It hasn’t been the best month for browsers, with both Internet Explorer and Google Chrome having zero day incidents.
Announcing an industry first deployment of multi-client access 7130 tier switches
At the foundation of our core network, we have developed a very close relationship with the Arista team, finding their products to be best in class for our use cases. Since the introduction of Arista switching capabilities to our network, we have doubled our total count of Arista switches deployed on the platform year on year.
Like many shrewd organisations, Options invests heavily to ensure its systems are securely protected. However, regardless of how much money, time and effort any organisation expends on technology, one critical weakness will remain – people!
Knowledge is Power:
Hacking human nature is often much easier than hacking security technology.
It hasn’t been the greatest month for Microsoft security. On Tue 10th they released their normal monthly security updates (read our analysis here) but less than 2 weeks later they have released another, this time an unexpected update to address a zero day exploit.
This month, we have another relatively light set of updates but that doesn’t mean the threat of attack has reduced. In fact, the number of ransomware attacks in September has continued to rise, particularly in the public sector. With this in mind, now may be a good time to review your patches...
Despite being around for decades, Windows Event Logging is still one of the most valuable (and underestimated) data sources available. It is also a prime example of how seemingly 'old tech' can be used to great effect by newer security solutions. Information collected via logged data spans a wide variety of application, system and security events, capturing everything from software installations through to failed login attempts.
This month, Microsoft reported 29 critical CVEs, including four critical remote code-execution (RCE) vulnerabilities in Remote Desktop Services (RDS) and a critical RCE flaw in Microsoft Word. These RDS bugs are wormable, allowing an exploit to self-propagate from PC to PC without user interaction, thus setting the scene for a global, fast-moving infection wave.
Malware continues to be one the most prevalent and easily exploitable methods used by hackers to infiltrate sensitive data and execute harmful code. In 2018, a surge in the number of malicious files, URLs, emails or attachments sent to mailboxes led to 76% of businesses falling prey to phishing attacks.
I was very sad to hear the news about Brian Conlon over the weekend. The Northern Ireland technology sector has lost a giant. Our thoughts are with his family who have lost much more.
Reading the eulogies online my feeling is that they haven’t fully captured the impact he had on the software and Fintech sectors in Northern Ireland.
Two weeks ago the CTO of one of our key New York based clients was visiting his European offices and offered to drop into our Belfast office to spend some time with the team. In fact, he agreed to give a presentation on client expectation /context as part of our recently launched Options University (OU).