Insight Blog

Cyber Month Blog 1

04 Oct: The Top 5 Mistakes Companies Make with Cloud Security

These security missteps represent common low-hanging fruit attackers seek to infect companies with ransomware and other costly exploits. Before the pandemic, cloud adoption was already expanding rapidly, and it accelerated even faster once companies had to make urgent changes to their business operations. For example, the Flexera 2021 State of the Cloud Report found that 61% of companies made slightly higher-than-planned cloud investments and 29% made significantly higher-than-planned cloud investments in 2020. However, besides the overnight changes in how companies work, another area witnessed explosive growth: cyberattacks. According to a research study by Deep Instinct, ransomware attacks increased 435% in 2020 compared with 2019, and malware increased 358% during the same period. Additionally, the average ransomware payout has grown to nearly $234,000 per event, according to cybersecurity firm Coveware.

RK Exchange Blog 1

30 Sep: 4 Things You Must Know to Modernize Your IT Foundation

Like Maslow’s hierarchy of needs, the IT foundation – compute, storage, network – are the food, safety, psychological and self-actualizing resources needed to run applications and access data at a fundamental level. Without them, cloud is not achievable at the scale and performance level companies need on their digital journey. Still, we run into companies who question whether their existing foundation needs to be modernized at all. Let’s discuss why “Modernize the Foundation” is such an area of focus.

Observability Blog

24 Sep: Making a Case for Observability

Imagine the following scenario for an online retailer: During a holiday weekend, the retailer sees a dramatic spike in site visitors after heavily promoting a sales event. On Tuesday morning, the sales and marketing teams meet to review the results. To everyone’s surprise, the spike in traffic resulted in very few sales. Interestingly, the report shows that many site visitors were deep into the sales process before abandoning their carts. For the rest of the week, the staff proposes several theories regarding why visitors didn’t complete their purchases.

Kesaya Breach Blog Image

21 Sep: The Kaseya VSA Breach: Is Anyone Safe?

Earlier this month, Russian-linked cybercriminal organization, REvil, launched the single biggest global ransomware attack on record. The breach infected thousands of victims in more than 17 countries and demanded $70 million in cryptocurrency to unscramble all the infected machines. What made this breach especially noteworthy was the specific conduit the criminals used to gain access to the victims: Kaseya VSA (virtual systems/server administrator), a remote monitoring and management (RMM) solution. RMM solutions are commonly used by managed services providers (MSPs) and managed security services providers (MSSPs) alike. What makes them particularly attractive to cybercriminals is that each MSP/MSSP breach has an enormous trickle-down effect. For example, CBS News reported that Swedish grocery chain Coop had to close most of its 800 stores for multiple days because the attack crippled their cash register software supplier. Thus, not only do these “one-to-many” attacks lead to more victims in a shorter period, but they also lead to bigger payoffs for the attackers.

Intel 9_21 Blog Tile

16 Sep: VMware Cloud on AWS Optimizes Performance with Intel® Architecture

The value of the public cloud and the benefits it provides are evidenced by its aggressive growth and wide acceptance. To support the continued strength of public cloud as an essential element in a modern data center solution, Presidio has emphasized the importance of a robust and optimized infrastructure, taking a methodical approach to identifying which instances are most appropriate for any given workload.

Pinewood Part 4 FI

07 Sep: Part 4: The Right Team for your Cybersecurity and the Pinewood Derby

Sportsmanship and collaboration are the key to success – whether it’s a sports team, colleagues on a project, or winning the Pinewood Derby. Because people are at the center of the data, threats and attacks, and the protection against those, leading security solutions companys such as Proofpoint takes a people-centric approach to cybersecurity. Here at Presidio, our philosophy is also centered around our team of technical experts and  getting the RIGHT people in the RIGHT roles to deliver impactful business outcomes for you.

Pinewood Part 3 Blog Image

02 Sep: Effectiveness of Cybersecurity and Weights

Security is like weight; it can be more effective if you put it in the right places. In a Pinewood Derby you can set a weight anywhere on your car, but it will affect your speed depending on where put the weight.  In your technology organization, by having visibility into Shadow IT, cloud risk assessment, and a true footprint of your applications, you can identify and put the right amount of security in the right places to secure and accelerate your business. Visibility in real-time is key when it comes to cloud security. With so many apps, services and other endpoints moving to the cloud, it can be challenging to have a 360 view of everything that is going on. To respond to threats as they come up, you need to ensure you have a bird’s eye view of your entire cloud ecosystem.

Cisco ISM Blog Feature Image

31 Aug: Why Now’s a Good Time to Re-Evaluate Your IAM

If your user identity and access procedures aren’t orchestrated and automated, you’re fighting a losing battle. Today’s digital landscape is more connected than ever, with an unprecedented number of network endpoints in more places sharing data across public and private clouds. With all these devices all over the place, it’s no wonder IT feels like the network perimeter is disappearing. And the more extensive the network, the bigger the challenge. You’ve got to confidently identify all those people, places and things and give them only the access they need to get the job done—while keeping data secure and maintaining compliance.

Presidio Cisco EN Blog Featured Image

24 Aug: 3 Networking Technologies Enabling the New Way We Work

The work-from-anywhere trend has become the new normal, and new networking technologies and methodologies are needed to sustain it. After 16-plus months of dealing with the pandemic, more than half of Americans want to continue working remotely, and two-thirds of companies may render their work-from-home (WFH) policies permanent, according to research from IBM. Many customers and prospects also are looking to equip their workforces with technology solutions that enable more flexible work arrangements, such as hoteling, where workers dynamically schedule their use of office workspaces, computers and conferencing systems. As a result, the modern workplace is becoming a hybrid environment where work is no longer defined as a place one goes, but rather it’s about the activities one does.

Okta Pinewood Blog Image

20 Aug: Foundational Design of the Security Stack and the Pinewood Car Body

At the core of your Pinewood Derby car is obviously the wooden body. What might not be as obvious is what should be at the core of your Zero Trust Network Access (ZTNA). The answer? Identity, or Identity Access Management (IAM) as the foundation in which to build the rest of your ZTNA. IAM is the core of ZTNA because it is the first step in granting entry. Much like showing your ID to enter a bar or board a plane, you are presenting verification that you are allowed to enter. Furthermore, It answers the question “Who has access to your most valuable asset – your data?” Most cyber-attacks take advantage of misused credentials in some fashion.