Elevating email to the Cloud safely and securely through LiquidCloud.

What lies ahead for your business
and cybersecurity in 2019? What do you do when the cloud goes down?

At LiquidCloud we provide all managed services, support, migration and consulting to assist with your decision to lift and shift into the cloud to not only save you money and give you the return on your investment giving you measurable benefits and savings while mitigating risk and preventing downtime.

We give you the balance of risk and reward in the cloud while we enable access to the right skills and tools to manage your estate.

The World Economic Forum recently placed cybersecurity as the fifth biggest global risk for doing business. 90% of organisations have seen an increase in the volume of attacks in the past 12 months.

Microsoft Office 365 is fast becoming the standard platform for organizations across the globe, with 135 million business users worldwide. Microsoft has revealed that it expects two thirds of its business Office customers using the cloud-based service by early- to mid-2019. With a move to Office 365, there is a lot for organizations to consider, including the impact it will have on email security.

Business email compromise (BEC) campaigns have become an opportunistic business for cyber criminals. From October 2013 to May 2018 the US FBI has reported that email account compromising attacks have resulted in total losses worldwide for known BEC scams hit $12.5 billion.

Unfortunately, most business’s still focus on the endpoint device and security. Endpoint devices such as laptops, desktops, mobile devices have been secured however the attacks today are no longer traditional viruses but have evolved to ransomware or phishing attacks and they are coming through email. If email is not top of your organisations core security strategy, it will be your vulnerability. Education is critical and while the end user is the one who access the link embedded in the email, the focus is that it is through email which has become the transport mechanism. Only 11% of organizations continuously train employees on how to spot cyber-attacks.

The dependency on email becoming a critical business tool and the migration of mail to the cloud to harness cloud benefits continues to create volatility with the growing numbers of connected devices and IOT devices and this is compounding the security challenge as each device represents a potential cybersecurity risk and a new revenue stream for criminals.

Ransomware attacks have become increasingly popular in recent years. How much downtime can your business withstand? 78% of organizations that experienced a ransomware attack over the past year report that downtime lasted for more than one day, with three days of downtime being the average. Ransomware damage costs are predicted to hit $11.5B by 2019.

Due to the value and sensitivity of data accessible via email it continues to be highly sought-after by cyber criminals as a source of revenue.

“Client data management is integral to the continuity of any organisation and, if breached, what is the cost to reputation and trust.”

The threat landscape are no longer new attack types but rather improved execution of existing attack types, with focus on those delivered via email. These attacks of advanced phishing attacks such as flawless phishing, improved social engineering, advanced malware attacks with multiple stages bring new challenges to detection and protection. An increase away from larger organisations to smaller organisations who will lag in their adoption of advanced security detection. And finally, targeted industry verticals such as healthcare and financial industries will be on the rise with new income revenue streams of ransomware and the monetisation of data breaches. Cybercrime have become an economic system in their own right.

Interestingly enough Healthcare and Legal Industries have become the Targeted-Rich Environment for Cybercriminals. As seen globally, the legal sector is the second-most breached sector, after the healthcare industry.

Keeping a cyberattack from happening to your organization is one thing. But having a plan in place for when you get attacked, and how to deal with the fallout, is the important thing

Unfortunately, Small Businesses are not geared technically to prevent
or recover from a data breach attack:

43%

of cyber-attacks target small business.

14%

of small businesses rate their ability to mitigate cyber risks, vulnerabilities and attacks as highly effective.

60%

of small companies go out of business within six months of a cyber-attack.

48%

of data security breaches are caused by acts of malicious intent. Human error or system failure account for the rest.

With the rise of cloud and being able to leverage it for cheap computing and storage, two thoughts come to mind:

What to do when the cloud comes down?
And what lies ahead regarding cybersecurity
and your business in 2019?

Ultimately the key is continued uptime with key strategies in place to not only address the resiliency requirements when the cloud comes down but to prevent your business coming to halt against a cybersecurity attack.

Tools can not only prevent but provide invaluable insight into security gaps to help the company identify business processes or legacy issues that need to be addressed to prevent further compromises cyber-attack paths, malware, vulnerabilities etc.

Every global vendor offering a cloud-based solution invests large amounts of capital into the environment to ensure to prevent a single failure/ multiple failure for customers connected to their services and to prevent the customer knowing about the failure. The cloud is resilient but is your data resilient and your access to it secure – this is your responsibility.

It is imperative to build your strategy with your digital transformation to the cloud to include contingencies such as cloud outages, cyber-attacks and other risks which can prevent you from business continuation.

Archiving and data retention has become another challenge that businesses could face include processing information in a compliant manner, retaining it for the appropriate amount of time, and making it accessible to the owner without exposing the business to any additional risk.

This is why we have partnered and are backed by Global leaders such as Mimecast
on Hosted Exchange and Microsoft Office365. This gives the continuation of services with a single click to switch from Office365 to Mimecast cloud for sending and
creceiving of email. Mail which is fast becoming many organisations main source of business revenue would not even notice an outage. This would meet your security and compliance requirements and you would revert to business as usual post outage.

Cyber attackers will try anything to get into business networks. This is where multi-factor authentication becomes part of the lifeblood of an organisation to not only prevent attacks but understand where the attack is coming from and to activate the necessary prevention and education and awareness.

Remember:

1. Email downtime should not be the new status quo
2. Threat intelligence should be actionable
3. Cybercriminals love industry specified focus
4. Cyber threat intelligence – Time to defend and protect
5. Deficiencies are vulnerabilities