Microsoft’s local data centres – To move or not to move?

Microsoft is in the process of moving all Office 365 services over to Microsoft data centres in Johannesburg and Cape Town, South Africa. The move has already been made for OneDrive, SharePoint and Exchange services. The rest of the Office 365 services are to follow suit soon.

This has been done to help SA customers meet with compliancy laws and reduce latency that has occurred when SA clients connect to data centres in Ireland.

For Office 365 users, this means their core data will reside in the confines of the South African border with added layers of data privacy and reliability.

New SA customers will automatically have their data stored in local data centres, while existing SA customers will have six months to choose whether to keep their data where it is or join the Office 365 Move Program. Choosing to move will mean Microsoft moving your data over to local data centres in their own time, within the next two years.

Microsoft has ensured their customers that whether they keep their data where it is or whether they move it to local data centres, their experience will remain the same and the process will be seamless. There is also no cost to move data over to local data centres for O365 customers.

Choose the move

Barry Kemp, Head of Managed Services at Vox, advises SA customers to move their data to local data centres. “The quicker you make the move, the quicker you’ll get reduced latency when using Office 365 products and services,” says Kemp.

After two years, all Office 365 users will be moved over to local data centres automatically. “It’s not a case of if you should make the move, it’s a case of when. The sooner the better. Not only for latency, but to also to comply with POPI laws,” adds Kemp.

Making the move involves logging onto your Microsoft portal and clicking “Move”. Microsoft will take it from there.

“Another positive that has come out of Microsoft having local data centres in SA is that government will be able to use Office 365 in their organisations,” says Kemp.

Sign up for Office 365 with Vox and enable your employees to work from anywhere on any device, to collaborate easily with team members on specific projects, find organisation resources, manage content and share ideas all within a single integrated system. Office 365 is available on a monthly subscription so that you can reduce your business’ capital expenditure.

What is a Shared APN and why does your business need it?

Mobile data is a necessity in any business. For one, any company with a sales team needs their sales force to be connected wherever they are, whether on the road, at a client, in a meeting, or at the office. Mobile data is also a great failover connectivity solution in the event of a fixed-line Internet outage as well as when starting a remote or satellite office that does not have any infrastructure set up yet.

Vox Shared APN is a quick to deploy mobile data solution that connects to the MTN or Vodacom network via Vox’s APNs, using one shared data bundle. To put it plainly, with Shared APN, you can manage the usage, security, allocation and analytics of mobile data within your company through one online portal.

Four reasons why your business will benefit from a Shared APN Solution.

  • Administrative life saver!

Imagine having fifty 2GB data contracts for fifty users! That means fifty invoices and fifty users whose data needs to be managed. With Shared APN you are invoiced for one data bundle that can be allocated to a limitless number of users in the company, all done online. Saving you time, hassle and paper!

  • Every cent counts!

Overall data costs are less with Vox Shared APN data. In-bundle rates cost 10c per MB for MTN and 15c per MB for Vodacom, while out-of-bundle rates cost 15c per MB for MTN and 17c per MB for Vodacom. Contract or prepaid out of bundle rates average at roughly 45c per MB with these network providers.

  • Get smart and stay safe!

Shared APN is a secure solution. Sim cards require a username and password in order to connect to the data bundle. If a sim gets stolen, the sim card can’t be accessed without the relevant credentials. If one of your employees decides to abscond and run away with their “free” data, you can immediately disable their username online.

  • Understand your usage

Shared APN provides users with usage reports. Not only does this create accountability for every user (they can be billed for excess use), but it allows you to see who needs more data and who needs less data. These insights will allow you to allocate data to different users based on their usage, helping you avoid overall out-of-bundle rates.

Shared APN gives your business the control it needs over the cost and usage of company mobile data. It is offered in three different solutions: Shared MTN APN, Shared Vodacom APN and a combination of MTN and Vodacom sims called AnyNet APN. Visit Vox to find out more: https://www.vox.co.za/mobile/anynet/.

Data Breaches 101: Don’t Become a Victim

The recent breach of a listed financial services company is a stark reminder that cybercrime is still very much on the rise – with more and more companies and individuals being hit. Here’s how to ensure your organisation doesn’t become a statistic by adopting a security and backup strategy.  

Thanks to our modern reliance on mass quantities of data and internet-based storage and interaction, data breaches are becoming more and more common. And, as our companies and organisations become more connected and dependent on data, the more vulnerable we are to hackers accessing our information.

What is a Data Breach?

A data breach occurs when cybercriminals successfully infiltrate a data source and extract sensitive, protected and confidential information. The main primary intent of the breach is malicious, where the hacker usually threatens to expose the said-information – or use it unlawfully – if a ransom isn’t paid. The breach can be done physically by accessing a computer or network to steal local files, or by bypassing network security remotely.

Cybercrime Continues to Escalate

Recently, cyber security firm, Norton, said globally, 978 million consumers were affected by cyber crime in 2017 stealing a total of $172 billion. According to the South African Banking Risk Information Centre (SABRIC), South Africa reportedly has the third highest number of cybercrime victims worldwide, losing about R2.2 billion a year to cyberattacks. It has also fallen victim to more cyberattacks than any other African country.

Head of Dialdirect Insurance, Maanda Tshifularo, said the losses were more than just financial – each victim of cyber crime spent, on average, nearly two working days dealing with the aftermath of the attack. “The most common crimes were generally low-tech, such as attempts to trick individuals into revealing their personal information through bogus emails,” says Tshifularo.

“With malicious intent underlying these incidents, attacks are directed through multiple areas including the network perimeter, websites and email,” says Jurgen Sorton, Vox Senior Product Manager (Cloud Security Solutions).

Daniel Jacobs, Vox Senior Product Manager (Cloud Computing) adds, “SME clients are most at risk because if they get hit by a full data breach, they could lose their entire customer base and have no choice but to pay the ransom that can cripple their business.”

That’s why both Jurgen and Daniel insist that the only way to effectively respond to these threats is with a full-integrated security and backup strategy.

Prevention is Better than Response

Jurgen offers his top tips on how to put the correct measures in place to stop data breaches in their tracks, so you won’t have to react to them:

  1. Ensure Email Security Has Targeted Threat Protection: Statistics show that up to 90 percent of breaches come via email phishing, and proactively screening for these types of potential threats helps minimise risk.
  2. Use a Reputable Firewall: Rather than relying on consumer equipment, businesses should turn to more robust firewall solutions that include advanced functionality like web and email filtering, data loss prevention, and management and reporting features.
  3. Run Scheduled Tests: Actively looking for weaknesses in your network to close vulnerabilities before they are exploited by hackers. Apart from running a battery of tests including network and port scans (manually or automated through software), companies are turning to hiring ‘white hat’ hackers or even offering the public rewards for finding bugs.
  4. Change Passwords Regularly: A joint study by Google and the University of California that monitored stolen credentials shows that nearly two billion usernames and passwords exposed through breaches are available on the black market. Regularly changing passwords ensures that the integrity of your network and/or data is not compromised.
  5. Check Policies and Procedures: Depending on the size of your business, this can range all the way from a single sheet to a comprehensive document that deals with anything from regulatory compliance to employee awareness. This policy needs to be regularly updated to keep up with business changes and new threats emerging.
  6. Be Cautious About Opening Unsolicited Emails: Employees are increasingly being targeted.with Hackers using ever more sophisticated methods including ‘whaling attacks’ that are a highly personalised form of phishing that are directed at senior management, aimed at getting them to part with confidential company information.
  7. Train Your Staff: As much as companies can rely on technology to improve data and network security, training employees to be digitally vigilant is vital to ensure that endpoints do not turn into the weakest link in the cybersecurity chain. This is especially important as work concepts such as enterprise mobility and ‘Bring Your Own Device’ gain in momentum.

The Backup Plan

Despite best efforts and effective secure measures in place, data breaches can still happen. “The breach could be internal, someone could steal a database and allow a breach, or the individual or company’s email could have been compromised,” says Jurgen.

“That’s why you need a backup plan as protection of your data is two-fold,” adds Daniel. “, Ensure your data is protected so that if something should happen, you are sufficiently armed with the right tools to take the correct and necessary precautions.”

Having an adequate cloud backup service will also ensure redundancy in case of data loss through equipment failure, accidental error, data corruption, natural disasters etc.

“If your perimeter, mail, or endpoint are compromised or fail, your backup gives you that sense of assurance that you can restore your data and continue to work without having to pay a ransom or meet the hackers’ demands,” says Daniel.

Another perk of backup is, because the data is encrypted, it’s unlikely that it can and will be hacked. Also, best practice calls for data backups to be held offsite, and away from your main network. Turning to the cloud for backup and disaster recovery is the most viable option as it further guarantees your information’s safety.

Ask yourself:

  • Do I have internal protection in place and know who has access to what?
  • Do I have adequate perimeter protection so no one can get into my network?
  • Is my email being protected so that I have policies to prevent data leaking via mail and/or people getting in via links and attachments?
  • Do I have backup in the event that someone has been able to breach my perimeters, so that I can restore without having to pay the ransom and/or having to pay it in order to get my client data?

If you answered ‘no’ to any of the above, then Vox can help you. Visit www.vox.co.za to view our full range of cloud security and backup options.

Why you need Managed Desktop Services

According to the South African Banking Risk Information Centre (SABRIC), South Africa has the 3rd highest number of cybercrime victims in the world. As an active target for cyber criminal’s, South African businesses need to be at the forefront of cyber security.

Many viruses use known vulnerabilities in Windows to infect a computer. One of the basic steps to secure an environment is to make sure that all the computers are updated with the latest updates from Microsoft.

A proper desktop security solution includes, anti-virus, OS patching and backup. These are all critical in ensuring that computers are not infected by ransomware or other viruses.

Centrally managed desktop support takes the headache out of managing the protection on a computer and provides a consistent and up to date security experience.

Having all your security components managed by a single provider lets you concentrate on running your business and not worrying about the current Bitcoin price.

Visit https://www.vox.co.za/managed-it-2/ to find more about their Managed IT services.

Wednesday Series of the Week: The Truth about the Harry Quebert Affair.

If you’re looking for an addictive and murky crime series with questionable characters, look no further than The Truth about the Harry Quebert Affair.

Lead character, Harry Quebert (Patrick Dempsey), is a renowned literary professor and famous author. New kid on the block and Quebert’s protégé, Marcus Goldman, has writer’s block and spends his days dodging agents requesting a follow-up to his first mega hit.

Things quickly take a turn for the worst when Quebert is arrested for the murder of fifteen-year-old Nola Kellergan, who disappeared in the 70s. Marcus, along with Sgt. Perry Gahalowood, delve deep into the lives of Maine’s townsfolk to discover what really happened in the summer of 1975.

Season 1, Episode 1 leaves watchers asking: “Did Quebert do it?”

As the show continues, the relationship between Quebert and Kellergan begins to unfold and may leave you feeling rather uncomfortable to say the least. The relationship is explored in a way we don’t usually see on screen. When we witness their first interaction, the mutual attraction is obvious. Is it wrong? Yes, but the producers handle it well and it is not used merely as a shock tactic.

Absolutely engrossing culminating in an unpredicted ending.

The Truth about the Harry Quebert Affair contains multiple twists and never fails to keep you guessing. The show is a genuine whodunnit. However, in my opinion, the ending fell a little short, but the suspense felt throughout the series is definitely worth the watch!

Stream season 1 of The Truth about the Harry Quebert Affair now. Available exclusively on Showmax.

“Absolutely engrossing culminating in an unpredicted ending.” – Diana Martins Prenner, Marketing Manager: PR, Events and Sponsorship.

Check out the trailer below:

SMEs need a different approach to cyber security

Even though the small to medium enterprise (SME) segment is the lifeblood of South Africa’s economy, not enough is being done to educate business owners about the importance of cyber security. This is especially relevant when safeguarding the perimeter from compromises that can put the entire organisation at risk.

The statistics make for grim reading.

A company will be down for at least 14 days a year while trying to restore its systems following a cyberattack. Almost half of all firewalls are provisioned with the wrong rules sets, rendering the network vulnerable to a ransomware attack that, on average demands R200,000. And of those organisations that decide not to pay it, 70% will close within six months.  And if that is not bad enough, half of all businesses do not even have a backup or disaster recovery plan in place.

Clearly, there is significant potential in the SME market to drive cyber security growth. However, smaller companies require a different approach to how vendors position solutions for enterprises. For one, more aggressive price points are needed as SMEs are beholden to cash flow and cannot afford enterprise-class offerings. For these owners, it is less about the value-adds cyber security can provide and more about working as effectively as possible to protect their data.

Integrated protection

Not many small business owners understand (or even care) what phishing, 419 scams, and the like are. They are so focused on delivering on their business needs, that these security concerns often fall by the wayside. This means a 360-degree approach is required that offers protection across all touch points so decision-makers can drive the strategic requirements of the company.

Such an approach starts at the perimeter where an SME must implement an effective firewall solution that offers the appropriate level of ransomware protection. Furthermore, it must integrate with a backup plan that enables the business to restore documents if the worst should happen and ransomware does get through.

Even then, the best firewall in the world will be useless if it is not provisioned properly. This is where a trusted partner becomes vital as it will guide the SME on how best to integrate the firewall if it is not going to become a glorified router.

Unfortunately, many leave this until it is too late. Once a business is hit by ransomware, there is very little to be done for them. It then revolves around damage control and trying to mitigate the loss of mission-critical data in ways that do not force the SME to close its doors a few months down the line.

At your service

With more than 380,000 new threats emerging daily, it is imperative to have a strong firewall capable of protecting the peripheral of the network. Using infrastructure-as-a-service as a foundation, the SME can apply policies and protection where they are needed most. However, this must be continually managed if it is to deliver permanent protection.

This is where managed services become critical for an SME. The service provider can make changes on-demand, perform ongoing health checks, provide reports, and even perform quarterly assessments as part of the firewall offering at a price point the SME can afford.

The digital world of business needs a different way of addressing cyber security concerns. And given how the cloud is permeating everything SMEs are doing, this makes it the ideal platform to drive more sophisticated defences that can be part of a managed offering.

360 degree approach is key to a sound cyber security strategy

The numbers are seemingly terrifying. According to Fortinet, there are over 300 New Zero Day threats and over 140 000 new malware programmes out there, while their security products worldwide are helping to resist 545 000 network intrusion attempts and over 300 000 Botnet Command & Control attempts – every single minute. And, these are statistics from just one security vendor.

While this growing number and complexity of cybersecurity threats toward business, and the ensuing breaches, continue to make headlines around the world, the news coverage of the resulting attacks often tend to focus on larger corporations that are household names. The reality however, is that all businesses are at risk, regardless of their size, popularity or how much they make.

As long as a business has confidential customer records or financial information stored on their network, they are a cybercrime target; hackers know how to exploit any and all weaknesses, and organisations need to take a 360 degree approach to security if they are to sufficiently protect themselves.

Policies and procedures

The starting point for any organisation has to be setting the right policies and standards that makes security by default a priority. This encompasses conducting a comprehensive risk assessment, the setting of guidelines and procedures, who manages security responsibilities, who has access to information, data governance, setting up training and awareness programmes for staff, and ensuring overall regulatory compliance.

Developments in technology have popularised cloud computing, remote working, bring your own device (BYOD) and more, meaning that security cannot be seen or addressed in isolation; the organisation has to take a holistic look at their network, emails, endpoints, vulnerability, and business continuity.

From a legacy perspective, a company network is the first port of call for any attacker, as this is what breaks out to the internet, and a breach has the potential to compromise your entire organisation. In this case, it is important to have a reputable firewall between your network and the rest of the internet in order to stop hackers ‘at the gate’. Having the right products here can further help your organisation better manage available bandwidth, as well as set up proper access control and user management.

The email threat

But the latest threats don’t target networks, but rather emails, which almost every company employee has access to. With improvements in security technology, humans have been left behind as the most vulnerable of gatekeepers.

Statistics show us that 90% of emails being sent have some sort of malicious intent (malware, phishing attacks, and more), with 70% of those leading to a secondary attack on your network. These forms of email attacks are becoming increasingly personalised in order to appear genuine to the end user, and it takes just one compromised email to bring down your entire network.

With a growing number of employees preferring to work from home or remotely, or by using their own devices (laptops, tablets, smartphones and other smart devices), companies need to have a firm grasp of the endpoints that are accessing their network and data. They need to carefully control user management, ensure these devices are secured, as well as have an understanding of which users have permission to access and modify what data. Your security should be able to detect and take immediate action if an employee tries to connect an infected device to your network.

Backup and business continuity

Despite all these precautions, security as a whole is still not foolproof. If any of these defences mentioned above are compromised, and you don’t have a proper backup system in place, you will not be able to restore your business in a timeous manner, and risk suffering from further damage to your brand and reputation.

Your business could even end up being held liable if it was found that it did not have the proper systems and procedures in place to store, manage and safeguard customer information and other personal data.

Apart from properly maintaining their security infrastructure and software, businesses need to ensure their security policies are still valid, as these need to be continually updated to match the evolving threat landscape. You cannot comprehensively mitigate today’s cyber security problems with policies from five years ago.

Skills, education and awareness

To do all of this however, you need to have the right skills in place if you are to secure your network and data, and this is a challenge facing many South African companies. While larger organisations can prioritise security at the C-Suite level and have internal IT staff to maintain network and data security, and ensure that security policies are crafted and adhered to, smaller businesses do not have this luxury – and this is where a managed service provider (MSP) becomes vital.

The right MSP can manage and maintain your security infrastructure, ensure policies are up to date and being adhered to, and that best practices are being applied across the organisation. They should be able to alert you to developing situations, provide a comprehensive report and review of the attempted/successful breach, and put in place measures to remediate the fault.

Lastly, however,  it is important for companies to remember that while they can spend millions on network and data security products and solutions, a human employee that does not understand the security posture or culture of an organisation remains the biggest risk, as all it takes is a click on the wrong link. They need to be continually educated, and brought into the fold to be part of your security defence measures.

Wednesday Series of the Week: Umbrella Academy

One day in 1989, 43 infants are inexplicably born to random, unconnected women who showed no signs of pregnancy the day before. Seven are adopted by billionaire industrialist Sir Reginald Hargreeves, the creator of the Umbrella Academy who prepares his “children” to save the world.

In their teenage years, the family fractures and the team disbands. Fast forward to the present day, when the six surviving members of the clan reunite upon the news of Hargreeves’ passing.

…a refreshing take on the superhero genre…

They work together to solve a mystery surrounding their father’s death, but divergent personalities and abilities again pull the estranged family apart, and a global apocalypse is another imminent threat. The series is based on a collection of comics and graphic novels created and written by My Chemical Romance lead singer Gerard Way.

Umbrella Academy not only looks, feels and sounds different but the production itself is gorgeous and evokes another world while keeping us firmly planted in this one. Yes, it has its flaws and excesses, but the series nonetheless lands in the sweet spot between comedy and drama. Some might say the plot and script are cliched but so what? It’s still a blast to watch, and the actors add further appeal of the show.

Umbrella Academy is a refreshing take on the superhero genre with unique tastes and lovable characters who are all too-real in their struggles with their past, emotional trauma and internal conflicts. We can’t wait for season 2!

Don’t just take our word for it, you too can watch Umbrella Academy, now streaming on Netflix.

Have a look at the Umbrella Academy trailer below.

What is Telephony Reporting and why does your business need it?

Telephony reporting is a tool that gives management greater insights into telephonic office communication habits. The tool helps users make informed decisions about expense management, departmental KPIs, and time management.

Three important ways telephony reporting can add value to your business

  1. No nasty bill surprises

Telephony reporting provides analytical data that can be drilled down from overall business usage to branch, department, user, device, and pin code (issued to a user using multiple devices). This helps you assign budget limits to individual users or specific departments. Budget limits will allow you to predict your bill each month, giving you more control over company spend.

  1. Increase company productivity

Some companies make use of uncapped voice, a voice solution with a set bill each month. Uncapped voice is another great way to have a predictable bill, but it doesn’t have the ability to help you understand usage. With telephony reporting, sales teams and debtor’s clerks can pull reports to see if they have reached or exceeded their call targets for the month. This allows employees to take ownership of their productivity and be accountable for their KPIs.

  1. Take control of your telephony spend

Telephony reporting allows you to see dates, time, calls based on duration, call cost, region, mobile calls, landline calls and top dialed numbers. Users have insight into their usage and can mark calls as business and private. This kind of understanding will help minimize voice call abuse in the company.

Vox offers a telephony reporting tool, Communications Manager, which has all the above mentioned benefits and more. Visit Vox’s website for more information.

Wednesday Series of the Week: When They See Us

When They See Us is a must-watch limited series on Netflix. The show is based on the true story of five young teens who were accused and convicted of assaulting and raping a jogger in Central Park, New York in 1989.

The emotional impact of When They See Us cannot be understated

Labelled the Central Park Five, the quintet maintained they were innocent throughout the trial and even after they were convicted. The family of the Central Park Five spent years fighting their convictions in the hope of exonerating the five teens. In a rather cinematic twist the real assailant comes forward 17 years later and confesses to the crime that the five teens are accused of.

The series spans a quarter of a century from when the teens are first questioned about the incident in the spring of 1989, going through their exoneration in 2002 and ultimately the settlement reached with the city of New York in 2014.

When They See Us is directed and co-written by Oscar Nominee and Emmy Award Winner, Ava DuVernay. The four episodes are packed with a range of emotions that leave the viewer not only angered by the injustice that is thrown upon the teens, but joyful when they are exonerated.

The story is unbelievable, and the performance of the actors draw out your emotions, passion and anger. Shedding at least two tears is guaranteed!

When They See Us is not just a story that highlights racial profiling and the flaws within the American justice system. It’s a story of five young teens who were deprived of their childhood, their dreams and hopes, and of their family, just because of the colour of their skin. The emotional impact of When They See Us cannot be understated.

Stream When They See Us on Netflix and don’t miss the companion special titled: Oprah Winfrey Presents When They See Us Now, featuring interviews with the cast and the exonerated five. This is also available on Netflix.

Check out the trailer below: