Posted on

What is Microsoft Teams?

You have probably come across the name in your online experience, as the popularity has been rising ever since its release in 2017.  Our goal in this journey series is to explain how Teams is used, what are it’s features and how you can expertly use it with your work group.

Microsoft Teams is a part of the Microsoft 365 suite and is being adopted by many businesses around the globe, especially with the current pandemic and social distancing we are all facing. Employees are having to work from home, while adhering to safety precautions and maintaining a healthy lifestyle.

As every organization is unique and has their own requirements, Teams lets you customize the platform to your exact business or cultural needs.

With our Microsoft Teams Journey series, we will be discussing features, applications and tips on how to use Teams with your colleagues or employees. You can look forward to the following topics in the near future:

  • How to use Teams
  • Usage and business application
  • Microsoft 365 Integration
  • Teams and Channels
  • Tabs
  • Apps and app categories 
  • Bots

To begin, we will have a look at what exactly Microsoft Teams is and what it offers :

Microsoft Teams is a collaboration tool for teamwork and communication that gives you the ability to discuss and share information through chat, video, file sharing and storage and app integration.  Think of it as the heart of an organizations place of working together, to achieve a common goal. 

Using the Teams platform, you have the most sought out features that all businesses look for:

Let’s look a bit further into each specific feature:

Communicate – have the option of all communication possibilities, either text, VoIP or video chat from anywhere and at any time. Share ideas and as well as you character with the option to send GIFs, emojis, and stickers in a group chat or direct messages. If you need to be more direct, simply do a voice or video chat, with a single person or many team members at the same time.

Share – Teams is all about collaboration and sharing is an important feature to have. Not only can you share live documents and files while chatting, you can also share them during a meeting or even to people outside of your team. If that’s not enough, you can share your entire desktop screen by giving certain people access to what you are seeing.

Integrate – currently sitting at 406 (yes, that’s right) available apps to choose from, the long list should have some options that your business can benefit from. If, by some chance, there is not a single one that could work for your business, then you also have the option to create your own using the developer toolkit.

Be Secure – the online world is full of cybercriminals who want to get their hands on your data. Teams offers premium security and compliance traits to help you stay secure. From advanced encryption to saving files on a secure cloud, you can be assured that your and your clients information is safe from harm.

Have a look at Microsoft’s video on Teams

Thank you for taking the time to read our blog, this is only the first issue of our Microsoft Teams Journey and we have a lot more exciting information to share with you. The next issue will focus on how to use and navigate Microsoft Teams from your desktop and mobile. Stay tuned!

Get Microsoft Teams today
Or contact us if you have any additional questions: support@3gi.co.za

Posted on

Ransomware – what to expect in 2020

Ransomware attacks continue to become more damaging and complex throughout recent years.  According to Cyber Security Ventures, a new organization will fall victim to ransomware every 11 seconds by 2021, with no signs of slowing down. While the primary targets are typically businesses, it is important for everyone to understand the dangers of malicious attacks. 

What is ransomware?

Ransomware is a type of malware that encrypts a user’s files, preventing them from accessing their data or system. The attacker will then use the encrypted files as a means to solicit money from you, in order for you to regain access to the data. Ransomware enters your system through a corrupted file or link, typically through an email. Victims are then given instructions on how to pay the attackers, and this is commonly done via cryptocurrency – namely Bitcoin. The cost per ransom depends on the cybercriminal and the amount of data that is held ransom.

While attacking your personal computer may be the prime goal, the targeting of mobile devices is increasing each month.

Below are some frightening statistics of ransomware from last year:

  • 1 in 10 URL’s are malicious
  • Ransomware attacks have increased by 97% in the past two years
  • 40% of ransomware victims end up paying the amount requested
  • Over 98% of ransomware payments are done in Bitcoin
  • Ransomware costs business over R115 billion in the past year
  • The average costs of ransomware attacks are R1 632 567
  • Ransomware makes up of 56% of malware attacks
  • The global spending on cybersecurity is over $14 billion


There are many different types of ransomware out there, but most fall into the below 3 categories, ranging from annoying to company destroying:

Scareware

Malicious software designed to trick users into believing that they need to buy or download unwanted software through scare tactics such as the perception of a threat on your pc. Most people have experienced scareware at a point during their online activities as it typically comes in the form of a pop-up. The best course of action is to ignore the pop-up, especially since you should already have reputable security software installed.

Screen Lockers

As the name suggests, this ransomware typically locks your screen on your computer while displaying a message designed to scare and threaten you. The most common example of this is users getting a pop-up window telling them they have been involved in illegal activities and claiming to be from a legit legal department. Screen lockers are less common these days but do still affect a number of users each year.

Encryptors

The most common and threatening form of ransomware. As explained above, encrypting ransomware takes your data, encrypts it so that you do not have access to it anymore and forces you to pay in order to decrypt. This method is the most dangerous because once the attackers have your files, there is nothing that you or your security software can do to regain access. Even upon payment, there is no guarantee that the cybercriminals will release your data.

What can you do to stay safe?

Here are some tips that everyone should know:

Never open email attachments from an untrusted source.

Many ransomware attacks happen through email attachments as attackers will disguise the malware as financial or important documents. Always double-check with the sender of the email, if you are unsure.

Never open email attachments from an untrusted source.

Internet security software and anti-virus programs play a huge role in helping you divert these attacks from your personal computer and network. Make sure to always keep them updated with the latest patches.

Do not trust every link.

It is very important to be wary of random links and URLs sent your way. Just like the email attachments, if you do not know or trust the source then it’s always better to verify with the sender and avoid opening anything.

Back up, back up and back up!

Always try to have your latest work and data backed up. Since 100% is almost impossible, the best course is to regularly back and save as you never know when an attack will come.

To conclude, it is of utmost importance to protect yourself, your business and your loved ones from cybercrime.

The best tool is always awareness and educating yourself and those around you. If you would like more tips and recommendations on keeping yourself, as well as your business, safe from cybercriminals, read our previous blog on how you can protect your business from cybercrime.

Posted on

Protecting Your Business From Cybercrime

Last year, we published a blog on basic security precautions and how to keep thieves and hackers at bay. The mentioned blog was targeted at individuals and the general public, with the primary message of prevention being worth much more than a cure. This year, the focus will be on businesses and how one can protect their data from cybercrime.

It’s important to note that while prevention is crucial and needed, 100% prevention is impossible and any company that claims otherwise is not being truthful.

Cybercrime is increasing at a drastic pace each day, and many businesses are struggling to handle it. Today, business owners have more reason to fear hackers and cyber criminals than burglars that come to your store. The loss of your data and sensitive information can cause irreversible damage compared to the loss of property. While many insurance companies do cover cybercrime and intellectual property, it is difficult to gain trust and reputation back from such an incident.  

A common mistake with small to medium business owners are thinking that they are too small to be targeted, which leads to less effort being put towards protecting themselves. According to Keeper Security’s 2019 SMB Cyberthreat Study, 66% of business leaders at SMB’s don’t believe that they will be affected by cybercrime. For this reason, small businesses are a prime target for attackers.

Here are some interesting statistics on cybercrime from last year:

  • Ransomware attacks on businesses occur every 14 seconds in 2019.
  • Cybercrime will cost up to $6 trillion annually by 2021.
  • 43% of cybersecurity attacks are directed at small businesses.
  • Hacker attacks occur every 39 seconds.
  • Public administration organizations in 2019 received one malicious email for every 302 emails.
  • IoT devices can be hacked within the first 5 minutes of connecting to the internet

While the above may seem alarming, there are many ways that you can protect yourself from attacks. Below are 7 tips that every business owner and leader should be aware of:

  1. Software updates
    Attackers often look for exploits within your system and software. It is imperative to constantly keep abreast with the latest patches and updates. Make sure that all the software used in your company is on the latest version.
  2. Train and educate your staff
    Human error plays a large part in cybersecurity. Over 90% of security breaches happen through an employee who unintentionally gives access and information to an attacker. You can be up to date with the latest security software and still be at risk of an attack. For this reason, it is important to train your staff about cybercrime and security, especially when it comes to phishing emails and weak passwords.
  3. Encryption is key!
    Data is typically a company’s most valuable asset and protecting it should be as important as protecting your physical offices. It is advisable to keep your data as safe as possible within your system. This can be done by dividing it into segments, adding extra layers of security and encrypting it so that even if it is accessed, it cannot be used as effectively. A common mistake is storing the keys that you use to encrypt your data in the same place as where the data is kept, this should never be done as it renders the encryption useless. Lastly, remember to constantly back up your data as you never know when you will need to restore something.
  4. Third-party risk
    If your business has to work with a vendor or a third-party, make sure to always assess the risk involved. This can be done by adding strict criteria to the vetting process and paying attention to their security defenses. Be sure to ask important questions about how they handle and protect their own data, as well as your own. Remember, you are only as strong as your weakest link.
  5. Utilizing a virtual private network (VPN)
    A VPN will help you create a secure connection to your business servers, and prevents people on the internet from intercepting your data. In the modern age, every employee will have their smartphone or laptop at work with many having direct access to the work server. Creating a safe network with a VPN will help you deter hackers and cybercriminals from seeing your unencrypted data in the first place.
  6. Manage user privileges and set up limitations
    Every business needs to know which employees have access to what, in terms of rights and privileges within the organization and network. High-level system privileges should be meticulously monitored and controlled. The best measure is to work by least privilege, this is the bare minimum access a person needs to function in their role.  Additionally, employees should not be able to install software without authorization and approval from a system manager.
  7. Threat monitoring
    It is advisable to set up a complete 24-hour monitoring system, that can help you notice suspicious activity and even attacks before they can escalate and cause further damage. Utilize popular software to monitor or consult a third-party specialist such as a Security Operations Centre.  A common saying is “Prevention is ideal, but detection is a must”.

Ransomware
One of the most common and dangerous forms of cybercrime, where attackers encrypt your data and files and demand payment in order to decrypt and release the data back to you. Each year, more and more business fall victim to ransomware attacks. Last year, a staggering R115 billion was spent by SME’s and large corporations to ransomware attacks. For more information and tips on how to avoid ransomware, read our latest blog on the matter.

To conclude, use the above tips and recommendations to keep your business and data safe from a cyber-attack. The solutions will depend on certain factors of your business, such as the field of work, number of employees, location of the business, etc. Utilize and adapt the cyber defense tactics to suit your business needs and prepare yourself for the future.