by Felicien | Jul 3, 2017 | Education
Flexibility, change, action — defining the value of SaaS in today’s economy is impossible to overstate. Organizations need to be able to turn on a dime to meet shifting customer requirements.
Business leaders have noted that XaaS (Anything-as-a-Service) is more than just a technology shift, it’s truly a mindset for today’s individuals who expect everything to be available whenever and wherever they want it. From photo sharing to ride sharing, delivery services to software, people appreciate the ability to be able to shift directions quickly and keep their options open. The lightning-quick shifts required for digital transformation make SaaS the ideal model for data and services delivery in today’s always-on organizations. Creating new models can be highly disruptive to business, and when transitions start in one area they tend to waterfall into other functional business units as well. The speed that SaaS (Software-as-a-Service) promises offers the chance to fail fast and create true digital transformation within even the most steadfast of organizations.
Looking Toward the Future
If your industry is not already feeling the effects of digital change, there’s a good possibility that shifts are coming your way in the near future. Transportation industries have been revolutionized even in the past five years with the introduction of Uber — which spelled the end for many taxi service operations. The same goes for bookstores: look at the number of bookstore closings in the past ten years. With the majority of individuals moving towards eBooks for the instant gratification that they provide, brick and mortar bookstores are going the way of the dinosaurs. The recent trend towards fast delivery with services such as Amazon Prime offering 2-hour delivery windows to many parts of the country, and regional food delivery options such as GrubHub.com, DeliveryDudes.com, and others cropping up on a daily basis. The way we communicate has also changed radically in the past ten years. Instead of picking up a phone to contact someone, you’re much more likely to text them, send them a message on social media or even Skype. The leaders in these industries must be nimble and able to change with customer demand, which is what makes SaaS so appealing.
Benefits of SaaS for Digital Transformation
Customer needs aren’t the only thing that’s changing almost faster than the eye can see. Technology innovations are coming at rapid speed as well, and SaaS provides organizations with the mobile-first, cloud-focused mindset that allows business leaders to dream big and technology teams to create solutions that scale. Workers are pushing tech teams to offer the ability to work in a variety of locations — including wherever they can find a computer with internet access — which means security is of critical importance. IT teams are having a tough time justifying legacy systems that take years to build and perfect, and are instead being pushed to accelerate updates to bring on the hottest new functionality to serve customers more effectively. Here are some of the many benefits that SaaS brings to digital transformation:
Cost structure: Many organizations find themselves in a situation where they can support a structure ongoing cost but may have difficulty with a huge upfront payment — the hallmark of digital change in the past. SaaS allows organizations the flexibility to pay for advanced technology out of their operating budget, improving the chances to get transformative projects approved.
Levels the playing field: Enterprise-scale applications were often reserved for the enterprise-scale budgets required to fund them. Cloud-based software delivery allows even smaller organizations to become players. As the cost of data storage continues to decrease, SaaS may be the biggest democratizer in business today by providing massive opportunities for growth to all sizes of organizations.
Nimble Change: The flexibility of making a quick shift in strategy is something that isn’t easy with traditional software models, and could include upwards of 12-18 months of scoping, contract negotiation, and then finally buildout. With SaaS, new out-of-the-box features can be turned on quickly and configured, promising a reduced time to ROI.
Scalable: Again, SaaS provides organizations with the ability to start small with smaller budgets, and quickly scale with the click. Since the majority of SaaS projects are hosted offsite, server capacity becomes almost a non-issue for most projects — allowing technology teams and business users to focus on the functionality and value of the platform instead of the cost of hosting and care and feeding of the server. This also allows seasonal organizations to scale back during a certain time of year and quickly ramp up as needed when business picks up, which would be nearly impossible to structure with traditional software builds.
New Business Models
Digital transformation is more than simply employing SaaS and waiting for the “next big thing” to come down the pike. Organizations who successfully invest in and drive digital transformation are those who are addicted to growth, and who are willing to put in the time and effort to make shifts internally that mirror this focus. This could mean a variety of things, from changing job descriptions to outsourcing some basic functionality such as accounting or more operational IT tasks to working with contractors instead of full-time employees to provide as-needed coverage based on business trends. Small, cross-functional teams are much more likely to be successful than a traditional model of IT-heavy implementation teams. This change can allow organizations to fundamentally improve overall operations by expanding the pace of innovation and future-proofing IT investments overall.
While implementing SaaS isn’t going to guarantee your organization’s success, not exploring this model can make growth more challenging. When you’re ready to learn more about how to drive digital transformation in your {city} business, contact the professionals at {company} via email to {email}. Let us help walk you through how SaaS can help your company keep pace with the speed of change through shifting your IT models to support modern business needs. Call us today at {phone} to get started.
by Felicien | Jul 3, 2017 | Education
Incorrectly hardening servers are one of the biggest challenges in cyber security. Watch from the driver’s seat to see what (ethical!) hackers are looking for so you can protect against vulnerabilities.
Security experts on both sides of the house recognize that bringing up a new server improperly can create a wide open door for cybercriminals, but how can you know for sure that you’re closing every nook and cranny and completely hardening your server? Small- to medium-sized organizations are particularly vulnerable, as they may not have the full complement of IT staff required to specialize in cyber security and are likely following a set of directions instead of fully understanding the challenges they’re facing. With the rapid pace of change and the complexity of technology today, it can be difficult to keep up with the myriad options available for your network. {company} agrees, so we’ve put together a first-hand view of how an ethical hacker quickly takes down a business Avaya server in a very short period of time. This cautionary tale may offer you some ideas for keeping your organization’s data such as your customer and employee personal information safe from cybercriminals.
Types of Attacks
There are some standard types of attacks that we see on a regular basis, many of which are perpetrated when an unethical individual gains access to a key internal server:
DoS: Denial of Service attacks can cause a web server to come to a halt, making your website(s) completely unavailable to users.
Phishing: Perhaps the most well-known type of attack, phishing occurs when individuals within your organization click on a link or navigate to a website that is fake. Individuals are then tempted to enter personal information or passwords so the hacker can gain entrance to your company.
Defacement: A scare tactic that is often used towards politicians or large corporations, defacement occurs when a hacker gains access to a web server and replaces the company’s website with a different page that includes a message, music or even the hacker’s name.
DNS Hijacking: Hijacking your domain name server (DNS) redirects all web traffic from your site to another location on the web.
Sniffing: Hackers attempt to “sniff out” sensitive information that is being passed internally and externally to your organization through an intercept, in an effort to gain unauthorized server access.
Cybersecurity Risks
Let’s say your organization’s servers have been hacked. What does this really mean in terms of data loss and security? Not only can your organization’s reputation be ruined by a DNS hijacking that sends your customers to a nefarious website, but cybercriminals can also install malicious viruses that can utilize your systems as a replication tool, sending viruses out to all your clients and contacts. Additionally, a true data breach could be incredibly expensive in terms of lost business and even lawsuits against your organization if the personal financial information is breached and then utilized by hackers. However, perhaps the most troubling and damaging effect of an attack is the loss of trust from your customers, which can have a long-term negative impact on your organization.
Let the Hacking Begin
The penetration testing was done against three different Avaya servers, exploiting different vulnerabilities each time. In all three instances, the white-hat security tester was able to gain access to all three servers.
LDAP Scenario
The first activity was to run a Nessus vulnerability scan, which showed that anonymous LDAP queries were a possibility: a hacker’s goldmine of data. Once this was determined, the hacker determined it was an easy step to scan for an Avaya phone tree by using JXplorer and looking for an LDAP tree with root “vsp” with a branch labeled “People”. After that, it was simple enough to scan for the two important entries: “cust” and “admin”. After determining that the passwords within the entries were hashed, it took only a moment to break the encryptions using a software tool called John the Ripper, even with the default settings. Turns out, the passwords were still the default passwords for the system “admin01” and “cust01”. After trying a few different tactics to get a full shell, the hacker eventually was able to utilize a combo of a Meterpreter reverse tcp payload via a Linux binary executable file delivered by msfvenom to essentially backdoor into the system. Next, the hacker was able to gain access to a second box that was tied into the first one, simply by following root SSH keys — which can indicate a way for users to log into the system remotely without a password. An additional find was user passwords on the second server, none of which were difficult for the hacker to guess using easy counter-encryption methods.
Two Down . . .
On the final server on the same subnet, the security expert quickly got a bonus find: easy logins with a full shell using the default “cust” and “admin” passwords. While they did receive a full shell from the system, the passwords and usernames uncovered in the first two servers also worked on the third. However, the shell would not allow access to the root directory and this third server was proving a difficult nut to crack. After utilizing linuxprivchecker.py script to identify any potential locations to run a binary, the hacker uncovered that the majority of locations on the box were covered with noexec commands — effectively halting binaries from executing to protect the server. Eventually, however, the white hat hacker noticed that there was a diag program setuid binary that was only available to a few users within the group, and not the users whose accounts were already compromised.
Getting to the Root
After several circuitous attempts, the security expert managed to gain access to a shall as a secondary user, by running through voice-only setup binaries and leveraging the diag command, which runs as root regardless of where the command is executed. The meterpreter reverse payload was used again in this instance, to gain access to the /msg/database/vm/tmp directory, which eventually led to full root access by the hacker.
There are several vulnerabilities in this scenario that could have been prevented with successfully-hardened servers. If all security patches were in place, no default user passwords and configurations were successfully updated, penetration would have been much more difficult if not impossible. Our cybersecurity experts are standing by in {city} to help support and protect you from attacks such as this one. Contact {company} today at {phone} or via email to {email}, and we’ll work with you to ensure that hackers will not have such an easy time gaining access to your protected information.
by Felicien | Jul 3, 2017 | Education
In the rapidly changing digital world, cyber security has become a major issue. Even tax preparers working for the IRS are no longer safe. Here is an in-depth look at the lessons that everyone can learn from the latest phishing attempt on tax preparers.
On June 23, 2017, the IRS released information showing that it had been the target of hackers and cyber criminals. The attack was similar to past ones that targeted tax professionals with phishing emails. However, these emails were different since they seemed to have come from tax software that is authentic. The emails would request for preparer information that in the wrong hands could be used for filing fraudulent tax returns.
What the IRS Recommends.
In a Bulletin, the IRS said the real organizations should not ask for passwords, usernames, or other sensitive information via an email. Although hackers were phishing for particular data such as Centralized Authorization File (CAF), Preparer Tax Identification Number (PTIN), and Electronic Filing information Numbers (EFIN), various organizations can apply the lessons from this attack.
Why are Tax Preparers So Valuable?
Cyber criminals target tax preparers for the most basic of reasons. If the accountant is working on 500 sets of data a year, those are 500 opportunities to steal identities. However, whether you are an accountant, a doctor, a lawyer, or anyone in any industry, you will need to take precautions. It is essential if you have house sensitive customer data in your system. Criminals will do anything to get it.
Monitoring solutions that maintain a 24/7 watch on your system are necessary. Besides that, you will need to comply with industry and government standards to stay safe. Simply having off-the-shelf firewalls and a basic anti-virus program will not be enough to keep you safe. In the rapidly evolving world of malware, you will need to do much more. For instance, you need properly deployed backups, multi-layered security, physical safety measures, and dedicated servers if you hope to stay safe.
No matter your industry, here are a few proven strategies on how to stay safe:
1. Never share sensitive information via an email.
It may seem self-explanatory. However, we all know a person who has sent or received their Social Security number or driver’s license via the internet. If the IRS needs your information, they will first send you an email. They do not use phone calls or emails to try to reach out to people. You need to treat anything else such as your bank account number, any username/password combination and other sensitive data delicately.
2. Learn to Identify Attempts to Steal Your Data.
There are major hallmarks of a scam that you can use to tell when you are about to get robbed. For one, it will have misspelled words, strange phrasing, and some awkward grammar. Besides that, you can check the address and the domain name. Besides that, avoid clicking on any unknown links in the email. Although it may seem time-consuming, any time you get an email request for your data, you should be alert and scrutinize it carefully. That way, you can avoid losing your data to hackers.
3. Avoid Using the Same Password for All Your Accounts.
All that cybercriminal need is a single login credential to access sensitive data. If you are using a single password for all your online accounts, you may have made yourself a simple target for the hacker. Thus, you should always create complex variations of your passwords with a mix of letters, special characters, and numbers. There are some great password managers available today that change your password often. Thus, they leave you with only the task of remembering a single master password. If the account you use offers two-factor authentication, you must make use of it. However, no matter what solutions you use, never utilize a simple password such as “password1234. “
4. Be cautious on the Internet.
Anyone who deals with sensitive information needs to have a multi-layered security solution in place. If you use Wi-Fi, ensure that it has password protection and that it is not public. Whenever you access a website, ensure that it has the “https” designation or a lock sign next to its web address. Besides that, avoid clicking on the adverts that are usually too good to be true.
5. Make employees Part of any Security Plans You Have.
In the IT world, the human factor is one of the first lines of defense against any cyber-attack on your system. If employees have the right information, support, and training, they could help to keep your systems secure. Ensure that you have a written set of plans that all employees must follow. Besides that, ensure that the organization works with a trusted IT company to generate thorough policies and procedures to keep the business safe. It takes just one click to one link or a piece of sensitive data in the wrong email to expose the business. Thus, addressing these threats early is an excellent way to mitigate any preventable hacks.
6. Provide Your Data with enough Protection.
No matter the industry in which you work, it is more than likely that you value your clients. Thus, you should ensure that you treat their data with respect. To do this, you will have to come up with strict protocols to which everyone must adhere. Another important way to secure customer data is to have regular backups made on a remote server. Thus, even when a data breach occurs, you will still have a way to continue operations.
Talk to a Security Expert.
If information security is an important topic to you in this rapidly evolving world, you should talk to an IT expert. These people understand that importance of securing data. They also have years of dealing with cyber threats. No matter how big or how small your organization is, hackers do not care. They will make use of any means possible to get access to your data. Only a professional can help you get the high level of security that your organization needs.
by Felicien | Jun 30, 2017 | Education
Here is a breakdown of the new video service called Microsoft Stream. It has a lot of potential as a video streaming service for businesses.
The role of video in the modern world of business cannot be ignored. In most modern workplaces, video allows for the efficient sharing of information and the training and educating employees. It is also useful in building a culture and increasing engagement in the workplace.
The History of Microsoft Stream.
In 2016, Microsoft released the beta version of Microsoft Stream. The video service is intended to make it easy for people inside an organization to upload, manage, and share videos in a secure environment.
A year later, Microsoft has rolled out the service to 181 markets all around the world. The service will be provided in 44 languages. Microsoft will provide it to all users of the Office 365 service. Additionally, the company announced that it would come up with new and interesting features for the service.
The One-Stop Shop for Video.
The Microsoft Stream service is intended to be a single stop destination for managing videos. It will be integrated into Office 365 and with the IT management and security needs that all businesses require. All individuals within the organization will have a destination where they can contribute videos and discover videos generated within the company.
Additionally, it is integrated with all apps in Office 365 suite. Thus, people on any app in Office 365 will be able to share videos with each other. The service is also integrated with Office 365 Groups. Each group has a designated channel, which makes it quite easy to share content across teams.
A Service Built for Collaboration.
If you already use Office 365, Microsoft Stream gives you an extra tool for more collaboration. You will be able to seamlessly integrate it into other apps that you use daily within Office 365. People collaborate using multiple tools in an organization and this service now allows you to add video. Those on Office 365 can begin to enjoy this integration right away.
Intelligence in Microsoft Stream.
The Microsoft Stream boasts of having some advanced intelligent features. Here is a breakdown of these features:
Speech to Text.
In Microsoft Stream, transcribed audio will be searchable. You simply need to type in a few descriptive words to get to any point in the video where you want. This feature is quite important. In most cases, business videos can be as long as 60 minutes long. However, employees may only need to watch a small 3-minute section that is relevant to their department. This will allow employees to fast forward to sections that matter to them.
Face Detection.
Face detection allows users to view when each person in a video is shown. Through a clickable timeline, a user can jump to instances when someone’s face is shown.
Time Codes.
Time codes are displayed in the comment section, and they link to text transcripts or table of contents. Thus, users can jump to a specific point in the video where they think they should be.
Security is a Priority.
Microsoft has used its industry-leading encryption for all video to ensure that customers who use Microsoft Stream share their videos with only the intended audience. Security management has been made quite simple with the Azure Active Directory.
Besides that, system administrators can tweak guidelines so that employees have to accept terms before uploading any video. The videos can be viewed seamlessly across devices, which allows employees to work at home or at the office. Some of the features you get include screen readers, closed captioning, high contrast, and keyboard navigation.
There is Increased Permission Management.
Microsoft Stream Groups, which are based on Office 365 Groups, allows users to better manage video permission. That simply means that videos can be made available to only select groups.
Office 365 Video Will Be Phased Out.
Office 365 Video will be phased out over time. However, it will not happen overnight. It is going to be done in stages, to ensure a smooth transition. Besides that, Microsoft will be careful to ensure that they get to retain all their content.
It is built on Experience.
The Microsoft Stream service is based on lessons learned from Office 365 Video. The result is that Microsoft has been able to achieve deeper integration and intelligence into Office 365.
Where is it?
For Office 365 customers, Microsoft Stream is found in the Office app launcher. Alternatively, people can visit the Microsoft Stream site and sign up. Those without Office 365 will get to enjoy a Microsoft Stream standalone service that begins with a free trial.
Areas that Could Use Improvement.
In essence, Stream is a password-protected version of YouTube. It is a bit rudimentary, although that may change with time. Some of the areas that could do with improvements are:
1. External Delivery.
Besides serving videos to internal audiences, businesses need to be able to stream to other partners, customers, and to the public. However, that is not currently possible with this service. Only an internal audience can view the videos.
2. Limited Deployment Model.
Today, the service is limited to the cloud. However, it may be nice if on-premises and private cloud hosting could be supported.
3. Video Creation Tools.
The line between content management and video creation has been blurred in recent years. The Stream service has no video creation tools. Besides that, Office Mix has no support for Stream publishing.
4. Video Editing.
Web-based video editing has become the norm in enterprise video platforms. The ability to cut videos, trim, split, and even splice videos together has become quite common. However, Stream has not yet upgraded to a video editor tool.
5. Video Analytics.
The ability to track the performance of videos shared within the organization is important. However, Stream only has a simple count of the number of views per video. Some of the features that could be added later are drop off rates, views by user, and completion rates.
6. Live Stream.
Although its name hints at it, Microsoft Stream does not have live stream support. However, that may be provided in coming months. It is quite clear that the company has invested a lot of effort into this service and major improvements can be expected in coming months.
by Felicien | Jun 29, 2017 | Education
Microsoft recently unveiled a mobile version of their Planner app. Here is a breakdown of what is contained in the app and what could be expected in future.
Microsoft recently announced their Microsoft Planner app would be available for the Android and the iPhone. People who already have the web Planner app can use it to view and make tweaks to their plans on the move. This mobile app was developed after Microsoft analyzed the feedback they have been getting from users of their Planner web app.
For those who are new to Planner, they can still use the web version and then view their plans on their mobile phones. The Planner is made available to all users that have the Business Essentials, Office 365 Enterprise E1-E5, Education, and Business Premium subscriptions. Users of the planner can seamlessly download the new app to their device.
What to Expect in Coming months.
Microsoft will add push notifications and the ability to create plans directly on the app with time. Additionally, they plan to integrate it with Intune. The company is still open to requests from users of the app. They have provided a link where users can upload their suggestions.
Understanding Planner.
The planner was launched in June 2016 as part of the apps suite for Office 365 Business and for school users. It provides a simple and visual means to organize team activities. The app enables you to assign or organize tasks, share information on projects, and receive updates on the progress of a project. In short, the app is aimed at improving collaboration among team members. It works in a similar manner to apps like Asana and Trello. The app comes as part of the Office 365 Suite free.
What to Expect for the Mobile app.
The mobile app is available for download. However, it does not have as much usability as the web version. For instance, the plans can only be created in the Web version and viewed on the mobile apps.
The Planner is quite easy to use and will allow you to view your tasks in one place. When your plans change, you are able to update the board with a simple drag and drop motion. Additionally, you will be able to chat with task members on the go. For now, you need to be subscribed to Office 365 work or school for the app to work. If you meet this qualification, the app is free to download on the App Store and Google Play store.
You Can Receive email Notifications.
One of the cool features of Planner is the fact that it has email notifications. That way, even if you forget to open the app, you will always be notified via an email. It is a great way to ensure that everyone gets to complete his or her tasks in good time.
What the Future Holds.
As of now, Microsoft has admitted that there is still a huge functionality gap between the web and mobile versions of the app. In future, Microsoft will add the ability to create plans to the mobile app. They also plan to integrate the app with Intune, which is the mobile app management platform.
However, their competitors are not just sitting back as Planner takes over the market. One of the competitors added two Power-Ups to their mobile app. That simply means they have increased integration and added more features.
On Trello, the upgrades will allow users to view items with the due date in the calendar view. Thus, users will be able to better anticipate and plan activities as project milestones approach. When it comes to deciding on issues, the app also has a voting feature, which ensures that all team members can agree on the direction they will take. Through voting, users can prioritize issues in an easy manner. The result is that it ends the need for lengthy meetings, which could eat into the productivity of the entire team.
Another competitor, Zenkit also has big plans. A while back, they announced a feature that will allow users to connect more than 750 apps to a project management platform. It will help to eliminate many of the repetitive tasks that are part of managing any multi-app environment.
For instance, the feature will eliminate the need to copy and paste customer data manually. The feature will also allow you to update data from your email marketing platforms, help desk services, and online forms.
Interestingly, the new integration feature from Zenkit will allow it to connect with its competition Trello. Other third party integrations possible on Zenkit’s Zapier are GitHub, Evernote, and Google Sheets.
How Planner makes work Easier.
Planner has four main functionalities that make it a must-have app for any business environment.
1. Information Hub.
Once you have Planner, you will never need to open multiple tabs of the same thing. You get to see everything in one place. Even when more than one person has to work on a task, the Planner can assign it to multiple people effortlessly.
2. Flexible Categorization.
The Microsoft Planner has a lot of flexibility in how tasks can be categorized. You can create as many buckets as you wish and add tasks via a simple drag and drop motion. The Buckets are awesome since they can add or remove with ease. Besides that, the buckets have many features that you will find useful while using Planner.
3. Communication.
Communicating with others about a task can be at times quite tricky. For instance, team members may not have viewed the original email thread. Additionally, they may not have been at the meeting when you assigned the tasks.
This is where Planner proves useful. On each task card, there is the comment section. You can leave comments. Additionally, when you begin a conversion in the Group mailbox, it is broadcast to all member of the Group. It is a great way to develop transparency around Group tasks.
4. Insights.
Another interesting feature of Planner is the soft analytical insight it offers users. It helps you to see if any of your team members have been overloaded with too much work. Besides that, you are able to track team productivity.
With the Chart overview, you can quickly get a sense of what is happening with the team. You can quickly tell which projects are late and when some prioritization is required.