IT solution Srl https://itsolutionsrl.it/?lang=en Assistenza tecnica hardware, software, reti a Rovigo Mon, 29 Nov 2021 13:57:58 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.1 https://itsolutionsrl.it/wp-content/uploads/2022/08/cropped-favicon-mamagari-3-32x32.png IT solution Srl https://itsolutionsrl.it/?lang=en 32 32 158874615 Deactivation of CSP subscription for spam or other https://itsolutionsrl.it/2021/11/deactivation-of-csp-subscription-for-spam-or-other/?lang=en Mon, 29 Nov 2021 13:57:58 +0000 https://itsolutionsrl.it/2021/11/deactivation-of-csp-subscription-for-spam-or-other/ Microsofttakes security very seriously. The Microsoft Azureplatform allows subscribers to use their own cloud applications and services by leveraging a wide range of security-focused tools and features. Subscription to the platform takes place through a cloud service provider (CSP), which provides cloud-based storage, application, infrastructure or platform services. Among the tasks of a provider is…

The post Deactivation of CSP subscription for spam or other first appeared on IT solution Srl.]]>
Microsofttakes security very seriously.
The Microsoft Azureplatform allows subscribers to use their own cloud applications and services by leveraging a wide range of security-focused tools and features.

Subscription to the platform takes place through a cloud service provider (CSP), which provides cloud-based storage, application, infrastructure or platform services.
Among the tasks of a provider is the management of security procedures, which consists of protecting data, managing the identities that access it, protecting equipment from malfunctions and much more.

With regard to this aspect, Microsoft has noticed a suspicious increase in spamming, in the last period, among customers subscribing to the Azureplatform.
Spamming is the indiscriminate sending, without the recipient’s consent, of e-mail messages: it is therefore an activity that risks damaging the functioning of the service and that violates the conditions for the use of Microsoft Azureservices.

 

Behaviors deemed harmful

Spamming isn’t the only violation of Microsoft’s acceptable use policy, it’s also considered malicious behavior:

  • Piracy and resale of pirated subscriptions.
  • Distributed Denial of Service (DDoS) attacks, the sending of large amounts of data from different sources to a target to prevent access.
  • Mining of cryptocurrencies.
  • Distribution of malware, malicious software used to damage networks and devices.

In cases where the algorithms detect these activities, Microsoft can deactivate customer subscriptions without any kind of notice!

Cloud Service Providers can also detect anomalous behavior among their customers and can intervene both in person, informing the customer that he is violating the established conditions and that his subscription will be deactivated by Microsoft, or by informing Microsoft that it will do so later.

In the event that Microsoft directly deactivates the customer’s subscription, its Cloud Service Provider will have to take care of repeating the message to the person concerned.

Very often it happens that, when opening an account, the Terms and Conditions of Useare not read thoroughly, but their acceptance and compliance is essential for use.
Customers who see their subscription canceled will no longer be able to access it as they immediately lose access to Microsoft resources, but will be able to fill out the unlock request form.

 

The post Deactivation of CSP subscription for spam or other first appeared on IT solution Srl.]]>
8763
SIAE under attack: 60 GB of data were stolen https://itsolutionsrl.it/2021/10/siae-under-attack-60-gb-of-data-were-stolen/?lang=en Fri, 22 Oct 2021 06:40:09 +0000 https://itsolutionsrl.it/2021/10/siae-under-attack-60-gb-of-data-were-stolen/ Cyber attacks by cybercriminals are the order of the day. Pandemic and the every-growing symbiosi between man and technology will be accomplices, but the activy of these cybercriminals towards our compter system is increasingly frequent.   The attack to SIAE The last important hacker attack inItaly was recorded on 18 October 2021 and targeted SIAE…

The post SIAE under attack: 60 GB of data were stolen first appeared on IT solution Srl.]]>
Cyber attacks by cybercriminals are the order of the day.
Pandemic and the every-growing symbiosi between man and technology will be accomplices, but the activy of these cybercriminals towards our compter system is increasingly frequent.

 

The attack to SIAE

The last important hacker attack inItaly was recorded on 18 October 2021 and targeted SIAE (Italian Society of Authors and Publishers), the company that manages the rights of artists from the world of entertainment and culture, from the recording to the television and publishing.
The criminals’ loot is composed of about60 gigabytes of sensitive data.

From the first evaluations it seems to be a ransomware by Everest Team, a type of malware that limits the access to the device or that codes user’s data that infects Requires a ransom to be paid to remove the restriction or to prevent the publication of decrypted data.

The hacker of the case in question have already published on the Dark Web a small part of the stolen data to prove the authenticity of the hack and they have requested a ransom of 3 million euros in Bitcoin to prevent the publication of the remaining data

The SIAE seems to be not willing to pay the ransom, “We can’t give in to blackmail of criminal persons, we have already made the complaint to the postal police ant to the guarantor of privacy as usual, we will constantly monitor the situation” announces Gaetano Blandini, the general manager of the company.

Among the stolen and published data there are: identity documents, contracts between artists and companies, recognition of works, IBAN:a real tragedy for the victims of this story.

But this, as anticipated, is only the latest in a long series. On August 19, it was the Regional Health Agency of Tuscany to be under attack, on July 31 the information system of the Lazio region, on October 6 the Twich platform and many others…

The only solution to these phenomena is to take strong precautionary measures, because cybercriminals will not end up here.

Don’t wait for a hacker to “knock on your door”… it could be the beginning of the end for your company. Take cover with our security solutions.

 

DISCOVER OUR SOLUTIONS

 

The post SIAE under attack: 60 GB of data were stolen first appeared on IT solution Srl.]]>
8657
Mandatory Green Pass from 15 October: what you need to know https://itsolutionsrl.it/2021/10/mandatory-green-pass-from-15-october-what-you-need-to-know/?lang=en Thu, 21 Oct 2021 09:40:46 +0000 https://itsolutionsrl.it/2021/10/mandatory-green-pass-from-15-october-what-you-need-to-know/

The Legislative decree of 21.09.2021 establishesthe requirement to verify the Green Pass for access in companies, for customers and employees, from 15 October to 31 December, day in which the emergency state ends.
Currently in Italy, over 3 millions workers are not vaccinated, and this measure has a duel purpose: to safeguard workers and prevent new outbreaks and new closures.

Can not access to the company those without:

  • Green certification “Green Pass”
  • Covid-19 recovery certification in the previous six months
  • Negative result of a swab (rapid antigen performed within the last 48 hours/ molecular test performed within the last 72 hours)

Are exemptfrom the Green Pass requirement in the workplace Those who can show a certificate issued by their doctor or a specific QR code that will be relased soon, wich certify the impossibility of receiving the vaccination for health reasons or because they are still awaiting its release (in the case of last minute vaccination).

 

Privacy treatment

The personal data processed will be: name and surname, date of birth, result of the verification of the Green COVID-19 certificate validity. The provision of data is mandatory for access to the company. The decree expresses the prohibition to memorize and keep such data, much less to transfer them to third parties.

 

Consequences

For the worker: In order to protect the health and safety of workers in the workplaces, if an employee declares to be without the Green Pass, he is considered in unjustified absence and he will lose his salary until he adapts to the new legislation. The employment relationship is suspended, but the employee will not lose the ownership of his position, neither he will receive a disciplinary sanction.

In the situation in which an employee without a Green Pass enters the company ignoring the prohibition, there is an administrative penalty ranging from 600 to 1.500 euros.

For the employer: if the empolyer does not appoint a manager and consequently does not carry out the necessary checks, a penalty ranging from 400 to 1000 euros will be incurred.

 

Verification method

These checks should be carried out at the time of access to the workplace; where not possible, a sample check can take place when the staff is already inside the offices. The Government wanted to leave full organizational autonomy, in order to manage the question according to its own reality.

The employer is required to verify the recpect of the provisions and to identify with a formal deed the persons in charge of ascertaining violations and contesting of any violations

Are you wondering what tools to use for verification?

If there is a person in charge of checking the certification, the App VerificaC19 can be downloaded to his device; instead, if you prefer that resource to cover other tasks, we have the solution that’s right for you: the Green Pass reader for thermal imaging cameras!

It’s an additional device to the Covid-19 thermal imaging camera, which in addition to controlling the body temperature and the presence of the protective mask, allow an accurate and immediate verification of the Green Pass in a few seconds anda automatically.

 

DISCOVER OUR SOLUTIONS
The post Mandatory Green Pass from 15 October: what you need to know first appeared on IT solution Srl.]]>
8637
National Cybersecurity Agency https://itsolutionsrl.it/2021/10/national-cybersecurity-agency/?lang=en Thu, 21 Oct 2021 09:40:45 +0000 https://itsolutionsrl.it/2021/10/national-cybersecurity-agency/ Did you know that in 2020 Italy was the 3° most affected country in the world by malware, the 2° hit by ransomware and ranks 24th among the countries analyzed for vulnerability for cybercrime? Covid-19 has been damaging from the users point of view, who have received numerous attacks, but has increased several initiatives aimed…

The post National Cybersecurity Agency first appeared on IT solution Srl.]]>
Did you know that in 2020 Italy was the 3° most affected country in the world by malware, the 2° hit by ransomware and ranks 24th among the countries analyzed for vulnerability for cybercrime?

Covid-19 has been damaging from the users point of view, who have received numerous attacks, but has increased several initiatives aimed at strenghthening cyber security in our country
To tackle the problem of cyber attack, the Government wanted to establishthe National Cybersecurity Agency (ACN). Legitimized by the legislative decree of 4 August 2021, its purpose is to promote the culture of cyber security, the awareness of the public, private amd civil sectors on cyber risks and threats.

The agency operates under the President of the Council of Ministers and the Delegated Authority for the Security of the Republic responsibility, in close contact with the Information System for the security of the Republic.
Roberto Baldoni is at the leader, after leaving his role of Deputy Director of the Information Security Department (DIS)

 

Agency’s duties

Agency’s duties for national cybersecurity can be summarized as follows:

  • It exercises the functions of National Authority in the cybersecurity sector
  • Dvelop national prevention, monitoring, detection and mitigation capabilities to tackle cyber attacs
  • It contributes to raising the security of the Information and Communication Technology system, of subjects included in the national cyber security perimeter, of public administrations, of essential services operators and digital service providers.
  • It increase the development of idustrial technological and scientific skills through project aimed at stimulating a solid labour power in the change of cybersecurity (with a view to national autonomy in the sector)
  • It assumes the function of a single national interlocutor for public or private entities on the subject.

The Agency has also established the Cybersecurity NucleusPresident of the Council of Ministries for aspects relating to prevention and a preparation for any crisis situations and for the activation of alert procedures.
Finally, the decree consitutes the Inter-ministerial Committee for cybersecurity, with advisory, proposal and supervision functions

Information security is achieved thanks to the National Cybersecurity Strategy, which has the task of identifying the profiles and evolutionary trends of the threats and vulnerabilities of national systems, specifying the tasks of the various public and private subjects, the procedures and tools with which to adapt them.
The path taken by the Government seems to go in the right direction. Strengthening cyber security is a necessity to guarantee the availability, integrity and prrivacy of information and data in the Information System.

The post National Cybersecurity Agency first appeared on IT solution Srl.]]>
8636
The internships continue: let’s get to know Camilla better! https://itsolutionsrl.it/2021/10/the-internships-continue-lets-get-to-know-camilla-better/?lang=en Thu, 21 Oct 2021 09:40:44 +0000 https://itsolutionsrl.it/2021/10/the-internships-continue-lets-get-to-know-camilla-better/ My name is Camilla Barbin and I am attending the third year of the three-year degree course in Communication Sciences and Technologies at the University of Ferrara. Today an interesting and important new experience begins for me, the internship. IT Solution will give me the opportunity to practice the knowledge that I acquired in these…

The post The internships continue: let’s get to know Camilla better! first appeared on IT solution Srl.]]>
My name is Camilla Barbin and I am attending the third year of the three-year degree course in Communication Sciences and Technologies at the University of Ferrara.
Today an interesting and important new experience begins for me, the internship. IT Solution will give me the opportunity to practice the knowledge that I acquired in these three years of study, carrying out 300 hours of field work.

The degree course I am attending aims to train specialist in public and social communication, ready to support companies in everything releated to the communication process. Particular attention is paid to marketing, to advertising and to effective communication techniques to keep in touch the company with its customers and to satisfy their every single necessities.

I will carry out my internship in the Marketing office, where I will have the opportunity to follow Giorgia, my company tutor, and to see how business communication is managed.
I am very excited to be able to understand how the various professional programs work, to create and publish articles for corporate websites and to keep their social networks active.

I can’t wait to start!

The post The internships continue: let’s get to know Camilla better! first appeared on IT solution Srl.]]>
8635
Sara’s internship comes to an end https://itsolutionsrl.it/2021/10/saras-internship-comes-to-an-end/?lang=en Mon, 04 Oct 2021 10:25:08 +0000 https://itsolutionsrl.it/2021/10/saras-internship-comes-to-an-end/ An internship is a period of training that allows you to acquire professional skills through hands-on experience in a company. IT Solution offers concrete opportunities for comparison with the world of work through the promotion of internships in the company. This is the end of Sara’s training at our company, and she described her experience…

The post Sara’s internship comes to an end first appeared on IT solution Srl.]]>
An internship is a period of training that allows you to acquire professional skills through hands-on experience in a company. IT Solution offers concrete opportunities for comparison with the world of work through the promotion of internships in the company.

This is the end of Sara’s training at our company, and she described her experience as follows.

Sara’s experience

“My name is Sara Chiorboli, and I am in my final year of studying Language Mediation in Advertising, International Marketing and Public Relations at CIELS University in Padua.

The three-year degree aims to train experts with a know-how of business management, with particular reference to the communication processes of companies. This internship has been a great opportunity to enrich my knowledge and skills.

I was placed in the marketing department, followed by Giorgia. Right away, I found a professional and calm environment that allowed me to put myself out there. All IT Solution staff is available and ready to help if needed. All agreed upon goals were achieved through the use of various web platforms, such as WordPressand IT Solution’s new support site. In both cases I was able to see concretely how the world of communication and marketingworks on a practical level in a company.

I followed the line of my studies also in the linguistic field, through the translationof articles to facilitate the use of the site to people who speak English. I’ve done blog articles in a variety of genres, from food to automotive to home. I have achieved goals and acquired skills that have allowed me to put into practice the theoretical notions, taking care of the management of social networks. I also assisted with customer care, which is critical in an IT company, especially with the advent of remote support.

It has been interesting to see the day to day operation of the IT Solution machine. Machinebecause all the components are essential to the operation of the whole thing, and I assimilated that during this month-long internship.

I would like to end by thanking the company for this opportunity, which has allowed me to improve my communication and relational skills, as well as making me grow professionally and personally”.

The post Sara’s internship comes to an end first appeared on IT solution Srl.]]>
8573
Snom switchboards https://itsolutionsrl.it/2021/09/snom-switchboards/?lang=en Thu, 30 Sep 2021 13:57:47 +0000 https://itsolutionsrl.it/?p=8525 History Founded in 1997 and headquartered in Berlin, Germany, Snom is a German multinational company that produces the world’s first and leading brand of professional and business VoIP phones. Snom is a premium European brand renowned for pioneering VoIP and mass production of VoIP. It produces robust, high-quality, feature-rich business phones designedexclusively for trained and…

The post Snom switchboards first appeared on IT solution Srl.]]>
History

Founded in 1997 and headquartered in Berlin, Germany, Snom is a German multinational company that produces the world’s first and leading brand of professional and business VoIP phones.
Snom is a premium European brand renowned for pioneering VoIP and mass production of VoIP. It produces robust, high-quality, feature-rich business phones designedexclusively for trained and certified IT installers and PBX professionals and universally compatible with leading PBX platforms.

Snom aims to provide you with devices that guarantee high quality communications wherever you are and wants to be at the center of your communications, whether it’s through your cell phone, your desk phone, your computer or anything else.
Snom has more than 4 million endpoints installed globally. It’s a very strong footprint in the small to medium business VoIP telephony market with a loyal customer base that provides continuity over the years. We also cultivate long-standing partnerships with EU telecom operators of all sizes. IT Solution infact is also a Snom authorized center for technical support.

 

Snom’s Products

Snom’s main differentiators are our extremely high standards of voice quality, our high quality of service and our high quality of service. Our German-engineered products that provide reliability, resilience and remarkable RIO, and the value-added capabilities of Snom software, including SIP standards compliance, ease of provisioning, feature richness and security. Customers benefit from a reliable and trustworthy product that delivers good ROI and increases staff satisfaction through its ease of use, integration into enterprise systems and high-quality audio.

 

Snom‘s range of phones is rich in solutions for operations, call center and executive workstations, with color displays, programmable BLF keys, Wi-Fi integration.
Snom specializes in VoIP telephony for unified communications.

The IP phones are interoperable with any IPPBX (3CX, Yeastar, Broadsoft, Freepbx, Asterisk, Elastix etc) providing standard SIP extensions, but they can also be used as an IP terminal for a virtual switchboard (cloud PBX) provided by any IP operator or telecommunications company.

Snom offers Microsoft Skype for Business optimized IP phones, in addition to the standard SIP versions.

The German company, (acquired by Vtech Group) also produces the PA1audio amplifier integration system with which to manage calls via amplifier/speaker on IP PBXs equipped with SIP extensions. PA1 is an excellent interface for audio amplifiers and electrical load control via IP (even remotely).

As far as the DECTwireless systems are concerned, we find the M325and M700solutions.

M325 is a stand alone system that supports wireless repeaters, (so for small structures up to 20 terminals), while the M700 solution, is aimed at companies and accommodation facilities even of large size, thanks to the possibility of installing DECT cells on LAN PoE and, to these, also the wireless repeaters M5, so as to obtain dect coverage of large areas and with many terminals, with the possibility of remoting cells and terminals in geographically distributed locations.

 

The post Snom switchboards first appeared on IT solution Srl.]]>
8525
Virtual Switchboard in the Cloud? https://itsolutionsrl.it/2021/09/virtual-switchboard-in-the-cloud/?lang=en Thu, 30 Sep 2021 13:56:09 +0000 https://itsolutionsrl.it/?p=8542 Cloud PBX is a virtualization of the company’s telephone management system, designed on a software platform with a marginal hardware part, offeringmany advanced features compared to the classic PBX. In fact, in addition to sorting calls and offering voicemail services, it can have inside: an automatic answering machine with preset call diversion; call forwarding also…

The post Virtual Switchboard in the Cloud? first appeared on IT solution Srl.]]>
Cloud PBX is a virtualization of the company’s telephone management system, designed on a software platform with a marginal hardware part, offeringmany advanced features compared to the classic PBX.

In fact, in addition to sorting calls and offering voicemail services, it can have inside:

  • an automatic answering machine with preset call diversion;
  • call forwarding also to a mobile number
  • management of queues to other extensions or voicemail
  • fax function through e-mail
  • traffic history
  • black list and white list management and scheduling
  • possibility to make video conferences and video calls
  • integration with CRM and other corporate databases
  • extension to chat and instant messaging tools.

 

Cloud switchboard: what are the benefits?

The benefits of cloud PBX are many. It allows you to organize your workin a flexibleway, overcoming the concept of telephone extension associated with a telephone system, which can be simply replaced with a pair of headsets and a computer, and that of fixed workstation, thanks to access to its users from anywhere and with any device.

Working and managing smart working, then, will be easier than ever.

It can be connected to multiple devices to receive phone calls and offers a video conference function that can be accessed simply by dialing a number.

Thanks to its integration with CTI (Computer Telephony Integration) platforms, the performance of the phonebecome identical to those of the computer and bothdevices can be used to receive and make calls, either through an application for PC, tablet or smartphone (downloadable from the Play Store or Apple Store), or with special IP or VoIP phones.

The integrationof the switchboard with CRM systems, allows us to offer a high quality level of customer service. Ultimately, the PBX cloud is an advanced and integrated solution that allows you to create a system of Unified Communications and Collaboration suitable for the needs of companies of all sizes.

 

In addition to technologies, the difference between VoIP virtual PBX and traditional PBX reflects different ways of working. The ISDN system, in fact, belongs to an organizational structure in which the desk of the individual has a central role in production processes.

Hence the need for an “extension” combined with a fixed location, from which one rarely leaves to attend meetings in common rooms or to travel outside the office. Today, digital transformation is subverting this order of things, pushing toward approaches that reshape how people stay in the workplace. Approaches such as, for example, ABW (Activity Based Working), which subdivides environments according to the tasks to which the employee is called, or smart working, in which remote activity tends to take on the contours of normality and no longer the exception to the rule. In such a scenario, Unified Communications (UC) platformsbecome essential for their ability to converge communication towards the same individual, regardless of physical location.

That’s what the Cloud PBX does, because it disrupts the concept of the telephone extension associated with the fixed workstation. As demonstrated by, among others, theHot Desking, i.e., the ability to access one’s user profile anywhere and with any device, the SIP Forking, which enables multiple devices to receive the phone call, or the Conference Room in which you do not enter by opening a door, but simply by dialing a number.

 

 

The post Virtual Switchboard in the Cloud? first appeared on IT solution Srl.]]>
8542
IT solution and Sophos team up to block ransomware and save your data https://itsolutionsrl.it/2021/09/it-solution-and-sophos-team-up-to-block-ransomware-and-save-your-data/?lang=en Tue, 28 Sep 2021 13:30:53 +0000 https://itsolutionsrl.it/2021/09/it-solution-and-sophos-team-up-to-block-ransomware-and-save-your-data/

Ransomware is a problem that continues to plague organizations.
A survey in which several companies in 30 countries participated found that more than a third had experienced a ransomware attack in the past 12 months.
These attacks are characterized by an increasing level of complexity and are carried out by hackers who are more and more able to take advantage of network and system vulnerabilities. The consequencesfor organizations are hefty costs to repair the damage, with a staggering average that amounts to more than double that recorded last year!
Modern firewalls are an effective resource for protecting against these types of attacks.

 

Hackers’ targets

Who are the targets of hackers? The short answer is: everyone. In a recent survey of 5,400 IT managers in mid-sized organizations located in 30 different countries, 37% of respondents revealed that they had been affected by ransomware in the past year.
Searching for the term “ransomware attack” in the news, you’ll find that there are a lot of them occurring every week, most of them successful.
The effects are dismantling: ransom demands, long periods of inactivityand a huge impact on business, in addition to reputational damage, data loss and the auctioning of victims’ sensitive data.

 

How ransomware attacks act to infiltrate the network

Hackers use an extensive variety of different Tactics, Techniques and Procedures (TTPs) to penetrate their victims’ networks. SophosLabsand the Sophos Managed Threat Response team have noticed an increase in the number of attacks in which cybercriminals are working to find a way to penetrate their victim’s network.
As it turns out, the main entry point of ransomware is files downloaded or sentto users as part of a spam or phishing attack.
It is therefore essential not to leave security in the hands of users: to prevent this kind of attack it is advisable to protect your organization with powerful and effective firewall protection systems… and we can help you with that!

 

How a ransomware attack works

How to maintain proper protection against ransomware

To properly protect your organization against ransomware, you need to take three main actions.

  1. Upgrade your IT security system

Firewall and endpoint protection can prevent network intrusionsby blocking the attack during the initial stages, and should an attack somehow make it past this barrier, it prevents it from spreading and infecting other systems. But not all firewall and endpoint protection solutions have this capability, so you need to choose an IT security system that is effective. Make sure you have available:

  • Accessible sandboxing capabilities to analyze the behavior of the file at execution before it reaches the network.
  • The latest machine learning technologies to identify zero-day malware variants in files that cross the firewall barrier
  • IPS in the firewall with real-time signature updates, to block network exploits
  • A simple, free remote access VPN so you can manage your network remotely without compromising on security
  • Endpoint protection with anti-ransomware capabilities

 

  1. Isolate remote access and management

In the context of network protection, every party in contact with the outside world represents a possible vulnerability, just waiting to be exploited by a ransomware attack. Isolatethe company’s accessto the Remote Desktop Protocol, avoid leaving ports open, and limit the use of other management protocols are some of the most effective precautions for protecting systems against targeted attacks.
One of the most common ways to do this is to require the use of a VPN before users can access resources such as RDP, and to make sure that access to the VPN is limited to a list of known IP addresses. You should then also protect and strengthen server security, use complex passwords that should be changed frequently, and implement multi-factor authentication.

 

How to proceed securely

Best practices for firewall and network configuration can be summarized as follows:

  • Be sure to use the best possible protection, which should include a high-performance Next-Gen firewall equipped with IPS, TLS inspection, sandboxing for zero-day threats, and anti-ransomware protection with Machine Learning technologies.
  • Isolate RDP and other services with the firewall. The firewall must be able to restrict access only to users using a VPN and to approved and permitted IP addresses.
  • Limit the size of the attack surface as much as possible by controlling and modifying all port forwarding rules to eliminate any unnecessary open ports. Each open port represents a potential entry point to your network. Whenever possible, instead of port forwarding, use VPN to access internal resources from outside the network.
  • Ensure that all open ports are properly secured by applying the right IPS protection to the rules set for the traffic in question.
  • Enable TLS inspection that supports the latest TLS 1.3 standards for web traffic to prevent threats from infiltrating the network using encrypted traffic streams.
  • Reduce the risk of lateral movement within the network by segmenting LANs into smaller, isolated areas or secure VLANs connected by a firewall. Be sure to apply appropriate IPS policies to the rules you set for traffic passing through these LAN segments to prevent the spread of exploits, worms, and bots between LAN segments.
  • Automatic isolation of infected systems. When an infection strikes, it is important that your IT security solution is able to quickly identify compromised systems and isolate them immediately until they can be disinfected (for example, with Sophos Synchronized Security).
  • Use complex passwords and multi-factor authentication for remote management and file sharing tools, so that these passwords cannot be cracked with brute force hacking tools.

 

IT Solution’s help with Sophos security systems

Sophos offers the ultimate IT security solution to protect your systems against the latest types of ransomware. Sophos not only provides the best possible protection on all levels, but also the benefits of years of integration between firewall and endpoint solutions.
All of this translates into tremendous benefits in terms of visibility into network integrity status and the ability to automatically respond to security incidents.
Sophos Firewall is a solution designed to prevent attackers from infiltrating the network in the first place. If ransomware does reach your network, however, the other side of this dual protection comes into play: Sophos Firewall can automatically nip ransomware attacks in the bud, thanks to integration with Sophos Intercept X, an industry-leading endpoint protection platform. It’s like putting your network protection on autopilot – a big help that multiplies your resources and therefore the effectiveness of your security team.

 

In conclusion

Despite being a perennial cyber threat, ransomware will continue to evolve. While ransomware will likely never be completely eradicated, observing the firewall best practices outlined in this document can ensure your organization is more likely to remain protected against the latest types of ransomware and other threats.

At IT solution, we view data security and service efficiency as a must – cyber threats are an increasing concern for organizations that need their services to be as functional as possible. This is why we offer security solutions capable of intercepting all possible threats that risk jeopardizing not only the functioning of systems, but also and above all the security of company data.

Don’t underestimate the risk of malware! Request a free consultation to evaluate the best protection strategy for your business with our Sophos centralized security solutions, here.

The post IT solution and Sophos team up to block ransomware and save your data first appeared on IT solution Srl.]]>
8473
Suspected link between Facebook gate and Italian election results https://itsolutionsrl.it/2021/09/suspected-link-between-facebook-gate-and-italian-election-results/?lang=en Mon, 20 Sep 2021 14:16:00 +0000 https://itsolutionsrl.it/2021/09/suspected-link-between-facebook-gate-and-italian-election-results/ For the past couple of days, Facebook has been notifying users who have fallen into the Cambridge Analytica net that their profiles have been breached: it’s a notice titled “Information Protection” with a link to see what apps users have used and what information has been shared with those apps. Users will be able to…

The post Suspected link between Facebook gate and Italian election results first appeared on IT solution Srl.]]>
For the past couple of days, Facebook has been notifying users who have fallen into the Cambridge Analytica net that their profiles have been breached: it’s a notice titled “Information Protection” with a link to see what apps users have used and what information has been shared with those apps. Users will be able to close apps individually or disable third-party access. As disclosed last week, of the 87 million profiles hacked, more than 200,000 are Italian. In this regard, the Privacy Guarantor, through the mouth of its president Antonello Soro, has pronounced itself, pointing its finger at Facebook, guilty of having allowed the transfer of data to the company Cambridge Analytica without the consent of the interested parties, then changing the purpose of use. The latter, as is well known, was for electoral propaganda. According to the Privacy Guarantor’s statement, Italy will ask for the application of the penalties provided by the new European regulation -GDPR- equal to 4% of the company’s global turnover. Moreover, the investigation will be extended to other companies dealing with political marketing that had signed agreements with the Californian giant: the suspicion is that the Italian accounts violated are much more than the 200 thousand reported. Another fear put forward by the Guarantor is that the victims have been influenced on certain issues such as racism and immigration: according to the verifications carried out by intelligence analysts, there have been exchanges between the Italians profiled by Cambridge Analytica and some fake accounts that had as a feature to have the word “Salvini” in the header.

Yesterday morning, a meeting was held in Brussels between the European Privacy Guarantors with the aim of providing the results of the checks carried out at national level, but above all to decide on the moves to be made. At the Italian level, the task force that had already been set up to verify the information of WhatsApp users by Facebook will most likely be expanded. Recall in this regard that these are two platforms that belong to the same company, but despite this it was found in many cases that the exchange of data between WhatsApp and Facebook had been activated without the explicit consent of those concerned, involving even people who had never signed up to Facebook but had only registered their phone number on WhatsApp. Thus, the usual sore point remains: the lack of awareness of the conditions of use of these tools and the final and intermediate destination of what is poured into them on a daily basis. While waiting for the disbursement of sanctions (the GDPR will be enforceable next May 25) on the European table is already discussing the issue of the criteria to be applied: the prevailing line is to proceed all together, so that it is the European Union to assert its reasons. The only thing that remains to be established is whether the fines should be contested by Great Britain -country where Cambridge Analytica has its headquarters- or by Ireland -where instead Facebook’s European headquarters are located.

According to the declarations of Christopher Wylie, the Cambridge Analytica analyst who disclosed the wrongdoing, Italy would have been the only country to have worked with the British company and that probably a political party may have been favored thanks to the propaganda carried out through Facebook. Faced with such heavy declarations, intelligence and postal police checks were immediately triggered, from which so far at least five fake profiles created to spark debate or send messages on the “hot” topics of the election campaign, especially immigration, have emerged. Making real accusations at the moment is still early because according to analysts these profiles could even have been created to damage the party and further checks will be necessary to establish what kind of influence there has been on users and whether it could have been such as to influence the vote.

Sara Avanzi

The post Suspected link between Facebook gate and Italian election results first appeared on IT solution Srl.]]>
8426