CS Jul-Aug 2023
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
managed services<br />
Unfortunately, many of the challenges that<br />
companies faced decades ago still exist,<br />
alongside newer challenges.<br />
Ransomware<br />
Ransomware is the top of just about every<br />
list, in terms of what concerns not just<br />
cyber security professionals, but anyone<br />
that is involved in the day-to-day activities<br />
of a business. Ransomware can have an<br />
impact on a business, from the internal<br />
disruption, loss or theft of data to the<br />
damaging impact to the company's<br />
reputation and brand in the public eye,<br />
which can result in a loss of income in<br />
the long term. The complexity of the<br />
ransomware is increasing, as are the<br />
vectors for attack and ways in which<br />
the cyber criminals are attempting<br />
to make money from an<br />
incident. Ransomware<br />
is understandably<br />
the top concern,<br />
due to the<br />
numerous<br />
ways in<br />
which an<br />
incident<br />
can impact a company; this is unlikely to<br />
change anytime soon.<br />
Credential Re-use<br />
Closely following ransomware, in terms of<br />
security concerns, is STILL credential reuse,<br />
even in the modern age of security awareness<br />
training, with public campaigns<br />
focusing on password security. Credential<br />
re-use remains a top concern, due to<br />
the fact employees often reuse company<br />
passwords on public sites. An attacker,<br />
with the right level of recon, will be able<br />
to use this to their advantage, if the<br />
employee has appeared in any user<br />
breaches of major sites.<br />
Phishing Attacks<br />
Phishing (Vishing, Smishing etc) and all<br />
attacks of this nature are a major concern,<br />
not just for businesses, but for the public<br />
as well. Phishing is one of the most<br />
common methods of attack and the<br />
complexity of the attacks is increasing<br />
substantially. Phishing is used to deliver<br />
numerous different malicious payloads,<br />
the most concerning being ransomware<br />
or trojans, both of which can have a<br />
devastating impact on the systems and<br />
companies affected.<br />
Mind Security describes itself as Cyber<br />
Security Peace of Mind. Can you explain<br />
the benefits of this service for your<br />
prospective customers?<br />
Mind security provides peace of mind by<br />
addressing two of the most common<br />
cyber security concerns experienced by<br />
businesses. Mind Security has chosen<br />
products that are best-of-breed for<br />
dealing with ransomware and<br />
credential re-use. The endpoint<br />
anti-malware product that has<br />
been adopted has some of the<br />
fastest reaction times of any<br />
product, as well as utilising<br />
AI to detect known and<br />
unknown threats. The<br />
technology adopted for<br />
the breach monitoring service has<br />
demonstrated itself to be one of the most<br />
effective in the industry, utilising one of<br />
the largest and most well-maintained<br />
databases of breached credentials/data.<br />
How do you decide which products are<br />
a good fit for the making of a managed<br />
service?<br />
We look for products that are best of<br />
breed, that are innovative or, if not<br />
innovative, have a solid track record of<br />
providing the service they set out to. There<br />
is a large focus on automation within the<br />
products that have been chosen, along<br />
with additional consideration given to the<br />
use of technologies, such as threat<br />
intelligence and, where feasible, artificial<br />
intelligence. We have been exceptionally<br />
careful to ensure that we only look at<br />
products touting AI, where there is a<br />
legitimate use case for the technology.<br />
The endpoint security offering within the<br />
service is driven by Deep Learning, which is<br />
a variant of Artificial Intelligence. What are<br />
the benefits of this?<br />
I think it is best we allow an AI to answer<br />
this in a few words.<br />
"Deep learning excels at automatically<br />
learning complex patterns from raw data,<br />
enabling hierarchical feature learning and<br />
achieving state-of-the-art performance in<br />
specific domains"<br />
Source: ChatGPT<br />
How do people find out more?<br />
Brookcourt has a team dedicated to<br />
supporting businesses to learn more about<br />
its products and solutions. To find out<br />
more about Mind Security, email the team<br />
at: enquiries@mindsecurity.co.uk<br />
mindsecurity.co.uk<br />
01737 886 111<br />
Useful Link:<br />
https://www.corporatescreening.com/blog/<br />
10-things-to-consider-when-looking-for-amanaged-service-provider<br />
www.computingsecurity.co.uk @<strong>CS</strong>MagAndAwards <strong>Jul</strong>y/<strong>Aug</strong>ust <strong>2023</strong> computing security<br />
23