Tips on How To Use the Cloud to Protect Your Company from Harmful email security threats

Registration is now open for an executive technology briefing on Cloud based email filtering and cyber security, 2pm 30th January 2013. Register now for 2 Months free service www.azurecoast.com/briefing

21 January 2013, Zurich Switzerland: Abusive email content, including Spam, Phishing, Malware and Viruses continues to increase, with more than 90% of all email traffic classified as junk.

To any business, small, big or massive, the cost of transporting this junk data is significant, and a waste of precious time and resource. The costs of equipment, IT management and business disruption caused by the presence of junk mail within the network are a real drag on budgets and operations that Cloud solutions can mitigate.

IT managers across the globe have been searching for innovative solutions to protect the corporate mail servers from this abusive content, and have found the most cost effective way is to stop abusive mail content from entering their networks in the first place. With Cloud services becoming so predominant in IT strategy; Cloud based email filtering is now taking the lead as email is a business critical application that can leverage the economics of Cloud technology immediately.

Cloud based email security can show rapid returns in savings by simply eliminating significant amounts of employee’s time across the entire enterprise. Plus, the technology can provide additional features such as disaster recovery and archival that are best run outside the corporate network for redundancy.

Register for the executive briefing now, to learn the tips on how to use Cloud email filtering to protect your business from the exponential growth of email-borne threats. As an added bonus, all attendees will receive a 2 months free Cloud based email filtering to trial. Click here to register now http://azurecoast.com/briefing/

Press Contacts
Contact us here »

Analyst agrees there’s life yet in email, but beware of security

Osterman Research: "making email interesting again" life left in email, but beware of security

A recent post from Osterman Research talks about how email is far from dead in the pan, and we agree.

Despite the rise of importance of texting (SMS) and social media in our daily communications, email still plays a hugely significant role. Whether it’s confirming a new online account, part of an online purchase or delivery of a business proposal, legal document or banking instruction, email simply will not go away.

However, the abuse of email is also on the rise, and the more critical functions email is being used to fill, the more opportunity there is for cyber criminals or cyber vandals to cause damage – from annoying advertising SPAM to coordinated criminal activities such as spear phishing campaigns and the deployment of ransomeware trojans.

There are many ways to improve email security from fundamental changes to the way email works, to multilayered security like that being used across many industries and governments to protect against potential cyber warfare attacks.

At AzureCoast we have decades of experience in email technologies. Today we work with service providers, banks and governments to advise them on how best to mitigate email security risks, with a multilayered approach to cyber security.

Cyber Security & Risk Mitigation - Contact AzureCoast - Experts in Cloud Communications and IP SecurityContact us today to find out how we can help with your security and risk mitigation.

 

[divider]

Read the Osterman Research article here: http://ostermanresearch.wordpress.com/2012/09/12/making-email-interesting-again/

 

Securing BYOD in the Enterprise Cloud

Let’s not kid ourselves, BYOD (Bring Your Own Device) has been an issue for enterprises for a while, but historically it was easy to dismiss and control through Employee T&Cs or Codes of Conduct, i.e. “Personal devices are not authorised for use in this company“. That was ok when all the execs has corporate Blackberry’s and those who really, really needed access from home were given RSA key fobs and VPNs.

But now execs are migrating from Blackberry as fast as Canada’s butterflies, so suddenly the attitude to BYOD has shifted and the IT departments are left wondering how to manage all those pesky iPads that their management are insisting on using.

In this article they talk about Securing BYOD in the Enterprise Cloud, however one thing seems to be missing entirely – how to secure email across all these devices – and seeing as email is still the most widely used communication tool in the enterprise, one that continues to hit the news for leaked, lost and hacked data, it seems to be quite an omission.

[image source_type=”attachment_id” source_value=”212″ title=”HardMail – Securing BYOD email with SMIME Key and Certificate Management” align=”right” icon=”zoom” width=”160″ autoHeight=”true” link=”http://www.azurecoast.com/products/hardmail-encryption-key-manager/” linkTarget=”_self” quality=”95″]AzureCoast have an answer to this, and it is actually quite simple. Head on over to our HardMail product to find out more.

London Underground – 200 laptops per day handed in

 

Think about this number for a minute:

On the city of London’s public transport system alone, around 200 laptops are handed into lost-property offices every day. from article: The Importance of Using Mobile Encryption.

Let’s assume the average number per day is just one half of this number, over the entire year that’s 36,500 laptops a year that are handed in on the London Underground.

Moreover, this is just the number of laptops that are actually handed in by the more honest of travellers. Add to this number those that don’t get handed in. Then multiply that by the number of cities in the UK, Europe, and beyond. There is a huge amount of data that’s being lost, compromised or simply stolen from laptops.

Now, let’s consider the data reported by Symantec last year, showing that one in three consumers either loose their mobile, or have it stolen and add those numbers to the mix, then then amount of corporate, sensitive data that is at risk is colossal.

Despite the plethora of communication mechanisms available today, email is still a primary vehicle for the transfer of sensitive data within a corporation and externally with partners, customers or other third parties. The big problem is email clients typically store this data locally, making it an easy target for compromise. The solution is easy to manage encryption and remote wipe capabilities, find out how HardMail can secure email communications across laptops and mobile devices.

Only as strong as the weakest link

TheNextWeb Insider story on lost email data

The recent leak of email account data of some of the leading oil companies has been attributed to poorly maintained security in less secure shell and sub-domains. This incident is a very real reminder that security is not just the responsibility of one department or individual, and that any weak links could comprise the entire system or organisation.

It highlights the potential issues that ‘data trails’ can cause when weak points in the chain allow information to fall into the wrong hands. More here on TheNextWeb.com »

Many organisations focus so intensely on securing data centres, websites and physical buildings that other aspects of day to day business can often become neglected.

Given that over 99% of all business is now done through digital channels, providing secure communications that are easy to maintain and manage to every employee, contractor and third party has never been more important. Contact us today to find out how HardMail could prevent your organisation from being the next victim of leaked emails.

I can’t listen to that

Value of Privacy in the 60s courtesy of The Andy Griffith Show

Andy Griffith vs the Patriot Act

Growing up in the UK, The Andy Griffith Show is not something I would normally have come across. However a recent article on current.com brought this show and its ‘heart warming’ values to my attention.

It is really interesting to watch this, and see how much the value of privacy has changed since the ’60s.

Debate continues around how much impact the Patriot Act has on the provision, use and risk of using Cloud services in Europe, or indeed elsewhere, and I do not see this coming to a tidy end anytime soon. However, the need for privacy in communications, especially security of email communications has never been higher.

At AzureCoast we have seen many organisations attempt to implement secure email (S/MIME) capabilities, but struggle to maintain the service due to complexities of managing and provisioning certificates and key for hundreds, if not thousands of devices. And this is why we developed HardMail.

If you are an organisation looking to protect your email communications then take a look at the key and certificate management capabilities of HardMail, and get in contact with us to arrange a trial.

The Data Privacy Question

is there a need and solution for secure communications?

The lack of concern about security and data privacy is pandemic. Worse still, as this article describes, it shows no real sign of improving on a wide scale any time soon:

It’s not just that the loss of privacy is a cost of doing business. It’s that we’ve become so lazy, so complacent, that we can’t even muster the energy to realize what we have given up. […] Here’s another possibility. Ours has become a trust-based community. Read the full article here ››

It seems that our societies continue to surrender claims to private communications or privacy in the search for better personal security or getting something for nothing. But is this justified or even realistic?

There’s no such thing as a free lunch.

Many of us were brought up with this ideal. That you get what you pay for, and free just means that you are paying for it some other way that you have not yet discovered. Whether we give up our privacy to get something for free, or because we are told it is “for our safety”, in a general sense this trend will continue.

However, there is a rapidly growing market for secure communications. AzureCoast see this growth across many sectors, including academic institutions, government agencies, banking and financial, research and development, military and security services, and many others.

These security conscious industries demand high levels of security and privacy in their communications and more are demanding their data be stored locally, within Europe or their home nations.

For service providers and telecom operators serious about providing secure services to major organisations there is both an opportunity and a solution. AzureCoast HardMail is a secure and encrypted email and digital communications service designed to enable service providers to deliver hardened, secured communications to a customers who demands the highest levels of data security and privacy.

Contact AzureCoast today to find out how to trial HardMail.

The Patriot Act: Inhibiting Cloud Adoption In Europe?

The Patriot Act Inhibiting Cloud Adoption In Europe from SecureCloudReview.com

Interesting comments from a USA citizen about the European perception of cloud computing and the Patriot Act.

Frankly, being from the US, I always assumed that US companies and especially US Government agencies wanted their data stored in US based clouds. It would seem that many outside the US have very different feelings about storing in the US. Read more here »

In his article he quotes a presentation and comments from Juergen Urbanski of Deutsche Telekom’s T-Systems, discussing the length that European customers will go to to keep their data out of the USA and USA Cloud providers.

The point they both seem to be converging on is that even if the fear of the Patriot Act is overblown, the reality is that there is a demand for secure European cloud services.

Data Sovereignty & Security still a major issue for cloud adoption

Security continues to be an obstacle to cloud adoption

In a recent article from GigaOm discussing the findings of a 2012 Future of Cloud Survey, security and data sovereignty were still cited as a major obstacle to Cloud adoption.

Security concerns still hamper cloud adoption with 55 percent of respondents citing concerns over cloud security. More here »

The issue of security will not go away, and whilst the Patriot Act continues to get so much media attention, consumers and enterprises are still raising questions about where their data is stored and who can have access to it. Obviously, there are many vendors, providers and governments that are unhappy with this negative coverage and they have engaged in several campaigns labelling this simply as Fear Uncertainty and Doubt (FUD).

FUD or not, the issue is here, and those carriers and service providers willing to capitalise on the opportunity will find themselves in stronger positions against those who are not.

AzureCoast’s HardMail is designed for service providers, telecom operators and enterprises who value security and data privacy. As a service provider, HardMail enables you to deliver in-country secure and encrypted communication services to security conscious consumers, businesses and governments. Find out more about HardMail here »

OTT Services for carriers

This week Telefonica announced the availability of their Tu Me application on Android following on from their recent launch on iOS.

Over-the-top, or OTT services have really hit the headlines recently, with many proclaiming OTT application providers to be the death knoll for telecom carriers.

But that doesn’t have to be so. OTT is simply the ability to deliver an application or service to your customer over a network. The contention arises around whether or not the application provider owns, or pays for the network it runs over.

Many service provider already deploy OTT services in some way or another, for example I can manage my Vodafone account over my Virgin broadband network. What is new is the ability to use applications on my mobile to control things on another network, like being able to set my Sky set top box to record a programme on my iPhone over the Vodafone network.

We believe OTT services are a simple evolution of connected applications and devices, and as such have worked hard to develop OTT applications and services that we carrier-friendly.

Take a look at our Branded Button page or our case study on 1ToGo case study for more information.