Categories
Uncategorized

Scammer Check: An Expert Guide to Avoiding Online Security Threats

Internet fraud manifests in many forms, and it wouldn’t hurt to have a scammer check. Cyber thieves are still alive and kicking, often using email tricks for financial information, pop-ups that infect your computer with malware—even resorting to catfishing to forge fake romantic relationships.

In the last five years, the FBI Internet Crime Report tallied a total of $13.3 billion in reported losses. Although anyone can fall victim to online scams, older adults stand at higher risk as they have more to lose.

These numbers are frightful, but unplugging from the internet is likely not a viable option in this modern world. So, how can you reduce exposure to cybersecurity threats and stay safe online? This scammer check serves to take you through the optics of common internet scams and how you can avoid them.

What are Internet Scams?

Cybercriminals prey on their victims using online services or software, attempting to obtain financial or personal information through email accounts, social media, dating apps, etc. In the end, the successful crime results in the victim losing substantial amounts of money or not receiving promised funds.

Rise in Internet Scams since COVID-19

Unfortunately, the global pandemic has brought forth more fraudulent cases on the scene. Find out how COVID-19 impacted data protection for many businesses or read about the latest online scams below:

Rise in Internet Scams since COVID-19

Read MoreHow to Implement Data Protection for Employees in Malaysia

Types of Internet Scams

These days, scammers are getting creative with ways to defraud victims through the internet. The first step in protecting yourself would be to recognise these methods.

Social Media Scams & Impersonation

Social networking sites are the motherlode of valuable personal information. Aside from aesthetic pictures, social media is also filled with fake posts about COVID-19 and fake accounts.

Take Facebook and Instagram, for instance. Fraudsters tend to copy a real account’s name, profile picture, posts and so on, creating a second identical account. Then, they target the original account’s friend list, sending follow requests to gain access to their profiles.

  • Scammer check: One might dismiss cloned accounts as a scam, considering the number of secondary accounts by the same person. However, it’s best to contact your friend directly if you get any suspicious friend requests. Ensure to report these accounts to Facebook or Instagram.
Coronavirus Emails

The deadly virus has affected us in various ways, including posing a threat to our online security. There have been emerging scams with false claims of cures, tests and vaccinations for sale, even going as far as to offer dirt-cheap deals on toilet paper.

  • Scammer check: Receiving emails full of links to great deals or vaccinations from unknown senders are never a good sign. Some may claim to be an “official” source but keep in mind that vaccination notifications don’t come in emails. Instead, head directly to official websites, such as WHO or CDC, to acquire factual information and news.
Quick-Money Promise

You’ve likely seen this scam everywhere. It could begin from a simple phone call, email, or LinkedIn message, endorsing a job that requires little effort for fast cash. As much as we want it to, the world doesn’t work that way.

Typically, these scammers would target those looking for new or WFH jobs. Once you secure the job, they’ll require you to fill up personal details like bank information, address, etc. But rather than receiving a pay cheque, you’ll be handing over entry to your financial accounts.

  • Scammer check: When a job position appears too good to be true, it probably is. Therefore, it’s best to stick to reputable sites during job hunts and do thorough research on the employer.
Online Romance Scams

Cyber thieves love preying on the vulnerable, and that includes people looking for love online.

First, they’ll start a conversation with an unsuspecting individual, establishing a romantic relationship. Gaining the victim’s trust, they might start asking for money, insisting that it’s for an emergency or for flying out to visit the victim.

  • Scammer check: It’s a red flag if your online partner never fails to produce excuses for why you can’t meet in person. Never allow access to your private financial accounts or transfer money to an internet stranger.
Malware Scams

Malicious software presents itself in deceptive ways: pop-up security warnings, links to news articles, phishing emails, etc. The perpetrator might scare their victim with pop-up warnings of virus infection, directing them to download fake antivirus software.

Clicking these embedded links will trigger malware installation, allowing the software to take control of your device, scan your private information, perhaps even destroy your files.

  • Scammer check: Such scams can look like legitimate messages from well-known computer security providers. Avoid clicking on any links, opening attachments, or even replying to the message.
Malware Scams - Scammer check

How to Avoid Online Security Threats

1. File a Complaint

If you’ve been scammed in Malaysia, gather all pertinent details regarding the incident and file a complaint to MCMC. Analysts will review your complaint, proceeding with an investigation to the appropriate law enforcement or regulatory agencies. Hopefully, you can pursue legal action against the perpetrator.

Also, familiarise yourself with widespread frauds, so you and your loved ones can identify them before the downfall.

2. Avoid Responding to Unsolicited Calls or Emails

Don’t offer up personal or financial information if you get a suspicious call or email from a supposed “tech expert”. Keep in mind to always ask for proof of identity about the company before proceeding any further.

3. Install Antivirus Software

Security software is specifically designed to prevent malware and ransomware from embedding on your computer. It works by removing any detected malicious code, such as a virus or worm.

Consequently, if you do click on a dangerous link, the software can safeguard your files against threats. Of course, be sure only to entrust your data with official vendors.

Read More: Endpoint Protection vs Antivirus: How Are They Different?

4. Always Back Up Data

Businesses should make regular copies of corporate data to a secondary site or cloud storage, lest they lose vital data in a cyberattack. Never rely solely on home networks, as they are not the most secure.

Moreover, it’s also important to back up critical data on all endpoint devices, including laptops, tablets and smartphones.

Aegis is a leading cloud backup and disaster recovery service provider in Malaysia, offering reliable and cost-effective cloud backup and disaster recovery solutions. Our services include Endpoint Data Protection that guarantees the safety of remote users’ data, and complimentary unlimited Disaster Recovery resources for business continuity. 

Categories
Uncategorized

Key Aegis Features You’ll Need to Beat Ransomware

Ransomware. The bane of all cybersecurity teams’ existence.

To this day, this imminent threat continues to instil headaches, financial losses, and irksome disruptions to business operations. Ransomware is the ultimate devil of all malware, severely unleashing chaos on operations and making it challenging to recover.

Ransomware restricts access to your corporate data, subsequently halting IT operations and all their reliant systems. But of course, there are effective strategies to enforce protection, such as a disaster recovery solution. A DR plan can help organisations recover their data and get them back online as fast as possible to avoid prolonged downtime.

Read More: 5 Steps to Recover Your Server After a Ransomware Attack

Key Aegis Features You’ll Need to Beat Ransomware

Aegis is a trusted cloud backup and DR provider that aids organisations in ransomware resilience. With Aegis, businesses can prevent the disastrous ramifications from ransomware attacks with data protection and recover quickly to meet their recovery time objective (RTO) and recovery point objective (RPO).

Here are some crucial features that will not only help you recover from an attack but also strengthen your IT systems and backups for early preparation against ransomware:

1. Recover data in a matter of seconds

Aegis’ data protection services utilise cloud hosting and hourly virtual machine (VM) to replicate enterprise data to a secondary site, ensuring data resiliency and safeguarded software. By leveraging cloud computing and unlimited disaster recovery resources, clients can access instant restores for any workloads and reduce the impact of ransomware attacks.

2. Resume operations as soon as possible

When ransomware hits, response time is first on the damage control list. One must act fast to stop the spread of encryption across business networks to avoid further disruptions to applications and data. Aegis provides disaster recovery services in accordance with your RTO and necessary premises, minimising downtime to ensure business continuity. With Aegis 1Price-Any-Technologies (1PAT), we can cater to different RTO or RPO requirements, guaranteeing the workability of the backup solution.

Resume operations as soon as possible
3. Multiple copies of data for recovery

Did you know that ransomware recovery could be more costly than conceding to the ransom? That’s what most hackers rely on when they infect your systems. This dangerous malware is perfectly capable of attacking local backup copies to prevent recovery.

Therefore, with Aegis’ 4-3-2 Backup rule, Aegis provides clients with multiple backup copies locally and remotely to guarantee uncorrupted data for a speedy recovery with minimal data loss. In turn, implementing recovery on any requisite sites is highly doable.

4. Successful and non-disruptive DR testing

Having a solution in place does not mean you’re done for the entirety of your business. After all, how would you be sure that it works and that you’re 100% secured? Hence, Aegis offers complimentary unlimited DR Drills throughout the year, assisted by dedicated DR professionals to guarantee the success of every drill.

Upon completion, Aegis’ DR Drill team provides clients with updated documentation and consultancy for their business IT needs.

Read More5 Benefits of Cloud Scalability for Businesses in Malaysia

5. On-demand scalability for increased demands

As your organisation grows, you will have more digital assets to protect. Simultaneously, you will need increased performance or capacity that usually requires complex infrastructure, added capital expenditures, maintenance and management.

On that note, Aegis enables on-demand flexibility and scalability to replicate and restore corporate data for different systems. With Aegis Fully Managed Service, clients can expect proactive monitoring, managed services and Aegis DR-As-A-Service (DRaaS) for unlimited complimentary DR resources without capital expenditures.

Read MoreRansomware Trends and Prevention Strategies: Learning From the Past

Final thoughts…

A vital reminder to take away is that ransomware is a threat to every company, regardless of size. Why wait for it to happen to you before deciding it’s time to deploy the right solution for your business? With these robust features from Aegis Cloud Backup and Disaster Recovery, you can have the upper hand.

Categories
Uncategorized

5 Things the Media Hasn’t Told You About Cybersecurity in Malaysia

In the wrong hands, digital information can be easily leveraged as weaponry. Malaysia has long readied itself for potential cybersecurity issues as a national strategy, setting a strong precedent for other developing countries.

However, CyberSecurity Malaysia received an astonishing 838 incidents in less than a month alone back in 2020. These cybersecurity cases mostly comprised cyberbullying, intrusion into unauthorised systems, and fraud. Considering that the increase in cases coincided with the first MCO, many fraudulent cases involved phishing and email scams feigning legitimate information on COVID-19. 

No matter how prepared the cybersecurity industry is in Malaysia, let’s face it. Hackers and online predators are rising in our midst, and the internet is their playground. To better protect yourself against such attacks, we’re here to inform you of 5 things the media probably isn’t too keen on disclosing to the public.

1. Cyberattacks can happen to anyone

It’s easy to think that cyberattacks are something to gloss through over the news instead of a horrendous fate you’d ever face. But if our state government can fall victim, and it has, then so can you.

Various cyber intrusion attacks, such as data breaches, have been targeting local businesses as of late. Cybercriminals also tend to target individuals within a larger organisation to obtain illicit data or internet with company systems.

When that happens, it could cost you millions in ransom fines and expenses to recover the data. Moreover, company executives and associates would be in danger of losing their job positions. 

2. Social media is a hacker’s favourite hunting ground

This next one comes as no surprise since over 3 billion users are active on social networking sites. Often, we click on links posted by friends on social media platforms without much thought, prompting hackers to take advantage. Let’s take a look at some types of cyberattacks common on SNS:

  • Like-jacking: Cybercriminals post fake Facebook ‘like’ buttons to webpages that download malware.
  • Link-jacking: Hackers redirect users who click on a trusted site’s link to malware-infected websites with drive-by downloads or other infections.
  • Phishing: Acquiring sensitive information, i.e. usernames, passwords, credit card details, disguising itself as a trusted entity in social media messages.
  • Social spam: Unwanted spam content on SNS or websites with user-generated content, such as comments and chats. It appears in the form of bulk messages, malicious links, fake friends, fraudulent reviews, etc.

Read MoreVishing Scams: How to Protect Yourself from Voice Phishing Attacks

Social media is a hacker’s favourite hunting ground

3. 99% of computers are vulnerable to exploitation

It is a cybersecurity fact that 99% of computers have Adobe Reader or Adobe Flash. Consequently, these computers, likely including yours, are highly vulnerable to software exploits.

These kinds of software present vulnerabilities so critical that one click on a fraudulent advertising banner can hand over full access of your computer to a hacker. In addition, attackers often utilise these security holes in Flash to infect your computer with ransomware.

The best way to protect your information would be to ensure your software and operating systems are continually updated. You can install updates to run automatically and silently to avoid manual actions. 

4. Fast-advancing technology will only cause more attacks

The emergence of 5G networks has unfortunately cultivated multidimensional cyberattack vulnerabilities. Not to mention the exponential growth of IoT that has led to billions of connected devices. Hackers are now using AI and machine learning to unleash automated cyberattacks on secure systems in masses.

Hence, this new landscape of networks calls for a renewed cyber strategy. Cloud backup-as-a-service has since increased as a cybersecurity solution, with Aegis at the forefront of reliable cloud backup providers in Malaysia. 

5. Inside jobs are a thing

The last essential aspect to factor into cybersecurity is that employees are capable of stealing proprietary corporate data. Besides disgruntled employees who quit or were let go, you should also consider:

  • Malicious insiders, who can cause significant and costly damage;
  • Exploited insiders, who may be tricked into providing data to external parties; and
  • Careless insiders, who may cause accidental deletions or modifications of critical information.

On the whole, it’s in everyone’s best interest to avoid clicking strange links, blindly giving away confidential information, and be proactive in raising security red flags to employees. It is also wise to have a long-term cybersecurity solution in place, which Aegis seeks to proffer!

Learn more about our cloud backup and disaster recovery services and strategies with us to build an impenetrable network. 

Categories
Uncategorized

Endpoint Backup Saves Businesses

There is no arguing that endpoint backup saves modern businesses. The Covid-19 pandemic has transformed the entire exemplar of work. Successively, the digitalisation of processes has placed a new importance on electronic data.

As the value of digital data grows, businesses must incorporate proper data security in their development strategy—even more so now that the General Data Protection Regulation (GDPR) has come into play. The number of remote employees looms larger than ever, which increases data migration from primary servers to end-user devices.

Traditional data protection solutions can no longer support such infrastructures that are holistic to remote desktops and laptops. In consequence, unsecured endpoints with valuable data will inevitably endanger the continuity of business processes.

Read MoreHow to Implement Data Protection for Employees in Malaysia

Why is endpoint backup so important?

Firstly, companies must realise what information is stored on these endpoint devices and evaluate the data’s actual value. Because more often than not, such documents and applications are impossible to recreate once lost.

In many cases, companies fail to perform regular backups and must face the music when they cannot restore data entirely after a hardware failure or cyberattack. Inadequate backups are unfortunately quite common amongst businesses, either due to device errors or human error. For example, endpoint devices might not complete backups, or backup administrators could miss important alerts and act too late upon server failures.

Traditional solutions known as “Legacy backups” were specifically for predictable physical environments, i.e. servers backup and databases. With this ever-changing IT landscape, it is outdated in the digital age, unable to support infrastructures with endpoint devices.

Even SaaS-based applications are susceptible to failure, prompting service providers to recommend that users back up their data using third-party services. On the other hand, modern endpoint backup solutions are more efficient in securing additional locations, ensuring high scalability, and preventing overload on terminal devices.

Read More: Managing and Securing Cloud Endpoints in the Era of IoT

Why is endpoint backup so important

What are some elements of a good endpoint backup service?

Enhanced Security

A modern endpoint protection service should employ the highest level of security for your sensitive data. Files should be encrypted on the user’s end before transferring to storage through a secure connection. With Aegis CEB, we ensure military grade encryption of all data in motion and at rest.

Easy Management

User management is vital when it comes to endpoint backup policies. Aegis CEB allows for easy deployment of policies, wherein users can create automated and silent backups to the Aegis Cloud as frequently as every minute. Our centralised management also simplifies IT administration and reduces the burden on IT teams.

Read More: Remote Cloud Backup Solutions for the Workforce in Malaysia

Quick & Dependable Restoration

Secure endpoint backup solutions should enable users to restore data quickly without additional IT support, even from remote locations. Although Aegis CEB provides unlimited cloud backup storage, users can employ incremental restores on selected files and devices, whether it is the same device or a new one. Upon misplacement or theft of an endpoint, we leverage device location tracking and enable remote data-wipe during emergencies.

Learn more about Aegis Cloud Endpoint Backup and why it’s the superlative solution that will save your business.

Categories
Uncategorized

The Hard Truths About External Hard Disks

Many business data backup plans hinge on hard drives to store secondary copies of data. In all fairness, implementing backups on an external hard disk is better than not backing up in any way. However, your data is only as protected as the backup methods you keep, and there are indeed vulnerabilities that come with this one.

Before resigning to this as your sole backup solution, let’s take a look at the hard truths about external hard disks that are worth considering:

Hard disks all fail eventually

The reality is that backup devices such as hard drives reach their demise way sooner than their recommended lifespan than regular drives. An external hard disk can also fail due to various reasons that occur every day.

Physical storage devices like these are especially susceptible to damage, general wear and tear, natural disasters, etc. Moreover, viruses and human error can result in data loss. And let’s not forget other human mishaps such as misplacing these devices.

Read More: 5 Fatal Human Errors that Result in Data Loss in Malaysia

Recoveries are unpredictable

Data loss includes logical failure and physical device failure risks, both of which vary in recovery time and expenses. Logical failure is a non-tangible failure commonly caused by viruses, power surges, and malware. The recovery services it entails may be less expensive, but it is essential to discover the root cause of failure. Sometimes, with ransomware and viruses, the encrypted data is often unretrievable without data backup or succumbing to cybercriminals’ demands.

On the other hand, data recovery tied to physical failures can be more expensive and time-consuming. This is because we have to consider the processes of disassembly, external hard disk repairs, etc. Either way, you would be toeing a risky, fine line.

There may not be warning signs

When hard drives make screeching and clicking noises that generally do not seem right, you can safely assume that it’s nearing its end. Or, when its speed slows down and you have trouble opening files, you might be in danger of losing critical data.

However, warning signs do not always present themselves in such conspicuous ways. You could lose important files and data without any warning, as just like recovery, hard drive failure is unpredictable. Thus, planning and preparing for unforeseeable occurrences is always wise to mitigate data loss early on.

External hard disk loss can be prevented

Hard disks are actually helpful for speedy recoveries if your primary drive fails. Regardless, ransomware is constantly on the rise, and it’s vital to consider the physical proximity of the external drive with your primary drive. To effectively prevent any loss, the key is to store your data in a separate location.

External hard drive loss can be prevented

Cloud storage solutions have revolutionised how businesses and consumers safeguard their data. Of course, you don’t have to choose between the two if hard disks still give you a sense of security. But backing up data to the cloud is a popular option that is here to stay, one you can certainly benefit from tremendously.

Access data anytime, anywhere

With data stored in the cloud, you can access it anytime and from anywhere with an internet connection. Plus, this availability is not limited to any devices—you can access data from your laptop, tablet, or smartphone.

More protection from disasters

Secure cloud storage services offer an extra layer of protection for your data, storing a secondary copy offsite. Like insurance policies, you’ll be glad for this additional measure in case the unthinkable does happen.

Read More: Understanding the Role of Cyber Insurance in Cloud Security

Better encryption and security

We understand that splashy headlines of major corporations getting hacked would raise valid concerns on whether you can entrust valuable data in the cloud. However, overall, reputable cloud storage providers are much better at securing user data compared to other types of online companies.

And with a leading enterprise cloud backup and disaster recovery service like Aegis, rest assured your data is in the best hands. Learn more about the cloud backup and DR services we offer, bundled with complimentary unlimited DR resources and fully manage services.

Categories
Uncategorized

Cold, Warm or Hot? What’s the best DR Site for your company?

So, you’ve decided to reassess your disaster recovery plan. The next step, and likely the toughest choice to make, is determining the best type of DR site for your organisation. Cold, warm or hot?

Realistically speaking, all three options can aid your company in times of disaster. With deliberate planning and revision, they can also protect your business’s critical data. Different DR sites vary in cost, which is a crucial factor to consider for budgetary reasons.

In this article, we will offer some guidance in choosing the most appropriate DR site setup. Hopefully, we will better prepare you on what to expect when outsourcing third-party services and private facilities.

What are Cold, Warm and Hot Sites?

Think of the various options as alternate sites established to protect data centres — hardware and software, systems and services, and operational data needed to run your business.

Fundamentally, there are two alternate site arrangements: internal and external. Organisations hosting large information requirements and vigorous recovery time objectives (RTOs) usually have internal recovery sites. This is a second data centre that provides recovery and business continuity resources following a primary data centre malfunction.

If your company does not have the funding or need for secondary sites, the external solutions — cold, warm or hot — prove effective for protecting data centres.

  • Cold Site:A data centre with associated infrastructure, i.e. power, communications, and environmental controls supporting IT systems only installed when DR services are activated. It is the cheapest choice of the three. However, it is only for an organisation or specific data that can be down for an extended period because it takes a comparatively long time to get the DR site running. 
  • Warm Site:A partially equipped data centre with network connectivity and the necessary hardware equipment already pre-installed. This is the closest that you can get to replicate the primary site. Data synchronisation between the primary site and warm site is performed daily or weekly, resulting in minor data loss. A warm site is perfect for organisations that can tolerate a short period of downtime. This type of DR site is the second most expensive option.
  • Hot Site: A fully operational site that has live customer data, equipped with computing hardware and software and supporting personnel. It is also staffed 27/4, ready for companies to operate IT systems when DR services are activated. This is the most expensive option among the three, but it is also the easiest and fastest to get your DR site running.

Source: ISO/IEC 24762:2008

Disaster Recovery (DR) Sites Deciding Criteria

The predominant benchmark most likely to influence your selection of DR sites is RTO and cost vs risk. For instance, mirroring critical data in real-time to an off-site premise may be appealing, but your budget may prohibit such ambition. In this case, costs would go into the services, mirroring technology, and the considerably high network bandwidth required for data transmission.

Since alternate sites are shared facilities, they represent a shared risk. Can your company risk data loss while using a solution without real-time mirroring?

Another thing to contemplate is the make vs buy. The criteria that influence this decision include RTO, cost and risk. Should you consider building an internal system, let alone fund it? Can your company afford the cost vs the risk?

Work-Area Recovery

Work-area recovery involves getting employees back to work rather than simply getting systems up and running. Numerous vendors are offering work-area recovery, making it the most significant growth area in the sector.

Of course, people are the foremost concern in traditional alternate sites. After all, where will they conduct business operations when primary offices are unavailable? The only thing left to do would be to temporarily relocate them.

A much-neglected issue is that some employees bring their children to work-area recovery centres. Leaving their children to work at a distant recovery location for an extended time does not seem feasible, especially not to parents. Moreover, work-area recovery pertains to human resources issues as well. Should you add this distant-working possibility to job descriptions?

Most big companies in public and private sectors have excellent IT recovery plans but lack an ideal work-area recovery plan for their staff. Thus, more education is necessary to shift senior managements’ perception of whether alternate sites are indeed valuable.

Final Thoughts for Consideration

It goes without saying that alternate sites must be far enough from primary offices to prevent effects by the same disaster that has rendered main facilities inoperative. When engaging DR service providers, keep in mind the aspects of site proximity, operational risks, and service-level agreements (SLAs).

Alternatives to conventional alternate sites include cloud-based recovery services, wherein your data resides in the “cloud”. Aegis is a cloud disaster recovery provider that caters to Warm or Hot DR sites, ensuring future-proof solutions and business continuity in difficult times. Complimentary DR seats are also included in Aegis service.

Learn more about our managed cloud DR services that come with complimentary and unlimited DR resources and testing all year round.

Categories
Uncategorized

The Surprising Truth About Regulatory Compliance & Protection

To the common person, regulatory compliance is misperceived as an all-encompassing term that includes security. Some may even think it’s the same thing.

As a result, modern-day startups tend to fixate on meeting compliance standards. From GDPR and CCPA to ISO27001 and SOC 2, achieving compliance takes precedence to sustain operations and geographical expansion. However, IT protection is rarely a given.

Treating compliance and security as one and the same can be an expensive mistake. In truth, compliance infers that an organisation meets a minimum set of controls. In contrast, security contains wide-ranging practices and software that help address the risks associated with business functions.

To cultivate a fully compliant and secure computing environment, let’s start by understanding how it is possible. 

IT Security

We’ll start with IT security as companies need to maintain IT regulatory compliance. Like complying with regulations, security is an act of risk mitigation. And the risks are multi-tiered indeed.

Many young organisations are compliant while still being vulnerable in their protection status. For instance, let’s say a software company meets SOC 2 standards, requiring its employees to install endpoint protection on their devices. Even so, it has no strategy for enforcing employees to activate or update the software.

Plus, let’s say the company lacks centrally managed tools to monitor and report any endpoint breaches, when and how they occurred. This poses a problem, especially if said company is not proficient in quick responses and recovery.

What then?

Companies always have the risk of operational issues that result in downtime, such as system corruption from external attacks, internal threats to on-premise systems, central computing infrastructure, etc. Not to mention, every single endpoint device on the network is exposed to some extent.

So, IT security helps you dictate the actions necessary in line with the number of risks you face. Reacting to problems on the spot is never a viable option. When protecting your network from such threats, you will acquire a more comprehensive understanding than under even the strictest compliance standards.

IT Security

IT Compliance

While regulatory compliance also involves minimising risk, it entails following definite rules instead of securing your systems. Government entities or third-party security structures typically pass down these regulations. Customer contracts contain precise requirements as well.

Consequently, network administrators have their hands full with the obligatory tasks to complete in order to keep their company’s IT compliant with various mandates. In fact, some regulations only dictate the business purchase regulation-compliant hardware without addressing IT infrastructure.

Read More: Building a Resilient IT Infrastructure in Malaysia with Cloud Technologies

Where Does Your Company Stand?

Although you may meet compliance standards, it is evident that security flaws remain. Startups are particularly vulnerable in the face of security breaches, which will eventually become extremely costly.

The danger for businesses in compliance lies in the false sense of safety. Of course, receiving a compliance certificate from auditors or revered professionals can evoke a sense of accomplishment. But that does not mean your security posture is covered.

You should always have a dedicated plan in place to secure all your digital assets aside from meeting your industry’s regulatory mandates. This cybersecurity strategy must prioritise ongoing training, whether for disaster recovery, endpoint protection or Software-As-A-Service (SaaS) protection.

Keep in mind that compliance only deals with defined terms and does not cover new circumstances that could arise. In an ideal world, compliance would equal security from the get-go, but it’s still up to you to enact protection on your digital assets.

Feel free to explore how Aegis can aid you in your cloud backup and disaster recovery needs for maximal security.

Categories
Uncategorized

No joke! Businesses still negligent about SaaS backup

The advent of cloud computing has presented businesses with revolutionary opportunities for firm footing in the global market. Amid cloud computing is software-as-a-service (SaaS), a breakthrough component.

Although it is not unheard of to back up SaaS application data, many organisations are still negligent about this concept. Here are some statistics to illustrate that this, indeed, is no joke!

As early as 2019, the Enterprise Strategy Group (ESG) started conducting reports titled ‘The Evolution of Data Protection Cloud Strategies’. This year, they found that 35% of survey respondents rely solely on SaaS vendors to safeguard their data despite intrinsic limitations.

Suffice to say, the evolution has barely budged.

What most SaaS users fail to grasp is that backing up data is not a standard feature provided. Given the vitality of Microsoft Office 365 documents and records, your organisation must take control of performing backups. Otherwise, data loss could lead to catastrophic consequences that should not be tolerated in the first place.

Defining SaaS

SaaS enables your business to install and run applications without needing a local version of your systems’ or data centre’s software. In other words, you can run software applications such as Office 365 and Google Workspace without the additional investments in necessary hardware.

Furthermore, SaaS facilitates application upgrades and delivers them to their subscribers efficiently. It should allow businesses flexibility (pay-as-you-go models), scalability, and of course, massive accessibility. It’s a wonder why these excellent services do not include backing up data.

Read More: Top 5 Reasons Why Every Business Needs SaaS Backup

The Problem with SaaS Vendor Backup

Did you know that one-third of SaaS users still report data loss in the cloud? The case with SaaS vendors providing data backup as a service involves many vulnerabilities, and unfortunately, very few incentives.

While the cloud is considerably safer than other onsite backup systems, it is not infallible. Older, more established organisations with experienced IT teams might know the importance of translating backup practices to the cloud. But newer businesses tend to believe that the cloud is infinitely safe and can do no wrong.

This misconception fails to consider user errors, accidental deletions, malware and other malicious corruption, be it internal or external. These factors can easily eliminate data located within SaaS storage packages or even cause it to become inaccessible and unrestorable.

Ultimately, the reality is that depending on SaaS data storage for protection is no different from relying on hard drives.

The Problem with SaaS Vendor Backup

Your Data, Your Problem?

Businesses must rid of the perception that the SaaS application provider will protect all their data. Even with built-in capabilities like a recycle bin function, SaaS applications cannot compare to data protection by a third party.

It comes down to your own responsibility for protecting your own data through backup. Whether you have fully migrated to Office 365 or not, you need a solid backup solution that will allow full access and control of the data at hand.

Your backup strategy should also facilitate recovery and restoration of lost data during disastrous events, either from on-premise backup or Cloud backup, and meet compliance requirements. After all, using a backup tool with advanced functions makes maintaining long-term retention policies much more effortless.

The Right People Miss Out on the Message

The problem lies not in the shortage of SaaS backup tools on the market but in informing the right people.

Customers who still think SaaS providers take complete protection responsibility on data restorability are not data management or security teams. Instead, they are outsiders who are inclined to question the criticality of SaaS app data or are willing to gamble against the likelihood of losing it.

Sadly, these people making the primary decisions aren’t close enough to the problem to recognise it.

A ransomware attack could cause compliance issues if personal data is compromised, and the blow to your company’s reputation could be fatal. What’s to happen to the future of your business then?

Consequently, leaders should loosen the reign on cutting costs, expanding and maximising profits—focusing more on protecting what they already have. If your company uses SaaS applications to stay relevant in the global market, facilitating frequent data backups is no longer a mere option.

Employing a Third-Party Expert

Aegis Cloud Office 365 Backup (COB)can help you eliminate the risk of losing access and control over your Microsoft 365 data. This includes data residing in applications like Exchange Online, SharePoint Online, OneDrive, etc., so that your data is always protected, accessible, and restorable.

Now, with Aegis’ limited time offer, clients can immediately save 50% of their subscription for Microsoft 365 cloud backup, with unlimited cloud backup storage. Don’t miss out!

Categories
Uncategorized

Why is disaster recovery moving to the cloud?

Before the pivotal contrivance of the cloud, protecting high-priority business applications involved building and maintaining a second on-premises data centre. This system was costly and, not to mention, an exhaustive operational exercise.

Today, Disaster Recovery solutions can augment data centres to the cloud for practicality in costs and expediency. Furthermore, modern organisations are increasingly leveraging the cloud for their DR needs.

According to Transparency Market Research, Disaster Recovery-as-a-Service (DRaaS) is growing steadily year after year. By 2020, approximately 90% of DR operations have since moved to the cloud.

Back up… What is DraaS?

As you may know from our previous article, DRaaS comprises replicating and hosting physical or virtual servers in the cloud. In times of disaster or disruption, companies must ensure failover can be granted to assume business functions.

A reputable service provider’s off-premises infrastructure can provide aid during seemingly trivial outages to havoc-wreaking natural disasters and cyberattacks. That way, your organisation can carry out its DR plan immediately and minimise excessive downtime, preventing data loss.

So, why is disaster recovery moving to the cloud?

The reasons for moving DR to the cloud are abundant, and you will reap numerous benefits such as:

1. Cost-efficiency with low upfront costs

Accordant with what we mentioned earlier, you no longer need to purchase equipment and build on-premises data centres. After moving disaster recovery to the cloud, companies gain significant savings on hardware, software, IT staff, facilities, utilities and the likes of other traditional expenses.

Cost-efficiency with low upfront costs
2. Flexible payment options

In case you weren’t aware, most computing programs and applications offer a subscription-based approach. Consequently, organisations have the freedom and flexibility to scale up or down, coinciding with their respective budgets and needs.

Likewise, it eliminates the possibility of a considerable upfront capital expense.

3. Relocate CapEX to OpEX

Employing a cloud solution also enables your business to move high capital expenses to operational expenses. Yes, this means it negates the hassle of managing and updating onerous hardware. As a result, your IT team can readjust their focus on driving more revenue.

4. Fast, secure and consistent recovery

With the ever-advancing technologies, cloud-based DR allows you to attain your RPO and RTO goals rather effectively. Even when the worst happens, you can quickly restore files and recover workloads from cloud backup.

5. Data encryption

Cybercrime is on the rise now more than ever, and data continuity should always be a top priority in your business continuity and disaster recovery planning. Establishing cloud-based DR ensures that your data is encrypted both in transit and when dormant.

Data encryption

Which DRaaS solution is right for me?

The answer to this is pretty standard. Essentially, you want your DR solution to protect your crucial company data and applications. It should recover your environment in line with your RPOs, RTOs, and budget, all whilst adhering to compliance requirements.

Upon implementing your solution, remember to include a thoroughly tested and managed DR plan, complete with 24/7 failover and instant recovery. That way, you make sure that you’ll be able to access it from any location without a hitch!

Choosing a Managed Cloud Disaster Recovery Service Provider that will meet your organisation’s disaster recovery objectives requires a reliable third-party technology partner. Aegis CDR 12 + 12 seeks to assist firms of all sizes in backing up their corporate data to the cloud easily, equipping them with unlimited DRaaS resources. 

Categories
Uncategorized

Cybercrime — The Effects of Cybercrime & How to Protect Yourself Against It

As cybersecurity practitioners would have it, ‘it’s not if, but when’ organisations will encounter cybercrime. Many small- and medium-sized businesses (SMEs), particularly, consider their cybersecurity budget secondary. Sadly, it’s these companies that get the short end of the stick.

Research has revealed that over 80% of data breaches involved using weak or stolen passwords. Through employees’ personal devices, cybercriminals can access corporate networks and applications, jeopardising enterprise security. 

Read More: Transitioning to the Cloud: A Step-by-Step Guide for Malaysian SME

The Rise of Phishing Attacks

One of the most commonplace security challenges that both individuals and companies encounter is phishing attacks. Hackers use emails, social media and phone calls to steal valuable data, from passwords to credit cards and other sensitive information.

Did you know that 91% of all cyberattacks begin with a phishing email? Despite extensive efforts to educate users on the dangers and methods of spotting these scams, the attacks have not subsided. On the contrary, they remain highly successful.

To help businesses fathom how they can avoid falling victim, we will first explore this topic deeper. Various phishing techniques that are the modus operandi for attackers include:

  • Embedding a link in emails redirecting employees to an unsecured website that requests sensitive information.
  • Installing a Trojan via malicious email attachments or ads that allows the intruder to exploit loopholes and obtain sensitive information.
  • Spoofing the sender address in emails to appear as a reputable source requesting sensitive information.
  • Impersonating a known company vendor over the phone to obtain corporate information.

Read More: Disaster Recovery Plan for Small Businesses in Malaysia

The Effects of Cybercrime

Small businesses don’t have the best software and hardware investment capacity, so they appear more vulnerable to cybercriminals. Therefore, they are more susceptible to attacks as opposed to larger enterprises. Without adequate protection and security, businesses may undergo many negative effects, such as:

1. Direct and significant financial disruption

The harsh reality points to most businesses shutting down after a large-scale cyberattack within a year. So, evidently, not only will cybercrime impact your company’s profits, it can create irrevocable damage. It can also cause a long-term impact on your company’s reputation and potential for growth.

2. Business disruption and lost productivity

Another debilitating effect businesses can suffer from is costly and time-consuming disruption. As a result, they must invest in repairing and improving IT systems and even retrain employees. After the immediate damage is dealt with, the fact remains that your organisation’s reputation has been compromised. Perhaps you lose contracts or client relationships. Ultimately, the business will have to rebuild its public relations.

3. Loss of reputation and credibility

On top of investing in new security, businesses may struggle with losing financial information or their confidential IP. This calls for auditing and moving financial accounts and attempting to recover the stolen IP. The value of these lost assets is difficult—sometimes impossible—to recover. Moreover, corporations can lose their required cash buffer to survive due to ransomware and more.

Read More: Cloud Service for Small Businesses: A Guide for Malaysian SMEs

Loss of reputation and credibility

Ways to Protect Your Business from Cybercrime

So, what does this mean for you? If you own an SME and haven’t prioritised cybersecurity, there’s no time like the present to change that. Luckily, we’re here to discuss the steps you can take to protect yourself better, even when resources are scarce.

1. Conduct employee training

Employees untrained in proper security practices pose a huge liability. Thus, it’s wise to have a rigid system for reporting signs of an attack. Educate your employees on the warning signs and conduct training sessions with mock phishing scenarios.

In addition, cybersecurity training shouldn’t be a one-time thing but rather a regular undertaking to stay updated with the latest technologies and threats. You want to ensure that the risks are low in the first place!

2. Keep software updated

Outdated software can expose companies to vulnerable security flaws. Unsurprisingly, hackers often study the latest software updates to target businesses that are behind in adopting them. Thus, keeping all systems current with the latest security patches and updates is imperative.

3. Develop a system security plan

It is also advisable to develop a security policy that goes beyond password expiration and complexity. With a system security plan (SSP) in place, you can identify features in a system like hardware, software, their respective security measures, training methods, and security breach protocols. This document should also detail how to limit authorised assess and ensure employees practice secure habits.

Read MoreHow to Implement Data Protection for Employees in Malaysia

4. Enforce secure password policies

Recycling passwords is a big no-no. Passwords should be updated constantly, containing more than eight characters. Just remember, the more complicated your password, the better. Contrarily, the simpler it is, the bigger the field day for hackers as it will be easier to crack. 

5. Deploy software solutions

To go the extra mile, try employing a web filter to block malicious websites. You can also install antivirus solutions, signature updates and monitor the antivirus status on all equipment. Go even further by encrypting sensitive company data and requiring encryption for telecommuting employees.

Read More: Encrypted Cloud Backup: What Malaysian Businesses Need to Know

6. Outsource disaster recovery

Managing cybersecurity issues yourself can get quite overwhelming. However, there are plenty of resources to turn to when you’re feeling lost. Besides outsourcing cybersecurity, you can employ Managed Cloud Disaster Recovery Services, a cloud computing and backup service model that helps prevent disruptions of applications and data during such events.

Having a copy of your important data backed up to the cloud will ensure a way for speedy restoration and minimised downtime. In turn, promising business continuity.

Running a business is stressful enough without having to worry about cybercrime adversities. Thankfully, Aegis CDR 12 + 12 aims to assist SMEs and big enterprises in backing up corporate data in a secure and cost-efficient way. With our help, you’ll be primed for success in no time.

Need help?