Using Cloud Services? How are You Managing Risk?

Using Cloud Services? How are You Managing Risk?

Most organizations are “in the cloud” to some degree. You may be running Office 365 for Email or you may be using a cloud based Enterprise Resource Planning or Accounting package. If you think that moving your systems to the cloud has eliminated risk, you should make sure you have considered these controls and know what your vendors are doing to protect your data:

1) What is being backed up and how frequently
2) What access controls are in place to prevent unauthorized access
3) What is the service level agreement (SLA) that is in place (i.e. what does your vendor guarantee for availability) and what happens if that SLA is breached

If you have questions using the cloud or your vendors, give The Atteberry Group a call today.

SMB Relay Attacks and How to Prevent the Attack from Occurring

SMB Relay Attacks and How to Prevent the Attack from Occurring:

Last week it was revealed that there is a known flaw in Windows that can allow domain credentials to be compromised. Using the aptly named SMB relay, it is possible to leak your credentials when performing normal operations including visiting a web site, using Outlook to read your email or using Windows Media Player. The attack is carried out by the attacker positioning himself between a Windows computer and a server and intercepting the traffic between the two and relaying the traffic back.

Those credentials can then be used by the attacker to authenticate as the user on any Windows servers where the user has an account, including those hosted in the cloud.

Fortunately, there is very easy fix to this problem… Prevent SMB traffic from leaving your Local Area Network through the use of firewalls. That’s all it takes, proper configuration on your firewall to prevent SMB traffic outbound.

Contact The Atteberry Group today for a security evaluation. Let us manage your security so that you can focus on your business.

BACK TO TOP