Cyberis Blog

Reassuringly clear thinking.

  • Cloud risk management
  • Remote working

When you outsource production, you may risk productivity

Gone are the days of anti-virus updates being applied only when a client is connected to a network segment that has visibility of the internal update services. In this new world, updates are being pushed out quickly and automatically from a central cloud service, reducing the exposure time to any potential threat. The security benefit of automatic, fast updates to client systems is obvious. The downside – which sometimes can be measured in terms of productivity - is less so. Productivity benefits are generally why businesses adopt cloud-centric models, that allow them to be agile. However, when we do this, we are at the mercy of these platforms. Global outages or incidents in large cloud platforms do not happen often, but when they do, especially at global scale, the ripples are felt everywhere.

Read more
  • Cloud risk management
  • Cyber Essentials
  • Penetration testing
  • Remote working
  • Tools and techniques

Defining controls by expectation may result in exploitation

One of the significant factors influencing SMEs when selecting security controls is not pragmatic risk management and risk treatment, or even common industry frameworks, as you might imagine - but security controls expected by customers. Supply-chain security management through due diligence activities is often reasonable for this approach, but the one-size-fits-all approach can lead to weaker security models.

Read more
  • Cloud risk management
  • Research
  • Tools and techniques

Intune hacking: when is a "wipe" not a wipe

In this blog post we explore privilege escalation to SYSTEM with Intune managed devices, and how an Intune "Wipe" is not really a wipe at all.

Read more
  • Cloud risk management
  • Remote working

Future Work Expectations

Some industries have already migrated to a cloud centric view for daily operations, and this provides freedom for both the employer and the employees. Companies can now tap into global markets as geography no longer serves as a barrier and as mentioned in previous articles, ZeroTrust models continue to define how these remote identities are connected into the environment.

Read more
  • Cloud risk management
  • Remote working

Cloud-Centric Models

Cloud environment management and setup can be very different from traditional internal/external based infrastructure deployment and therefore careful planning and design consideration is key to building scalable, resilient, secure cloud environments.

Read more
  • Cloud risk management

Identifying errors in cloud configurations that could lead to data breaches

Migrating from an on-premise paradigm to a cloud-based paradigm can be confusing and fraught with unconsidered risks.  When you adopt cloud-based solutions – be they Platform as a Service, Software as a Service or Infrastructure as a Service – you will inevitably outsource much of the management and administration of the service to a cloud provider.  Responsibilities that you previously held yourselves may now be the province of the cloud service provider rather than yourself.  In this environment, you need to understand what your responsibilities are, and what you have delegated externally.

Read more

Improve your security

Our experienced team will identify and address your most critical information security concerns.