28.07.2023 Views

CS Jul-Aug 2023

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

managed services<br />

Unfortunately, many of the challenges that<br />

companies faced decades ago still exist,<br />

alongside newer challenges.<br />

Ransomware<br />

Ransomware is the top of just about every<br />

list, in terms of what concerns not just<br />

cyber security professionals, but anyone<br />

that is involved in the day-to-day activities<br />

of a business. Ransomware can have an<br />

impact on a business, from the internal<br />

disruption, loss or theft of data to the<br />

damaging impact to the company's<br />

reputation and brand in the public eye,<br />

which can result in a loss of income in<br />

the long term. The complexity of the<br />

ransomware is increasing, as are the<br />

vectors for attack and ways in which<br />

the cyber criminals are attempting<br />

to make money from an<br />

incident. Ransomware<br />

is understandably<br />

the top concern,<br />

due to the<br />

numerous<br />

ways in<br />

which an<br />

incident<br />

can impact a company; this is unlikely to<br />

change anytime soon.<br />

Credential Re-use<br />

Closely following ransomware, in terms of<br />

security concerns, is STILL credential reuse,<br />

even in the modern age of security awareness<br />

training, with public campaigns<br />

focusing on password security. Credential<br />

re-use remains a top concern, due to<br />

the fact employees often reuse company<br />

passwords on public sites. An attacker,<br />

with the right level of recon, will be able<br />

to use this to their advantage, if the<br />

employee has appeared in any user<br />

breaches of major sites.<br />

Phishing Attacks<br />

Phishing (Vishing, Smishing etc) and all<br />

attacks of this nature are a major concern,<br />

not just for businesses, but for the public<br />

as well. Phishing is one of the most<br />

common methods of attack and the<br />

complexity of the attacks is increasing<br />

substantially. Phishing is used to deliver<br />

numerous different malicious payloads,<br />

the most concerning being ransomware<br />

or trojans, both of which can have a<br />

devastating impact on the systems and<br />

companies affected.<br />

Mind Security describes itself as Cyber<br />

Security Peace of Mind. Can you explain<br />

the benefits of this service for your<br />

prospective customers?<br />

Mind security provides peace of mind by<br />

addressing two of the most common<br />

cyber security concerns experienced by<br />

businesses. Mind Security has chosen<br />

products that are best-of-breed for<br />

dealing with ransomware and<br />

credential re-use. The endpoint<br />

anti-malware product that has<br />

been adopted has some of the<br />

fastest reaction times of any<br />

product, as well as utilising<br />

AI to detect known and<br />

unknown threats. The<br />

technology adopted for<br />

the breach monitoring service has<br />

demonstrated itself to be one of the most<br />

effective in the industry, utilising one of<br />

the largest and most well-maintained<br />

databases of breached credentials/data.<br />

How do you decide which products are<br />

a good fit for the making of a managed<br />

service?<br />

We look for products that are best of<br />

breed, that are innovative or, if not<br />

innovative, have a solid track record of<br />

providing the service they set out to. There<br />

is a large focus on automation within the<br />

products that have been chosen, along<br />

with additional consideration given to the<br />

use of technologies, such as threat<br />

intelligence and, where feasible, artificial<br />

intelligence. We have been exceptionally<br />

careful to ensure that we only look at<br />

products touting AI, where there is a<br />

legitimate use case for the technology.<br />

The endpoint security offering within the<br />

service is driven by Deep Learning, which is<br />

a variant of Artificial Intelligence. What are<br />

the benefits of this?<br />

I think it is best we allow an AI to answer<br />

this in a few words.<br />

"Deep learning excels at automatically<br />

learning complex patterns from raw data,<br />

enabling hierarchical feature learning and<br />

achieving state-of-the-art performance in<br />

specific domains"<br />

Source: ChatGPT<br />

How do people find out more?<br />

Brookcourt has a team dedicated to<br />

supporting businesses to learn more about<br />

its products and solutions. To find out<br />

more about Mind Security, email the team<br />

at: enquiries@mindsecurity.co.uk<br />

mindsecurity.co.uk<br />

01737 886 111<br />

Useful Link:<br />

https://www.corporatescreening.com/blog/<br />

10-things-to-consider-when-looking-for-amanaged-service-provider<br />

www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards <strong>Jul</strong>y/<strong>Aug</strong>ust <strong>2023</strong> computing security<br />

23

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!