A Summary of Digitisation and Cloud Adoption

The age of digitisation is a driving force spinning a web throughout business planning and strategy. Digitisation is transforming business norms, creating new and dominant players faster than any other time in history.

Digitisation is such a powerful force because it is creating new ways of engagement between business, customers and stakeholders. This has resulted in more and more businesses pivoting their focus on cloud adoption and its attendant benefits.

The explosion of SaaS, cloud storage, IoT, and DevOps allows you to:

  • improve your business’ productivity
  • reduce operating costs
  • introduce ever more flexible ways of the workforce
  • greater customer engagement.

This article focuses on the trends that are being driven by digitisation and how they can impact your business.

SaaS Explosion

Digitisation has resulted in exponential growth in Software as a Service (SaaS). You may have already taken advantage of the flexibility and performance guarantees provided by SaaS services. It also gives you the ability to develop and deploy new services without a huge amount of expertise or infrastructure.
SaaS applications can help to reduce your IT workload, increase employee productivity and cut your business costs.

By the end of 2018, it is predicted that SaaS applications will account for 60% of all cloudbased workloads. 

Some great SaaS applications available to businesses include Office365, HubSpot and Google Works.
It is important to ensure that your SaaS applications are secure and compliant.

Cloud Storage Growth

As cloud application adoption grows, the requirement for cloud storage is growing rapidly to keep apace. Cloud storage poses a number of benefits to your organisation by allowing you to easily access files from anywhere online, save backups of important files and reduce your operating costs.

In 2017 the total data stored in Data Centres was 370 Exabytes (EB). However, by late 2018, this storage will grow to 1.1 Zettabytes (ZB)– a tripling of capacity over a 12 month period.

There are many types of cloud storage providers available to suit your organisations IT infrastructure. It is important to consider how secure the platform is and if it is compliant with the regulations in your industry.

Internet of Things (IoT)

Continuous growth in real-time analytics and cloud computing is expected to push the Internet of things to the fore. IoT can boost your business’ productivity giving you access to valuable data and greater vision of customer behaviour.
It is expected that machine to machine learning will play a significant role in developing IoT. Due to this, you should expect to see complex systems aimed at simplifying interactions. This will enable you to interact intelligently with a large number of host devices in a network.
Businesses are using IoT devices such as smart door locking systems, connected cameras, smart lighting, thermostats and even sensors to measure room usage.
Watch an IoT attack video.

DevOps and Web APIs

A key component of cloud services is Application Programming Interface (API’s). API’s are used by software applications to enable customisation of SaaS applications. As a result, the use of API’s and the work of development operations teams gives you the ability to quickly deploy and tune applications to meet your exact needs.
This is a rapidly growing trend that is making SaaS adoption and integration between systems even more attractive because DevOps facilitates faster innovation.

The most popular web API’s. 
Popular web based API's

Some recent examples of businesses benefiting from cloud adoption include:

  • Netflix – moved from its own DC to a cloud-only model and within 12 months scaled its workload and compute instance by a thousandfold, this would have been impossible to do with a traditional model based on premise or DC only model.
  • Bank of America – are migrating 80% of its computing workload to the cloud within a 3 year timeframe

Consider: security risks will continue to grow

Security will continue to be a major risk for all businesses and will need consistent and elevated levels of defence to mitigate the threats. The security threats to your business are continually increasing in sophistication.
The scale of the threats is also growing as businesses adopt more diverse ways to access services such as remote access, direct internet access at branch offices, smartphone access and cloud adoption (access from anywhere).
With the adoption of more stringent compliance regulations such as GDPR, it is now essential for your business to adopt additional security controls such as security information and event monitoring (SIEM) and advanced malware detection and prevention systems.

Next Steps

The trends driving cloud adoption are compelling to the extent we are no longer at the stage of pioneering or early adoption. Cloud adoption has become mainstream as witnessed by the stellar success of a number of leading digitisation pioneers such as Air BnB, Uber, Spotify or Amazon.
However, is vital as you hurtle towards the exciting era of digitisation, cloud adoption and virtual workforces is the need for a robust and secure cloud strategy that is geared to maximise the benefits of cloud adoption while mitigating the inevitable and growing risks. Our next article in this series will focus on cloud strategy and governance for your business.

In the meantime read about 5 Cloud Security Basics for your business.

If you want to dive into this topic check out Cisco Global Cloud Index: Forecast and Methodology, 2016–2021 White Paper.

Infographic: Secure remote working with DNS

Download the Infographic

The best way to counter rogue activity is with DNS-layer security that’s always-on … just like your end-users.

What can you do to mitigate the risks associated with “off-network” access to sensitive data and applications?

According to a recent IDG Research Services report, roaming workstyles are the new norm. Workers are dispersed, on the move and increasingly blending their work and personal lives. Unfortunately, they’re also bypassing corporate VPNs to get their work — and personal business — done; and traditional security measures are falling short.

Today’s workers are using laptops and other mobile devices for anytime, anywhere access to corporate networks and to conduct their own personal business. VPN usage is necessary but not always mandatory; and
end-users readily admit to bypassing that security precaution.

  • 45% using their laptops outside the office at least 50% of the time
  • 20% using their laptops outside the office 100% of the time
  • 61% used online banking
  • 51% visited social media sites
  • 52% watched videos
  • Only 16% must log onto a VPN in order to access the internet
  • 82% have browsed the internet without logging into the VPN

Virtually all have gone around the VPN for one reason or another
“I would rather NOT use the VPN as it is slower…”— End-user

Traditional approaches to security — firewalls, proxy servers and anti-virus solutions — are simply not enough to avoid off-network security issues.

Extremely concerned all about enabling your workforce while protecting your business against off-network activity. By adding an always on DNS-layer of security in the cloud, we can help safeguard devices on and off your corporate network, prevent malicious traffic and payloads from reaching
their target, and even apply learnings from internet activity patterns.

Our solution is easy to deploy, transparent to end-users and lightweight to devices — everything you need to quickly and efficiently shore up your network.

Download the Infographic

5 Takeaways from the Cisco 2018 Annual Cyber Security Report

Cisco Annual Cybersecurity Report 2018

Cloud abuse on the rise according to Cisco Security Report

Cisco’s Annual Cyber Security Report 2018 provides an insightful account into the changing cyber security landscape. This article summarises some findings of the report pertaining to cloud security.
Some main take aways from the report that will be discussed in this blog include:
  • Legitimate cloud services such as Twitter and Amazon being used by attackers to scale their activities
  • Machine-Learning is being used to capture download behaviour
  • Cloud Security is a shared responsibility between organisations and its provider
  • There is an increase of belief in the benefits of cloud security
  • Cloud abuse is on the rise
According to the report, increased security was the principle reason security professionals gave for organisations deciding to host corporate applications in the cloud.
Fifty seven percent believe the cloud offers better data security
Organisations who have a security operations team are likely to have a well defined cloud security approach that may include the adoption of Cloud Access Security Broker (CASB) as they deploy to the cloud.
Many smaller organisations however are adopting cloud services without a clear security strategy, there is therefore a blurring of the security boundaries where many organisations are not certain about where their responsibilities end and where the responsibility of the cloud provider starts.
Security in the cloud is a shared responsibility: Cloud Security, DNS, IaaS PaaS Saas
Security in the cloud is a shared responsibility
Cyber attackers are increasingly taking advantage of this blurring of the boundaries to exploit systems.
An increasing trend amongst cyber attackers is to use legitimate cloud services to host malware and command and control infrastructure. Public clouds that have been used for malware activity include Amazon, Google, DropBox and Microsoft.
This makes it doubly difficult for security teams to identify bad domains and take protective measures without risking significant commercial impact caused by denying user access to legitimate business services.
Examples of legitimate services abused by malware for C2
The misuse of legitimate services is attractive to cyber attackers for a number of reasons;
  • Easy to register a new account and set up a web page
  • Adopt use of legitimate SSL certificate
  • Services can be adapted and transformed on the fly
  • Reuse of domain and resources for multiple malware campaigns
  • Less likely that infrastructure will be ‘burned’ (service can just be taken down) with little evidence of its purpose
  • Reduce overhead for attacker and better return on investment
Cyber attackers are effectively using legitimate and well known cloud infrastructure with their attendant benefits; ease of scale, trusted brand and secure features such as SSL. This enables them to scale their activity with less likelihood of detection if current protection methods are retained.
The challenges posed for the security teams defending organisations from these new threats call for a more sophisticated approach because in effect you need to block services that users are trying to access for legitimate work such as Amazon or Dropbox. Furthermore, the legitimate services are encrypted and so malware will be encrypted and evade most forms of threat inspection techniques– the threat will only become apparent after it has been activated on a host.
Intelligent cloud security tools will need to be deployed to help identify malware domains and sub-domains using legitimate cloud services. Such tools can also be used to further analyse related malware characteristics such as associated IP addresses, related domains and the registrant’s details.
An emerging and valuable approach to detect anomalous behaviour is machine learning.
Machine learning algorithms can be used to characterise normal user activity, unusual activity can be identified, and action taken automatically.
Machine-learning algorithms capture user download behaviour 2017
To meet the range of challenges presented by cloud adoption,
organisations need to apply a combination of best practices, advanced security technologies, and some experimental methodologies especially where they need to overcome the use of legitimate services by cyber attackers.

Would you like to learn more? Claim your Free copy of our latest eBook “A View of the Cyber Threat Landscape”. Click here.

I made a call, the customer said no, but I loved it

 

We have been doing our cloud security blog now for a couple of weeks and decided to start to speak directly to some of the contacts who had been reading the blogs. I spoke to one contact from the legal sector (who shall remain nameless) who gave some very interesting feedback.

 

The bad news is that the call did not end up in a sale or a trial of the software, and they didn’t want to meet with us or try out any of our services so there is no fairy tale ending here.

 

What was more interesting was that the customer said about Umbrella cloud security and his current IT partner.

 

On the subject of Cisco Umbrella, he said they had been using it for over a year now and “it was absolutely brilliant”. The ability to automatically block bad domains and to investigate suspected threats was extremely good and he was very happy that they had decided to deploy the product.
Furthermore, he said it was introduced to him by their IT provider whom they have worked with for nearly 10 years now. He said it was a very strong partnership where they had offered an exceptional quality of service, they weren’t the cheapest but it would just be silly for them to look elsewhere at this stage because you get what you pay for and they certainly were getting very good value for money. He felt it would be silly of them to be looking to change under such circumstances. I said to him I hoped my customers felt the same way about the service we provide as we certainly strive to differentiate ourselves in this way. He thanked me for the call and we went t our separate ways.

 

Wow this is what I have been banging on about for what seems a lifetime, it’s not about being the cheapest or biggest, but rather about providing good value for money.

 

What was even more satisfying is the fact that he appreciated what we had been writing about in terms of cloud security and the importance of DNS security. He was totally happy with the Umbrella product and now couldn’t see them operating without it.

 

So I am really happy that though this customer said no to us, they endorsed what we believe and what we have been banging the drum about.

 

Protect yourself against 92% of malware threats that can be stopped at source via secure DNS. The free trial is waiting for you to just click the link and be up and running in 5 minutes. It will be the best cyber security click you’ve ever made.

Test the solution yourself! Free 14 day trial 

What Will You Pay? Costs of a Cyber Attack

What will you pay?

With a 750% increase in ransomware attacks in 2016, a first layer of defense is needed.

View the infographic for new proactive strategies with Cisco Umbrella and keep your business protected.

Click here to view the infographic

Take Control with CASB and DNS

Its been a cloudy blog of a fortnight (pardon the pun but I couldn’t help it). To summarise we have been looking at the changing IT landscape and the consequent change in the threat landscape. We then looked at how organisations need to change their approach to cloud security to address this new reality.

 

The age of digitisation is bringing about a dramatic change to the IT landscape. Digitisation is about new efficient ways of doing things at scale. It’s about automation and new ways of engagement with customers in a way that suits them and at a time that suits them.

 

Digitisation is turning century old industries on its head as new players emerge that are agile, visionary and creative at a rate it’s outpacing their peers.

 

The new IT landscape is about DevOps “scoring an end goal” around or despite IT. Being applied to conceive and deploy apps in a fraction of the time it used to take using a conventional approach. Its about using the cloud to take advantage of Infrastructure, Platform or Software as a Service and being able to globally scale an application.

 

The new IT landscape is also about anytime anywhere access for users/employees. Power is being devolved to branch offices because they need better connectivity to access their new apps in the cloud. Analysts are saying that approximately 50% of users now access their applications remotely and 25% actually work remotely.

 

We also need to factor the explosive growth of IoT and the pervasive use of mobile devices to access the web.

 

Digitisation is a bright new horizon but it also brings major security headaches. Some of these include;

  • A massive increase in cyber attack landscape, more devices, more apps, more points of access
  • Increase in the number of alerts security teams need to process and understand
  • More applications to monitor and manageLack of visibility in what users are doing and how they are using apps
  • The growth of shadow IT exposing corporate information and services to attacks
  • Outdated non-cloud savvy security relative to the emerging landscape

 

Cyber attackers have evolved in sophistication to keep apace of the changes in IT. They constantly evolve their exploits, they are offering attacks as a service, they are using cloud scale computing power as well. Cisco’s annual cyber security report identifies that the scale and sophistication of attacks have increased over the past 12 months.

 

Security teams need to evolve their approach to security making it cloud centric with the ability to protect users and data anywhere anytime. Remember cloud services still require organisations to take responsibility for the security of their data. Gartner has identified that 95% of data breaches will be the fault of the end user.

 

Some of the essential tools that security need to include in their new armoury include secure DNS services as well as CASB services. DNS will block access to malware sites before they happen, or if a machine has been infected, it will block the command and control call back. CASB has the ability to monitor user activity in the cloud, profile applications in use and prevent data leakage. Both tools can also provide invaluable visibility into the normal behaviour of users and trigger protective actions and alerts as and when behaviour varies from the norm.

14 Day Free Trial of Cisco Umbrella

Get started in 30 seconds

No credit card or phone call required

 

WHAT IS INCLUDED?

  • Threat protection like no other — block malware, C2 callbacks, and phishing.
  • Predictive intelligence — automates threat protection by uncovering attacks before they launch.
  • Worldwide coverage in minutes — no hardware to install or software to maintain.
  • Weekly security report — get a personalized summary of malicious requests & more, directly to your inbox.
  • 1,000+ users? — You’re eligible for the Umbrella Security Report, a detailed post-trial analysis.

See how easy Umbrella is to instal

In the Cloud you need CASB: How to Secure the Cloud

We introduce another acronym yesterday, CASB (Cloud Access Security Broker) and we now expand on the features and benefits of deploying a CASB solution as we continue in our approach to cloud security. We noted in our previous blog that cloud security was a shared responsibility between service user and service provider. Gartner analysis indicates that by 2021, 27% of corporate data will bypass perimeter security. In addition by 2020, 95% of cloud security failures will be the customer’s fault.

 

Cloud Umbrella, DNS, Firewall, Cloud Security, Data Breach

 

Securing the cloud will need a robust security approach which includes features such as the ones outlined below;

 

Cloud User Security

Attackers are defeating today’s security controls that rely on the network perimeter, firewalls, or a specific platform. Activities across platforms are not correlated, making it difficult to identify suspicious behavioural patterns. At the same time, security teams are inundated with alerts that lack priority, useful information, or context. Faced with a flood of unhelpful notifications, the legitimate security breaches get overlooked. This problem is magnified with the use of cloud applications and platforms, as organisations often have little visibility into the activities of their users in their cloud environments.
A CASB can analyse user and entity behaviour, using the analytics to profile behaviour and detect and respond to anomalies in real time, while alerting security teams.

 

Cloud Data Security

The number one cloud security concern for organisations is storing sensitive data in the cloud. 53% of organisations rated this top of their list. A CASB is an effective solution to address this by enabling tuneable policies to be deployed to monitor and provide data loss prevention. In the event of a policy violation, a CASB can initiate an automated response mechanism that can notify users, encrypt connections and quarantine data as necessary.

 

Cloud Applications Security

Unauthorised cloud applications is now a major security hole being exploited by cyber attacks. Discovery and security rating of cloud applications are therefore another essential feature that is needed to determine compliance with the organisations security policy. The ability to also block or whitelist applications may also be a necessary measure for compliance.

 

Correctly configured the CASB solution should provide the following benefits;

  • Detect and respond to compromised accounts
  • Detect and respond to malicious insiders
  • Monitor and secure privileged accounts
  • Protect sensitive data in the cloud
  • Enable compliance with cloud data
  • Gain full visibility into cloud app usage
  • Block cloud malware
  • Secure cloud marketplace apps

Securing SaaS Applications: How to Secure the Cloud

Security in the cloud is a shared responsibility: Cloud Security, DNS, IaaS PaaS Saas

 

More organisations are adopting a cloud strategy to leverage cloud services and enjoy the associated speed of development and deployment. One of the biggest challenges, however, is creating the balance that provides an appropriate level of governance over the use of cloud applications that still empowers users to leverage these services.

 

We recently highlighted a news article (read it here) about a tool that was able to trawl through Amazon Web servers and access potentially sensitive data hosted by a number of organisations. The tool highlighted flaws in the configuration of servers in the cloud. This is a good example possibly of a rush to deployment that left good cyber security practices behind.


In this blog series, we have discussed the need for a pervasive cloud centric cyber security approach that not just protects the user but also the data.

 

Cloud service providers are responsible for the security of their infrastructure, while organisations that use those services are responsible for user activities on top of that infrastructure. Cloud service providers will build security into their platforms and environment, however, if the data is being accessed by the wrong person or used inappropriately, they will not be aware of that. Additionally, they do not know what applications an organisation has approved or disallowed. 

 

The cloud centric security approach, therefore, needs to have extensive visibility of who is accessing applications and data and how they are using it. The security approach must have the ability to identify malicious infrastructure and protect sensitive data from it. Compromised accounts need to be identified as well as potential malicious insiders. The emerging security tool that addresses this security concern is the cloud access security broker (CASB).

 

A cloud access security broker helps organisations address a range of cloud security vulnerabilities by providing visibility into the applications in use, profiling them from a risk perspective, and enforcing policies especially around data loss prevention (DLP) and user activity.

 

A good CASB implementation will also provide for the retrospective discovery of sensitive data and malware in cloud applications. The CASB should also integrate with network based entities to give visibility into real time data, threats in motion, as well as preview historical use of cloud applications.

 

In our next episode, we will take a deeper look at CASB and how they can work more effectively with other security tools to secure the cloud.

Free eBook: A View of the Cybercrime Threat Landscape

 

$2,235,018 per year

The average amount SMBs spent in the aftermath of a
cyber attack or data breach due to damage or theft of IT
assets and disruption to normal operations.

The amount is staggering, and enough to jeopardize the viability of
many companies. Yet the business benefits that come with the internet,
Cloud computing and other applications are impossible to forego
and remain competitive.

That’s why business owners and executives are asking one question:

  • Is our internet safe?

If your service provider can’t demonstrate how it is making you
company less likely to become a victim of cybercrime, then it is time
to consider alternatives.

In this eBook, we’ll outline what companies are up against
today, and how Cisco Umbrella can help bring you peace of mind.

Download the eBook here!

What Next?

 

Trial Cisco Umbrella for 14 Days, completely free and no obligations!

If you have read the last few updates you should now have a deeper understanding of Cloud Security, that’s great! But what can YOU do about it? 

We are offering a 14 day trial of Cisco Umbrella, the industry’s first Secure Internet Gateway in the cloud.

Cisco Umbrella provides the first line of defence against threats on the internet. Because Umbrella is delivered from the cloud, it is the easiest way to protect all of your users in minutes.

It takes no time to install and you don’t have to provide any payment details (or even have a phone call).

So what have you got to lose? 

Click here to start your trial! 

See how easy Umbrella is to installwatch this video 

Block 82% of cyber threats before they get you: How to secure the cloud

Cloud Security DNS

In our previous blogs, we looked at the changing IT landscape and how cyber security protection needs to change to meet the new challenges and cyber threats.

 

  • We know that cloud adoption in the form of SaaS is pervasive.
  • Remote working is the norm providing increased flexibility, costs savings, higher productivity and generally a happier workforce.
  • More power is being devolved to branch locations as they contribute more to an organisation’s success.
  • Branches need more speed and direct internet access to more efficiently support the adoption of cloud.
  • IoT connectivity is growing apace as is mobile device connectivity which is outpacing fixed devices.
  • Cyber threats are increasing in scale and sophistication and we have experienced a number of attacks on a global scale, this trend is likely to increase and accelerate.

 

The rapidly changing IT landscape characterizes a new era of digitisation where IT adoption and automation of business processes is happening at a scale rarely seen before. The changes are bringing about a paradigm shift in our approach to providing cyber security where we need to essentially provide continuous, pervasive protection for known and unknown threats. As we continue in this series we discuss some technological approaches to delivering pervasive cloud centric security.

 

Securing DNS

We are aware of the pivotal role of DNS in getting us connected to literally any service we need to access, whether via email, web or a bespoke application. DNS is a service we always make use of. So how can securing a simple background process like DNS have a dramatic effect on an organisation’s cyber security posture?

 

DNS security can act as a form of perimeter security where the perimeter is pushed back to the source of the cyber threat. So the threat is initially blocked at the source or its point of origin. How this works is that the DNS points to a secure DNS service with up to date threat domain intelligence and machine learning that discovers and protects against emerging threats. Remember that 100% of organisations interact with known malware domains. Securing DNS will instantly block these connections as they are requested, as well as blocking future domains that have been identified as malware hosts.

 

If a previously infected device connects to the network or service, secure DNS will block the command and control call back to the malware domain and notify the security team.

 

This level of security is highly scalable in that it can be provided for an individual roaming client, a branch site or the organisation’s principle location.

 

Another useful feature is the ability to track normal behaviour for your organisation in terms of the rate and volume of requests over time. Anomalous behaviour can then be detected by comparing significant changes in normal behaviour.

 

A secure DNS solution will also provide detailed information about the malware domain such as IP addresses, associated domains and attacks associated with these domains. A robust, secure DNS solution could also provide a data feed into other security components in the organisation, thus sharing security updates that can be actioned elsewhere in the security stack.

 

In our next blog, we will take a look at how SaaS applications can be used in conjunction with secure DNS.

 

Trial Cisco Umbrella for 14 Days, completely free and no obligations!

If you have read the last few updates you should now have a deeper understanding of Cloud Security, that’s great! But what can YOU do about it?

We are offering a 14 day trial of Cisco Umbrella, the industry’s first Secure Internet Gateway in the cloud.

Cisco Umbrella provides the first line of defence against threats on the internet. Because Umbrella is delivered from the cloud, it is the easiest way to protect all of your users in minutes.

It takes no time to install and you don’t have to provide any payment details (or even have a phone call).

So what have you got to lose?

Click here to start your trial! 

See how easy Umbrella is to instalwatch this video 

Win Big by Securing DNS: How to Secure the Cloud

 

Adoption of cloud based technology and the proliferation of remote working is driving a new approach to security that needs to be omnipresent providing the highest practical levels of cyber security for the user, the network and the data.

 

We reviewed some of the features that were needed for this new security approach and the risks/challenges that needed to be addressed. Security analysts such as Gartner and IDC have a new security term that is relevant to this emerging security environment and have coined it the Security Internet Gateway. The principle function of the Secure Internet Gateway is to secure the cloud environment in the same way that we secure the on-premises environment.

 

Implementing a security platform in the cloud will break the limitations and constraints of centralised solutions. The security must be flexible in line with user access, virtualised to deliver security wherever it is needed and extend beyond just securing web protocols such as http and https. Most security vendors now offer cloud based security solutions and in many instances what they have done is taken a conventional security component such as Anti-Virus or Web Proxy services and deployed it in the cloud. While this may be a good start, a range of other technologies need also to be included in the security stack deployed to protect users and data.

 

When users connect to the web they must immediately undergo inspection and policy enforcement to ensure their connection is being done in a secure manner. These may include but not limited to;

 

  • Visibility and enforcement of policy on or off VPN
  • Security against threats from all ports and protocols
  • Inspection of web traffic and file inspection including behavioural sandboxing
  • Live threat intelligence from global internet activity with near real time updates
  • Visibility and control of SaaS applications

 

Clearly no single solution can provide all of these components, but a Secure Internet Gateway correctly specified could go a long way to providing many of these security measures. Secure DNS must be a major component of the functionality of Secure gateway because of its ability to stop a large swathe of attacks before they reach the user or the data.

 

We have outlined in previous blogs the pivotal role that DNS plays in almost all web based communications, yet DNS is not understood by most users. DNS is involved but not necessarily exploited in 92% of cyber attacks and therefore it can be used in a secured manner to block most attacks. Some examples are that 100% of organisations interact with known malware sites. If these are known to the DNS servers, they could block access with no impact on the user or performance.

 

Once a device is infected with ransomware it will need to make a command and control call to get the key needed to encrypt data. Again secure DNS could prevent this connection and thus block the attack in its track until the key is downloaded, the data cannot be encrypted. Deploying a cloud security solution that includes secure DNS is a quick way of effectively managing the risk of ransomware and stopping the execution of malware once a device is infected.

 

In our next episode, we will provide more details about how secure DNS works and how some of the other Secure Internet Gateway features can be implemented and employed.

Trial Cisco Umbrella for 14 Days, completely free and no obligations!

If you have read the last few updates you should now have a deeper understanding of Cloud Security, that’s great! But what can YOU do about it?

We are offering a 14 day trial of Cisco Umbrella, the industry’s first Secure Internet Gateway in the cloud.

Cisco Umbrella provides the first line of defence against threats on the internet. Because Umbrella is delivered from the cloud, it is the easiest way to protect all of your users in minutes.

It takes no time to install and you don’t have to provide any payment details (or even have a phone call).

So what have you got to lose?

Click here to start your trial! 

See how easy Umbrella is to instal: watch this video