Technology Newsletter April 2015

Technology newsletter
Technology Newsletter  April 2015


Welcome to the April edition of the brightstack technology newsletter! The purpose of this newsletter is to keep you informed of the latest technology news. We hope you will find this information useful and will help you to become more productive by getting the most value from your partnership with brightstack! For more information on any of these items please reach out to your account manager or call us at 212-812-9450 option 2.
Enabling Successful Migrations to the Microsoft Cloud

Computer Integrated Services (CIS), brightstack and Microsoft invite you to join us for an engaging educational discussion about the future of business technology. Experts from both organizations will discuss the transformative power of leading-edge cloud solutions for business, and share case studies for businesses that have begun to sail on the Microsoft Cloud.


Why Migrate to the Cloud?
• Cost Savings
• Greater Business Agility
• Reduced IT Complexity
• Ease of Maintenance

All registered attendees will be entered to win a Microsoft Surface 3!

Microsoft's vision for the cloud in the enterprise is focused on preserving an organization’s scarcest resource – human attention. The power of a cloud platform lies in its unparalleled ability to seamlessly orchestrate an individual’s digital work and life experiences so that people can do more and achieve more.


The event will take place Wednesday, April 29th, 2015 from 2:30 PM to 6:00PM (EDT)

Follow the link to register:  Enabling Successful Migrations to the Microsoft Cloud


Microsoft Launches Office 365 Mobile Device Management for Android, iOS, and Windows Phone Devices


Recently Microsoft announced a new MDM (mobile device management) end-point for Office 365 users.  The new MDM software allows Office 365 administrators of businesses, enterprises, EDU and government facilities to easily determine accessibility to Office 365 data for users on their system.  


Because MDM is built directly in to Office 365, users can continue to use their current productivity apps.  Microsoft claims that this MDM is superior to third-party MDM's that replace productivity apps with all-in-one apps for corporate emails, calendars and documents.


Here are some of the features included in the MDM for Office 365:


Remotely wipe a mobile device
If a device is lost or stolen, you can remove sensitive organizational data and help prevent access to your organization’s Office 365 resources by doing a wipe from Office 365 admin center >mobile device management. You can do a selective wipe to remove only organizational data or a full wipe to delete all information from a device and restore it to its factory settings.


Policy settings for mobile devices
If you create a policy to block access with certain settings turned on, users will be blocked from accessing Office 365 resources when using a supported app that is listed in access control for Office 365 email and documents. The settings that can block users from accessing Office 365 resources are in these sections:
-Jail broken
-Managed email profile


Device Management

Set and manage security policies such as device level pin lock and jailbreak detection to help prevent unauthorized users from accessing corporate email and data on lost or stolen devices. 


If some of these features sound familiar, they are.  Microsoft Intune already has many of the  same capabilities.  Integrating these features directly to Office 365, allows these features to be accessed more broadly. 


If you want to see the entire list of features for Microsoft's new MDM for Office 365 click here.


It's Out! Dell's Annual Security Report

Every year Dell releases it's own report on the latest security threat trends.  Leveraging information from Dell's Global Response Intelligence Defense (GRID) and telemetry data from Dell SonicWALL, this report is a great reference on what we all should be on the look out for and how to minimize and/or eliminate cyber-security risks.

This year Dell's report highlights their top security risks, which include surges in point-of-sale (POS) malware, increased malware traffic in encrypted HTTPS protocols, along with twice the number of attacks on supervisory control and data acquisition (SCADA).

POS Attacks
In 2014 we saw a big increase in POS attacks across multiple major retailers.  These attacks not only do monetary damage, but also create face damage.  Customers may stop trusting these businesses, which in the long run is much harder to earn back than just physical damages.

There was also an increase of POS attacks on Dell SonicWALL customers.  The Dell SonicWALL Threat Research Team created 13 POS malware signatures in 2014, compared to three in 2013 for a 333 percent increase in the number of new POS malware countermeasures developed and deployed.  The majority of these POS hits targeted the U.S. retail industry (

HTTPS Web Protocol
HTTPS web protocols saw an uptick in attacks also this past year.  HTTPS is a safer alternative to HTTP, as it encrypts sensitive data, creating a much more secure server.  Hackers however have found ways of exploiting this, by injecting malicious code that can't always be seen. As mentioned before, because of HTTPS encrypting all of the data, certain securtiy systems can't see through the encryption and detect the virus. 

Executive director of Dell Security, Patrick Sweeney, explains, “Managing threats against encrypted web traffic is complicated. Just as encryption can protect sensitive financial or personal information on the web, it unfortunately can also be used by hackers to protect malware. One way organizations mitigate this risk is through SSL-based web browser restrictions, with exceptions for commonly used business applications to avoid slowing company productivity.”

SCADA Systems
Attacks also have doubled on supervisory control and data acquisition (SCADA) systems.  Industrial operations leverage (SCADA) systems to control remote equipment and monitor performance data.  Most of these attacks tend to be for political reasons,  as these attacks tend to target power plants, refineries and factories.  The primary point of attack tends to be through buffer overflow vulnerabilities. 

Patrick Sweeney also commented on the rise of (SCADA) attacks, “Since companies are only required to report data breaches that involve personal or payment information, SCADA attacks often go unreported,” said Sweeney. “This lack of information sharing combined with an aging industrial machinery infrastructure presents huge security challenges that will to continue to grow in the coming months and years.”

Of course these risks can be lowered by increasing internal security protocols with employees and making sure that the security software being leveraged against these types of viruses is up to date. 

If you're a registered user through Dell you can read the entire white paper by clicking here. 

About our newsletters
brightstack publishes a ShoreTel and Technology newsletter each month to keep our users informed and up to date with the latest offerings and news.
Address: 450 7th avenue, New York, New York.
Phone: 212.812.9450 | Fax: 212.812.9451
Find Us
Facebook Email Facebook Email