeted a range of Command and Control (C2) servers that were operating the botnet by closing the external management ports which Sandworm had originally used to access them.  

Help from Microsoft

Since 2016, Microsoft has been working to dismantle Russian GRU-connected actors such as Strontium and Sandworm. Through a specially designed legal process established to enable Microsoft to receive quick access to the resources needed to disrupt these groups, they have successfully seized control of over 100 Strontium-controlled domains on 15 separate occasions alone. 

CISA

Cybersecurity authorities in the US, Canada, Australia, New Zealand, and here in the UK jointly issued a Cybersecurity Advisory (CSA) on the 20th of April 2022 warning against Russian-sponsored actors as well as Russian-supporting cybercrime groups. Among the tactics listed were ransomware, DDoS attacks, and destructive malware – all used in efforts to maintain persistent intrusive access to IT networks, extract sensitive data from those networks, and disrupt critical industrial control systems (ICS). 

Avoiding Impact of Cyber Attacks

There are many steps organisations and individuals can take to avoid and/or minimise the impact of a cyberattack, no matter its geographic source. 

1. Complete a Cybersecurity Risk Assessment

A Cybersecurity Risk Assessment is the best way to determine your baseline and identify areas in your security protocol that are up to par and areas that need preventative attention. Knowing the current state of your cybersecurity posture is the first step towards a more secured network, and Thrive can help

2. Routinely Update Software

When new vulnerabilities are identified, developers release patches and updates to cover them. Ensure that all of your bases are covered, including OS updates, app and firmware updates, and IT network asset updates. 

3. Enforce MFA

To the greatest extent possible, ensure that all users across all devices require at least a 2nd form of identification for access. Additionally, minimum password strength requirements are strongly encouraged to reduce the likelihood of a successful brute-force attack. 

4. Provide End-User Awareness Training

The most effective way to stop cyberattacks is at their most common breach point – the end-user. Social engineering attacks, spear phishing campaigns, and new SMS attacks (sometimes referred to as “Smishing”) all can be recognised and avoided with proper anti-phishing and cybersecurity awareness training from Thrive. 

What Is Your Risk Exposure?

Russia is not the first, nor the last, government body to engage in cyber warfare for monetary or military gain. While Russia’s efforts have been targeted at Ukrainian entities and politically influential groups abroad, cyberattacks originate and target people from all corners of the globe. Keep your cyber defence mechanisms up to date with a team that is on the cutting edge of security news – contact Thrive today to learn more. 

The post Responding to Cyber Attacks Abroad appeared first on Thrive.

]]>
How to Know You’re Being Targeted by a Phishing Attack https://thrivenextgen.com/how-to-know-youre-being-targeted-by-a-phishing-attack/ Fri, 10 Jun 2022 18:29:27 +0000 https://thrivenextgen.com/?p=22797 Phishing attacks are serious business, so it is important that your team members know what they are, for one, and know how to spot them. To facilitate this, let’s review the signs of a phishing…

The post How to Know You’re Being Targeted by a Phishing Attack appeared first on Thrive.

]]>
Phishing attacks are serious business, so it is important that your team members know what they are, for one, and know how to spot them. To facilitate this, let’s review the signs of a phishing attack—or ideally, a phishing attempt (because by spotting it, you’re more able to stop it).

First, let’s quickly touch on what constitutes a phishing attack.

What is Phishing?

Phishing is a horribly common form of cyberattack that is used by cybercriminals to accomplish a variety of goals, whether it’s gaining access to a system or stealing data from your team members. Basically, by posing as a trusted party and communicating with your team members, the responsible cybercriminal leverages the imperfect human element to sidestep your cybersecurity.

Phishing, while perhaps most well-known as an email-centric threat, can take place in many forms and formats. In addition to phishing emails—which themselves come in numerous forms—phishing attacks can also come in the form of SMS messages, phone calls, and effectively any other means of communication.

This makes it crucial that your team is prepared to deal with these attempts—capable of spotting them and properly reacting by reporting their suspicions to your IT resource.

To this end, let’s go over a few ways that your team members can potentially catch a phishing attack before they fall for it.

Signs That a Phishing Attack is Targeting You

There are numerous signs that a message could potentially be a disguised phishing attack. Here’s a basic list of warning signs:

  • A tone that doesn’t match the supposed sender
  • Misspellings and other discrepancies in key details, like email addresses, domain names, and links
  • Out-of-the-blue messages
  • Egregious spelling and grammar errors
  • Unexpected or out-of-context attachments
  • Excessive urgency behind, or open threats as a consequence of, not complying with the message
  • Ambiguous messages that motivate the recipient to investigate
  • Unusual requests, or requests for explicitly sensitive information

It’s important that your team is aware of these warning signs and actively keeps them in mind when dealing with any business communications.

Thrive Is Here to Help Keep Your Team Safe!

Reach out to us to find out how we can assist you in maintaining your business’ security against threats of various kinds, including phishing attempts. CONTACT THRIVE today.

The post How to Know You’re Being Targeted by a Phishing Attack appeared first on Thrive.

]]>
Getting the Most Out of Azure AD : Why MFA Is So Important https://thrivenextgen.com/getting-the-most-out-of-azure-ad-why-mfa-is-so-important/ Wed, 25 May 2022 18:25:21 +0000 https://thrivenextgen.com/?p=22456 Multi-factor authentication (MFA) is no longer an ‘extra’ security measure only necessary for those working with sensitive information. In days past we were able to lock down our accounts with just a simple password, but…

The post Getting the Most Out of Azure AD : Why MFA Is So Important appeared first on Thrive.

]]>
Multi-factor authentication (MFA) is no longer an ‘extra’ security measure only necessary for those working with sensitive information. In days past we were able to lock down our accounts with just a simple password, but the rise of bot-automated brute force attacks has made passwords an imperfect security measure that needs to be bolstered by a full line of account defense measures.

Enabling multi-factor authentication where available is a crucial step in locking down your business’s data. Access management tools like Azure Active Directory (AD) can help organizations not only protect their networks but also make the MFA sign-in process easier for employees using cloud-based apps from several different vendors.

What Are Brute Force Attacks?

Brute force attacks are among the most popular password-cracking methods. This can be attributed to how simple it is to automate the process of password guessing and the relatively low stakes of hackers not getting it right.

Applications or scripts try numerous password combinations based on common words (called a ‘dictionary attack’) or by simply trying billions of password/username combinations until one is correct. When login credentials are identified, the hacker then tries them everywhere and often leaks that information onto the dark web – hence why it is also essential to keep separate passwords for each account. The best way to reduce the likelihood of a successful brute force attack is to make your passwords as long and varied as possible. Thrive’sSecurity Resource Center has some great free tools to help users check the strength of their passwords and auto-generate stronger ones. 

Are Strong Passwords Enough?

Some users may think “I already have very strong, unique passwords for all of my accounts. Why do I need MFA?”. This is a valid question, and one Thrive has been asked by clients before. The answer is this – while strong, unique passwords are in fact harder to crack it is not entirely impossible. Managing a password library is nearly impossible by memory, and burdensome by other methods. Password lockers like LastPass are an excellent option for password management, but remember – you’ll need to remember your login credentials for that account separately.

It is also important to keep in mind that brute force attacks are not the only way a password can become compromised. Even strong passwords can easily be discovered using these methods:

Unsecured Networks

If data is shared over an unsecured network, passwords can easily be intercepted and deciphered. 

Keylogging

Keylogging malware skims everything a user types – including passwords.

Phishing

A successful phishing attempt tricks users into giving over their credentials voluntarily. 

Maintaining a portfolio of strong passwords is a great first line of defense, but that’s all they should be – the first line of defense. Requiring the second step of identification for successful account access ensures that your accounts are secured – no matter if or how your password is discovered.

Why Is MFA Important?

Multi-factor Identification – or MFA – is a second step in the login process where the user has to confirm their identity in another way. This might be using something only you would know – like a mother’s maiden name, or a previous password; or something you possess – like a smartphone or other security token. These are some of the most common forms of secondary identification:

Application-based Identification

Common apps such as Microsoft Authenticator generate one-time verification codes sent to your personal device

Biometric

Apps like Hello Windows or even facial recognition on your smartphone are examples of biometric sign-on.

SMS or Phone Call

A code is delivered via text or automated call.

Key Fob or USB

Users are issued physical tokens that are then used for secondary or tertiary identification

Managing Logins with Azure AD

If you or your company are using Office 365, you’re already using a version of Azure Active Directory (Azure AD) under the hood. Microsoft’s Azure AD is an organization’s central identity control and can manage user access to a range of cloud-based applications, enabling a single sign-on for all work-related apps.

Azure AD inherently offers several forms of MFA but allows users to log into all of their cloud-based apps after a single verification has been completed. This means that a single biometric scan or verification code allows your users to gain secure access to not only their Microsoft 365 account but also the tools they use every day like Salesforce or Quickbooks.

If You Have Azure AD, Turn on MFA Now

A basic version of Azure AD comes free with any subscription to Office 365. The full version of Azure AD (Azure Active Directory Premium Plan 1 and 2) which comes with Enterprise Mobility and Security bundles and Microsoft 365 subscriptions is a complete, top-down network security command center protecting more than just information related to your Microsoft accounts.

To get the most out of your Microsoft subscriptions and to learn more about deploying more secure user and access management, contact one of Thrive’s Collaboration experts today.

The post Getting the Most Out of Azure AD : Why MFA Is So Important appeared first on Thrive.

]]>
What is Azure Virtual Desktop? https://thrivenextgen.com/what-is-azure-virtual-desktop-thrive/ Wed, 16 Jun 2021 16:00:11 +0000 https://thrivenextgen.com/?p=18278 As has become evident in the past few years (particularly in the last year), remote work is no longer just a possibility, but a reality. Organizations have seen the value of completing work from anywhere,…

The post What is Azure Virtual Desktop? appeared first on Thrive.

]]>
As has become evident in the past few years (particularly in the last year), remote work is no longer just a possibility, but a reality. Organizations have seen the value of completing work from anywhere, but many have used patchwork solutions and short-term fixes to help establish a remote workforce.

Azure Virtual Desktop provides business leaders with a scalable, long-term solution, something many organizations are looking for. The right tools are required for collaboration and innovation, but important information and data must be protected in the process. Azure Virtual Desktop enables a secure remote desktop experience from any device at any time, providing end users with the access they need to get the job done.

Running Azure Virtual Desktop on the Cloud

Running Azure Virtual Desktop on the Microsoft Azure Cloud platform allows users to set up a multi-session Windows 10 deployment that provides a scalable Windows 10 instance accessible from anywhere. An end user gains access to Azure Virtual Desktop via a company-issued device, a shared computer, or their own device. For on-the-go employees, the benefits are clear – no matter where someone is, they’re always connected to a full desktop experience with the proper functionality and customization they’re accustomed to.

Organizations will realize cost savings immediately. Hosting on Azure requires less infrastructure than a traditional setup, and there’s no need for costly servers and the space required to house them. Plus, with employees working from anywhere, office spaces can be consolidated, giving users the option to log on either from home or perhaps a co-working space. Should IT departments choose to forego the process of searching for and maintaining hardware, bring-your-own-device (BYOD) is an option. Allowing employees to use their own device reduces costs and ensures a certain level of comfort.

In a BYOD setup, a company can continue to grow without having to focus on costly IT infrastructure or a lengthy procurement process. Since an Azure Virtual Desktop is always up to date, it has the latest security features capable of detecting threats and taking action, and for IT departments, is an alternative to purchasing expensive new equipment or backup and disaster recovery services.

Azure Virtual Desktop Benefits and Considerations

Azure Virtual Desktop deploys and scales in a matter of minutes, with the ability to use existing licenses so you only pay for what you use. For example, if you’re already signed up for Microsoft Office 365 or an enterprise Windows version, a virtual desktop instance can be set up for each user at no extra cost. Remote users gain access to a virtual desktop interface from anywhere, regardless of device type:

  • Windows
  • Mac
  • iOS
  • Android
  • Any device with an HTML5 web client

IT administrators can increase the number of virtual CPUs, virtual RAM, and create more virtual hard disk storage with just a few clicks. Azure Virtual Desktop can also be the first step towards bringing legacy applications to the Cloud, for those yet to implement a software-as-a-service (SaaS) solution. This allows for the hybridization of the work environment; if an end user requires a full desktop, Azure Virtual Desktop is the solution, but if they only require access to O365, they can work locally.

As the platform is rolled out to employees, organizations must consider the needs of the end user. While an IT department and a group of tech-savvy professionals may enjoy having access to a virtual interface, some members of a team may require further training and coaching on how to use the technology and how to ask for additional resources if they’re required. Our Thrive team provides detailed training prior to deployment.

Azure Virtual Desktop is a great opportunity for organizations to maximize the benefits of the Cloud. Plus, Azure Virtual Desktop is just one more way to provide employees with remote desktop access and the ability to accomplish tasks even if they’re nowhere near the office. To help your organization deploy Virtual Desktop on Microsoft Azure, get in touch with us today.

The post What is Azure Virtual Desktop? appeared first on Thrive.

]]>